陈泯融
陈泯融,工学博士,华南师范大学计算机学院教授,硕士生导师。1
基本信息
- 中文名
陈泯融
- 国籍
中国
- 民族
汉
- 毕业院校
上海交通大学
- 职业
教师
个人简介
主要研究计算智能及信息安全。获华南理工大学学士、硕士学位,获上海交通大学博士学位,博士期间师从吕勇哉教授(IEEE Fellow)。曾任教于深圳大学信息工程学院(2008年~2015年)。目前主持一项国家自然科学基金面上项目,曾主持一项国家自然科学基金(青年基金)项目和一项深圳市基础研究计划项目,曾参与四项国家自然科学基金项目。在Applied Soft Computing、European Journal of Operational Research、Information Sciences、Expert Systems with Applications、中国科学、CEC2014(计算智能领域顶级会议之一)等知名国际期刊和国际会议上发表30多篇学术论文(其中20篇论文被SCI收录),合作撰写了一部英文学术专著《Extremal Optmization: Fundamentals, Algorithms, and Applications》(已由CRC出版社出版,ISBN:9781498705653),以及获得一项国家发明专利授权(专利号:ZL 2013 1 0186736.8)。2015年3月-2016年2月曾作为国家公派访问学者到美国纽约州立大学布法罗分校计算机系进行学术访问一年。
目前担任《Information Sciences》、《Applied Soft Computing》《European Journal of Operational Research》等多个国际知名期刊的审稿人。1
研究兴趣
计算智能与信息安全1
学术活动
共发表论文34篇,其中20篇论文被SCI收录:
[1] Min-Rong Chen, Xia Li ,Xi Zhang, Yong-Zai Lu. A novel particle swarm optimizer hybridized with extremal optimization. Applied Soft Computing. Vol. 10, No. 2, pp 367-373,2010. (SCI收录, 影响因子:2.857,SCI被引频次:70次)
[2] Min-Rong Chen, Yong-Zai Lu. A novel elitist multiobjective optimization algorithm: multiobjective extremal optimization. European Journal of Operational Research. Vol.188, No.3, pp 637-651, 2008. (SCI收录, 影响因子:2.679, SCI被引频次:43次)
[3] Min-Rong Chen, Wei Zeng, Guo Qiang Zeng, Xia Li, Jian Ping Luo. A Novel Artificial Bee Colony Algorithm with Integration of Extremal Optimization for Numerical Optimization Problems, 2014 IEEE Congress on Evolutionary Computation (CEC 2014). pp. 242-249, September 16, 2014. (计算智能领域的顶级会议,EI收录)
[4] Min-Rong Chen, Yong-Zai Lu, Genke Yang. Multiobjective Optimization Using Population-Based Extremal Optimization, Neural Computing & Applications. Vol.7, No.2, pp. 101-109, 2008. (SCI收录, 影响因子:1.569, SCI被引频次:12次)
[5] Min-Rong Chen, Yong-Zai Lu, Genke Yang. Multiobjective Extremal Optimization with Applications to Engineering Design, Journal of Zhejiang University: SCIENCE A, Vol.8, No. 12, pp. 1905-1911, 2007.(SCI收录, SCI被引频次:12次)
[6] Min-Rong Chen, Xi Zhang, Xia Li. Comments on Shao-Cao’s Unidirectional Proxy Re-Encryption Scheme from PKC 2009, Journal of Information Science and Engineering, Vol.27, No.3, 2011. (SCI收录)
[7] J. Weng, G. Yao, R.H. Deng, M.R. Chen(通讯作者). Cryptanalysis of a Certificateless Signcryption Scheme in the Standard Model. Information Sciences, 183(3): 661-667, 2011 (SCI收录,中科院一区期刊,影响因子4.038,SCI被引频次:25次)
[8] J. Weng, M.R. Chen(通讯作者), R. H. Deng, K. Chen. Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E93-A, No.4, pp. 1-3, 2010.(SCI收录,被Google Scholar引用23次)
[9] J. Weng, M.R. Chen(通讯作者), Y. Yang, R. H. Deng, K. Chen, F. Bao. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Science China: Information Sciences(中国科学:信息科学), Vol. 53, No. 3, pp. 593-606, 2010.(SCI收录)
[10] Yijun Mao, Jin Li, Min-Rong Chen(通讯作者), et al..Fully secure fuzzy identity-based encryption for secure IoT communications,Computer Standards & Interfaces,Vol 44,Feb 2016,Pages117–121.(SCI 收录)
[11] Yijun Mao, Yue Zhang, Min-Rong Chen(通讯作者), Yongbiao Li, Yiju Zhan. Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense, Intelligent Automation & Soft Computing,Vol.22, No. 3, pp. 397-403, 2016. (SCI 收录)
[12] Xi Zhang, Min-Rong Chen(通讯作者). On the Security of a Conditional Proxy Re-Encryption. IEICE Transactions on Fundamentals of Electronics, Communications and Computer, Vol.E92-A No.10, pages 2644-2647, 2009. (SCI收录)