个人简介
陈龙,北京化工大学信息学院教授,国家重点研发计划青年科学家(入选2025年全院级重大突出成果),毕业于北京航空航天大学计算机学院,获工学博士学位。任国家重点研发计划专家组组长、国家自然科学基金委高技术中心专家召集人,入选省部级高层次专家人才计划。主持国际合作1项、国防特色项目4项、国家重点研发计划青年科学家项目1项、省部级科技计划4项、市级科学技术研究与发展计划3项,参加国家重点研发计划、国家自然科学基金、省部级项目若干项。获国家教育部、工信部、中国科协、共青团中央、北京市人民政府、河北省人民政府及辽宁省人民政府等单位颁发的多项奖励或表彰,其中省部级5项(第一完成人,其中一项列入2025年全校自然科学类标志性成果),地厅级6项(第一完成人)。近五年,第一作者/通讯作者在TDSC、THMS等期刊及会议发表论文20余篇,申请国家发明专利13项。第一指导教师身份指导学生获“挑战杯”人工智能+赛道获全国三等奖、中国青年科技创新“揭榜挂帅”擂台赛全国三等奖、“青创北京”2025年“挑战杯”首都大学生课外学术科技作品竞赛北京市二等奖。长期担任评审专家组组长或成员(国务院、科技部、国家自然科学基金委、清华大学及国家数据局等几十家机构)。任IEEE TDSC, IEEE TGRS, IEEE GRSL, EAAI, IJPRAI, SCCSE, JOG, EESI, JSRR, BJAST, ARRB, NT J PHYS SCI, AGG, IJECC, AJGR, JGEESI等30余种国际知名期刊审稿人。ICIC 2025、2026学术会议程序委员会委员,Digital Twins and Applications编委。
主要研究学科Areas of Research of Expertise 计算机科学与技术、控制科学与工程、网络空间安全、智能科学与技术、软件工程、信息与通信工程及学科交叉领域 课题组常年接收推免生、考研生、申请考核博士生、直博生、实验班、本科期间进课题组,希望有意向的同学联系邮箱chen_long@buct.edu.cn
科研项目Research Projects 序号 # | 项目名称 Project Name | 项目性质 及来源 Type and Source of the Project | 排序 Personal Ranking | 1 | 网络安全高质量数据集高效构建关键技术 2025YFB3109900 | 国家重点研发计划青年科学家项目 (入选2025年全院级重大突出成果) | 主持人 | 2 | 大型枢纽通航关基设施跨域联动防御关键技术 2024YFB3108400 | 国家重点研发计划青年科学家项目 | 第二 | 3 | 雄安智慧农场知识图谱 | 揭榜挂帅课题 | 负责人 | 4 | 工控系统网络攻击行为动态检测理论与溯源方法 2025SMECP01 | 教育部重点实验室开放课题 | 主持人 | 5 | 面向高级持续性威胁的小样本密流学习 | 中央高校基本科研业务费项目 | 主持人 | 6 | 直播型IPTV QoS关键技术研究 冀科验字2017210065号 | 河北省重点研发计划 | 主持人 | 7 | 直播型IPTVQoS视频编解码关键技术研究 石市科鉴字[2016]第104号 石市科验字第(16141020066)号 | 石家庄市重点研发计划 | 主持人 | 8 | 农业移动综合执法系统研究与应用 石市科验字第(1715201804)号 | 石家庄市重点研发计划 | 第二 | 9 | 面向大数据的条件概率电商智能检索技术研究与应用 石市科验字第(19181063286)号 | 石家庄市重点研发计划 | 主持人 | 10 | 面向网络安全态势感知的大数据技术 石市科验字第(22201042234)号 | 石家庄市重点研发计划 | 主持人 |
主要成果、奖励Main Achievements & Awards 序号 # | 获奖名称 Name of Awards | 奖励等级 Awards Level | 授奖单位及国别 Source and Country of Awards | 奖励年度 Year of Awards | 排序 Personal Ranking | 1 | 河北省科学技术合作奖 | 科学技术合作奖(人物奖) 入选2025年全校标志性成果 | 河北省人民政府 | 2024 | 第一完成人 | 2 | 某未来概念与场景 | 全国三等奖 | 省部级 | 2021 | 第一完成人 | 3 | 第十一届“挑战杯”全国大学生课外学术科技作品竞赛 | 全国三等奖 | 教育部、中国科协、工信部、团中央 | 2009 | 第一完成人 | 4 | 第十二届“挑战杯”全国大学生课外学术科技作品竞赛 | 全国三等奖 | 中国科协、教育部、团中央 | 2011 | 第一完成人 | 5 | 第七届“挑战杯”中国大学生创业计划大赛 | 全国铜奖 | 教育部、中国科协、团中央 | 2010 | 第一完成人 | 6 | 第二届中国大学生创意创业大赛 | 全国二等奖 | 中国高等教育学会 | 2011 | 第一完成人 | 7 | 首届中国大学生创新创意大赛 | 全国三等奖 | 中国高等教育学会 | 2010 | 第一完成人 |
代表性论著 Research Publications 所有作者姓名(第一通讯作者标注*号),著作或论文名称,出版单位或期刊名称:出版或发表年度、期号、起止页码。Authors Names (specify the first corresponding author with *), Title of the publication, Publisher/Journal: Year/Issue/Pages | 期刊类型,期刊领域、排名及分区,期刊影响因子。Journal Type, Area, Ranking and JCR Zone, Impact Factor | 作者 顺序 Author order | 备注 Remarks | CHEN L et al. Cybersecurity multi-dimensional few-shot data generation on malicious enhancement [J]. IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2025.3558545 | SCI, COMPUTER SCIENCE, SOFTWARE ENGINEERING 7/131,Q1, 7.5 CCF推荐期刊 | 第一 | CCF推荐A类 中科院TOP期刊 | CHEN L, Zhang W, Song Y, CHEN J*, Machine Learning for Human-Machine Systems with Advanced Persistent Threats [J]. IEEE Transactions on Human-Machine Systems, vol. 54, no. 6, pp. 753-761, Dec. 2024, doi: 10.1109/THMS.2024.3439625. | SCI, JCR Q1, 3.5 COMPUTER SCIENCE, CYBERNETICS CCF推荐期刊 | 第一 | CCF-B SCI | CHEN L, CHEN J*, XIA C*. Social network behavior and public opinion manipulation [J]. Journal of Information Security and Applications, 2022, 64: 103060. | SCI, JCR Q1, 5.6 COMPUTER SCIENCE, INFORMATION SYSTEMS, 48/251, CCF推荐期刊 | 第一 | 中科院二区 CCF-C SCI | CHEN L, WANG Q, SONG Y and CHEN J*. Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic [C]. 2023 IEEE 47th Annual Computers, Software, and Applications Conference. 27 –29 June 2023 | CCF推荐会议 EI | 第一 | CCF-C EI会议 CPCI会议 | CHEN L, WANG Q, SONG Y and CHEN J*, a framework for few-shot network threats based on generative adversarial networks [C]. IEEE 28th Symposium on Computers and Communications. 9 –12 July 2023 | CCF推荐会议 EI | 第一 | CCF-C EI会议 CPCI会议 | CHEN L, CHEN J*, XU Q H. Correlations between solid tides and worldwide earthquakes MS≥ 7.0 since 1900 [J]. Natural Hazards and Earth System Sciences, 2012, 12(3): 587-90, doi:10.5194/nhess-12-587-2012, 2012 | SCI,JCR Q1, 4.345 MULTIDISCIPLINARY, 36/200 | 第一 | 中科院二区 SCI | CHEN L, CHEN J*. Global military machine learning technology development tracking and evaluation [C]. 20th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International. 2021. DOI: 10.34190/EWS.21.092 | EI CPCI | 第一 | EI会议 | SONG X., CHEN J., SONG Y., YU H., CHEN L.*, few-shot constraint enhancement based on generative adversarial networks [C]. International Conference on Intelligent Computing, Springer Nature, August 5-8 2024 | CCF推荐会议 | 通信作者 | CCF-C 会议 | ZHANG Y., CHEN J., SONG Y., YU H., CHEN L.*, generative adversarial network for enhancement network security log detection. Advanced intelligent computing technology and applications. ICIC 2024. Lecture Notes in Computer Science, vol 14869. Springer, Singapore. https://doi.org/10.1007/978-981-97-5603-2_31 | CCF推荐会议 | 通信作者 | CCF-C 会议 | SONG Y., CHEN J.., LIU N., ZHANG W., CHI Y., YANG X., HOU X.., DING Z., GUO L., CHEN L.*Breeding strategies generation and crop genetic enhancement based on generative adversarial networks[C]. International Conference on Intelligent Computing, Springer Nature, August 5-8 2024 | CCF推荐会议 | 通信作者 | CCF-C 会议 | CHEN L, CHEN J*. Global social network warfare on public opinion [C]. 20th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International. 2021. DOI: 10.34190/EWS.21.093 | EI CPCI | 第一 | EI会议 |
专著 所有作者姓名(第一通讯作者标注*号),著作或论文名称,出版单位或期刊名称:出版或发表年度、期号、起止页码。Authors Names (specify the first corresponding author with *), Title of the publication, Publisher/Journal: Year/Issue/Pages | 出版日期 Publication Date | 作者 顺序 Author order | 实战VMware+Windows—玩转虚拟机,陈龙等编著. 北京 : 中国水利水电出版社, 2026. 1. -- ISBN 978-7-5226-4132-4 | 2026-01-01 | 主编 |
已授权专利:共3项,按照重要性填写主要专利 Granted Patents: , List the patents in the order of importance | 序号 No. | 专利名称 Title | 专利授权国 Country | 专利号. Patent No, | 授权公告日 Date of Granting | 排序 Personal Ranking | 1 | 一种文本增强方法、文本分类方法及相关装置 | 中国 | ZL202110311001.8 | 2021/3/23 | 1 | 2 | 基于IPTV的节目广告发布方法和装置 | 中国 | ZL201610670801.8 | 2019/06/18 | 1 | 3 | 一种自行车防盗报警装置 | 中国 | ZL200520115326.5 | 2006/12/06 | 1 | 尚未授权专利:共11项,按重要性填写主要专利,总共不超过11项 Filed Patent: 11, List the patents (no more than 11) in the order of importance | 序号 No. | 专利名称 Title | 专利申请国 Country | 申请号 Patent No. | 专利申请日 Date of Filing | 排序 Personal Ranking | 1 | 恶意样本增强方法、恶意程序检测方法及对应装置 | 中国 | CN202011598718.7 | 2020/12/29 | 1 | 2 | 一种日志数据增强方法、分类检测方法及系统 | 中国 | CN202011592665.8 | 2020/12/29 | 1 | 3 | 一种流量数据增强方法、流量数据分类方法及相关装置 | 中国 | CN202110310934.5 | 2021/3/23 | 1 | 4 | 一种融合多源传感信息的退化设备健康指标构建方法 | 中国 | CN202510595844.3 | 2025 | 8/8 | 5 | 一种基于预测误差平方和与JS散度的微小故障检测方法 | 中国 | CN202510506860.0 | 2025 | 9/9 | 6 | 一种基于融合小波卷积与窗口注意力机制的多故障诊断方法 | 中国 | CN202510286281.X | 2025 | 9/9 | 7 | 一种三维空间中目标-攻击者-防御者混合博弈的界栅构造方法 | 中国 | CN202411968893.9 | 2025 | 7/10 | 8 | 一种退化设备在线领域迁移剩余寿命预测方法 | 中国 | CN202511010082.2 | 2025 | 8/8 | 9 | 一种基于两阶段维纳过程的退化设备寿命预测方法 | 中国 | CN202510596094.1 | 2025 | 8/8 | 10 | 一种基于神经因果发现与因果特征筛选的工业故障溯源分析方法 | 中国 | CN202510914919.X | 2025 | 9/9 | 11 | 虚假数据注入攻击下多无人机系统的动态分布式安全控制方法 | 中国 | CN202511340610.0 | 2025 | 4/6 |
|
|
|
|
|
|
|
教学成果 序号 # | 获奖名称 Name of Awards | 奖励等级 Awards Level | 授奖单位及国别 Source and Country of Awards | 奖励年度 Year of Awards | 排序 Personal Ranking | | 第十九届“挑战杯”全国大学生课外学术科技作品竞赛“人工智能+” | 全国 | 中国工程院、教育部、中国社科院、共青团中央、中国科协、全国学联、江苏省人民政府 | 2025 | 第一指导教师 | | 中国青年科技创新“揭榜挂帅”擂台赛 | 全国 | 共青团中央 | 2025 | 第一指导教师 | | “青创北京”2025年“挑战杯”首都大学生课外学术科技作品竞赛 | 北京市 | 北京市科协、团市委、北京市教委 | 2025 | 第一指导教师 |
社会职务
担任项目评审专家组的组长或成员: 国务院 科技部 国家自然科学基金委 清华大学 国家数据局 中国科学技术信息研究所 中国科学技术馆 中国国家版本馆 国家海关总署 国家市场监管总局 国家税务总局 全国工商联信息中心 国家疾病预防控制局 中国工业互联网研究院 中国信息通信研究院 中国农科院 中国中医研究院 中国地质调查局 国家基础地理信息中心 国际学术服务: IEEE TDSC, IEEE TGRS, IEEE GRSL, EAAI, IJPRAI, SCCSE, JOG, EESI, JSRR, BJAST, ARRB, NT J PHYS SCI, AGG, IJECC, AJGR, JGEESI等30余种国际知名期刊审稿人。 International Conference on Intelligent Computing (ICIC 2025, 2026) 大会程序委员会委员。 Digital Twins and Applications编委
本科生课程
| 课程名称 |
开课学年 |
课程总学时 |
选课人数 |
课程性质 |
| 大数据技术基础 |
2025 |
48 |
59 |
专业必修 |
| 大数据技术基础实验 |
2025 |
32 |
57 |
实践环节必修 |
纵向项目
- 1. 网络安全高质量数据集高效构建关键技术 ,国家重点研发计划,项目时间:2025-12-18 至 2028-11-30
- 2. 大型枢纽通航关基设施跨域联动防御关键技术 ,国家重点研发计划,项目时间:2024-12-16 至 2027-11-30
横向项目
- 1. 雄安智慧农场知识图谱 ,企事业单位委托科技项目,项目时间:2024-09-28 至 2025-09-27
论文信息
[+][-]代表性论文
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]
2030年
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]
2029年
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]
2028年
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]
2027年
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]
2026年
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]
2025年
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]
2024年
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]
2023年
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
[+][-]2023年之前
-
1. DOI
陈龙,Wang, Yanting,Wang, Qiaojuan,Song, Yanqing,Chen, Jianguo
Cybersecurity Multi-Dimensional Few-Shot Data Generation on Malicious Enhancement[期刊论文],IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,2025-09-01
-
2. DOI
陈龙,Wei Zhang,Yanqing Song,Jianguo Chen
Machine Learning for Military Human-Machine Systems with Advanced Persistent Threat[期刊论文],IEEE Transactions on Human-Machine Systems,2024-10-08
-
3. DOI
SONG Y.,CHEN J.,LIU N.,ZHANG W.,CHI Y.,YANG X.,HOU X.,DING Z.,GUO L.,陈龙
Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
-
4. DOI
Zhang, Yu;Song, Yanqing;Chen, Jianguo;Chen, Long
Generative Adversarial Network for Enhancement Network Security Log Detection[会议论文],Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2024-08-05
-
5. DOI
Xin Song, Yanqing Song,Jianguo Chen,陈龙
Few-shot Constraint Enhancement Based on Generative Adversarial Networks[会议论文],International Conference on Intelligent Computing,2024-08-05
软件著作
| 作者类型 |
作者姓名 |
著作名称 |
出版日期 |
出版社 |
排名/总人数 |
荣誉及奖励
- 1. 河北省科学技术合作奖 ,2025-04-05 00:00:00 ,省部级科技奖励 ,其他
招生信息
课题组常年接收推免生、考研生、申请考核博士生、直博生、实验班、本科期间进课题组,希望有意向的同学联系邮箱chen_long@buct.edu.cn 主要研究学科:计算机科学与技术、控制科学与工程、网络空间安全、软件工程
|