Dr. Long CHEN

Professor

Editor:College of Information Science and Technology Time:2024-11-21

Dr. Long CHEN

Professor

Email:chen_long@buct.edu.cn




Background

Long Chen, a Professor at the School of Information Science and Technology, Beijing University of Chemical Technology, holds a Ph.D. in Engineering from the School of Computer Science, Beihang University, serves as a member of the IEEE Computer Society's Technical Committee on Security and Privacy, be recognized as a high-level expert under provincial and ministerial talent programs, held management and research positions at central enterprises, Fortune Global 500 companies, and leading internet firms, leads three featured projects, one provincial and ministerial-level science and technology program, and three municipal-level research and development programs, and participated in several national key R&D programs and National Natural Science Foundation projects. Chen has received numerous awards from institutions such as Ministry of Industry and Information Technology, the Ministry of Education, the China Association for Science and Technology, The People’s Government of Beijing Municipality, and the People’s Government of Liaoning Province, including seven provincial and ministerial-level awards (as the first contributor) and six department and bureau-level awards (as the first contributor). He has published over 20 papers (4 as first author in SCI journals, 7 as first author at internationally renowned conferences), including 4 first-author SCI papers in journals at Chinese Academy of Sciences Zone 2 and 7 papers in CCF-recommended journals and conferences. He has also applied for six national patents, and serves as a reviewer for more than 20 prestigious international journals, including IEEE TDSC, IEEE TGRS, IEEE GRSL, EAAI, IJPRAI, SCCSE, JOG, EESI, and others.

Areas of Research of Expertise

  • Computer Science and Technology, Control Science and Engineering, Software Engineering, and Cyberspace Security

  • The research group is always opens to recommended exempt student, graduate entrance examination student, Ph.D. applicant via application and assessment, direct PhD students, and experimental class students, interested students are encouraged to contact via email chen_long@buct.edu.cn

Research  

Funded Research Projects

National Key Research and Development Program of China:

  • Key Technologies for Cross-domain Collaborative Defense of Large Hub Navigation Infrastructure and Critical Facilities

Relevant Supervisory Authorities:

  • Nine Featured projects

National Natural Science Foundation Joint Fund:

  • Research on Immunization Defense Mechanisms and Technologies for Personal Computing Environments in Cyberspace

General Program of the National Natural Science Foundation:

  • Research on Trusted Execution Mechanisms in Open Time-Varying Network Computing Environments

Youth Program of the National Natural Science Foundation:

  • Information Dissemination Modeling and Key Network Structure Discovery Based on Social Network Text Interaction Content

Hebei Province Key R&D Program:

  • Research on Key Technologies for QoS in Live IPTV

Shijiazhuang City Key R&D Program:

  • Research on Key Video Encoding and Decoding Technologies for Live IPTV QoS

  • Research and Application of Mobile Agricultural Comprehensive Law Enforcement System

  • Research and Application of Conditional Probability-based E-commerce Intelligent Retrieval Technology for Big Data

  • Big Data Technology for Network Security Situational Awareness

Main Achievements & Awards

  • The 11th "Challenge Cup" National Undergraduate Curricular Academic Science and Technology Works By Race

  • The 12th "Challenge Cup" National Undergraduate Curricular Academic Science and Technology Works By Race

  • The 7th "Challenge Cup" National Undergraduate Curricular Academic Science and Technology Works By Race

  • The 2nd First China College Student Innovation and Creativity Competition

  • The 1st First China College Student Innovation and Creativity Competition

Representative Publications  

  1. CHEN L, Zhang W, Song Y, CHEN J*,  Machine Learning for Human-Machine Systems with Advanced Persistent Threats [J]. IEEE Transactions on Human-Machine Systems, 10.1109/THMS.2024.3439625

  2. CHEN L, CHEN J*, XIA C*. Social network behavior and public opinion manipulation [J]. Journal of Information Security and Applications, 2022, 64: 103060.

  3. CHEN L, WANG Q, SONG Y and CHEN J*. Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic [C]. 2023 IEEE 47th Annual Computers, Software, and Applications Conference. 27 –29 June 2023 (Oral)

  4. CHEN L, WANG Q, SONG Y and CHEN J*, A Framework for Few-Shot Network Threats Based on Generative Adversarial Networks [C].  IEEE 28th Symposium on Computers and Communications. 9 –12 July 2023 (Oral)

  5. CHEN L, CHEN J*, XU Q H. Correlations between solid tides and worldwide earthquakes MS≥ 7.0 since 1900 [J]. Natural Hazards and Earth System Sciences, 2012, 12(3): 587-90, doi:10.5194/nhess-12-587-2012, 2012

  6. CHEN L, CHEN J*. Global Military Machine Learning Technology Development Tracking and Evaluation [C]. 20th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International. 2021. DOI: 10.34190/EWS.21.092 (Oral)

  7. SONG X, CHEN J, SONG Y, YU H, CHEN L*, Few-Shot Constraint Enhancement Based on Generative Adversarial Networks [C]. International Conference on Intelligent Computing, Springer Nature, August 5-8 2024

  8. ZHANG Y, CHEN J, SONG Y, YU H, CHEN L*, Generative Adversarial Network for Enhancement Network Security Log Detection. Advanced Intelligent Computing Technology and Applications. ICIC 2024. Lecture Notes in Computer Science, vol 14869. Springer, Singapore. https://doi.org/10.1007/978-981-97-5603-2_31 (Oral)

  9. SONG Y, CHEN J, LIU N, ZHANG W, CHI Y, YANG X, HOU X, DING Z, GUO L, CHEN L* Breeding Strategies Generation and Crop Genetic Enhancement Based on Generative Adversarial Networks[C]. International Conference on Intelligent Computing, Springer Nature, August 5-8 2024

  10. CHEN L, CHEN J*. Global Social Network Warfare on Public Opinion [C]. 20th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International. 2021. DOI: 10.34190/EWS.21.093 (Oral)

Patents     

Dr. Chen holds senior titles in research, teaching, and engineering, with extensive experience and achievements in the academic, teaching, and industrial sectors.

Granted Patents:

  • A Text Enhancement Method, Text Classification Method, and Related Devices

  • Program Advertising Release Method and Device Based on IPTV

  • A Bicycle Anti-theft Alarm Device

Filed Patents:

  • Malicious Sample Enhancement Method, Malware Detection Method, and Corresponding Devices

  • A Log Data Enhancement Method, Classification Detection Method, and System

  • A Traffic Data Enhancement Method, Traffic Data Classification Method, and Related Devices and Process

  • Trusted Identity Authentication Method Based on Zero Trust Blockchain

  • Federated Learning Secure Aggregation Model for Target Detection Based on Blockchain

  • Adaptive Noise Addition Method for Differential Privacy Federated Learning Model