Chenlong头像

Chenlong

Professor

Research direction:

Education:

  • Department:
  • ORCID:
  • DBLP:

10 Access

  • Email: chen_long@buct.edu.cn
  • Office :

Introduction

Long Chen, a Professor at the School of Information Science and Technology, Beijing University of Chemical Technology, holds a Ph.D. in Engineering from the School of Computer Science, Beihang University, serves as a member of the IEEE Computer Society's Technical Committee on Security and Privacy, be recognized as a high-level expert under provincial and ministerial talent programs, held management and research positions at central enterprises, Fortune Global 500 companies, and leading internet firms, leads three featured projects, one provincial and ministerial-level science and technology program, and three municipal-level research and development programs, and participated in several national key R&D programs and National Natural Science Foundation projects. Chen has received numerous awards from institutions such as Ministry of Industry and Information Technology, the Ministry of Education, the China Association for Science and Technology, The People’s Government of Beijing Municipality, and the People’s Government of Liaoning Province, including seven provincial and ministerial-level awards (as the first contributor) and six department and bureau-level awards (as the first contributor). He has published over 20 papers (4 as first author in SCI journals, 7 as first author at internationally renowned conferences), including 4 first-author SCI papers in journals at Chinese Academy of Sciences Zone 2 and 7 papers in CCF-recommended journals and conferences. He has also applied for six national patents, and serves as a reviewer for more than 20 prestigious international journals, including IEEE TDSC, IEEE TGRS, IEEE GRSL, EAAI, IJPRAI, SCCSE, JOG, EESI, and others.


Education

Work Experience

Social Position

Social Activities

Research

Ÿ   Computer Science and Technology, Control Science and Engineering, Software Engineering, and Cyberspace Security

Ÿ   The research group is always opens to recommended exempt student, graduate entrance examination student, Ph.D. applicant via application and assessment, direct PhD students, and experimental class students, interested students are encouraged to contact via email chen_long@buct.edu.cn


Teaching

Computer Science and Technology, Control Science and Engineering, Software Engineering, and Cyberspace Security


Postgraduates

Funding

National Key Research and Development Program of China:

Ÿ   Key Technologies for Cross-domain Collaborative Defense of Large Hub Navigation Infrastructure and Critical Facilities

Hebei Province Key R&D Program:

Ÿ   Research on Key Technologies for QoS in Live IPTV

Shijiazhuang City Key R&D Program:

Ÿ   Research on Key Video Encoding and Decoding Technologies for Live IPTV QoS

Ÿ   Research and Application of Mobile Agricultural Comprehensive Law Enforcement System

Ÿ   Research and Application of Conditional Probability-based E-commerce Intelligent Retrieval Technology for Big Data

Ÿ   Big Data Technology for Network Security Situational Awareness


Vertical Project

Horizontal Project

Publications

1.       CHEN L, ZHANG W, SONG Y, CHEN J*,  Machine Learning for Human-Machine Systems with Advanced Persistent Threats [J]. IEEE Transactions on Human-Machine Systems, 10.1109/THMS.2024.3439625

2.       CHEN L, CHEN J*, XIA C*. Social network behavior and public opinion manipulation [J]. Journal of Information Security and Applications, 2022, 64: 103060.

3.       CHEN L, WANG Q, SONG Y and CHEN J*. Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic [C]. 2023 IEEE 47th Annual Computers, Software, and Applications Conference. 27 –29 June 2023 (Oral)

4.       CHEN L, WANG Q, SONG Y and CHEN J*, A Framework for Few-Shot Network Threats Based on Generative Adversarial Networks [C].  IEEE 28th Symposium on Computers and Communications. 9 –12 July 2023 (Oral)

5.       CHEN L, CHEN J*, XU Q H. Correlations between solid tides and worldwide earthquakes MS≥ 7.0 since 1900 [J]. Natural Hazards and Earth System Sciences, 2012, 12(3): 587-90, doi:10.5194/nhess-12-587-2012, 2012

6.       CHEN L, CHEN J*. Global Military Machine Learning Technology Development Tracking and Evaluation [C]. 20th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International. 2021. DOI: 10.34190/EWS.21.092 (Oral)

7.       SONG X, CHEN J, SONG Y, YU H, CHEN L*, Few-Shot Constraint Enhancement Based on Generative Adversarial Networks [C]. International Conference on Intelligent Computing, Springer Nature, August 5-8 2024

8.       ZHANG Y, CHEN J, SONG Y, YU H, CHEN L*, Generative Adversarial Network for Enhancement Network Security Log Detection. Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14869. Springer, Singapore. https://doi.org/10.1007/978-981-97-5603-2_31 (Oral)

9.       SONG Y, CHEN J, LIU N, ZHANG W, CHI Y, YANG X, HOU X, DING Z, GUO L, CHEN L* Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[C]. International Conference on Intelligent Computing, Springer Nature, August 5-8 2024

10.     CHEN L, CHEN J*. Global Social Network Warfare on Public Opinion [C]. 20th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International. 2021. DOI: 10.34190/EWS.21.093 (Oral)


Awards

Ÿ   The 11th Challenge Cup National Undergraduate Curricular Academic Science and Technology Works By Race

Ÿ   The 12th Challenge Cup National Undergraduate Curricular Academic Science and Technology Works By Race

Ÿ   The 7th Challenge Cup National Undergraduate Curricular Academic Science and Technology Works By Race

Ÿ   The 2nd First China College Student Innovation and Creativity Competition

Ÿ   The 1st First China College Student Innovation and Creativity Competition


Patent

Honor Reward

Admissions Information