<< Go Back

JianyongChen

  • JianyongChen, Professor
  • 2014-now: Director, Research Institute of Network and Information Security, Shenzhen University, China
  • 2006-now: Professor, Shenzhen University, China
  • 2003-2006: Director of Network Security Standardization, ZTE Corporation, China.
  • 2003: PhD, City University of Hong Kong, China
  • E-mail:

Research Interesting: Deep learning and its applications in security and finance, Block chain, Artificial intelligence in evolutionary computation


Publications in 2017

[1]Qiuzhen Lin, Songbai Liu, Qingling Zhu, Chaoyu Tang, Ruizhen Song, Jianyong Chen, Carlos A. Coello Coello, Ka-Chun Wong, and Jun Zhang, Particle swarm optimization with a balanceable fitness estimation for many-objective optimization problems, IEEE Transactions on Evolutionary Computation, DOI: 10.1109/TEVC.2016.2631279, 2017. 2017-qiuzhenlin-tevc.pdf

[2]Qiuzhen Lin, Bishan Hu, Ya Tang, Leoyu Zhang, Jianyong Chen, Xiaomin Wang, Zhong Ming, A local search enhanced differential evolutionary algorithm for sparse recovery, Applied Soft Computing, DOI: 10.1016/j.asoc.2017.03.034, 2017. 2017-hubishan-asoc.pdf

[3]Yingying Zhu, Junwei Liang, Jianyong Chen, Zhong Ming, An improved NSGA-III algorithm for feature selection used in intrusion detection, Knowledge-Based Systems, 116: 74-85, January 2017. 2017-yingyingzhu-KBS.pdf

[4]Qiuzhen Lin, Caoyu Tang, Yueping Ma, Zhihua Du, Jianqiang Li, Jianyong Chen, and Zhong Ming, A novel adaptive control strategy for decomposition-based multiobjective algorithm, Computer & Operations Research, 78: 94-107, February 2017. 2017-qiuzhenlin-cor.pdf

 

Publications in 2016

[1]Qiuzhen Lin, Jianyong Chen, Zhihui Zhan, Weineng Chen, Carlos A. Coello Coello, Yilong Yin, Chihmin Lin, and Jun Zhang, A hybrid evolutionary immune algorithm for multiobjective optimization problems, IEEE Transactions on Evolutionary Computation, 20 (5): 711-729, 2016.  2016-linqiuzhen-tevc.pdf

[2] Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, and Weixin Xie, Attribute-based data sharing scheme revisited in cloud computing, IEEE Transactions on Information Forensics and Security, 11 (8): 1661-1673, August 2016.  2016-1-wangshulan-trans.pdf

[3] Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, Jianyong Chen, and Weixin Xie, An efficient file hierarchy attribute-based encryption scheme in cloud computing, IEEE Transactions on Information Forensics and Security, 11 (6): 1265-1277, June 2016. 2016-2-wangshulan-trans.pdf

[4]Laizhong Cui, Genghui Li, Qiuzhen Lin Zhihua Du, Weifeng Gao, Jianyong Chen, Nan Lu, A novel artificial bee colony algorithm with depth-first search framework and elite-guided search equation, Information Sciences, 367-368: 1012-1044, 2016. 2016-cuilaizhong-is.pdf

[5]Genghui Li, Qiuzhen Lin, Laizhong Cui, Zhihua Du, Zhengping Liang, Jianyong Chen, Nan Lu, Zhong Ming, A novel hybrid differential evolution algorithm with modified CoDE and JADE, Applied Soft Computing, 47: 577-599, 2016. 2016-ligenghui-asc.pdf

[6] Qiuzhen Lin, Zhiwang Liu, Qiao Yan, Zhihua Du, Carlos A. Coello Coello, Zhengping Liang, Wenjun Wang, and Jianyong Chen, Adaptive composite operator selection and parameter control for multiobjective evolutionary algorithm, Information Sciences, 339: 332-352, 2016. 2016-linqiuzhen-is.pdf

[7]Qiuming Luo, Feng Xiao, Zhong Ming, Hao Li, Jianyong Chen, and Jianhua Zhang, Optimizing the memory management of a virtual machine monitor on a NUMA system, Computer, 66-73, 2016. 2016-luoqiuming-computer.pdf

[8]Xuancai Zhao, Qiuzhen Lin, Jianyong Chen, Xiaomin Wang, Jianping Yu, and Zhong Ming, Optimization security and quality of service in a real-time database system using multi-objective genetic algorithm, Expert Systems with Applications, 64: 11-23, 2016. 2016-zhaoxuancai-esa.pdf

[9]Qingling Zhu, Qiuzhen Lin, Zhihua Du, Zhengping Liang, Wenjun Wang, Zexuan Zhu, Jianyong Chen, Peizhi Huang, Zhong Ming, A novel adaptive hybrid crossover operator for multiobjective evolutionary algorithm, Information Sciences, 345: 177-198, 2016.  2016-zhuqingling-is.pdf

[10] Zhengping Liang, Jiangtao Sun, Qiuzhen Lin, Zhihua Du, Jianyong Chen, and Zhong Ming, A novel multiple rule sets data classification algorithm based on ant colony algorithm, Applied Soft Computing, 38: 1000-1011, 2016. 22-liangzhengping-2016.pdf

[11] Laizhong Cui, Genghui Li, Qiuzhen Lin, Jianyong Chen, Nan Lu. Adaptive differential evolution algorithm with novel mutation strategies in multiple sub-populations. Computers and Operation Research, 67: 155-173, 2016. 21-cuilaizhong-2016.pdf

 

Publications before 2016

[1]Fei Chen, Tao Xiang, Xinyu Lei, and Jianyong Chen, Highly efficient linear regression outsourcing to a cloud, IEEE Transactions on Cloud Computing, 2 (4): 499-508, 2014.2014-feichen.pdf

[2] Jianyong Chen, Junwei Zhou, and Kwok W. Wong, "A modified chaos-based joint compression and encryption scheme", IEEE Transactions on Circuits and Systems--II: Express Briefs, Vol. 58 (2) (2011) 110-114.2011-02-ieee-cs.pdf

[3] Kwok-Wo Wong, Qiuzhen Lin, Jianyong Chen, “Simultaneous arithmetic coding and encryption using chaotic maps”, IEEE Trans. on Circuits and Systems-II: Express Briefs, Vol. 57, No. 2, (2010) 146-150.2010-06-cs-kww.pdf

[4] Qiuzhen Lin, Jianqiang Li, Zhihua Du, Jianyong Chen, and Zhong Ming, A novel multi-objective particle swarm optimization with multiple search stragegies, European Journal of Operational Research, 247, 732-744, 2015.ejor-2015.pdf

[5] Qiuzhen Lin, Kwok-Wo Wong, Ming Li, and Jianyong Chen, An effective error correction scheme for arithmetic coding, Mathematical Problems in Engineering, Vol. 2015, Article ID: 861093, 2015.2015-qiuzhen-mpe-861093.pdf

[6] Qiuzhen Lin, Qingling Zhu, Peizhi Huang, Jianyong Chen, Zhong Ming, and Jianping Yu, A novel hybrid multi-objective immune algorithm with adaptive differential evolution, Computers & Operations Research, 62, 95-111, 2015.2015-qinglin-cor.pdf

[7] Zhengping Liang, Ruizhen Song, Qiuzhen Lin, Zhihua Du, Jianyong Chen, Zhong Ming, and Jianping Yu, A double-module immune algorithm for multi-objective optimization problems, Applied Soft Computing, 35: 161-174, 2015.2015-qiuzhen-asf.pdf

[8] Bo Wang, Jianyong Chen, Songsong Jia, Chunli Lv, Xiaomin Wang, and Hongying Zheng, Secret sharing scheme with dynamic size of shares for distributed storage system, Security and Communication Networks, 7 (8) 1245-1252, 2014.2014-09-bo.pdf

[9] Hongying Zheng, Quan Yuan, and Jianyong Chen, A framework for protecting personal information and privacy, Security and Communication Networks, 8: 2867-2874, October, 2015. 2015-hongying-sec.pdf

[10] Jianyong Chen, Yang Wang, Xiaomin Wang, "On-demand security architecture for cloud computing", Computer, 45 (7) 2012: 73-78.2012-01-cloud-security.pdf

[11] Qiuzhen Lin, Jianyong Chen, "A novel micro-population immune multiobjective optimization algorithm", Computers & Operations Research, 2013, 40(6): 1590–1601.2013-01-lin.pdf

[12] Jianyong Chen, Cunying Hu, Zhen Ji, “Self-tuning random early detection algorithm to improve performance of network transmission”, Mathematical Problems in Engineering, Vol. 2011, Article ID 872347, 17 pages.2011-04-MPE-hcy.pdf

[13] Jianyong Chen, Guihua Wu, Linlin Shen, and Zhen Ji, "Differentiated security levels for personal identifiable information in identity management system", Expert Systems with Applications 38 (11) 2011: 14156-14162. 2011-06-esa-wgh.pdf
[14] Jianyong Chen, Guihua Wu, and Zhen Ji, “Secure Interoperation of  Identity Managements among Different Circles of Trust Transmission”, Computer Standards & Interfaces 33 (6), pp. 533-540, 2011. 2011-05-csi.pdf

[15] Jianyong Chen, Junwei Zhou, and Kwok W. Wong, "Enhanced cryptography by multiple chaotic dynamics", Mathematical Problems in Engineering, Vol 2011 (2011), Article ID 938454, 12 Page. 2011-03-mpe-zjw.pdf

[16] Jianyong Chen and Qiuzhen Lin, "An immune-inspired evolutionary strategy for constrained optimization problems", International Journal on Artificial Intelligence Tools, 20(3) 2011: 549-561.2011-10-IJAI.pdf

[17] Jianyong Chen, Huawang Zeng, Cunying Hu, and Zhen Ji, “Optimization between security and delay of quality-of-service”, Journal of Network and Computer Applications, 34, (2011) 603-608. 2011-01-jnca.pdf

[18] Jianyong Chen, Qiuzhen Lin, Zhen Ji, “Chaos-based multi-objective immune algorithm with a fine-grained selection mechanism”, Soft Computing, 15(7) 2011: 1273-1288. 2011-08-sc.pdf

[19] Jianyong Chen, Cunying Hu, and Zhen Ji, “An improved ARED algorithm for congestion control of network transmission”, Mathematical Problems in Engineering, Vol. 2010, Article ID 329035, 14 pages.2010-02-mpe-hcy.pdf

[20] Jianyong Chen, Qiuzhen Lin, Qinbin Hu, "Application of novel clonal algorithm in multiobjective optimization", International Journal of Information Technology and Decision Making. 9 (2) 2010: 239–266. 2010-03-ijicdm.pdf

[21] Jianyong Chen, Qiuzhen Lin, Zhenji, "A hybrid immune multiobjective optimization algorithm", European Journal of Operational Research, 204 (2010) 294–302. 2010-01-ejor.pdf

[22] Kwok-Wo Wong, Qiuzhen Lin, and Jianyong Chen, "Error detection in arithmetic coding with artificial markers", Computers and Mathematics with Applications 62 (2011): 359-366. 2011-07-computer-mathematics.pdf

[23] Qiuzhen Lin, Kwok-Wo Wong, and Jianyong Chen, "An efficient chaotic source coding scheme with variable-length blocks", Chin. Phys. B 20 (7) 2011: 070501.2011-09-cpb.pdf

[24] J. Y. Chen, K. W. Wong, and J. W. Shuai, “Phase synchronization between two different oscillators with unidirectional signal coupling,” International Journal of Bifurcation and Chaos 14, 1877-1884 (2004).2004-01-IJBC.pdf

[25] J. Y. Chen, K. W. Wong, L. M. Cheng and J. W. Shuai, “A secure communication scheme based on the phase synchronization of chaotic systems,” Chaos, 13, 508-514 (2003). 2003-01-chaos.pdf

[26] J. Y. Chen, K. W. Wong, and J. W. Shuai, “Phase synchronization in coupled chaotic oscillators with time delay.” Physical Review E, 66, 056203 (2002). 2002-01-PRE.pdf

[27] J. Y. Chen, K. W. Wong, and J. W. Shuai, “n:m phase synchronization with mutual coupling phase signals,” Chaos, 12, 100-106 (2002). 2002-02-chaos.pdf

[28] J. Y. Chen, K. W. Wong, H. Y. Zheng, and J. W. Shuai, “Phase signal coupling induced n:m phase synchronization in drive-response oscillators,” Physical Review E, 63, 036214 (2001).2001-01-PRE.pdf

[29] J. Y. Chen, K. W. Wong, and J. W. Shuai, “Properties of phase locking with weak phase-coherent attractors,” Physics Letters A, 285, 312-318 (2001). 2001-02-PLA.pdf

[30] J. Y. Chen, K. W. Wong, H. Y. Zheng, and J. W. Shuai, “Intermittent phase synchronization of coupled spatiotemporal chaotic systems,” Physical Review E, 64, 016212 (2001).2001-03-PRE.pdf

[31] J. Y. Chen, K. W. Wong, Z. X. Chen, S. C. Xu, and J. W. Shuai, “Phase synchronization in discrete chaotic systems” Physical Review E 61, 2559-2562 (2000). 2000-01-PRE.pdf

[32] J. Y. Chen, K. W. Wong, and J. W. Shuai, “Finding the chaotic synchronizing state with gradient descent algorithm,” Physics Letters A, 263, 315-322 (1999). 1999-01-PLA.pdf

[33] J. Y. Chen, Z. X. Chen, J. W. Shuai, Y. Y. Lu, and D. H. Guo, “A chaotic lattice and the circuit of its unit”, Canadian Journal of Physics, 76, 801-808 (1998). 1997-01-canadianphysics.pdf

last updated:2017/09/12
Research Institute of Network and Information Security,Shenzhen University | since 2014