Qian ChenPhD Candidate 陈倩,在读博士研究生 CARC Laboratory 计算机应用研究中心,计算机科学与技术学院, E-mail:qianchen@stu.hit.edu.cn Address:HITSZ, University Town of Shenzhen, Nanshan District, Shenzhen, Guangdong, China |
Research Interests:
- Algorithmic Game Theory(博弈论),
- Auction Mechanism(拍卖机制),
- Privacy Preserving(隐私保护),
- Deep Learning(深度学习),
Education Experience:
- 2019.9 - Now: Computer Science and Technology, Harbin Institute of Technology, Shenzhen, PhD Candidate
哈尔滨工业大学(深圳),计算机科学与技术,博士在读
First place in comprehensive appraisal of admission
Surpervisor:Prof. Xuan Wang - 2023.2 - Now: Information Systems, College of Business, City University of Hong Kong, Visiting Student
香港城市大学,商学院,信息系统,访问学生
Surpervisor:Prof. YANG Cengying - 2016.9-2018.7: Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Master
哈尔滨工业大学(深圳),计算机科学与技术,硕士
First place in recommended graduate students
Surpervisor:Prof. Lin Jiang - 2011.9-2016.7: Computer Science and Technology, Zhengzhou University, Bachelor
郑州大学,计算机科学与技术专业,学士
Supervisor:Prof. LiMing Wang
Working Experience:
- 2018.7-2019.8:Experimentalist, Experimental and Creative Practice Education Center, Harbin Institute of Technology, Shenzhen
哈尔滨工业大学(深圳),实验与创新实践教育中心,实验师 -
Teaching: Compiling principle(编译原理),High level language program(高级语言程序设计) and so on.
- 2020.1-now:Intern, Network Intelligence Department, Pengcheng National Laboratory
鹏城实验室,实习 - 2022.2-now:PINGAN-HITsz Intelligence Finance Research Research Center
哈工大(深圳)+ 平安科技粤港澳智慧金融研究中心,实习
Academic Papers:
- (SCI, JCR Q1, IF:4.715) Qian Chen, Yulin Wu, Xuan Wang, Zoe Lin Jiang, Weizhe Zhang, Yang Liu, Mamoun Alazab. A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes.IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2023, 16: 3309-3321.
- (SCI, JCR Q2, IF:3.847) Qian Chen, Lin Yao, Xuan Wang*, Zoe L. Jiang, Yulin Wu and Tianzi Ma. SecMDGM: Federated Learning Security Mechanism Based on Multi-Dimensional Auctions. Sensors, 2022, 22(23):9434.
- (SCI, JCR Q2, IF:5.102) Qian Chen, Xuan Wang*,Zoe Lin Jiang,Yulin Wu,Huale Li,Lei Cui,Xiaozhen Sun. Breaking the traditional: A Survey of Algorithmic Mechanism Design Applied to Economic and Complex Environments. NEURAL COMPUTING & APPLICATIONS, 2023, 35(22): 16193-16222
- (CCF C) Qian Chen, Xuan Wang, ZoeLin Jiang. Efficient Cloud Computing Resource Management Strategy Based on Auction Mechanism. APNOMS, 2023, 286-289.
- (CCF A workshop) Qian Chen, etc. File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops, 2018, pp:140-147.
- (EI) Qian Chen, Lin Yao, Yulin Wu, Xuan Wang, Weizhe Zhang, Zoe Jiang, Yang Liu, Mamoun Alazab. PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption, ICDIS, 2022.
- (SCI, JCR Q1, IF:6.404) Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe L. Jiang, Qian Chen, Peng Xu. Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing, IEEE Transactions on Dependable and Secure Computing, TDSC, 2022.
- (SCI, JCR Q1, IF:7.302) Huale Li, Xuan Wang, Fengwei Jia, Yifan Li, Qian Chen. A Survey of Nash Equilibrium Strategy Solving Based on CFR, Archives of Computational Methods in Engineering. JUN 2021,28(4): 2749-2760.
- (SCI, JCR Q2, IF:3.062) Junbin Fang, Guikai Xi, Long Li, Qian Chen, Puxi Lin, Sijin Li, Siu-Ming Yiu and ZoeL. Jiang. Coarse-to-Fine Two-Stage Semantic Video Carving Approach in Digital Forensics. COMPUTERS & SECURITY, 2020.
- (CCF A workshop) Chengjin Liu, ZoeL.Jiang, Xin Zhao, Qian Chen, Yang Liu, Xuan Wang. Multi-party secure logistic regression scheme based on leveled fully homomorphic encryption and trusted hardware. INFOCOM WKSHPS, 2022.6.20.
- (EI) Yifan Li, Xuan Wang, Zoe L. Jiang, Shuhan Qi, Xinhui Liu, Qian Chen. RGB-D tracker under Hierarchical structure. CIFEr 2019: 1-6.
Patents for Inventions:
- A Digital Forensics File Fragment Classification Method Based on Digital Image Transformation and Deep Learning. Application Number: 201810455121.3
- Consensus method and device based on aggregated signature and temporal proof algorithm. Application Number: Not given
- A method and system for heterogeneous acceleration of privacy computing based on full homomorphic encryption. Application Number: Not given
- Complementary operator and operation method based on multi-key fully homomorphic scheme. Authorization Number: ZL 202210424254.0 (Authorized)
- Black-box traceable key attribute encryption method and apparatus based on DFA adaptive security. Authorization Number: ZL 202210357035.5 (Authorized)
- A Multi-Party Privacy-Preserving Machine Learning Approach Based on Homomorphic Encryption and Trusted Hardware. Authorization Number: ZL 202111103182.1 (Authorized)
Projects
|
Project Source 项目来源 |
Project Name 项目名称 |
Time 起止 |
2 |
Industry-University-Research Project of the Ministry of Education 教育部产学研项目 |
Question answering system for experimental teaching based on artificial intelligence 基于人工智能的实验教学问答系统 |
2019.06 -2020.06 |
2 |
Guangdong Science and Technology Program- Key Areas R&D Program 广东省重点领域研发计划 |
Super-scale AI computing power driven non-complete information Development and application of key technologies for game decision making 超大规模AI计力驱动的非完全信息博弈决策关键技术研发与应用 |
2020.10 -2023.09 |
3 |
Harbin Institute of Technology Research Innovation Fund 哈尔滨工业大学科研创新基金 |
Key technologies for efficient privacy protection machine learning 高效隐私保护机器学习关键技术 |
2019.10-2020.9 |
4 |
International (regional) cooperation and exchange project of National Natural Science Foundation of China 国家自然科学基金国际(地区)合作与交流项目 |
Research on the core issues of multimedia evidence fragment carving and tampering detection in digital forensic investigation 数字取证调中多媒体证据碎片的雕复及篡改检测核心问题研究 |
2014.01-2017.12 |
5 |
National technology research and development plan (863)国家技术研究发展计划(863计划) |
key technologies for user data privacy protection in cloud computing environment 云计算环境用户数据隐私保护关键技术 |
2015.1 -2017.12 |
6 |
Projects on the National Natural Science Foundation of China国家自然科学基金委面上项目 |
Research on Key Technologies of Privacy Protection Machine Learning 隐私保护机器学习关键技术研究 |
2019.1 |
7 |
National key R & D plan 国家重点研发计划 |
Massive heterogeneous network security data aggregation, fusion, storage management and sharing 海量多元异构网络安全数据汇聚、融合、存储管理与共享 |
2017.7 |
8 |
Projects on the National Natural Science Foundation of China 国家自然科学基金委面上项目 |
Research on Key Technologies of Privacy Protection Machine Learning 隐私保护机器学习关键技术研究 |
2019.1 |
Representative Prizes, Awards and Scholarships:
- February 2021, Outstanding Paper Award in Computer Academy of Guangdong
- The 3rd National Artificial Intelligence Innovation and Entrepreneurship Conference (Innovation), Grand prize
- The 6th “TaiDi Cup” Data Mining Challenge, Guangdong Province, The third prize
- September 2017, Second-class scholarship in Harbin Institute of Technology
- September 2016, First-class scholarship in Harbin Institute of Technology
- November 2014, University-level outstanding students’s third-class scholarship in Zhengzhou University
- The 5th “Blue Bridge Cup” C/C++ Programming Undergraduate Group A, Excellent prize
- The 7th ACM College Student Programming Competition of Zhengzhou University, First prize
- December 2012, Zhengzhou University, “Merit Student”
- December 2012, National Encouragement Scholarship
Skills and Interests: Table Tennis and badminton
- Harbin Institute of Technology (Shenzhen) first table tennis tournament, First place in singles, March 2018
- Computer Academy ”Guangxi Cup” individual basketball shooting, First place, 2017
- The 2nd Shenzhen University City Sports Games Table Tennis Competition, Second place in group competition, December 2017
- National Grade II Athletes of Table tennis, and won many awards in provincial competitions.