-
董晨
(福州大學計算機與大數據學院系副主任,碩士生導師)
鎖定
- 中文名
- 董晨 [1]
- 國 籍
- 中國
- 民 族
- 漢族
- 出生地
- 陝西西安
- 畢業院校
- 武漢大學
- 學位/學歷
- 博士研究生
- 職 業
- 教師
- 專業方向
- 計算機應用技術
- 職 務
- 福州大學計算機與大數據學院系副主任 [1]
- 學術代表作
-
網絡空間安全概論
《芯片安全導論》
目錄
董晨人物經歷
美國加州大學洛杉磯分校(UCLA)訪問研究員(visiting researcher)。
董晨研究方向
主要方向:優化算法,智能計算;
董晨主要成就
董晨獲獎記錄
董晨社會任職
董晨主要貢獻(學術代表作)
- Y. Xu, Z. Chen, B. Huang, X. Liu and C. Dong*, "HTtext: A TextCNN-based pre-silicon detection for hardware Trojans," 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2021, pp. 55-62, [17]
董晨其他研究成果(參考著作)
- 參考資料
-
- 1. 導師簡介 .福州大學計算機與大數據學院.2021-10-08[引用日期2022-05-18]
- 2. 學院概況 .福州大學計算機與大數據學院[引用日期2022-06-23]
- 3. 導師信息 .福州大學計算機與大數據學院[引用日期2022-06-23]
- 4. 網絡空間安全概論 .中國大學MOOC[引用日期2022-06-23]
- 5. 6G Mobile Communications for Multi-Robot Smart Factory | Journal of ICT Standardization .Journal of ICT Standardization[引用日期2022-06-23]
- 6. Overlapping Community Detection Based on Attribute Augmented Graph .Entropy[引用日期2022-06-23]
- 7. Detection of Algorithmically Generated Domain Names Using the Recurrent Convolutional Neural Network with Spatial Pyramid Pooling .Entropy[引用日期2022-06-23]
- 8. An adaptive hybrid combination of PSO and Extremal Optimization .IEEE[引用日期2022-06-23]
- 9. Hybrid particle swarm optimization algorithm for fixed-outline floorplanning | IEEE Conference Publication | IEEE Xplore .Proceedings of 2011 International Conference on Computer Science and Network Technology[引用日期2022-06-23]
- 10. Multiple voltage assignment based on PSO | IEEE Conference Publication | IEEE Xplore .Proceedings of 2011 International Conference on Computer Science and Network Technology IEEE[引用日期2022-06-23]
- 11. 董晨-作者知網節 .CNKI[引用日期2022-06-23]
- 12. Chen Dong .ACM[引用日期2022-06-23]
- 13. Dong Chen .Ieeex plore[引用日期2022-06-23]
- 14. 最佳一節課 .福州大學[引用日期2022-06-23]
- 15. A Survey on Security of Digital Microfluidic Biochips: Technology, Attack, and Defense .ACM Transactions on Design Automation of Electronic Systems[引用日期2022-06-23]
- 16. A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production | IEEE Conference Publication | IEEE Xplore .2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC)[引用日期2022-06-23]
- 17. HTtext: A TextCNN-based pre-silicon detection for hardware Trojans | IEEE Conference Publication | IEEE Xplore .19th IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA)[引用日期2022-06-23]
- 18. Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection - ScienceDirect .FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[引用日期2022-06-23]
- 19. MEDASec: Logic Encryption Scheme for Micro-electrode-dot-array Biochips IP Protection .Conference: GLSVLSI '21: Great Lakes Symposium on VLSI 2021[引用日期2022-06-23]
- 20. BotDetector: An extreme learning machine-based Internet of Things botnet detection model .Transactions on Emerging Telecommunications Technologies[引用日期2022-06-23]
- 21. HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems | Proceedings of the 2020 on Great Lakes Symposium on VLSI .GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSI[引用日期2022-06-23]
- 22. Distributed Attack Modeling Approach Based on Process Mining and Graph Segmentation .Entropy[引用日期2022-06-23]
- 23. An Unsupervised Detection Approach for Hardware Trojans | IEEE Journals & Magazine | IEEE Xplore .IEEE Access[引用日期2022-06-23]
- 24. IPlock: An Effective Hybrid Encryption for Neuromorphic Systems IP Core Protection .Conference: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)[引用日期2022-06-23]
- 25. A Survey of DMFBs Security: State-of-the-Art Attack and Defense | IEEE Conference Publication | IEEE Xplore .2020 21st International Symposium on Quality Electronic Design (ISQED)[引用日期2022-06-23]
- 26. A novel method on discrete particle swarm optimization for fixed-outline floorplanning .2020 IEEE International Conference on Artificial Intelligence and Information[引用日期2022-06-23]
- 27. Hardware Trojans in Chips: A Survey for Detection and Prevention .Sensors[引用日期2022-06-23]
- 28. The State-of-the-art in EDA tools: the Hardware Trojan Confrontation Framework | IEEE Conference Publication | IEEE Xplore .2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)[引用日期2022-06-23]
- 29. A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things .International Journal of Distributed Sensor Networks[引用日期2022-06-23]
- 30. Grasshopper optimization algorithm combining Gaussian and chaos theory for optimization design .2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE)[引用日期2022-06-23]
- 31. SSA-MSV: Multiple Supply Voltage for VLSI based on SSA .2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)[引用日期2022-06-23]
- 32. Combine Discussion Mechanism and Chaos Strategy on Particle Swarm optimization Algorithm .2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS)[引用日期2022-06-23]
- 33. QSSA: Quantum Evolutionary Salp Swarm Algorithm for Mechanical Design .IEEE Access[引用日期2022-06-23]
- 34. A novel chaotic dragonfly algorithm based on sine-cosine mechanism for optimization design .2019 2nd International Conference on Information Systems and Computer Aided Education (ICISCAE)[引用日期2022-06-23]
- 35. A Hardware-Trojans Detection Approach Based on eXtreme Gradient Boosting | IEEE Conference Publication | IEEE Xplore .2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET)[引用日期2022-06-23]
- 36. A Locating Method for Multi-Purposes HTs Based on the Boundary Network | IEEE Journals & Magazine | IEEE Xplore .IEEE Access[引用日期2022-06-23]
- 37. A method for indoor Wi-Fi location based on improved back propagation neural network .Turkish Journal of Electrical Engineering and Computer Sciences[引用日期2022-06-23]
- 38. Dual-Search Artificial Bee Colony Algorithm for Engineering Optimization | IEEE Journals & Magazine | IEEE Xplore .IEEE Access[引用日期2022-06-23]
- 39. A Multi-Layer Hardware Trojan Protection Framework for IoT Chips | IEEE Journals & Magazine | IEEE Xplore .IEEE Access[引用日期2022-06-23]
- 40. The Sensitivity Design of Piezoresistive Acceleration Sensor in Industrial IoT | IEEE Journals & Magazine | IEEE Xplore .IEEE Access[引用日期2022-06-23]
- 41. The Sensitivity Design of Piezoresistive Acceleration Sensor in Industrial IoT | IEEE Journals & Magazine | IEEE Xplore .ieee[引用日期2022-06-23]
- 42. The Acceleration Coefficients Self-Adapting In PSO .International Journal of Digital Content Technology & Its Applic[引用日期2022-06-23]
- 43. A VLSI routing algorithm based on improved DPSO | IEEE Conference Publication | IEEE Xplore .IEEE International Conference on Intelligent Computing & Intelligent Systems[引用日期2022-06-23]
- 44. A Method of Self-Adaptive Inertia Weight for PSO | IEEE Conference Publication | IEEE Xplore .International Conference on Computer Science & Software Engineering[引用日期2022-06-23]
- 45. The inertia weight self-adapting in PSO | IEEE Conference Publication | IEEE Xplore .Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress on[引用日期2022-06-23]
- 46. MEDAguard:基於邏輯加密的微電極點陣生物芯片知識產權保護方案 - 中國知網 .電子學報[引用日期2022-06-23]
- 47. 面向智能工廠原料供應環節的多機器人任務分配方法 .小型微型計算機系統.[引用日期2022-06-23]
- 48. 董晨 - 福州大學 - 至誠學院 .福州大學[引用日期2022-06-26]
- 收起