当前位置:首页  教师信息  名师风采

熊平

来源:信息与安全工程学院作者:陈溪发布日期:2018-10-26访问次数:6745


姓名: 熊平

籍贯: 湖北荆州

系: 计算机科学与技术系

民族: 

E-mail pingxiong@zuel.edu.cn



社会兼职:湖北省网络空间安全学会理事 

研究方向:数据挖掘、机器学习、隐私保护

讲授课程:信息安全概论、机器学习基础与实践、密码学

 

个人简历:中南财经政法大学信息与安全工程学院教授、博士生导师,IEEE会员,CCF会员,湖北省网络空间安全学会理事。从事信息安全、隐私保护、数据挖掘与机器学习等领域的教学与研究工作。近年来一直专注于差分隐私理论及应用方面的研究,解决在大数据背景下网络空间的用户隐私保护问题,在《计算机学报》、《计算机研究与发展》、FGCSKAISEISIEEE Transactions等国内外学术期刊发表学术论文40余篇,主要涉及社交网络、推荐系统以及位置服务应用中的隐私保护问题。

 

学术成果:

1.Xiong P, Liang L, Zhu Y, Zhu T. Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning. Paper presented at: The 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA)2021.

2.Xiong P, Li G, Ren W, Zhu T. LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing. Journal of Ambient Intelligence and Humanized Computing. 2021/05/07 2021.

3.Zhang T, Zhu T, Xiong P, Huo H, Tari Z, Zhou W. Correlated Differential Privacy: Feature Selection in Machine Learning. IEEE Transactions on Industrial Informatics. 2020;16(3):2115-2124.

4.Yang Yang, Ping Xiong, Qing Huang, Chen F. Secure and efficient outsourcing computation on large-scale linear regressions. Information Sciences. 2020;522:134-147.

5.Tianqing Zhu , Ping Xiong, Gang Li, Wanlei Zhou, Philip S Yu. Differentially private model publishing in cyber physical systems. Future Generation Computer Systems. 2020/07/01/ 2020;108:1297-1306.

6.Ping Xiong, Lefeng Zhang, Tianqing Zhu, Gang Li, Wanlei Zhou. Private collaborative filtering under untrusted recommender server. Future Generation Computer Systems. 2020;109:511-520.

7.Zhang L, Xiong P, Ren W, Zhu T. A differentially private method for crowdsourcing data submission. Concurrency and Computation: Practice and Experience. 2019;31(19):e5100.

8.Xiong P, Zhu D, Zhang L, Ren W, Zhu T. Optimizing rewards allocation for privacy-preserving spatial crowdsourcing. Computer Communications. 2019/10/15/ 2019;146:85-94.

9.Zhu T, Yang M, Xiong P, Xiong Y, Zhou W. An iteration-based differentially private social network data release. Computer systems science and engineering. 2018;33(2):61-69.

10.Zhu T, Li G, Xiong P, Zhou W. Answering differentially private queries for continual datasets release. Future Generation Computer Systems. 2018/10/01/ 2018;87:816-827.

11.Zhang L, Xiong P, Zhu T. A Differentially Private Method for Crowdsourcing Data Submission2018; Cham.

12.Zhu T, Xiong P, Li G, Zhou W, Yu PS. Differentially private query learning: From data publishing to model publishing. Paper presented at: 2017 IEEE International Conference on Big Data (Big Data); 11-14 Dec. 2017, 2017.

13.Xiong P, Zhang L, Zhu T. Reward-based spatial crowdsourcing with differential privacy preservation. Enterprise Information Systems. 2017;11(10):1500-1517.

14.Zhu T, Li G, Zhou W, Xiong P, Yuan C. Privacy-preserving topic model for tagging recommender systems. Knowledge and Information Systems. 2016;46(1):33-58.

15.Xiong P, Zhu T, Niu W, Li G. A differentially private algorithm for location data release. Knowledge and Information Systems. 2016;47(3):647-669.

16.Xiong P, Zhang L, Zhu T. Semantic analysis in location privacy preserving. Concurrency and Computation: Practice and Experience. 2016;28(6):1884-1899.

17.Zhu T, Xiong P, Li G, Zhou W. Correlated differential privacy: hiding information in non-IID data set. Information Forensics and Security, IEEE Transactions on. 2015;10(2):229-242.

18.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Privacy preserving data release for tagging recommender systems. Paper presented at: Web Intelligence2015.

19.Zhang L, Lu X, Xiong P, Zhu T. A Differentially Private Method for Reward-Based Spatial Crowdsourcing. Applications and Techniques in Information Security: Springer; 2015:153-164.

20.Yang F, Zheng Y, Xiong P. An Overview of Ad Hoc Network Security. Applications and Techniques in Information Security: Springer; 2015:129-137.

21.熊平, 朱天清, 王晓峰. 差分隐私保护及其应用. 计算机学报. 2014;37(1):101.

22.熊平, 朱天清, 金大卫. 一种面向决策树构建的差分隐私保护算法. 计算机应用研究. 2014;31(10):3108-3112.

23.熊平, 朱天清, 顾霄. 基于信息增益比例约束的数据匿名方法及其评估机制. 计算机应用研究. 2014;31(3):819-824.

24.熊平, 顾霄. 基于属性权重最优化的 k-means 聚类算法. 微电子学与计算机. 2014;31(4):40-43.

25.Zhu T, Ren Y, Zhou W, Rong J, Xiong P. An effective privacy preserving algorithm for neighborhood-based collaborative filtering. Future Generation Computer Systems. 2014;36:142-155.

26.Zhu T, Li G, Zhou W, Xiong P, Yuan C. Deferentially private tagging recommendation based on topic model. Advances in knowledge discovery and data mining: Springer; 2014:557-568.

27.Zhang L, Xiong P, Zhu T. Location Privacy Preserving for Semantic-Aware Applications. Applications and Techniques in Information Security: Springer; 2014:135-146.

28.Xiong P, Zhu T, Pan L, Niu W, Li G. Privacy Preserving in Location Data Release: A Differential Privacy Approach. PRICAI 2014: Trends in Artificial Intelligence: Springer; 2014:183-195.

29.Xiong P, Wang X, Niu W, Zhu T, Li G. Android malware detection with contrasting permission patterns. Communications, China. 2014;11(8):1-14.

30.Zhu T, Xiong P, Xiang Y, Zhou W. An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. Paper presented at: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on2013.

31.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Differential privacy for neighborhood-based collaborative filtering. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Niagara, Ontario, Canada: ACM; 2013:752-759.

32.Zhu T, Li G, Ren Y, Zhou W, Xiong P. Privacy Preserving for Tagging Recommender Systems. Proceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 01: IEEE Computer Society; 2013:81-88.

33.熊平. 信息安全原理及应用: 清华大学出版社; 2012.

34.熊平. 基于杂度削减的连续属性离散化方法. 统计与决策. 2012(5):35-37.

35., 朱天清. 基于杂度增益与层次聚类的数据匿名方法. 计算机研究与发展. 2012;49(7):1545-1552.

36.Xiong P, Zhu T. An anonymization method based on tradeoff between utility and privacy for data publishing. Paper presented at: Management of e-Commerce and e-Government (ICMeCG), 2012 International Conference on2012.

37.熊平. 数据挖掘算法与Clementine实践: 清华大学出版社; 2011.

38.钱学锋, 熊平. 中国出口增长的二元边际及其因素决定: 经验研究. 经济研究. 2010;1:65-79.

39.钱学锋, 熊平. 李嘉图比较优势, 特惠贸易安排与产业集聚. 经济学 (季刊). 2009;3:002.

40.熊平. 基于正常轮廓更新的自适应异常检测方法. 武汉大学学报:信息科学版. 2007;32(9):842-845.

41.朱天清, 熊平. 模糊关联规则挖掘及其算法研究. 武汉工业学院学报. 2005;24(1):24-28.

42.熊平, 朱天清, 黄天戍. 模糊关联规则挖掘算法及其在异常检测中的应用. 武汉大学学报:信息科学版. 2005;30(9):841-845.

43.Zhu T-Q, Xiong P. Optimization of membership functions in anomaly detection based on fuzzy data mining. Paper presented at: Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on2005.

44.朱天清, 王先培, 熊平. IDS 中的模糊关联规则挖掘与响应. 计算机工程与应用. 2004;40(15):148-150.

45.Huang T, Xiong P, Zhu T. Data mining model and algorithm in IDS. Paper presented at: Asia-Pacific Optical and Wireless Communications2004.

46.王先培, 朱天清, 熊平. 基于 MAS 的电力系统脆弱性评估与控制. 电力系统及其自动化学报. 2003;15(3):20-22.

47.王先培, 张爱菊, 熊平, 张俊. 新一代数据加密标准——AES. 计算机工程. 2003;29(3):69-70.

48.Xiong P, Huang T-s, Yi K, Zhu T-q. Design of communication port between DCS and computers of RTU. Paper presented at: Machine Learning and Cybernetics, 2003 International Conference on2003.

49.熊平, 王先培, 张爱菊. 网络入侵检测方法. 中国数据通信. 2002;4(2):35-38.

50.熊平, 王先培. P2DR 模型基于时间的量化分析. 信息技术. 2002(7):27-28.

51.王先培, 熊平, 李文武. 防火墙和入侵检测系统在电力企业信息网络中的应用. 电力系统自动化. 2002;26(5):60-63.