师资队伍

杨进

特聘副研究员

专业:网络空间安全

研究方向:网络安全与智能计算

Email:jinnyang@163.com

电话:

学习和工作简历

20042007年毕业于四川大学,分别获四川大学硕士学位、博士学位。2011~2014年,西南交通大学信息与通信工程博士后流动站博士后。一直从事计算机网络与网络安全的研究。四川省第十一批学术和技术带头人后备人选。四川省教育厅科研创新团队带头人。主持国家、省部级等项目多项,发表SCIEI论文多篇。获得国家专利9项。获得3项软件著作权。2011年赴瑞典斯德哥尔摩大学学习交流,2015年以访问学者身份赴美国学习交流一年。2011被评为四川省优秀共产党员四川省省部级劳模等称号。

 

科研项目与获奖

l  国家自然科学基金项目  基于免疫原理的网络危险度评估系统 (No.61003310) (国家级) 2011.1-2013.12   主持人:杨进

l  中国博士后科学基金第五批特别资助项目 云计算环境下基于人工免疫的网络安全评估及预测模型(No. 2012T50783) (国家级) 2012.9-2013.9   主持人:杨进

l  四川省科技厅项目  基于云计算环境下的网络安全风险评估及预测研究(No.2014JY0036)(省部级) 2014.1-2015.12  主持人:杨进

l  中国博士后科学基金 云计算环境下基于免疫原理的网络风险评估模型(No.2011M501419) (省部级)” 2011.9-2013.12   主持人:杨进 

l  四川省人力资源和社会保障厅  四川省学术和技术带头人培养支持经费基于概率图理论的网络安全预测模型研究主持人:杨进  2016.12-2017.12

l  四川省教育厅高校科研创新团队人工智能及信息安全创新团队(项目编号13TD0014 团队带头人:杨进。2013.1.1-2015.12.31

l  四川省教育厅重点研究项目《云计算环境下的舆情监控系统 17ZA0200》主持人:杨进  2017.1-2018.12

l  四川省哲社重点研究基地社会发展与社会风险控制研究中心项目 分布式智能网络舆情监控系统(No. SR12B04)  主持人:杨进  2012

 

获得的国家、省部级奖励奖及荣誉称号主要有:

l  评为 四川省第十一批学术和技术带头人后备人选”      2014.12

l  评为四川省优秀共产党员(中共四川省委)”            2011.7

l  评为四川省省部级劳模(四川省总工会)”         2011.11

l  评为乐山市第八批市级拔尖人才称号(中共乐山市委、乐山市人民政府)2013.12

l  获得乐山市教师节优秀教师表彰”                  2011

l  获得市级共产党员示范岗”(中共乐山市委组织部)        2012.5

 

论文、专著与专利

l  Jin Yang, Tao Li, Distributed Agents Model for Intrusion Detection Based on AIS[J]Knowledge-Based Systems, 22 (2), 2009 :115–119.  (SCI检索,IDS Number:423VN)

l  Jin Yang, Tao Li, SunJun Liu, Computer Forensics System Based on Artificial Immune Systems[J]Journal of Universal Computer Science. Vol. 13(9): 1354-1365, 2007.  (SCI检索,IDS Number: 268YI).

l  Lingxi Peng, Jin Yang, Dongqing Xie,Ying Gao, Maobing Tang, Fufang Li. An Immune-inspired Computer Forensics Model With Reproductive Crime Scene, Information-An International Interdisciplinary Journal. 2012, 15(6): 2521-2530. (SCI检索,IDS Number: 965MS)

l  TangLiu, JianPeng, Xiao-fen Wang, Jin Yang, and Bing Guo. Research on the Energy Hole Problem Based on Non-uniform Node Distribution for Wireless Sensor Networks[J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS. VOL.6, NO. 9, Sep 2012:2017-2036. (SCI检索,SCI: 000310982100002)

l  Tianfei Wang, Jin Yang, Bin Li. Improved Upper Bounds for the Laplacian Spectral Radius of a Graph[J], Electronic Journal of Combinatorics, vol 18 (1): 35-38, 2011. (SCI检索,IDS Number:724UJ)

l  Jin Yang, Lingxi Peng, Tang Liu. Anti-Spam Model Based on AIS in Cloud Computing Environments[J]. Computer Modelling and New Technologies, 2014,18(7): 97-102 (EI Compendex检索, Accession number: 20150500474316)

l  Jin Yang, YunJie Li, Qin Li. Immune-based Systems on Network Security Situation Awareness and Risk Prediction Model[J]. Applied Mechanics and Materials. 2014,vol.643:99-104. (EI Compendex检索, Accession number:20144900281087)

l  Jin Yang, Cilin Wang, Caiming Liu, Le Yu. Cloud Computing for Network Security Intrusion Detection System[J]. Journal of Networks. Vol.8(1), 2013:140-147. (EI Compendex检索, Accession number: 20130916054238)

l  Jin Yang, Cilin Wang, Le Yu, Caiming Liu, Lingxi Peng. Network Security Evaluation Model based on Cloud Computing[J]. Communications in Computer and Information Science. 2012.vol 308:488-495 (EI Compendex检索, Accession number: 20124315590202)                              

l  Jin Yang , Tang Liu  and Lingxi Peng. Immune Network Risk Evaluation Model Based on the Spreading of Infectious Diseases. Lecture Notes in Electrical Engineering. ISSN: 1876-1100  2013.vol 254: 333-340 (EI Compendex检索, Accession number:  20133216592059)

l  Jian-dong Zhang, Jin Yang*, Xuan M, Cai-ming Liu. Bin Li. Research and Implementation of AHP Scheduling Algorithms for Load Balancing. 2013 IEEE conference Anthology 2013  (EI Compendex检索, Accession number: 20141817681973)

l  Jin Yang, Tang Liu, Lingxi Peng, XueJun Li, and Gang Luo. Multilevel Network Security Monitoring and Evaluation Model [J], Journal of software, vol. 6 (5):806-813, 2011. (EI Compendex检索, Accession number:  20112914158525)

l  Jin Yang, TianFei Wang, CaiMing Liu, Bin Li. Improved Agent Model for Network Security Evaluation Based on AIS. Fourth International Conference on Intelligent Computation Technology and Automation, vol (1): 151-154, 2011 (EI Compendex检索, Accession number: 20112013991770 )

l  Li Bin, Yang Jin*, Liu Caiming, Zhangjiandong. Research on improved clustering algorithm on web usage mining based on scientific analysis of web materials. Applied Mechanics and Materials. Vol 63:863-867, 2011. (EI Compendex检索, Accession number:  20112714110212)

l  Caiming Liu, Jin Yang*, Run Chen, Yan Zhang, Jinquan Zeng. Research on immunity-based intrusion detection technology for the internet of things. Proc. of 2011 7th International Conference on Natural Computation (ICNC2011). Shanghai, China, July 26-28, 2011. IEEE CS, pp. 212-216. (EI Compendex检索,Accession number: 20114014404250)

l  Yingfang Fu, Jin Yang, Peng Xiao, Liangyu Luan, Lingxi Peng. Research on Detection Scheme for Denial of Service Attacks in Wireless Mesh Networks[J]. International Journal of Digital Content Technology and its Applications. Vol 5:(6) 290-296, 2011. (EI Compendex检索, Accession number:  20112814133901)

l  刘唐、彭舰*杨进,异构延迟容忍移动传感器网络中基于转发概率的数据传输[J],软件学报,第24卷,第2期, 2013:215-229EI Compendex检索,Accession number:20131016090315

l  Jin Yang, Yi Liu, JianJun Wang, JianDong Zhang, Bin Li, Dynamical Immunological Surveillance for Network Danger Evaluation Model, 5th International Conference Wireless Communications, Networking and Mobile Computing, 24-26 Sept. 2009:1–4.   (EI Compendex检索, Accession number: 20100112610028)

l  Jin Yang, Yi Liu, Qin Li. Immunity-based method for anti-spam model. Proceedings-International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009, p171-174, 2009. (EI Compendex检索,  Accession number: 20093012206607 )

l  Jin Yang, Peng Jin, YanWei Hong, Gang Luo, Improved Method for Network Danger Evaluation Based on Immunology Principle. 2009 Fifth International Conference on Natural Computation. P47-51, 2009. (EI Compendex检索, Accession number: 20101512839625

l  杨进, 李涛. 人工免疫中匹配算法研究[J],四川大学学报(工程科学版), Vol.40(3): 126-131, 2008. (EI Compendex检索,  Accession number:  082611337512)

l  Jin Yang, Tao Li, SunJun Liu, and Gang Liang. A novel network security evaluation system based on immune principle. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE , P484-489, 2007 EI Compendex检索,  Accession number:  083111420590

l  T. Wang, J. Yang, S. Liu, G. Liang, An Immune Mobile Agent Based Grid Intrusion Detection Model, Lecture Notices in Computer Science, 4247: 112-119, 2006 .  (SCI ids num: BFH68)

l  X. Gong, T. Wang, J. Yang, G. Liang, X. Hu, Grid Intrusion Detection Based on Immune agent, Lecture Notices in Computer Science, 4222: 73-82, 2006 .( SCI ids numBFL00)

l  Tiefang Wang, Tao Li, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao, Family Gene based Grid Trust Model,LECTURE NOTES IN COMPUTER SCIENCE, vol.4222, 110-113, 2006. (SCI ids num: BFH68) 

l  Y. Jiang, J. Yang, X. Gong, An immunity-based dynamic multilayer intrusion detection system, Lecture Notices in Computer Science, 4115: 641-650,2006. (SCI ids num: BEY16)