爱游戏体育平台罗马赞助商

爱游戏体育平台罗马赞助商: 熊平

发布者:陈溪发布时间:2016-09-18浏览次数:5427

姓名: 熊平

籍贯: 湖北荆州

系: 计算机科学与技术系

民族: 汉

E-mail: pingxiong@zuel.edu.cn



社会兼职:湖北省网络空间安全学会理事 

研究方向:数据挖掘、机器学习、隐私保护

讲授课程:信息安全概论、机器学习基础与实践、密码学

 

个人简历:爱游戏体育平台罗马赞助商教授、博士生导师,IEEE会员,CCF会员,湖北省网络空间安全学会理事。从事信息安全、隐私保护、数据挖掘与机器学习等领域的教学与研究工作。近年来一直专注于差分隐私理论及应用方面的研究,解决在大数据背景下网络空间的用户隐私保护问题,在《计算机学报》、《计算机研究与发展》、FGCS、KAIS、EIS、IEEE Transactions等国内外学术期刊发表学术论文40余篇,主要涉及社交网络、推荐系统以及位置服务应用中的隐私保护问题。

 

学术成果:

1.Xiong P, Liang L, Zhu Y, Zhu T. Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning. Paper presented at: The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA)2021.

2.Xiong P, Li G, Ren W, Zhu T. LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing. Journal of Ambient Intelligence and Humanized Computing. 2021/05/07 2021.

3.Zhang T, Zhu T, Xiong P, Huo H, Tari Z, Zhou W. Correlated Differential Privacy: Feature Selection in Machine Learning. IEEE Transactions on Industrial Informatics. 2020;16(3):2115-2124.

4.Yang Yang, Ping Xiong, Qing Huang, Chen F. Secure and efficient outsourcing computation on large-scale linear regressions. Information Sciences. 2020;522:134-147.

5.Tianqing Zhu , Ping Xiong, Gang Li, Wanlei Zhou, Philip S Yu. Differentially private model publishing in cyber physical systems. Future Generation Computer Systems. 2020/07/01/ 2020;108:1297-1306.

6.Ping Xiong, Lefeng Zhang, Tianqing Zhu, Gang Li, Wanlei Zhou. Private collaborative filtering under untrusted recommender server. Future Generation Computer Systems. 2020;109:511-520.

7.Zhang L, Xiong P, Ren W, Zhu T. A differentially private method for crowdsourcing data submission. Concurrency and Computation: Practice and Experience. 2019;31(19):e5100.

8.Xiong P, Zhu D, Zhang L, Ren W, Zhu T. Optimizing rewards allocation for privacy-preserving spatial crowdsourcing. Computer Communications. 2019/10/15/ 2019;146:85-94.

9.Zhu T, Yang M, Xiong P, Xiong Y, Zhou W. An iteration-based differentially private social network data release. Computer systems science and engineering. 2018;33(2):61-69.

10.Zhu T, Li G, Xiong P, Zhou W. Answering differentially private queries for continual datasets release. Future Generation Computer Systems. 2018/10/01/ 2018;87:816-827.

11.Zhang L, Xiong P, Zhu T. A Differentially Private Method for Crowdsourcing Data Submission2018; Cham.

12.Zhu T, Xiong P, Li G, Zhou W, Yu PS. Differentially private query learning: From data publishing to model publishing. Paper presented at: 2017 IEEE International Conference on Big Data (Big Data); 11-14 Dec. 2017, 2017.

13.Xiong P, Zhang L, Zhu T. Reward-based spatial crowdsourcing with differential privacy preservation. Enterprise Information Systems. 2017;11(10):1500-1517.

14.Zhu T, Li G, Zhou W, Xiong P, Yuan C. Privacy-preserving topic model for tagging recommender systems. Knowledge and Information Systems. 2016;46(1):33-58.

15.Xiong P, Zhu T, Niu W, Li G. A differentially private algorithm for location data release. Knowledge and Information Systems. 2016;47(3):647-669.

16.Xiong P, Zhang L, Zhu T. Semantic analysis in location privacy preserving. Concurrency and Computation: Practice and Experience. 2016;28(6):1884-1899.

17.Zhu T, Xiong P, Li G, Zhou W. Correlated differential privacy: hiding information in non-IID data set. Information Forensics and Security, IEEE Transactions on. 2015;10(2):229-242.

18.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Privacy preserving data release for tagging recommender systems. Paper presented at: Web Intelligence2015.

19.Zhang L, Lu X, Xiong P, Zhu T. A Differentially Private Method for Reward-Based Spatial Crowdsourcing. Applications and Techniques in Information Security: Springer; 2015:153-164.

20.Yang F, Zheng Y, Xiong P. An Overview of Ad Hoc Network Security. Applications and Techniques in Information Security: Springer; 2015:129-137.

21.熊平, 朱天清王晓峰差分隐私保护及其应用计算机学报. 2014;37(1):101.

22.熊平, 朱天清金大卫一种面向决策树构建的差分隐私保护算法计算机应用研究. 2014;31(10):3108-3112.

23.熊平, 朱天清顾霄基于信息增益比例约束的数据匿名方法及其评估机制计算机应用研究. 2014;31(3):819-824.

24.熊平, 顾霄基于属性权重最优化的 k-means 聚类算法微电子学与计算机. 2014;31(4):40-43.

25.Zhu T, Ren Y, Zhou W, Rong J, Xiong P. An effective privacy preserving algorithm for neighborhood-based collaborative filtering. Future Generation Computer Systems. 2014;36:142-155.

26.Zhu T, Li G, Zhou W, Xiong P, Yuan C. Deferentially private tagging recommendation based on topic model. Advances in knowledge discovery and data mining: Springer; 2014:557-568.

27.Zhang L, Xiong P, Zhu T. Location Privacy Preserving for Semantic-Aware Applications. Applications and Techniques in Information Security: Springer; 2014:135-146.

28.Xiong P, Zhu T, Pan L, Niu W, Li G. Privacy Preserving in Location Data Release: A Differential Privacy Approach. PRICAI 2014: Trends in Artificial Intelligence: Springer; 2014:183-195.

29.Xiong P, Wang X, Niu W, Zhu T, Li G. Android malware detection with contrasting permission patterns. Communications, China. 2014;11(8):1-14.

30.Zhu T, Xiong P, Xiang Y, Zhou W. An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. Paper presented at: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on2013.

31.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Differential privacy for neighborhood-based collaborative filtering. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Niagara, Ontario, Canada: ACM; 2013:752-759.

32.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Privacy Preserving for Tagging Recommender Systems. Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01: IEEE Computer Society; 2013:81-88.

33.熊平. 信息安全原理及应用: 清华大学出版社; 2012.

34.熊平. 基于杂度削减的连续属性离散化方法统计与决策. 2012(5):35-37.

35.平熊, 朱天清基于杂度增益与层次聚类的数据匿名方法计算机研究与发展. 2012;49(7):1545-1552.

36.Xiong P, Zhu T. An anonymization method based on tradeoff between utility and privacy for data publishing. Paper presented at: Management of e-Commerce and e-Government (ICMeCG), 2012 International Conference on2012.

37.熊平. 数据挖掘算法与Clementine实践: 清华大学出版社; 2011.

38.钱学锋, 熊平中国出口增长的二元边际及其因素决定经验研究经济研究. 2010;1:65-79.

39.钱学锋, 熊平李嘉图比较优势特惠贸易安排与产业集聚经济学 (季刊). 2009;3:002.

40.熊平. 基于正常轮廓更新的自适应异常检测方法武汉大学学报:信息科学版2007;32(9):842-845.

41.朱天清, 熊平:亓嬖蛲诰蚣捌渌惴ㄑ芯武汉工业学院学报. 2005;24(1):24-28.

42.熊平, 朱天清黄天戍:亓嬖蛲诰蛩惴捌湓谝斐<觳庵械挠τ武汉大学学报:信息科学版2005;30(9):841-845.

43.Zhu T-Q, Xiong P. Optimization of membership functions in anomaly detection based on fuzzy data mining. Paper presented at: Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on2005.

44.朱天清, 王先培熊平. IDS 中的:亓嬖蛲诰蛴胂煊计算机工程与应用. 2004;40(15):148-150.

45.Huang T, Xiong P, Zhu T. Data mining model and algorithm in IDS. Paper presented at: Asia-Pacific Optical and Wireless Communications2004.

46.王先培, 朱天清熊平基于 MAS 的电力系统脆弱性评估与控制电力系统及其自动化学报. 2003;15(3):20-22.

47.王先培, 张爱菊熊平张俊新一代数据加密标准——AES. 计算机工程. 2003;29(3):69-70.

48.Xiong P, Huang T-s, Yi K, Zhu T-q. Design of communication port between DCS and computers of RTU. Paper presented at: Machine Learning and Cybernetics, 2003 International Conference on2003.

49.熊平, 王先培张爱菊网络入侵检测方法中国数据通信. 2002;4(2):35-38.

50.熊平, 王先培. P2DR 模型基于时间的量化分析信息技术. 2002(7):27-28.

51.王先培, 熊平李文武防火墙和入侵检测系统在电力企业信息网络中的应用电力系统自动化. 2002;26(5):60-63.




爱游戏体育平台罗马赞助商(游戏)有限公司