37000Cm威尼斯

基本信息

姓名:王金艳 

出生年月:1982年1月 

民族:苗 

政治面貌:中共党员 

籍贯:广西桂林 

学位/职称/职务:博士/教授/博士生导师

电子邮箱:wangjy612@163.com;wangjy612@gxnu.edu.cn 

研究领域:数据安全、机器学习、自动推理 

学习工作经历

2001年9月-2005年7月,东北师范大学,计算机科学系,计算机科学与技术专业,本科,获研究生保送资格(3/142);

2005年9月-2008年7月,东北师范大学,计算机科学与信息技术学院,计算机应用技术专业,硕士;

2008年9月-2011年12月,东北师范大学,数学与统计学院,运筹学与控制论专业,博士,导师:谷文祥教授;

2012年1月-至今,广西师范大学,计算机科学与信息工程学院专任教师。 

科研项目

[1] 图神经网络中的隐私保护理论和方法研究,国家自然科学基金项目,No. 62162005,2022.01-2025.12,主持;

[2] 数据流发布中的隐私保护理论和方法研究,国家自然科学青年基金项目,No. 61502111,2016.01-2018.12,主持;

[3] 基于扩展规则的SAT问题不完备求解方法研究,国家自然科学基金项目,No. 61763003, 2018.01-2021.12,主持;

[4] 集值型数据流发布中的隐私保护关键技术研究,广西自然科学基金,No. 2016GXNSFAA380192 2016.09-2019.08,主持;

[5] 基于扩展规则的SAT和#SAT问题求解方法研究,广西自然科学基金,No. 2013GXNSFBA019263,2013.04-2016.03,主持;

[6] 扩展规则方法在命题逻辑中的应用研究,广西高校科研项目,No.2013YB029,2013.01-2015.12,主持;

[7] 面向加密图像的信息隐藏模型与方法,国家自然科学地区基金项目,No. 61562007,2016.01-2019.12,主持人:唐振军教授,排名第二;

[8] 分布式环境多样性数据共享的隐私模型及其保护技术研究,国家自然科学基金,No. 61272535,2013.01-2016.12,主持人:李先贤教授,排名第三;

代表性科研成果(*为通讯作者)

1.期刊论文

[1]Quanmin Wei, Jinyan Wang*, Xingcheng Fu, Jun Hu, Xianxian Li*. AIC-GNN: Adversarial Information Completion for Graph Neural Networks. Information Sciences, 2023, 626: 166-179.(SCI一区, EI, CCF-B)

[2]De Li, Jinyan Wang*, Qiyu Li, Yuhang Hu, Xianxian Li*. A Privacy Preservation Framework for Feedforward-Designed Convolutional Neural Networks, Neural Networks, 2022, 155: 14-27. (SCI一区, EI, CCF-B)

[3]Quanmin Wei, Jinyan Wang*, Jun Hu, Xianxian Li, Tong Yi. OGT: Optimize Graph Then Training GNNs for Node Classification. Neural Computing and Applications, 2022, 34: 22209-22222.(SCI三区, EI, CCF-C)

[4]Jing Liu, Xianxian Li*, Quanmin Wei, Songfeng Liu, Zhaohui Liu, Jinyan Wang*. A two-phase random forest with differential privacy. Applied Intelligence, 2023, 53(10): 13037-13051.(SCI二区, EI, CCF-C)

[5]Jiawen Qin, Jinyan Wang*, Qiyu Li, Shijian Fang, Xianxian Li, Lei Lei*. Differentially private frequent episode mining over event streams, Engineering Applications of Artificial Intelligence, 2022, 110: 104681, 16 pages.(SCI二区, EI, CCF-C)

[6]Xianxian Li, Jing Liu, Songfeng Liu, Jinyan Wang*. Differentially Private Ensemble Learning for Classification, Neurocomputing, 2021, 430: 34-46.(SCI二区, EI, CCF-C)

[7]Jinyan Wang, Shijian Fang, Chen Liu, Jiawen Qin, Xianxian Li*, Zhenkui Shi. Top-k closed co-occurrence patterns mining with differential privacy over multiple streams, Future Generation Computer Systems, 2020, 111: 339-351. (SCI二区, EI, CCF-C)

[8]Jinyan Wang, Chen Liu, Xingcheng Fu, Xudong Luo, Xianxian Li*. A Three-phase Approach to Differentially Private Crucial Patterns Mining over Data Streams. Computers & Security, 2019, 82: 30-38. (SCI二区, EI, CCF-B)

[9]Jinyan Wang, Kai Du, Xudong Luo, Xianxian Li*. Two privacy-preserving approaches for data publishing with identity reservation, Knowledge and Information Systems, 2019, 60(2): 1039-1080. (SCI三区, CCF-B)

[10]Jinyan Wang, Minghao Yin, Jingli Wu. Two approximate algorithms for model counting, Theoretical Computer Science, 657, Part A: 28-37, 2017. (SCI, EI, CCF-B)

[11]王金艳, 刘陈, 傅星珵, 罗旭东, 李先贤*. 差分隐私的数据流关键模式挖掘方法, 软件学报, 2019, 30(3): 648-666. (EI, CCF-A, 中文核心)

[12]王金艳, 胡春,牛当当, 李先贤*. 基于IAPS的扩展规则局部搜索算法, 电子学报, 2020, 48(5): 899-905. (EI, CCF-A, 中文核心)

[13]Songfeng Liu, Jinyan Wang*, Wenliang Zhang. Federated personalized random forest for human activity recognition, Mathematical Biosciences and Engineering, 2022, 19(1): 953-971. (SCI, EI)

[14]王金艳*, 胡春, 高健. 一种面向知识编译的OBDD构造方法, 广西师范大学学报(自然科学版), 2021, 39(4): 47-54. (中文核心)

[15]Jinhuan Duan, Xianxian Li*, Shiqi Gao, Zili Zhong, Jinyan Wang*. SSGD: A safe and efficient method of gradient descent, Security and Communication Networks, 2021, Article ID 5404061, 11 pages.(SCI, EI, CCF-C)

[16]Jinyan Wang, Chaoji Deng, Xianxian Li*. Two Privacy Preserving Approaches for Publishing Transactional Data Streams, IEEE Access, 6: 23648-23658,2018. (SCI二区, EI)

[17]Jinyan Wang, Guoqing Cai, Chen Liu, Jingli Wu, Xianxian Li*. A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory, Symmetry, 10(8): 333, 2018. (SCI)

[18]Jinyan Wang, Minghao Yin, Wenxiang Gu. Soft hyperrings and their (fuzzy) isomorphism theorems, Hacettepe Journal of Mathematics and Statistics, 44(6): 1463-1475, 2015. (SCI) 

[19]Jinyan Wang, Shenghai Zhong, Minghao Yin. Knowledge Compilation Based on Component Analysis and Extension Rule, Journal of Computational Information Systems,11(12): 4305-4312, 2015. (EI)

[20]Jinyan Wang, Suqin Tang. Some new operations on interval-valued intuitionistic fuzzy soft sets, Italian Journal of Pure and Applied Mathematics, 34: 225-242, 2015. (EI)

[21]Jinyan Wang, Minghao Yin, Jingli Wu. Approximate model counting via extension rule. FAW 2015, 2015, pp. 229-240. (EI)

[22]Jinyan Wang, Jingli Wu, Zhixin Li. More on Krasner (m,n)-hyperrings, Italian Journal of Pure and Applied Mathematics, 35: 243-264, 2015. (EI)

[23]王金艳, 谷文祥, 覃少华, 殷明浩. 扩展规则方法研究综述, 智能系统学报, 9(1): 1-11, 2014. (CCF-C, 中文核心)

[24]Jinyan Wang, Minghao Yin, Wenxiang Gu. Fuzzy multiset finite automata and their languages, Soft Computing, 17(3): 381-390, 2013. (SCI三区, EI, CCF-C)

[25]Jinyan Wang, Minghao Yin, Wenxiang Gu. Soft polygroups, Computers and Mathematics with Applications, 62(9): 3529-3537, 2011. (SCI一区, EI)

[26]Jinyan Wang, Jianmiang Zhan, Wenxiang Gu. Some new results on soft hypermodules, Ars Combinatoria, 104: 289-306, 2012. (SCI)

[27]谷文祥, 王金艳, 殷明浩. 基于MCN和MO启发式策略的扩展规则知识编译方法, 计算机研究与发展, 48(11): 2064-2073, 2011. (EI, CCF-A, 中文核心)

[28]Xiangtao Li, Jinyan Wang, Junping Zhou, Minghao Yin. A perturb Biogeography based optimization with mutation for global numerical optimization, Applied Mathematics and Computation, 218(2): 598-609, 2011. (SCI二区, EI)

[29]Jian Gao, Jinyan Wang, Kuixian Wu, Rong Chen. Solving quantified constraint satisfaction problems with value selection rules. Frontiers of Computer Science, 2020, 14(5): 145317. (SCI二区, EI, CCF-C)

2.会议论文

[1]Yuecen Wei, Xingcheng Fu, Qingyun Sun, Hao Peng, Jia Wu, Jinyan Wang*, Xianxian Li*. Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation. The 22nd IEEE International Conference on Data Mining (ICDM), 2022, pp. 528-537. (EI, CCF-B)

[2]Xiaohong Liu, Hanbo Cai, De Li, Xianxian Li, Jinyan Wang*. Differential Privacy Preservation in Adaptive K-Nets Clustering, The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021, pp. 405-412. (EI, CCF-C)

[3]Yuhang Hu, De Li, Zhou Tan, Xianxian Li, Jinyan Wang*. Adaptive Clipping Bound of Deep Learning with Differential Privacy, The 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021, pp. 428-435. (EI, CCF-C)

[4]Jun Hu, Jinyan Wang*, Quanmin Wei, Kai Du, Xianxian Li. Learning Graph Neural Networks on Feature-Missing Graphs, International Conference on Knowledge Sciecne, Engineering and Management (KSEM), 2023, pp. 255-262. (EI, CCF-C)

[5]Shenghan Li, Jinyan Wang*, Huachang Zeng, Jun Li, Yuecen Wei, Xianxian Li. Dynamic Social Recommendation with High-matching Inhomogeneous relations. IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2023. Accepted. (EI,CCF-C)

[6]Dongqi Yan, Jinyan Wang*, Qingyi Huang, Juanjuan Huang, Xianxian Li. LTNI-FGML: Federated Graph Machine Learning on Long-Tailed and Non-IID Data via Logit Calibration. The 32nd International Conference on Artificial Neural Network (ICANN), 2023. Accepted. (EI,CCF-C)

[7]Yangyou Ning, Jinyan Wang*, De Li, Dongqi Yan, Xianxian Li. GFedKRL: Graph Federated Knowledge Re-Learning for Effective Molecular Property Prediction via Privacy Protection. The 32nd International Conference on Artificial Neural Network (ICANN), 2023. Accepted. (EI,CCF-C)

[8]Linlin Su, Jinyan Wang*, Zeming Gan, Xianxian Li. FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection Attacks. The 22nd IEEE International Conference on Trust, Security and Privacy in Computingand Communications (Trustcom), 2023, Aceepted.(EI, CCF-C)

发明专利

[1]王金艳,秦佳雯,黎启宇,李先贤.数据流中频繁情节挖掘的差分隐私保护方法,专利号:ZL201910430882.8,授权日:2022.7.5.

[2]王金艳,李德,胡宇航,李先贤.可解释性深度学习的差分隐私保护方法,专利号:ZL202010011049.2,授权日: 2022.6.21.

[3]王金艳,方仕健,刘陈,李先贤.多条流中top-k共生模式挖掘的差分隐私保护方法,专利号:ZL201811618433.8,授权日:2021.9.24.

[4]王金艳,刘陈,傅星珵,李先贤.数据流关键模式挖掘的差分隐私保护方法,专利号:ZL201711230632.7,授权日:2021.8.3.

[5]王金艳,周思明,李先贤.关系事务数据发布的隐私保护方法,专利号:ZL201711174376.4,授权日:2020.12.15.

[6]王金艳,蔡国庆,李先贤.层次数据发布中的分级隐私保护方法,专利号:ZL20171112494.0,授权日:2020.11.10.

[7]金艳,邓超记,李先贤.事务型数据流发布的隐私保护方法,专利号:ZL201611198601.3,授权日:2019.10.15.

[8]王金艳,杜凯,李先贤.增强型身份保持的隐私保护方法,专利号:ZL201710014358.3,授权日:2019.4.30.

获奖情况

[1]2022年3月,广西师范大学2021年度桂林银行教师奖;

[2]2021年6月, 2020年广西师范大学本科课堂教学优秀教师;

[3]2021年1月, 广西师范大学2020年度优秀研究生指导教师;

[4]2019年12月, 广西师范大学2019年度诚华青年教师奖;

[5]2018年9月, 2016-2018年度广西师范大学优秀教师;

[6]2018年4月, 广西高等学校千名中青年骨干教师培育计划第一期培养对象;

[7]2018年6月, 第五届全区高校青年教师教学竞赛三等奖;

[8]2018年12月, 广西师范大学计算机科学与信息工程学院2018年度教书育人标兵;

[9]2017年5月, 广西师范大学第十一届十佳青年;

[10]2017年2月, 广西师范大学第五届教学新秀人选;

[11]2017年5月, 广西师范大学青年教师教学竞赛二等奖;

[12]2013年1月, 广西师范大学青年骨干教师成长支持计划资助人选.

  • 地址 :广西师范大学育才校区育才路15号
  • 邮编:541004
37000Cm威尼斯-威斯尼斯人8188cc(中国)官网 - App Store 版权所有 备案号: