Professor
Supervisor of Doctorate Candidates
Supervisor of Master's Candidates
Honors and Titles:
校级教学优秀奖
省第六批科技镇长团省级优秀成员
市第八届青年科技奖
2008 市第九届自然科学优秀学术成果二等奖
The Last Update Time: ..
指导计算机硕士研究生、博士研究生30余名,其中国内研究生18名,留学硕士生14名,指导的研究生获得校长奖学金、研究生优秀奖学金和三好研究生荣誉等称号。
Neural Networks、IEEE Internet of Things Journal、Multimedia Tools and Applications等国际1区2区顶级SCI期刊审稿人
计算机应用研究等国内期刊审稿人
IEEE ICCNT等国际会议审稿人
NCM等会议分会主席
江苏省网络监控中心成员
贵州省人工智能学会会员
IBM的Q1Lab信息安全研究项目组成员
中英云网络安全研究所所长
育英二外校务委员会副主任
网络公司技术总监
区工信局副局长
虚拟仿真中心副主任
Dr. Chunyong Yin is currently a Professor and Dean with the Nanjing University of Information Science & Technology, China. He received his Bachelor (SDUT, China, 1998), Master (GZU, China, 2005), PhD (GZU, 2008) and was Post-doctoral associate (University of New Brunswick, 2010).He has authored or coauthored more than twenty journal and conference papers. His current research interests include privacy preserving and network security etc.
尹春勇,男,博士,现为南京信息工程大学计算机与软件学院教授、博导、硕导、虚拟仿真中心副主任,原网络工程系主任,中英云网络安全研究所所长,江苏省网络监控中心成员,贵州省人工智能学会会员,IBM的Q1Lab信息安全研究项目组成员。担任国家重点研发计划网络空间安全重点专项评审专家、国家重点研发计划“战略性国际科技创新合作”重点专项评审专家、国家自然科学基金评审专家,《Neural Networks》《IEEE Internet of Things Journal》等国际1区2区顶级SCI期刊审稿人,计算机应用研究等国内期刊审稿人,IEEE ICCNT等国际会议审稿人,NCM等会议分会主席。1998年以来先后获得计算机应用专业硕士学位和网络及信息安全专业博士学位,并在加拿大新不伦瑞克大学信息安全研究中心从事博士后研究员工作。作为项目组主持人和项目组主要成员,主持和参与了国家自然科学基金面上项目、山东省自然科学基金、贵州省自然科学基金、军参部子项目、与英国伦敦大学、新不伦瑞克大学的国际合作基金等多项科研项目。在国内外核心期刊上发表论文100余篇(其中,SCI/EI收录80篇)。获得市第八届青年科技奖、市第九届自然科学优秀学术成果二等奖等多项奖励。获得发明专利授权3项,软件著作权18项。
研究领域与方向
1. 计算机网络与信息安全
2. 云计算
3. 大数据安全
4. 数据挖掘
5. 文本内容安全
博士生招生方向:网络空间安全; 大数据挖掘及隐私保护; 人工智能及新型计算
硕士生招生方向:网络与信息安全; 机器学习; 大数据安全; 隐私保护
主持项目:
面向高速数据流的新型异常入侵检测技术研究,国家自然科学基金面上项目
面向大规模新型P2P 僵尸网络的检测研究,国家自然科学基金面上项目
高速数据流异常检测系统,国际合作项目
基于云计算的智能数据安全存储系统,国际合作项目
僵尸网络的检测、分析、可视化,国际合作项目
一种新型入侵检测模型的设计与实现,省教育厅项目
自动气象信息服务系统,江苏省气象探测与信息处理中心基金项目
基于密态数据库的安全研究,南京信息工程大学科研项目
基于秘密同态的实数的整数化表示理论与算法,校基金项目
一种新型自动防御系统的研究.校重点项目
网络入侵检测系统的设计.校青年项目
主研项目:
软件可靠性与安全性综合评估方法研究,国家自然科学基金项目
网络漏洞挖掘与分析研究.军参部子项目
提高高校数据安全的实验技术研究.校青年项目
城市交通地理信息系统的设计与实现.校重点项目
主要论文:
Selected Journal Publications:
1. C. Yin, S. Zhang, J. Wang and N. N. Xiong (2020). Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time Series. IEEE Transactions on Systems, Man, and Cybernetics: Systems, doi: 10.1109/TSMC.2020.2968516.(SCI 1区TOP期刊)
2. Yin, C., Ding, S., & Wang, J. (2019). Mobile marketing recommendation method based on user location feedback. Human-centric Computing and Information Sciences, 9(1), 14.(SCI)
3. Yin, C., Wang, H., Yin, X., Sun, R., & Wang, J. (2019). Improved deep packet inspection in data stream detection. The Journal of Supercomputing, 75(8), 4295-4308.(SCI,CCF C类)
4. Yin, C., Shi, L., Sun, R., & Wang, J. (2019). Improved collaborative filtering recommendation algorithm based on differential privacy protection. The Journal of Supercomputing, 1-14.(SCI,CCF C类)
5. Yin, C., Ju, X., Yin, Z., & Wang, J. (2019). Location recommendation privacy protection method based on location sensitivity division. EURASIP Journal on Wireless Communications and Networking, 2019(1), 266.(SCI)
6. Yin, C., Zhou, B., Yin, Z., & Wang, J. (2019). Local privacy protection classification based on human-centric computing. Human-centric Computing and Information Sciences, 9(1), 33. (SCI)
7. Yin, C., Xi, J., Sun, R., & Wang, J. (2018). Location Privacy Protection based on Differential Privacy Strategy for Big Data in Industrial Internet-of-Things. IEEE Transactions on Industrial Informatics, 14(8), 3628-3636.(SCI 1区TOP期刊,高被引论文)
8. Yin, C., Xia, L., Zhang, S., Sun, R., & Wang, J. (2018). Improved clustering algorithm based on high-speed network data stream. Soft Computing, 22(13), 4185-4195.(SCI,CCF C类)
9. Yin, C., Wang, J., & Park, J. H. (2017). An improved recommendation algorithm for big data cloud service based on the trust in sociology. Neurocomputing, 256, 49-55.(SCI 2区TOP期刊,CCF C类)
10. Yin, C., Zhang, S., Xi, J., & Wang, J. (2017). An improved anonymity model for big data security based on clustering algorithm. Concurrency and Computation: Practice and Experience, 29(7), e3902.(SCI,CCF C类)
11. Yin, C., & Zhang, S. (2017). Parallel implementing improved k-means applied for image retrieval and anomaly detection. Multimedia Tools and Applications, 76(16), 16911-16927.(SCI,CCF C类)
12. Yin, C., & Xi, J. (2017). Maximum entropy model for mobile text classification in cloud computing using improved information gain algorithm. Multimedia Tools and Applications, 76(16), 16875-16891.(SCI,CCF C类)
13. Yin, C., Xi, J., & Sun, R. (2017). Location Privacy Protection Based on Improved-Value Method in Augmented Reality on Mobile Devices. Mobile Information Systems, 2017.(SCI)
14. Yin, C., Zhang, S., & Kim, K. J. (2017). Mobile Anomaly Detection Based on Improved Self-Organizing Maps. Mobile Information Systems, 2017.(SCI)
15. Yin, C., Zhang, S., Yin, Z., & Wang, J. (2017). Anomaly detection model based on data stream clustering. Cluster Computing, 1-10.(SCI)
16. Yin, C., Feng, L., & Ma, L. (2016). An improved Hoeffding-ID data-stream classification algorithm. The Journal of Supercomputing, 72(7), 2670-2681. (SCI,CCF C类)
17. Yin, C., Ma, L., & Feng, L. (2017). Towards accurate intrusion detection based on improved clonal selection algorithm. Multimedia Tools and Applications, 76(19), 19397-19410.(SCI,CCF C类)
18. Yin, C., Ma, L., & Feng, L. (2016). A feature selection method for improved clonal algorithm towards intrusion detection. International Journal of Pattern Recognition and Artificial Intelligence, 30(05), 1659013.(SCI,CCF C类)
19. Yin, C., Feng, L., Ma, L., Kim, J. U., & Wang, J. (2016). An effective feature selection and data-stream classification model HDP. Journal of Internet Technology, 17(4), 695-702.(SCI)
20. Yin, C., Awlla, A. H., Yin, Z., & Wang, J. (2015). Botnet detection based on genetic neural network. International Journal of Security and Its Applications, 9(11), 97-104.
21. Yin, C., Zou, M., Iko, D., & Wang, J. (2013). Botnet detection based on correlation of malicious behaviors. International Journal of Hybrid Information Technology, 6(6), 291-300.
22. Yin, C., Yang, L., & Wang, J. (2013). Botnet detection based on degree distributions of node using data mining scheme. International Journal of Future Generation Communication and Networking, 6(6), 81-90.
23. Yin, C. (2014). Towards accurate node-based detection of P2P botnets. The Scientific World Journal, 2014..
24. Yin, C., Feng, L., Ma, L., Yin, Z., & Wang, J. (2015). A feature selection algorithm based on Hoeffding inequality and mutual information. Int J Signal Process Image Process Pattern Recognit, 8(11), 433-444.
25. Yin, C., Zhang, H., Xiang, J., Yin, Z., & Wang, J. (2015). A Mobile Recommendation Algorithm Based on Statistical Analysis of User Data. International Journal of Hybrid Information Technology, 8(12), 355-366.
26. Yin, C., Xiang, J., Zhang, H., Yin, Z., & Wang, J. (2015). Short text classification algorithm based on semi-supervised learning and SVM. International Journal of Multimedia and Ubiquitous Engineering, 10(12), 195-206.
27. Yin, C., Ma, L., Feng, L., Yin, Z., & Wang, J. (2015). A Feature Selection Algorithm towards Efficient Intrusion Detection. International journal of multimedia and ubiquitous engineering, 10(11), 253-264.
28. Yin, C., Zhang, S., Yin, Z., & Wang, J. (2015). An algorithm of clustering by density peaks using in anomaly detection. Int J Secur Appl, 9(12), 115-128.
Selected Conference Publications:
1. Chunyong Yin , Jun Xiang, Hui Zhang, Jin Wang, A New Classification Method for Short Text Based on SLAS and CART, CCITSA2015, 2015.12.10-2015.12.12.
2. Chunyong Yin , Sun Zhang, Jin Wang, An Improved K-Means Using in Anomaly Detection, CCITSA2015, 2015.12.10-2015.12.12.
3. Chunyong Yin, Ardalan Husin, Jin Wang, An Improved Transmission Control Protocol Effect on Router Performance, CCITSA2015, 2015.12.10-2015.12.12.
4. Chunyong Yin , Jinwen Xi, Jin Wang, The Research of Text Classification Technology Based on Improved Maximum Entropy Model, CCITSA2015, 2015.12.10-2015.12.12.
5. Chunyong Yin , Sun Zhang, Jin Wang, Zhichao Yin, Anomaly detection based on clustering by density peaks using, COMCOMS2015, 2015.10.22-2015.10.24.
6. Chunyong Yin , Ardalan Husin Awlla, Jin Wang, Zhichao Yin, A Novel framework towards Botnet Detection, COMCOMS2015, 2015.10.22-2015.10.24.
7. Chunyong Yin , Lu Feng, Luyu Ma, Jin Wang, Zhichao Yin, Jeong-Uk Kim, A Feature Selection Algorithm of Dynamic Data-Stream Based on Hoeffding Inequality, AITS2015, 2015.8.21-2015.8.23.
8. Chunyong Yin; Luyu Ma; Lu Feng; Jin Wang; Zhichao , A Hybrid Feature Selection Algorithm, AITS2015, 2015.8.21-2015.8.23.
9. Chunyong Yin; Hui Zhang; Jun Xiang; Jin Wang; Zhichao Yin , A New Mobile Recommendation Algorithm Based on Statistical Theory, AITS2015, 2015.8.21-2015.8.23.
10. Chunyong Yin; Jun Xiang; Hui Zhang; Jin Wang; Zhichao Yin , A New SVM Method for Short Text Classification Based on Semi-Supervised Learning, AITS2015, 2015.8.21-2015.8.23.
11. Chunyong Yin, P2P Botnet Detection Based on Association between Common Network Behaviors and Host Behaviors, 2011 International Conference on Multimedia Technology,ICMT2011, 2011.7.26-2011.7.28.
12. Chunyong Yin, Study on Data Field Content Security Based on OA, ETP/IITA World Congress in Applied Computing, Computer Science, and Computer, 2010.4.17-2010.4.18.
13. Chunyong Yin, Study on Protection Method Based on Document, the International Conference on System Science and Simulation in Engineering, 2010.9.1-2011.9.3.
14. Chunyong Yin, A Specific Implementation Based on Document Security Model, the International Conference on Optics, Photonics and Energy Engineering, 2010.5.10-2010.5.12.
15. Chunyong Yin, An Improved Method of C Learning Based on Individuation, the International Conference on Telecommunication and Information, 2010.6.22-2010.6.23.
16. Chunyong Yin, Study on Document Content Security, the International Conference on Optics, Photonics and Energy Engineering, 2010.5.10-2010.5.12.
17. Chunyong Yin, A Model of Information Security Based on Office Automation, 5th International Joint Conference on INC, IMS and IDC, 2009.8.25-2009.8.27.
18. Chunyong Yin, A Model of Information Security Based on Office Automation, 5th International Joint Conference on INC, IMS and IDC, 2009.8.25-2009.8.27.
19. Chunyong Yin, The Design of Secure Document Management, 2009 ETP/IITA World Congress in Applied Computing, Computer Science, and Computer Engineering, 2009.8.8-2009.8.9.
20. Chunyong Yin, A Method of Automatic Key Generation Based on Handwriting, 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel, 2009.5.27-2009.5.29.
21. Chunyong Yin, A Modified Query Algorithm for Private Data Security Facing E-commerce, 2009 Pacific-Asia Conference on Circuits, Communications and System, 2009.5.16-2009.5.17.
主要专利:
文档数据安全管理系统ZL201020676507.6
基于节点僵尸网络检测系统ZL201220292800.1
自动气象信息服务系统01220680664.3
安全移动在线视频监控系统201320305370.7
僵尸网络检测系统2012SR072502
数据包捕获实验数据采集系统2015SR039711
安全移动在线视频监控系统2015SR071378
毕业设计管理系统2015SR056177
校园网物品交易平台系统2016SR028182
智能文档分类系统2016SR028184
在线游戏论坛系统2016SR028455
基于聚类的通用数据处理系统2016SR028325
市第八届青年科技奖
市第九届自然科学优秀学术成果二等奖
校教学优秀奖
My Ph.D. and M.S. students
1. Sun Zhang
He received his bachelor degree in computer science and technology from Nanjing University of Information Science and Technology, China. Now he is studying for his master’s degree in there. His current research interests are in network security and intrusion detection.
Selected Journal Publications:
[1] Chunyong Yin, Sun Zhang. Parallel implementing improved k-means using mapreduce programming mode for mobile networks. Multimedia Tools and Applications, DOI: 10.1007_s11042-016-3638-1.
[2] Chunyong Yin, Sun Zhang, et al. An improved anonymity model for big data security based on clustering algorithm. Concurrency and Computation-Practice & Experience, DOI: 10.1002/cpe.3902.
[3] Chunyong Yin, Sun Zhang, et al. An algorithm of clustering by density peaks using in anomaly detection. International Journal of Security and Its Applications, Vol. 9, No. 12 pp.115-128DOI: 10.1002/cpe.3902.
Selected Conference Publications
[1] Chunyong Yin, Sun Zhang, et al. Anomaly detection based on clustering by density peaks using. COMCOMS2015, October 22-24, 2015, Hanoi, Vietnam.
[2] Chunyong Yin, Sun Zhang, et al. An Improved K-Means Using in Anomaly Detection. CCITSA2015, December 10-12, 2015, ILan, Taiwan.
2. Jinwen Xi
He received his bachelor degree in computer science and technology from Huaiyin Institute of Technology, China. Now he is studying for his master’s degree in computer science and technology from Nanjing University of Information Science and Technology, China. His current research interests are information processing, data mining and feature extraction algorithm.
Selected Journal Publications:
[1] Chunyong Yin, Jinwen Xi. Maximum entropy model for mobile text classification in cloud computing using improved information gain algorithm. Multimedia Tools and Applications, DOI: 10.1007/s11042-016-3545-5.
[2] Chunyong Yin, Sun Zhang, Jinwen Xi, et al. An improved anonymity model for big data security based on clustering algorithm. Concurrency and Computation-Practice & Experience, DOI: 10.1002/cpe.3902.
Selected Conference Publications
[1] Chunyong Yin, Jinwen Xi, Jin Wang. The Research of Text Classification Technology Based on Improved Maximum Entropy Model. CCITSA2015
3. Darious
Personal Information:
Full Name: Darius Iko
Nationality: Indonesia
Education Background:
September 2005 - March 2009 : Bachelor of Computer Science at Bina Nusantara University, Jakarta, Indonesia (GPA 3.61 out of 4.00 Scale)
February 2011 - June 2011 : Mandarin Chinese Language at Nanjing University of Information Science and Technology, Nanjing, China
September 2011 - Present : Master of Computer Application Technology at Nanjing University of Information Science and Technology, Nanjing, China
Academic Special Certification:
Achievement as Outstanding Student at Bina Nusantara University in 2007
Academic Experience:
February 2008 - May 2008 : Internship as ASP.NET Web Developer at Applied Technology Laboratories (ATL) at Bina Nusantara University, Jakarta, Indonesia
Design and develop a KPI (Key Performance Indicator) - based Performance Assessment System that is used by an organization to evaluate its success or the success of a particular activity in which it is engaged.
Professional Experience:
August 2006 & August 2007 : Internship as Hardware Technical Support at PT. Inti Sanho Utama Teknologi, Medan, Indonesia
Deal with customer complaining computer hardware, operating system, and computer software issue, as well as installation request.
August 2008 - December 2008 : PHP Web Developer at PT. Pacific Tractor Indonesia
Design and develop an Online Product Ordering System that provide convenient ordering system for customers and easy ordering management system for PT. Pacific Tractor Indonesia
April 2009 - January 2010 : C# .NET Web Developer at PT. Adicipta Inovasi Teknologi, Jakarta, Indonesia
Responsibility:
April 2009 : As a .NET Trainee learning various technical skill in C# language, .NET environment and MSSQL technologies related to the framework.
May 2009 - February 2010 : Car Rental Web-based Application Development for client company PT. Tunas Rental, Jakarta, Indonesia
Involve in development of Customer Billing module that can automatically generate bills that contain the detailed amount to be paid by the customer.
Involve in development of Treasury module that can record the payment and generate estimated amortization of loans from bank.
Involve in development of End-of-Period Processing Application that can conduct overall data processing during the off-work hour.
Involve in development of Agreement Contract process (Agreement Live)
Involve in SIT and UAT test, and User Manual documentation.
March 2010 – August 2010 : Involve in data migration from the database of the previous application into the Oracle-based database of new developed motorcycle financing application at PT. Bussan Auto Finance, Jakarta, Indonesia
September 2010 – January 2011 : Involve in designing and developing a new framework for the foundation of the upcoming projects:
Involve in providing Technical Development Training for Junior Programmer & AdIns Center of Excellence (ACE) Trainee
Develop Client Usage Application Licensing that strictly establishes the usage limit of the Application for the client company.
Develop Reporting Engine that can queuing report request asynchronously from the users in order to prevent several huge-data reports processing that can cause overload to server.
Involve in development of Batch Engine that will conduct distributed data processing and automatic/manual processing that can improve throughput of data processing.
Involve in development of Workflow Engine based on Workflow Foundation 4 that can model human or system flow, and perform state-oriented integration with the Application according to designed flow.
Develop Notification Engine that can process a template and an input, and send the result to single/multiple recipient via E-Mail, Mobile SMS, or the Application notification bar.
4. Bondzie Nanabanyin
Name: Bondzie Nanabanyin
Nationality: Ghanaian
Educational Details
Nanjing University of Info Sci and Tech 2011-Present Master’s Degree
Institute of Advance Computer Education (GHANA) 2008 Higher Diploma (MIS)
Institute of Advance Computer Education (GHANA) 2005 Diploma (MIS)
Educational Experience
2005- Diploma Project Website for online Ticket reservation
2008- Higher Diploma Project Network threats.
2005 Programming essentials with visual basic
5. Melvyn
Name: Melvyn
Problem Solving
Possess swift analytical capabilities and diagnostic skills.Made use of extensive knowledge gained to meet tight deadlines under pressure.
Computer Skills:Java,VB 6.0,C,Php and javascript,Python,SQL,SAP BW
6. Happiness
7. Ardala
8. Shadidy
9. Stacey
10. 邹勉
2008年到2012年 南京信息工程大学,计算机与软件学院,本科\学士
2012年至今 南京信息工程大学,计算机与软件学院,研究生\硕士
Nongombe
姓名:Nongombe
2013年至今 南京信息工程大学,网络安全,研究生\硕士
11. 杨磊
2011年至今 南京信息工程大学,计算机与软件学院,研究生\硕士
12. 马卢玉
教育经历:
2009到2013 南京信息工程大学,计算机与软件学院,本科\学士
2013年至今 南京信息工程大学,计算机与软件学院,研究生\硕士
Nanjing University of Information Science and Technology
1. OBJECTIVE
Can be more in-depth study of a subject that interests and in the field.
2. RESEARCH INTERESTS
Networksecurity and intrusion detection
Cloud computing
3. EDUCATION
13. 冯璐
教育经历:
2009年到2013年 南京信息工程大学,数学与统计学院,本科\学士
2013年至今 南京信息工程大学,计算机与软件学院,研究生\硕士
1. OBJECTIVE
To make researches on Network Security and apply on the Cloud Computing Security
2. RESEARCH INTERESTS
Network Security and Cloud Computing
Data Analysis
3. EDUCATION
• Master of Engineering, a postgraduate degree in Software Engineering, Nanjing University of Information Science and Technology, Nanjing,China,2013.
Thesis:
• Bachelor of Science, Information and Computing Science, Nanjing University of Information Science and Technology, Nanjing, China, 2013
Thesis: Apply the idea of matrix eigenvalues on solution the partial differential equations
4. RESEARCH EXPERIENCE
5. SOFTWARE SKILLS
• Operating Systems: Windows XP/7/8
• Computer Languages:
• Proficiency in C
• Familiar with JAVA
• Tools: Familiar with Eclipse .
14. Jun Xiang
15. Hui Zhang
16. Natania
17. Tomas
18. Franck
19. 夏莲
20.石岭峰
21.王泓毅
22.鞠晓康
23.丁施磊
24.朱宇航
25. Rahman
26. Oscar
27. Miao He
28. Biao Zhou
29. Ange
30. Rana
31. 张帼杰
32. 李波
33. 屈锐
34. 李荧
35. 爨昊祺
36. 陈双双
37. 周立文
38. 徐朋
39. 张剑
40. 贾续康
41. 孔娴
42. 沈子宁
43. 张阳春
44. 冯梦雪
45. 赵峰
46. 张小虎
47. 曾庆魁
48. DANSO SOLOMON DANQUAH
49. NANA
•
Telephone : 18252088019
E-mail : yinchunyong@hotmail.com