十博10bet体育官网
首页十博10bet概况师资队伍本科教育硕士教育科研学术党建思政理论学习合作交流学生工作招生就业校友之家
师资队伍
彭三城
当前位置: 首页>师资队伍>云山学者>彭三城>正文
基本资料

姓名:彭三城

学历/学位:博士

职称/职务:教授

教师介绍

研究方向:情感计算、可信计算、社会网络分析、移动计算、大数据。

办公室及联系电话:实验楼B302,020-39318302

电子邮箱:psc346@aliyun.com

个人简介:广东省语言工程与计算重点实验室副主任,中国计算机学会高级会员,硕士生导师,2014年入选广东省“千百十人才培养工程”省级培养对象曾任肇庆十博10bet网络与信息安全研究所所长。主持国家自科基金面上项目2项、广东省自科基金项目1项、国家博士后基金面上项目1项,横向项目4项;参与国家973计划项目1项、国家863项目1项、国家自科基金面上项目1项、省部级项目6项。IEEE Communications Surveys and TutorialsIEEE Transactions on Dependable and Secure Computing,IEEE Transactions on Knowledge and Data Engineering,IEEE Wireless CommunicationsIEEE Internet of Things JournalIEEE NetworkFuture Generation Computer SystemsInformation SciencesJournal of Network and Computer ApplicationsComputers & SecurityJournal of Computer Science and Technology,计算机研究与发展等国内外SCI、EI杂志及国际会议发表学术论文60多篇(其中SCI检索20多篇,EI检索30多篇。申请或获国家发明专利与国家软件著作权登记5项,出版教材3部。担任TrustComICA3PPEUC,ICCVEICNCICCSDSNiSCI,SpaCCS等国际学术会议的程序委员会委员,担任IEEE Transactions on Parallel and Distributed SystemsIEEE NetworkIEEE Transactions on Mobile Computing,Future Generation Computer SystemsInformation SciencesComputer NetworksJournal of Computer and System SciencesJournal of Computer Science and Technology, Mobile Networks & Applications等知名杂志的审稿人

近年来承担的科研项目

[1]国家自然科学基金面上项目(项目编号:61876205),项目名称:社交网络中热点事件的负面情绪识别及演化分析研究019年1月至2022年12月。(在研)

[2]国家自然科学基金面上项目(项目编号:61379041),项目名称:智能手机病毒传播动力学建模理论及分析方法研究2014年1月至2017年12月,主持。(已结题)

[3]广东省自然科学基金(课题编号:S2011040002356),项目名称:无线Mesh网中异常行为分析与检测方法研究2011年10月至2013年10月,主持。(已结题)

[4]中国博士后科学基金会--第51批中国博士后科学基金(课题编号:2012M511757),项目名称:智能手机病毒传播理论及应用研究2012年6月至2014年6月,主持。(已结题)

[5]广州市科技计划项目,微博热点事件的负面情绪识别及传播分析研究,2018年4月至2021年3月,主持。(在研)

近年来发表的学术论文

[1]Guorui Li, Guang Guo, Sancheng Peng*, Cong Wang, Shui Yu, Jianwei Niu, and Jianli Mo.Matrix Completion via Schatten Capped p Norm. Accepted byIEEE Transactions on Knowledge and Data Engineering, 2020, DOI: 10.1109/TKDE.2020.2978465.(SCI源刊)

[2]Cong Wang,Fanghui Zheng,Guangcong Zheng,Sancheng Peng*,Zejie Tian,Yujia Guo,Guorui Li,Ying Yuan.Modeling on Virtual Network Embedding Using ReinforcementLearning, Accepted byConcurrency and Computation: Practice and Experience, 2020, DOI: 10.1002/cpe.6020.(SCI源刊)

[3]Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu, and Jianwei Niu. An Immunization Framework for Social Networks through Big Data Based Influence Modeling. IEEE Transactions on Dependable and Secure Computing, 2019, 16(6): 984-995. (SCI)

[4]Guorui Li, Jingsha He, Sancheng Peng*, Weijia Jia, Cong Wang, Jianwei Niu, and Shui Yu. Energy Efficient Data Collection in Large-scale Internet of Things via Computation Offloading, IEEE Internet of Things Journal, 2019, 6(3): 4176-4187. (SCI)

[5]Yanxia Lv, Sancheng Peng*, Ying Yuan, Cong Wang, Pengfei Yin, Jiemin Liu, and Cuirong Wang. A Classifier Using Online Bagging Ensemble Method for Big Data Stream, Tsinghua Science and Technology, Tsinghua Science and Technology, 2019, 24(4): 379-388. (SCI)

[6]Guorui Li, Sancheng Peng*, Cong Wang, Jianwei Niu, and Ying Yuan. An Energy-efficient Data Collection Scheme Using Denoising Autoencoder in Wireless Sensor Networks. Tsinghua Science and Technology, 2019, 24(1): 86-96.(SCI)

[7]Sancheng Peng, Yongmei Zhou, Lihong Cao, Shui Yu, Jianwei Niu, and Weijia Jia. Influence Analysis in Social Networks: A Survey. Journal of Network and Computer Applications, 2018, 106:17-32. (SCI)

[8]Sancheng Peng, Shui Yu, Peter Mueller. Social networking big data: Opportunities, solutions, and challenges. Future Generation Computer Systems, Volume 86, 2018, pp. 1456-1458. (SCI)

[9]Youyang Qu, Shui Yu, Wanlei Zhou, Sancheng Peng*, Guojun Wang, and Ke Xiao. Privacy of Things Emerging Challenges and Opportunities in Wireless Internet of Things. IEEE Wireless Communications, 2018, 25(6): 91-97.(SCI)

[10]Guorui Li , Haobo Chen, Sancheng Peng*, Xinguang Li, Cong Wang, Shui Yu and Pengfei Yin. A Collaborative Data Collection Scheme based on Optimal Clustering for Wireless Sensor Networks.Sensors, 2018, 18(2487): 1-19.(SCI)

[11]Ruibo Yan, Xi Xiao, Guangwu Hu, Sancheng Peng, Yong Jiang. New deep learning method to detect code injection attacks on hybrid applications, Journal of Systems and Software,2018,137:67-77. (SCI)

[12]Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu, Dongqing Xie. Social influence modeling using information theory in mobile social networks. Information Sciences, 2017, 379: 147-159. (SCI)

[13]Sancheng Peng, Guojun Wang, Dongqing Xie. Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. IEEE Network, 2017, 31(1): 11-17. (SCI)

[14]Mei Wang, Meng Xiao, Sancheng Peng*, Guohua Liu. A hybrid index for temporal big data. Future Generation Computer Systems, Volume 72, July 2017, pp. 264-272. (SCI)

[15]Cong Wang, Guohua Liu, Sancheng Peng*, Ying Yuan, Guorui Li, and Cong Wan. Virtual Network Embedding with Pre-transformation and Incentive Convergence Mechanism. Concurrency and Computation: Practice & Experience, 2017, 29: 1-19. (SCI)

[16]Xi Xiao, Ruibo Yan, Runguo Ye, Sancheng Peng*, Qing Li, Shutao Xi. Detecting Code Injection Attacks on Hybrid Apps with Machine Learning. Journal of Internet Technology, 2017, 18(4): 843-854. (SCI)

[17]Sancheng Peng, Shui Yu, Aimin Yang. Smartphone Malware and Its Propagation Modeling: A Survey. IEEE Communications Surveys and Tutorials, 2014, 16(2): 925-941. (SCI)

[18]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu. Containing smartphone worm propagation with an influence maximization algorithm. Computer Networks, 2014, Vol. 74, pp. 103-113. (SCI)

[19]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu. Propagation Model of Smartphone Worms Based on Semi-Markov Process and Social Relationship Graph. Computers & Security, 2014, Vol. 44, pp. 92-103. (SCI)

[20]Sancheng Peng, Guojun Wang, Shui Yu. Modeling the Dynamics of Worm Propagation Using Two-Dimensional Cellular Automata in Smartphones. Journal of Computer and System Sciences,2013,Vol. 79, No. 5, pp. 586-595. (SCI)

[21]Sancheng Peng, Guojun Wang, Zhongwang Hu, and Jianping Chen. Survivability Modeling and Analysis on 3D Mobile Ad-hoc Networks. Journal of Central South University of Technology,2011,18(4): 1144-1152. (SCI)

[22]Sancheng Peng, Weijia Jia, Guojun Wang, Jie Wu, and Minyi Guo. Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks. IEICE Transactions on Information and Systems, March 2010, Vol. E93-D, No.3, pp. 510-517. (SCI)

[23]Sancheng Peng, Weijia Jia, and Guojun Wang. Survivability Evaluation in Large Scale Mobile Ad Hoc Networks. Journal of Computer Science and Technology, 2009, 24(4): 661-674. (SCI)

[24]李国瑞,孟婕,彭三城*,王聪.基于JacobiADMM的传感网分布式压缩感知数据重构算法.计算机研究与发展, 2020, 57(6):1284-1291.(EI)

[25]王聪,苑迎,彭三城,王兴伟,王翠荣,万聪.基于拓扑预配置的公平虚拟网络映射算法.计算机研究与发展, 2017, 54(1): 212-220.(EI)

近年来的获奖情况:

2020年获Tinghua Science Technology和IEEE“优秀论文”奖.

2018年获广东省计算机学会“优秀论文奖”等奖.

2017年获广东省计算机学会“优秀论文奖”二等奖.

2014年获广东省计算机学会“优秀论文奖”三等奖.

2015年获“第十四届肇庆市自然科学优秀学术论文”二等奖.

2014年获“肇庆十博10bet2013年度科研先进个人(科研十佳)”称号.

2011年获“第十二届肇庆市自然科学优秀学术论文”三等奖.

网址:www.selenemusic.com | 中国广州市番禺区小谷围广州大学城 510006 (南校区)
联系方式:(020) 39328032(南校区)
十博10bet体育官网 Copyright©2022

十博10bet体育官网