Research

Funded Projects

  • PI, Ministry of Industry and Information Technology – Public service platform of Industrial Technology Project (Sub-project: Artificial Intelligence),2020-2022
  • PI, Ministry of Industry and Information Technology – Industrial Internet Innovation development Project (Sub-project: Reference Model), 2018-2020
  • PI, Ministry of Industry and Information Technology – Industrial Internet Innovation development Project (Sub-project: Emergency Response), 2018-2020
  • PI, The National Key Research and Development Program of China (SubTask: Standardization), 2017-2020
  • PI, The National Key Research and Development Program of China (SubTask: Temporal Summarization), 2017-2020
  • PI, The National Natural Science Foundation of China (No. 61671030), 2017-2021
  • PI, The BJUT International Cooperation Foundation, 2016-2017
  • PI, The National Standardization Foundation, 2015-2016
  • PI, The Beijing Excellent Talent Development Foundation, 2013-2015
  • PI, The Importation and Development of High Caliber Talents Project of Beijing Municipal Institutions (No. CIT&TCD201404052), 2013-2015
  • Co-PI, The National Information Security 242 Project of China (No. 2014A104), 2014-2015
  • PI, The Open Research Fund of Beijing Key Laboratory of Trusted Computing, 2014-2015
  • PI, The National Soft Science Program of China (No. 2010GXQ5D317), 2011-2012
  • PI, The National Natural Science Foundation of China (No. 61001178), 2011-2014
  • PI, The Scientific Research Common Program of Beijing Municipal Commission of Education (No. KM201210005024), 2011-2014
  • PI, The Beijing Natural Science Foundation (No. 4102012), 2010-2013

Selected Papers

Research Highlight

  • [2021] Yu H, Hu Q, Yang Z*, Liu H. Efficient Continuous Big Data Integrity Checking for Decentralized Storage. IEEE Transactions on Network Science and Engineering [Early Access] (5-year Impact factor: 5.213)
  • [2021] Chen Y, Martínez J, López L, Yu H, Yang Z*. A dynamic membership group-based multiple-data aggregation scheme for smart grid. IEEE Internet of Things Journal [Early Access] (5-year Impact factor: 11.705)
  • [2020] Yang Z*, Yao Y, Tu S. Exploiting Sparse Topics Mining for Temporal Event Summarization. 2020 IEEE 5th International Conference on Image, Vision and Computing (ICIVC). IEEE, 2020: 322-331. Best Paper
  • [2020] Ma Z*, Lu X, Xie J, Yang Z*, Xue Jao, Tan Z, Xiao B, Guo J. On the Comparisons of Decorrelation Approaches for Non-Gaussian Neutral Vector Variables, IEEE Transactions on Neural Networks and Learning Systems. [Early Access] (5-year Impact factor: 8.823)
  • [2019] Yang Z*, Yu H, Tang J, Liu H. Toward Keyword Extraction in Constrained Information Retrieval in Vehicle Social Network. IEEE Transactions on Vehicular Technology, 2019, 68(5): 4285-4294. (5-year Impact factor: 5.119)
  • [2018] Yang Z*, Tang J, Liu H. Cloud Information Retrieval: Model Description and Scheme Design. IEEE Access, 2018, 6: 15420-15430.
  • [2015] Yang Z*, Issac J, Hu X, Liu H. “Finding the Right Social Media Site for Questions.” 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’15), August 25-28, 2015, Paris, France, 639-644. (A demo Q&A system ‘Social Answer’ was demonstrated in ICDM’15)
  • [2013] Yang Z*, Lei J, Fan K, Lai Y. “Keyword Extraction by Entropy Difference Between the Intrinsic and Extrinsic Mode.” Physica A: Statistical Mechanics and its Applications 392(19): 4523-4531. [paper, Code]

Editor of Proceeding

  • Yung M, Zhang J, Yang Z (Eds.). Trusted Systems-7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015. INTRUST 2015, LNCS 9565, 2016

Standards

  • Yang Z (Editor), Li T (Co-Editor), Karl Waedt, Lin Yanghuichen. Information technology- Security techniques-Security reference model for industrial internet platfrom. ISO/IEC 24392, 3rd WD.
  • 《信息安全技术 物联网数据传输安全技术要求(GB/T37025—2018)》, 国家标准. 杨震; 范科峰; 丁治明; 赖英旭; 刘贤刚; 黄剑; 李健; 龚洁中; 李琳; 李怡德; 马占宇; 段立娟; 秦华; 丁丽萍; 顾健; 齐力; 杨明; 陈书义; 裴庆祺; 张志勇; 曹占峰; 聂祥飞; 涂山山; 何通海; 魏欣; 吴亚玺; 李童; 刘静; 蔡伟; 邹仕洪. 2018年12月28日发布,2019年7月1日实施。
  • 《信息安全技术 物联网安全参考模型及通用要求(37044—2018 )》, 国家标准. 龚洁中; 李琳; 范科峰; 杨震; 李京春; 姚相振; 周睿康; 周松奕; 刘军明; 蒋昊; 顾健; 齐力; 杨明; 陈书义; 马占宇; 常亮; 王勇; 陶晓玲; 谷大武; 陈恭亮; 曹占峰. 2018年12月28日发布,2019年7月1日实施。

Papers

Airtifical Intelligence Theory and Application

  • [2021] Du Yu, Li T, Pathan M, Teklehaimanot H, Yang Z. An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits. Cognitive Computation (2021): 1-13. (5-year Impact factor: 3.856)
  • [2020] Ma Z*, Lu X, Xie J, Yang Z*, Xue J, Tan Z, Xiao B, and Guo J. On the Comparisons of Decorrelation Approaches for non-Gaussian Neutral Vector Variables. IEEE Transactions on Neural Network and Learning Systems (TNNLS), Accepted. (5-year Impact factor: 8.823)
  • [2018] Ma, Z., Xue, J. H., Leijon, A., Tan, Z. H., Yang, Z., Guo, J. Decorrelation of neutral vector variables: Theory and applications. IEEE Transactions on Neural Network and Learning Systems (TNNLS), 2018, 29(1): 129-143. (5-year Impact factor: 8.823)
  • [2018] Yang Z, Chen W, Huang J. Enhancing recommendation on extremely sparse data with blocks-coupled non-negative matrix factorization. Neurocomputing, 2018, 278: 126-133.

Information Retrieval/Social Mining

  • [2020] Yang Z*, Yao Y, Tu S. Exploiting Sparse Topics Mining for Temporal Event Summarization. 2020 IEEE 5th International Conference on Image, Vision and Computing (ICIVC). IEEE, 2020: 322-331. Best Paper
  • [2019] Yang Z*, Yu H, Tang J, Liu H. Toward Keyword Extraction in Constrained Information Retrieval in Vehicle Social Network. IEEE Transaction on Vehicular Technology, 2019, 68(5): 4285-4294. (5-year Impact factor: 5.119)
  • [2019] Yin R, Li K; Lu J, Zhang G. Enhancing fashion recommendation with visual compatibility relationship, 2019 World Wide Web Conference, WWW 2019, San Francisco, CA, United states, 2019-5-13-2019-5-17.
  • [2018] Yang Z*, Tang J, Liu H. Cloud Information Retrieval: Model Description and Scheme Design. IEEE Access, 2018, 6: 15420-15430.
  • [2018] Yang Z, Gao K, Huang J. External Expansion Risk Management: Enhancing Microblogging Filtering Using Implicit Query. Wireless Personal Communications, 2018, 102(3): 2199-2209.
  • [2016] Yang Z, Yao F, Fan K, Huang J. Text Dimensionality Reduction with Mutual Information Preserving Mapping. Chinese Journal of Electronics 26.5 (2017): 919-925.
  • [2015] Yang Z*, Issac J, Hu X, Liu H. “Finding the Right Social Media Site for Questions.” 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’15), August 25-28, 2015, Paris, France, 639-644. (A demo Q&A system ‘Social Answer’ was demonstrated in ICDM’15)
  • [2015] Dani H, Morstatter F, Xia H, Yang Z, and Liu H. Social Answer: A System for Finding Appropriate Sites for Questions in Social Media. In 2015 IEEE International Conference on Data Mining Workshop (ICDMW), pp. 1632-1635. IEEE, 2015 (This is a demo track paper that demonstrates a Q&A system ‘Social Answer’ proposed in our ASONAM’15 paper!)
  • [2014] Yang Z, Fan K, Lai Y, Gao K, Wang Y. “Short Texts Classification Through Reference Document Expansion.” Chinese Journal of Electronics, 2014, 23(2): 315-321.
  • [2013] Yang Z, Wang L, Fan K, Lai Y. “Exemplar-Based Clustering Analysis Optimized by Genetic Algorithm.” Chinese Journal of Electronics, 2013, 22(4): 735-740.
  • [2012] Yang Z, Lai Y, Duan L, Li Y, Xu X. “Spam Collaborative Filtering in Enron E-mail Network.” Acta Automatica Sinica, 2012, 38(3): 399-411. (in Chinese, 杨震, 赖英旭, 段立娟等. 邮件网络协同过滤机制研究. 自动化学报, 38(3): 399-411, 2012)
  • [2012] Yang Z, Lai Y, Duan L, Li Y. “Short Text Sentiment Classification Based on Context Reconstruction.” Acta Automatica Sinica, 2012, 38(1): 55-67. (in Chinese, 杨震, 赖英旭, 段立娟等. 基于上下文重构的短文本情感极性判别研究. 自动化学报, 38(1): 55-67, 2012)
  • [2009] Yang Z, Fan K, Lei J, Guo J. Text Manifold Based on Semantic Analysis. Acta Electronica Sinica, 37(3): 557-561, 2009. (in Chinese, 杨震, 范科峰, 雷建军, 郭军. 基于语义的文本流形研究. 电子学报, 37(3): 557-561, 2009)

Language Model/Keywords Detection

  • [2015] Yang Z, Gao K, Fan K, Lai Y. “Sensational Headline Identification By Normalized Cross Entropy-Based Metric.” The Computer Journal, 2015, 58 (4): 644-655.
  • [2014] Yang Z, Wang L, Lai Y. “ Online comment clustering based on an improved semantic distance.” Ruan Jian Xue Bao/Journal of Software, 2014, 25(12): 2777-2789. (in Chinese, 杨震, 王来涛, 赖英旭. 基于改进语义距离的网络评论聚类研究. 软件学报, 25(12): 2777-278, 2014)
  • [2013] Yang Z, Lei J, Fan K, Lai Y. “Keyword Extraction by Entropy Difference Between the Intrinsic and Extrinsic Mode.” Physica A: Statistical Mechanics and its Applications, 2013, 392(19): 4523-4531. [paper, Code]

Data Security

  • [2021] Yang Z (Editor), Li T (Co-Editor), Karl Waedt, Lin Yanghuichen. Information technology- Security techniques-Security reference model for industrial internet platfrom. ISO/IEC 24392, 3rd WD.
  • [2021] Yu H, Hu Q, Yang Z*, Liu H. Efficient Continuous Big Data Integrity Checking for Decentralized Storage. IEEE Transactions on Network Science and Engineering [Early Access] (5-year Impact factor: 5.213)
  • [2021] Yu H, Hu Q, Yang Z*, Liu H. Efficient Continuous Big Data Integrity Checking for Decentralized Storage. IEEE Transactions on Network Science and Engineering [Early Access] (5-year Impact factor: 11.705)
  • [2019] Yu H, Yang Z, Sinnott R O. Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology. IEEE Access, 2019, 7: 6288-6296.
  • [2018] Yu H, Cai Y, Sinnott R O, et al. ID‐based dynamic replicated data auditing for the cloud. Concurrency and Computation: Practice and Experience, Online.
  • [2018] 杨震, 刘贤刚, 范科峰. 工业互联网平台安全参考模型国际标准提案研究. 信息技术与标准化, 2018, 401(05):34-37.
  • [2016] 李怡德, 杨震*, 龚洁中, 何通海. 物联网安全参考架构研究. 信息安全研究, 2016, 2(5):417-423.
  • [2016] Yang Z, Yang T, Fan K, Wang Y. Cloud Services Composition Based on Trust Combination. Acta Electronica Sinica, 2018,46(3):614-620. (in Chinese, 杨震, 杨甜甜, 范科峰,等. 基于信任合成的云服务动态组合机制研究. 电子学报, 2018,46(3):614-620).

Requirements Engineering

  • Li T*, Wang S, David L, Yang Z. Combining Machine Learning and Logical Reasoning to Improve Requirements Traceability Recovery, Applied Sciences-Basel, 2020, 10(20): 0-7253.
  • Li T, Wang K and Horkoff J. Towards Effective Assessment for Social Engineering Attacks. In The 27th IEEE International Requirements Engineering Conference (RE), 2019. CCF推荐B类国际会议
  • Wang S, Li T, Yang Z. (2019, November). Using Graph Embedding to Improve Requirements Traceability Recovery. In International Conference on Applied Informatics (pp. 533-545). Springer, Cham.
  • Wang S, Li T, Yang Z. (2019, December). Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach. In 2019 26th Asia-Pacific Software Engineering Conference (APSEC) (pp. 39-46). IEEE.

发表评论

您的电子邮箱地址不会被公开。 必填项已用*标注