师资队伍

董晨

来源:     发布日期:2021-10-08    浏览次数:

 

                   
               

             
 

福州大学计算机与大数据学院信息安全与网络工程系副主任,硕士生导师。

毕业于武汉大学计算机学院,计算机应用技术专业,获得工学博士学位。

美国加州大学洛杉矶分校(UCLA)访问研究员(visiting researcher)。

获得第二届全国电子线路教学竞赛华东区一等奖,负责制作的课程《网络空间安全概论》获国家级精品在线课程,由实验室研究生助教参与的董老师主讲课程获得福建省精品线上线下课程。

主要方向为人工智能,包括机器学习、智能计算的研究与应用,及其涉及的网络空间安全方面的相关问题。

涵盖大数据、多智能体、智能制造等,同时也关注SoC芯片、AI芯片、生物芯片等安全策略及物理设计相关问题。


***新新新*****招收2024级硕士生:******************************************************

2024年秋季董老师实验室 还剩余1名专硕和1名学硕名额。

专硕学硕 均以“项目驱动” 为途径:

1)对于有深造意愿的同学,以发表高水平论文为手段,侧重培养科研探索能力。重点关注集成电路(SoC)安全设计关键技术方法研究。

2)对于有就业意愿的同学,通过与电力、政府部门的产学研合作项目,侧重培养将前沿知识转化到工程项目的能力。重点关注人工智能方法在行业的应用及实现。

致力通过三年不断夯实,切实培养学生具备创新科研实践能力。


本实验室适合打算读博、想出好科研成果、想具备前沿知识应用能力,在毕业找工作时胜人一筹、不想虚度光阴的同学。

请记住!!!董老师会经常督促学生,切实指导学生掌握独立研究及工作的能力。请打算躺平、没有心理准备的同学绕道!!!

***董老师对学生的要求:由于实验室课题较前沿,更适合具备良好的英语能力和计算机科班基础的同学。要求同学们需要与导师有一致的信念、尊重时间、不怕困难、不轻言放弃、不断突破自己、为成为更好的自己而加倍努力学习!

欢迎本科是计算机相关专业的同学们发邮件咨询!dongchen@fzu.edu.cn


*****指导硕士生情况:*********************************************************

1)指导2019届硕士林诗洁同学,获得“福建省优秀硕士学位论文”;(福州大学共57篇硕士博士论文获得省级优秀论文)

2)指导6位2020届硕士:

2020届共培养6位硕士毕业生,每人发表1-2篇SCI论文,其中5人获得高水平论文奖学金,剩余1人(陈景辉同学)获得国家奖学金。

熊子奇、贺国荣、叶尹3位同学均通过申请考核方式进入其他高校继续攻读博士。

3)指导2021届硕士董旭东同学,获得国家奖学金。

4)指导2022届硕士许熠、洪祺瑜、刘灵清、连思璜发表国际顶级会议论文、中文顶级期刊论文、芯片类卓越期刊TODAES等SCI论文。

5)指导2023届硕士程栋发表芯片类国际顶级会议DATE学术论文,已攻读博士。

6)指导2022级硕士陈力涵发表芯片类CCF A类期刊学术论文,已直博。


*****指导本科生情况:********************************************************

指导的2018届本科毕业生洪志兴同学2021届本科生刘钰琳同学获得“校级优秀毕业设计”(top 2%);另有多名同学获得院优秀论文。范馨文,刘钰琳等多位同学在本科在读期间发表SCI高水平学术论文,保送至985院校读研。


******部分研究成果,近期成果较多,最新成果可在百度学术中查询:******************************************************


X Lin, C Dong, X Liu, D Cheng, “Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain”, International Conference on Machine Learning for Cyber Security, 457-471, 2023

X Lin, C Dong, X Liu, “SFTA: Spiking Neural Networks Vulnerable to Spiking Feature Transferable Attack”, 2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC), 140-149, 2022

Y Ye, S Xiong, C Dong, Z Chen, “The structural weight design method based on the modified grasshopper optimization algorithm”, Multimedia Tools and Applications, 29977–30005, 2022

Y Zhang, C Dong, Y Xu, Y Yao, C Lyu, “RLocHT: A Hardware Trojans Localization Method Utilizing Deep Learning at the Gate-Level”, 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), 2290-2294, 2022

X Lin, C Dong, X Liu, Y Zhang, SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic, 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), 366-375

MEDAguard: A Logic Encryption Scheme for Micro-Electrode-Dot-Array Biochips IP Protection, L LIU, C DONG, X LIU, H LIU, S LIAN, X CHEN, ACTA ELECTONICA SINICA 50 (2), 440

A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense    
W Guo, S Lian, C Dong*, Z Chen, X Huang
ACM Transactions on Design Automation of Electronic Systems (TODAES) 27 (4 …

2022
6G Mobile Communications for Multi-Robot Smart Factory    
Z Chen, KC Chen                  *, C Dong, Z Nie
Journal of ICT Standardization, 371–404-371–404

2021
A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production    
Q Hong, Z Chen, C Dong                  *, Q Xiong
2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC …

2021
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans    
Y Xu, Z Chen, B Huang, X Liu, C Dong                  *
2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications …

2021
Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection    
H Zhang, JL Li, XM Liu, C Dong                  *
Future Generation Computer Systems 122, 130-143
12 2021
MEDASec: Logic Encryption Scheme for Micro-electrode-dot-array Biochips IP Protection    
C Dong, L Liu, X Liu, H Liu, S Lian
Proceedings of the 2021 on Great Lakes Symposium on VLSI, 277-282

2021
Overlapping Community Detection Based on Attribute Augmented Graph    
H Lin, Y Zhan, Z Zhao, Y Chen                  *, C Dong
Entropy 23 (6), 680

2021
BotDetector: An extreme learning machine‐based Internet of Things botnet detection model    
X Dong, C Dong                  *, Z Chen, Y Cheng, B Chen
Transactions on Emerging Telecommunications Technologies 32 (5), e3999
2 2021
HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems    
G He, C Dong                  *, X Huang, W Guo, X Liu, TY Ho
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 415-420
1 2020
Detection of algorithmically generated domain names using the recurrent convolutional neural network with spatial pyramid pooling    
Z Liu, Y Zhang, Y Chen                  *, X Fan, C Dong
Entropy 22 (9), 1058
3 2020
Distributed attack modeling approach based on process mining and graph segmentation    
Y Chen, Z Liu, Y Liu, C Dong                  *
Entropy 22 (9), 1026
6 2020
An unsupervised detection approach for hardware trojans    
C Dong, Y Liu, J Chen, X Liu, W Guo, Y Chen
IEEE Access 8, 158169-158183
6 2020
IPlock: An Effective Hybrid Encryption for Neuromorphic Systems IP Core Protection    
G He, C Dong                  *, Y Liu, X Fan
2020 IEEE 4th Information Technology, Networking, Electronic and Automation …

2020
A survey of DMFBs security: State-of-the-art attack and defense    
C Dong, L Liu, H Liu, W Guo, X Huang, S Lian, X Liu, TY Ho
2020 21st International Symposium on Quality Electronic Design (ISQED), 14-20
12 2020
A novel method on discrete particle swarm optimization for fixed-outline floorplanning    
Y Ye, X Yin, Z Chen, Z Hong, X Fan, C Dong                  *
2020 IEEE International Conference on Artificial Intelligence and …

2020
Hardware Trojans in chips: a survey for detection and prevention    
C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen
Sensors 20 (18), 5165
13 2020
The State-of-the-art in EDA tools: the Hardware Trojan Confrontation Framework    
F Zhang, C Dong                  *, W Hu, J Chen, G He
2019 IEEE 4th Advanced Information Technology, Electronic and Automation …

2019
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things    
C Dong, J Chen, W Guo, J Zou
International Journal of Distributed Sensor Networks 15 (12), 1550147719888098
15 2019
Grasshopper optimization algorithm combining Gaussian and chaos theory for optimization design    
X Chen, Y Ye, C Dong                  *, Z Chen, W Guo, Y Huang
2019 3rd International Conference on Electronic Information Technology and …
1 2019
SSA-MSV: Multiple Supply Voltage for VLSI based on SSA    
Y Liu, R Chen, C Dong                  *, Z Chen
2019 IEEE 10th International Conference on Software Engineering and Service …

2019
Combine Discussion Mechanism and Chaos Strategy on Particle Swarm optimization Algorithm    
X Fan, Y Ye, Z Chen, Z Hong, Z Qiu, C Dong                  *
2019 IEEE 10th International Conference on Software Engineering and Service …

2019
QSSA: Quantum evolutionary salp swarm algorithm for mechanical design    
R Chen, C Dong                  *, Y Ye, Z Chen, Y Liu
IEEE Access 7, 145582-145595
10 2019
A novel chaotic dragonfly algorithm based on sine-cosine mechanism for optimization design    
J Peng, Y Ye, S Chen, C Dong                  *
2019 2nd International Conference on Information Systems and Computer Aided …
3 2019
A Hardware-Trojans detection approach based on eXtreme Gradient Boosting    
J Chen, C Dong                  *, F Zhang, G He
2019 IEEE 2nd International Conference on Computer and Communication …
7 2019
A locating method for multi-purposes HTs based on the boundary network    
C Dong, F Zhang, X Liu, X Huang, W Guo, Y Yang
IEEE Access 7, 110936-110950
13 2019
A method for indoor Wi-Fi location based on improved back propagation neural network    
J Chen, C Dong                  *, G He, X Zhang
Turkish Journal of Electrical Engineering & Computer Sciences 27 (4), 2511-2525
7 2019
Dual-search artificial bee colony algorithm for engineering optimization    
C Dong, Z Xiong, X Liu, Y Ye, Y Yang, W Guo
IEEE Access 7, 24571-24584
9 2019
A multi-layer hardware trojan protection framework for IoT chips    
C Dong, G He, X Liu, Y Yang, W Guo
IEEE Access 7, 23628-23639
34 2019
The sensitivity design of piezoresistive acceleration sensor in industrial IoT    
C Dong, Y Ye, X Liu, Y Yang, W Guo                  *
IEEE Access 7, 16952-16963
9 2019
A chaotic artificial bee colony algorithm based on levy search    
S Lin, C Dong                  *, Z Wang, W Guo, Z Chen, Y Ye
IEICE Transactions on Fundamentals of Electronics, Communications and …
5 2018
The Acceleration Coefficients Self-Adapting In PSO    
C Dong, Z Chen                  *, S Sun
International Journal of Digital Content Technology and its Applications 7 …
3 2013



An adaptive hybrid combination of PSO and Extremal Optimization    
Z Chen, G Wang                  *, C Dong
2012 IEEE International Conference on Information Science and Technology …

2012
Hybrid particle swarm optimization algorithm for fixed-outline floorplanning    
Z Chen, G Wang                  *, C Dong
Proceedings of 2011 International Conference on Computer Science and Network …
1 2011
Multiple voltage assignment based on PSO    
Z Chen, G Wang                  *, C Dong
Proceedings of 2011 International Conference on Computer Science and Network …
4 2011
A VLSI routing algorithm based on improved DPSO    
C Dong, G Wang                  *, Z Chen, S Sun, D Wang
2009 IEEE International Conference on Intelligent Computing and Intelligent …
12 2009
A method of self-adaptive inertia weight for PSO    
C Dong, G Wang                  *, Z Chen, Z Yu
2008 international conference on computer science and software engineering 1 …
53 2008
The inertia weight self-adapting in PSO    
C Dong, G Wang                  *, Z Chen
2008 7th World Congress on Intelligent Control and Automation, 5313-5316
45 2008



2 5G and Beyond 5G Technology for Smart Factories    
Z Chen, KC Chen                  *, C Dong, Z Nie


上一篇
下一篇