NOTES

Photo Gallery

VIDEOS

You are now here Home > Academics > Professors >

CS:Yong WANG

published: 2015-12-09 21:27:41       hits: 

name : Yong WANG Sex: male phone: 13086679398
email: cla@uestc.edu.cn office-address:  No.2006, Xiyuan Ave, West Hi-Tech Zone, Chengdu
PH.D  Supervisor:   Master Supervisor:  
major: Computer Science and Technology
research interst: P2P network measurements & modeling,  Mobil network privacy preserving
Biography: YONG WANG received the PhD degree in computer science fromInstitute of Computing Technology, Chieses Academy of Sciences, in 2008. From 2008 to 2010, he was a lecture at UESTC. He is currently an associate professor at UESTC. His research interests include P2P network modeling, mobile network privacy preserving, and big data security.
Education experience: Ø 2007.2 - 2007.12 Fellow, United Nations University International Institute for Software Technology (UNU-IIST)
Ø 2004.9-2008.03 Ph.D. in information and network security, Institute of Computing Technology, Chieses Academy of Sciences, Beijing, China
Ø 2001.9-2004.7 M.S. in parallel and distributed systems, School of Computer Science, Sichuan University, Chengdu, China
Ø 1995.9-1999.7 B.S. in computer science, School of Computer Science, Sichuan University, Chengdu, China
Selected Publications:
[1] Yong Wang, Hong-zong Li, Ting-Ting Zhang and Jie Hou. A Privacy Preserving Matchmaking Scheme for Multiple Mobile Social Networks. The 13th International Conference on Algorithms and Architectures for Parallel Processing(ICA3PP),Vietri sul Mare, Italy ,December 18-20, 2013

[2] Yong Wang, Jie Hou, Yuan-wei Tan and Xiao Nie. A Recommendation based Matchmaking Scheme for Multiple Mobile Social Networks against Private Data Leakage. The First International Conference on Information Technology and Quantitative Management(ITQM),Suzhou, China, 16-18 May, 2013

[3]  Kamenyi D. M., Yong Wang, Fengli Zhang, Imran Memon and Y. H. Gustav. Authenticated Privacy Preserving for Continuous Query in Location Based Services. Journal of Computational Information Systems, Jan. 2014

[4] Yankson H. Gustav, Yong Wang, Kamenyi Domenic M., Fengli Zhang and Imran Memon. Velocity Similarity Anonymization for Continuous Query Location Based Services. The 4th International Conference on Computational Problem-Solving (ICCP), JiuZhai Valley, China. Oct.26-28, 2013

[5] Daniel ADU-GYAMFI, Yong WANG, Fengli ZHANG, Domenic KAMENYI M., Imran MEMON and Gustav YANKSON H. A Model for Spreading Behavior of Passive Worms in Mobile Social Networks. Journal of Computational Information Systems, March, 2014

[6] Kamenyi Domenic M., Yong Wang, Fengli Zhang, Imran Memon and Yankson H. Gustav.  Preserving Users' Privacy for Continuous Query Services in Road Networks. The 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), Xi’an, China. Nov. 23-24, 2013

[7] Yong Wang,  Nan Zhang,  Yan-mei Wu, Bin-bin Su and Yong-jian Liao. Protocol Formats Reverse Engineering based on Association Rules in Wireless Environment. The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), Melbourne, Australia, 16-18 July, 2013

[8] Yong Wang,  Nan Zhang,  Yan-mei Wu and Bin-bin Su. Protocol Specification Inference Based on Keywords Identification. The 9th International Conference on Advanced Data Mining and Applications (ADMA), CCNT Lab, Zhejiang University. Dec. 14-16, 2013

[9] Kamenyi Domenic M., Yong Wang, Fengli Zhang, Yankson Gustav, Daniel Adu-Gyamfi, and Nkatha Dorothy. Optimizing Placement of Mix Zones to Preserve Users' Privacy for Continuous Query Services in Road Networks. The 9th International Conference on Advanced Data Mining and Applications (ADMA), CCNT Lab, Zhejiang University. Dec. 14-16, 2013

[6] Y.WANG, Y. BAI, J. HOU, Y.W. TAN. A malicious users detecting model based on feedback correlations. International journal of computer networks and communications (IJCNC) vol. 1(5), 2013.

[7] Y. Wang, H.L. He, J. Peng, T.T. Zhang, H.Z. Li . Privacy Preserving for Continuous Query in Location Based Services. In: proc. of ICPADS 2012, Singapore, Dec.17-19, 2012. INSPEC Accession Number: 13246690

[8] Y. Wang, J. Peng, L.P. He, T.T. Zhang, H.Z. Li . LBSs Privacy Preserving for Continuous Query based on Semi-honest Third Parties. In: proc. of IPCCC 2012, Austin, Texas, USA, Dec.1-3, 2012.INSPEC Accession Number:13228087

[9] Wang Yong, Solomon Haile Tefera, Yonas Kibret Beshah, Understanding Botnet: From Mathematical Modelling to Integrated Detection & Mitigation Framework. In: proc. of 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2012, Kyoto, Japan, August 8-10, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2120-4.INSPEC Accession Number:12996921

[10] 王勇,侯洁. 基于反馈相关性的P2P网络信任模型,计算机科学,2013.3

[11] Yong WANG, Ting-Ting ZHANG et al. “ Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users”, In proc. of TrustCom 2012 INSPEC Accession Number:12980123

[12] WANG Yong, ZHANG Ting-ting, BAI Yang, LIU Meng-juan, and QIN Zhi-guang, “Spectrum Based Analysis of Gnutella Overlays Characteristics”, Journal of University of Electronic Science and Technology of China, Vol. 41(2) Mar. 2012 INSPEC Accession Number:13408691