Dr. Long Chen
Professor
Email:chen_long@buct.edu.cn
Background
Long Chen, a Professor at the School of Information Science and Technology, Beijing University of Chemical Technology, holds a Ph.D. in Engineering from the School of Computer Science, Beihang University, serves as a member of the IEEE Computer Society's Technical Committee on Security and Privacy, be recognized as a high-level expert under provincial and ministerial talent programs, held management and research positions at central enterprises, Fortune Global 500 companies, and leading internet firms, leads three featured projects, one provincial and ministerial-level science and technology program, and three municipal-level research and development programs, and participated in several national key R&D programs and National Natural Science Foundation projects. Chen has received numerous awards from institutions such as Ministry of Industry and Information Technology, the Ministry of Education, the China Association for Science and Technology, The People’s Government of Beijing Municipality, and the People’s Government of Liaoning Province, including seven provincial and ministerial-level awards (as the first contributor) and six department and bureau-level awards (as the first contributor). He has published over 20 papers (4 as first author in SCI journals, 7 as first author at internationally renowned conferences), including 4 first-author SCI papers in journals at Chinese Academy of Sciences Zone 2 and 7 papers in CCF-recommended journals and conferences. He has also applied for six national patents, and serves as a reviewer for more than 20 prestigious international journals, including IEEE TDSC, IEEE TGRS, IEEE GRSL, EAAI, IJPRAI, SCCSE, JOG, EESI, and others.
Areas of Research of Expertise
Computer Science and Technology, Control Science and Engineering, Software Engineering, and Cyberspace Security
The research group is always opens to recommended exempt student, graduate entrance examination student, Ph.D. applicant via application and assessment, direct PhD students, and experimental class students, interested students are encouraged to contact via email chen_long@buct.edu.cn
Research
Funded Research Projects
Relevant Supervisory Authorities:
Nine Featured projects
National Natural Science Foundation Joint Fund:
Research on Immunization Defense Mechanisms and Technologies for Personal Computing Environments in Cyberspace
General Program of the National Natural Science Foundation:
Research on Trusted Execution Mechanisms in Open Time-Varying Network Computing Environments
Youth Program of the National Natural Science Foundation:
Information Dissemination Modeling and Key Network Structure Discovery Based on Social Network Text Interaction Content
Hebei Province Key R&D Program:
Research on Key Technologies for QoS in Live IPTV
Shijiazhuang City Key R&D Program:
Research on Key Video Encoding and Decoding Technologies for Live IPTV QoS
Research and Application of Mobile Agricultural Comprehensive Law Enforcement System
Research and Application of Conditional Probability-based E-commerce Intelligent Retrieval Technology for Big Data
Big Data Technology for Network Security Situational Awareness
Main Achievements & Awards
The 11th "Challenge Cup" National Undergraduate Curricular Academic Science and Technology Works By Race
The 12th "Challenge Cup" National Undergraduate Curricular Academic Science and Technology Works By Race
The 7th "Challenge Cup" National Undergraduate Curricular Academic Science and Technology Works By Race
The 2nd First China College Student Innovation and Creativity Competition
The 1st First China College Student Innovation and Creativity Competition
Representative Publications
CHEN L, Zhang W, Song Y, CHEN J*, Machine Learning for Human-Machine Systems with Advanced Persistent Threats [J]. IEEE Transactions on Human-Machine Systems, 10.1109/THMS.2024.3439625
CHEN L, CHEN J*, XIA C*. Social network behavior and public opinion manipulation [J]. Journal of Information Security and Applications, 2022, 64: 103060.
CHEN L, WANG Q, SONG Y and CHEN J*. Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic [C]. 2023 IEEE 47th Annual Computers, Software, and Applications Conference. 27 –29 June 2023 (Oral)
CHEN L, WANG Q, SONG Y and CHEN J*, A Framework for Few-Shot Network Threats Based on Generative Adversarial Networks [C]. IEEE 28th Symposium on Computers and Communications. 9 –12 July 2023 (Oral)
CHEN L, CHEN J*, XU Q H. Correlations between solid tides and worldwide earthquakes MS≥ 7.0 since 1900 [J]. Natural Hazards and Earth System Sciences, 2012, 12(3): 587-90, doi:10.5194/nhess-12-587-2012, 2012
CHEN L, CHEN J*. Global Military Machine Learning Technology Development Tracking and Evaluation [C]. 20th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International. 2021. DOI: 10.34190/EWS.21.092 (Oral)
SONG X., CHEN J., SONG Y., YU H., CHEN L.*, Few-Shot Constraint Enhancement Based on Generative Adversarial Networks [C]. International Conference on Intelligent Computing, Springer Nature, August 5-8 2024
ZHANG Y., CHEN J., SONG Y., YU H., CHEN L.*, Generative Adversarial Network for Enhancement Network Security Log Detection. Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14869. Springer, Singapore. https://doi.org/10.1007/978-981-97-5603-2_31 (Oral)
SONG Y., CHEN J.., LIU N., ZHANG W., CHI Y., YANG X., HOU X.., DING Z., GUO L., CHEN L.* Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[C]. International Conference on Intelligent Computing, Springer Nature, August 5-8 2024
CHEN L, CHEN J*. Global Social Network Warfare on Public Opinion [C]. 20th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International. 2021. DOI: 10.34190/EWS.21.093 (Oral)
Patents
Dr. Chen holds senior titles in research, teaching, and engineering, with extensive experience and achievements in the academic, teaching, and industrial sectors.
Granted Patents:
A Text Enhancement Method, Text Classification Method, and Related Devices
Program Advertising Release Method and Device Based on IPTV
A Bicycle Anti-theft Alarm Device
Filed Patents:
Malicious Sample Enhancement Method, Malware Detection Method, and Corresponding Devices
A Log Data Enhancement Method, Classification Detection Method, and System
A Traffic Data Enhancement Method, Traffic Data Classification Method, and Related Devices and Process
Trusted Identity Authentication Method Based on Zero Trust Blockchain
Federated Learning Secure Aggregation Model for Target Detection Based on Blockchain
Adaptive Noise Addition Method for Differential Privacy Federated Learning Model