複製鏈接
請複製以下鏈接發送給好友

董晨

(福州大學計算機與大數據學院系副主任,碩士生導師)

鎖定
董晨(Dong Chen) [1]  [11-13]  ,女,畢業於武漢大學計算機學院計算機應用技術專業,現就職於福州大學計算機與大數據學院,擔任系副主任 [2]  。工學博士學位,現任福州大學碩士生導師職務 [3]  。曾在美國加州大學洛杉磯分校(UCLA)擔任訪問研究員(visiting researcher)。
中文名
董晨 [1] 
國    籍
中國
民    族
漢族
出生地
陝西西安
畢業院校
武漢大學
學位/學歷
博士研究生
職    業
教師
專業方向
計算機應用技術
職    務
福州大學計算機與大數據學院系副主任 [1] 
學術代表作
網絡空間安全概論
《芯片安全導論》

董晨人物經歷

畢業於武漢大學計算機學院計算機應用技術專業,獲得工學博士學位。
美國加州大學洛杉磯分校(UCLA)訪問研究員(visiting researcher)。

董晨研究方向

主要方向:優化算法,智能計算
同時也關注:人工智能,包括機器學習智能計算的研究與應用,及其涉及的網絡空間安全方面的相關問題;大數據多智能體智能製造等,也關注SoC芯片AI芯片生物芯片安全策略及物理設計相關問題。

董晨主要成就

獲得第二屆全國電子線路教學競賽華東區一等獎,負責製作的課程《網絡空間安全概論》獲國家級精品在線課程 [4]  ,由實驗室研究生助教參與的董老師主講課程獲得福建省精品線上線下課程。

董晨獲獎記錄

(1)2018年5月第二屆全國高等學校青年教師電子技術基礎、電子線路課程授課競賽,華東區一等獎; [1]  [48] 
(2)2018年8月第二屆全國高等學校青年教師電子技術基礎、電子線路課程授課競賽,全國決賽三等獎; [1]  [48] 
(3)福州大學第十三屆青年教師“最佳一節課”比賽,二等獎,(現場成績第一) [14] 
(4)福州大學數計學院第八屆青年教師“最佳一節課”比賽,第一名 [14] 

董晨社會任職

福州大學計算機與大數據學院系副主任,碩士生導師 [3] 

董晨主要貢獻(學術代表作)

  1. Wenzhong Guo, Sihuang Lian, Chen Dong*, Zhenyi Chen, and Xing Huang. 2022. A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense. ACM Trans. Des. Autom. Electron. Syst. 27, 4, Article 40 (July 2022), 33 pages. [15] 
  2. Q. Hong, Z. Chen, C. Dong* and Q. Xiong, "A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production," 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2021, pp. 3297-3302, [16] 
  3. Y. Xu, Z. Chen, B. Huang, X. Liu and C. Dong*, "HTtext: A TextCNN-based pre-silicon detection for hardware Trojans," 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2021, pp. 55-62, [17] 
  4. Zhang, H. , Li, J. L. , Liu, X. M. , & Dong, C*. . (2021). Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection. Future Generation Computer Systems. [18] 
  5. Dong C , Liu L , Liu X , et al. MEDASec: Logic Encryption Scheme for Micro-electrode-dot-array Biochips IP Protection[C]// GLSVLSI '21: Great Lakes Symposium on VLSI 2021. 2021. [19] 
  6. Dong X , Dong C* ,Chen Z , et al. BotDetector: An extreme learning machine-based Internet of Things botnet detection model[J]. Transactions on Emerging Telecommunications Technologies, 2020(4):e3999. [20] 
  7. He G, Dong C*,Huang X , et al. HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems[C]// GLSVLSI '20: Great Lakes Symposium on VLSI 2020. 2020. [21] 
  8. Chen, Y. , Liu, Z. , Liu, Y. , & Dong, C*. (2020). Distributed attack modeling approach based on process mining and graph segmentation. Entropy, 22(9), 1026. [22] 
  9. Dong C , Liu Y , Chen J , et al. An Unsupervised Detection Approach for Hardware Trojans[J]. IEEE Access, 2020, PP(99):1-1. [23] 
  10. He G , Dong C*, Liu Y , et al. IPlock: An Effective Hybrid Encryption for Neuromorphic Systems IP Core Protection[C]// 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2020. [24] 
  11. Dong C , Liu L , Liu H , et al. A Survey of DMFBs Security: State-of-the-Art Attack and Defense[C]// 2020 21st International Symposium on Quality Electronic Design (ISQED). 2020. [25] 
  12. Ye Y , Dong C*, Chen Z . A novel method on discrete particle swarm optimization for fixed-outline floorplanning[C]// 2020 IEEE International Conference on Artificial Intelligence and Information Systems. IEEE, 2020. [26] 
  13. Dong C , Xu Y , Liu X , et al. Hardware Trojans in Chips: A Survey for Detection and Prevention[J]. Sensors, 2020, 20(18). [27] 
  14. Zhang F , Dong C*, Hu W , et al. The State-of-the-art in EDA tools: the Hardware Trojan Confrontation Framework[C]// 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2019. [28] 
  15. Dong C , Chen J , Guo W , et al. A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things[J]. International Journal of Distributed Sensor Networks, 2019, 15(12):155014771988809. [29] 
  16. Chen X , Ye Y , Dong C*, et al. Grasshopper optimization algorithm combining Gaussian and chaos theory for optimization design[C]// 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE). 2019. [30] 
  17. Liu Y , Chen R , Dong C*, et al. SSA-MSV: Multiple Supply Voltage for VLSI based on SSA[C]// 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2019. [31] 
  18. Fanl, X. , Ye, Y. , Chen, Z. , Hong, Z. , & Dong, C*. . (2019). Combine Discussion Mechanism and Chaos Strategy on Particle Swarm optimization Algorithm. 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS). IEEE. [32] 
  19. Chen R , Dong C*, Ye Y , et al. QSSA: Quantum Evolutionary Salp Swarm Algorithm for Mechanical Design[J]. IEEE Access, 2019, 7:1-1. [33] 
  20. Peng, J. , Ye, Y. , Chen, S. , & Dong, C.* . (2019). A novel chaotic dragonfly algorithm based on sine-cosine mechanism for optimization design. 2019 2nd International Conference on Information Systems and Computer Aided Education (ICISCAE). [34] 
  21. Chen J , Dong C*, Zhang F , et al. A Hardware-Trojans Detection Approach Based on eXtreme Gradient Boosting[C]// 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET). IEEE, 2020. [35] 
  22. Dong C , Zhang F , Liu X , et al. A Locating Method for Multi-Purposes HTs Based on the Boundary Network[J]. IEEE Access, 2019, PP(99):1-1. [36] 
  23. Chen J , Dong C*, Guorong H E , et al. A method for indoor Wi-Fi location based on improved back propagation neural network[J]. Turkish Journal of Electrical Engineering and Computer Sciences, 2019, 27(4):2511-2525. [37] 
  24. Dong C , Xiong Z , Liu X , et al. Dual-Search Artificial Bee Colony Algorithm for Engineering Optimization[J]. IEEE Access, 2019:1-1. [38] 
  25. Chen D , He G , Liu X , et al. A Multi-Layer Hardware Trojan Protection Framework for IoT Chips[J]. IEEE Access, 2019, PP(99):1-1. [39] 
  26. Chen, Dong, Yin, et al. The Sensitivity Design of Piezoresistive Acceleration Sensor in Industrial IoT[J]. IEEE Access, 2019. [40] 
  27. Lin S , Dong C*, Wang Z , et al. A Chaotic Artificial Bee Colony Algorithm Based on Lévy Search[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2018, 101(12):2472-2476. [41] 
  28. Chen D , Chen Z , Sun S . The Acceleration Coefficients Self-Adapting In PSO[J]. International Journal of Digital Content Technology & Its Applic, 2013, 7(5):672-678. [42] 
  29. Chen D , Wang G , Chen Z , et al. A VLSI routing algorithm based on improved DPSO[C]// IEEE International Conference on Intelligent Computing & Intelligent Systems. IEEE, 2009. [43] 
  30. Dong C , Wang G , Chen Z , et al. A Method of Self-Adaptive Inertia Weight for PSO[C]// International Conference on Computer Science & Software Engineering. IEEE, 2008:1195-1198. [44] 
  31. Chen D , Wang G , Chen Z . The inertia weight self-adapting in PSO[C]// Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress on. IEEE, 2008. [45] 
  32. 劉靈清,董晨*,劉西蒙,柳煌達,連思璜,陳瀟.MEDAguard:基於邏輯加密的微電極點陣生物芯片知識產權保護方案[J].電子學報,2022,50(02):440-445. [46] 
  33. 熊乾程,董晨*,洪祺瑜.面向智能工廠原料供應環節的多機器人任務分配方法[J/OL].小型微型計算機系統:1-6[2022-06-23]. [47] 

董晨其他研究成果(參考著作)

  1. Chen Z, Chen K C, Dong C, et al. 6G Mobile Communications for Multi-Robot Smart Factory[J]. Journal of ICT Standardization, 2021: 371–404-371–404. [5] 
  2. Lin, H., Zhan, Y., Zhao, Z., Chen, Y., & Dong, C. (2021). Overlapping Community Detection Based on Attribute Augmented Graph. Entropy, 23(6), 680. [6] 
  3. Liu, Z. , Zhang, Y. , Chen, Y. , Fan, X. , & Dong, C. . (2020). Detection of algorithmically generated domain names using the recurrent convolutional neural network with spatial pyramid pooling. Entropy, 22(9), 1058. [7] 
  4. Chen Z ,Wang G ,Chen D . An adaptive hybrid combination of PSO and Extremal Optimization. IEEE. [8] 
  5. Chen Z , Wang G , Chen D . Hybrid particle swarm optimization algorithm for fixed-outline floorplanning[C]// Proceedings of 2011 International Conference on Computer Science and Network Technology. IEEE, 2012. [9] 
  6. Chen Z , Wang G , Chen D . Multiple voltage assignment based on PSO[C]// Proceedings of 2011 International Conference on Computer Science and Network Technology. IEEE, 2012. [10] 
參考資料
展開全部 收起