助理研究员 Assistant Professor
njucsmyl@163.com
南京大学计算机科学与技术系大楼326室
个人简介:
毛云龙于2013年和2018年在南京大学计算机科学与技术系分别获得学士、博士学位,导师为仲盛教授。2017年作为访问学者赴美国威廉玛丽学院访问,国外导师为Qun Li教授。
主要的研究兴趣包括,网络安全、隐私保护、无线网络通信、区块链、机器学习等。
I am currently an Assistant Professor in the Department of Computer Science and Technology at Nanjing University. I received my BS (2013) and PhD (2018) in Computer Science from Nanjing University, under the supervision of Prof. Sheng Zhong. I was a visiting scholar in College of William & Mary (2017), under the supervision of Prof. Qun Li.
My research interests include but not limited to, cybersecurity, privacy, wireless networks, blockchain, machine learning.
部分论文:
1、Yunlong Mao, Wenbo Hong, Heng Wang, Qun Li, Sheng Zhong. Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training. Accepted, IEEE Transactions on Parallel and Distributed Systems. 2020.
2、Yunlong Mao, Ying He, Yuan Zhang, Jingyu Hua and Sheng Zhong, Secure TDD MIMO Networks Against Training Sequence Based Eavesdropping Attack, accepted by IEEE Transactions on Mobile Computing
3、Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong. A Privacy-Preserving Deep Learning Approach for Face Recognition with Edge Computing. USENIX Workshop on Hot Topics in Edge Computing (HotEdge ’18), Accepted.
4、Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong. Location Privacy in Public Access Points Positioning: An Optimization and Geometry Approach. Computers & Security, Accepted.
5、Yunlong Mao, Tingting Chen, Yuan Zhang, Tiancong Wang, Sheng Zhong. Towards Privacy-Preserving Aggregation for Collaborative Spectrum Sensing. IEEE Transactions on Information Forensics & Security, Accepted.
6、Yuan Zhang, Yunlong Mao, Sheng Zhong. Joint Differentially Private Gale-Shapley Mechanisms for Location Privacy Protection in Mobile Traffic Offloading Systems, IEEE Journal of Selected Areas in Communications, Accepted.
7、Yunlong Mao, Yuan Zhang, Sheng Zhong.Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. Accepted by the 23rd ACM Conference on Computer and Communications Security (CCS’ 16).