教师名录

骆源 教授

主页:

办公室电话:+86-21-3420-5477

办公地点:SEIEE-3-403

电子邮件:luoyuan@cs.sjtu.edu.cn

实验室: 信息论与编码实验室

  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 论文发表
  • 项目资助
  • 获奖信息
  • 学术服务

目前主要工作方向在以下领域:分布式存储编码技术、信道安全容量分析、大数据应用(射电天文、联通应用技术)、5G通信技术等。具体科研工作还包括:

1. SKA中国专家委员会委员的工作

20157月申请人入选第二届平方公里阵列射电望远镜SKA中国专家委员会,参加科技部合作司组织的SKA历次工作会议。目前被SKA科学数据处理中方联盟推举为政府间国际科技创新合作重点专项“2016YFE01006002016YFE0100300”两项目的总体组长,两项目201612月启动。

2. 大数据试验场联盟筹建

2016122日,以复旦大学、上海交通大学和上海宽带技术及应用工程研究中心为代表的 29家创始单位自愿联合起来,以国家《促进大数据发展行动纲要》等相关文件为指导,依据《上海市大数据发展实施意见》,共同发起成立大数据试验场联盟。将开发和建设大数据试验场作为大数据时代引领国家创新能力发展的核心要素与紧迫任务之一。联盟双理事长为上海交通大学校长张杰(目前由林忠钦校长接任)和复旦大学校长许宁生,执行理事长邬江兴。本人为联盟副秘书长,代表上海交通大学参加建设工作。

3. 筹建上海交大-中国联通-广视通达大数据联合实验室

筹建由上海交通大学、中国联通小沃科技有限公司、中国联通研究院、北京广视通达数字网络科技有限公司发起的大数据联合实验室,在大数据基础研究与前沿市场应用方面展开合作,包括但不限于大数据行业产品动态研究、云计算基础理论的研究、基于运营商数据与互联网公共数据的用户行为数据建模、数据采集技术研究以及基于云的各类用户数据的商业模式研究等方面。


Education Background

He received the B.S. in (Mathematics) Information Science, M.S. and Ph.D. degrees in Probability and Mathematical Statistics from Nankai University, Tianjin, China, in 1993, 1996, and 1999, respectively.

Work Experience

骆源,上海交通大学计算机科学与工程系长聘教授,副系主任。1993年本科毕业于南开大学数学系,并于19961999年分别获得南开大学数学系硕士和博士学位。自1999年至2003年分别在中国科学院数学与系统科学研究院和德国杜伊斯堡埃森大学IEM试验数学研究所进行博士后工作。2003年迄今入职上海交通大学计算机科学与工程系,2006年任教授,第二届平方公里阵列射电望远镜中国专家委员会委员,中国通信学会第四届青工会副主任,上海交大-中国联通-广视通达大数据联合实验室主任。研究方向为信息论、信息科学和计算机安全。在IEEE TIT, TC, TCOM, TIFS, TVT,TWC等国际期刊和会议上发表论文近百篇。


From July 1999 to April 2001, he held a Postdoctoral position in the Institute of Systems Science, Chinese Academy of Sciences. From May 2001 to April 2003, he had a Postdoctoral position in the Institute for Experimental Mathematics, University of Duisburg-Essen, Germany, where he revisited the institute twice several years later by the support of German Foundation DFG. From March 2011 to August 2011, he visited the Department of Electrical and Computer Engineering, Waterloo University, Canada. Since June 2003, he has been with the Computer Science and Engineering Department, Shanghai Jiao Tong University, Shanghai, China. He held his present position as a Full Professor since 2006.

Teaching Assignment

Current Assignment:

1. Discrete Mathematics, in English, for undergraduate students

2. Information and Coding Theory, in English, for graduate students


Publications:

Books: 

1. Z. Du and Y. Luo, A Concise Course on Scientific Language Matlab (in Chinese), Nankai University Press, 1998.

2. Y. Wang and Y. Luo (editors), Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing, December 10-12, 2010, Shanghai, China.

3. Chinese translation of the 19th, 20th and 21st chapters of the book: Information Theory and Network Coding (R. W. Yeung), which was publised by Higher Education Press, China, July 2011.

Papers:

IEEE Transactions on Information Theory:

1). Y. Luo, A. J. Han Vinck and Yanling Chen, "On the optimum distance profiles about linear block codes", IEEE Trans. on Inform. Theory, vol.56, no.3, pp. 1007 -1014,  2010.

2). Y. Luo, C. Mitrpant, A. J. Han Vinck, and K. Chen, "Some new characters on the wire-tap channel of type II", IEEE Trans. Inform. Theory, vol.51, no.3, pp.1222-1229, 2005.

3). C. Mitrpant, A. J. Han Vinck and Y. Luo, "An Achievable Region for the Gaussian Wiretap Channel with Side Information", IEEE Trans. Inform. Theory, vol.52, no.5, pp.2181-2190, 2006.

4). Y. Luo, F. Fu, A. J. Han Vinck and W. Chen, "On constant composition codes over Zq", IEEE Trans. Inform. Theory, vol.49, no.11, pp.3010-3016, 2003.

5). Y. Luo, F. Fu and V. K. Wei, "On the depth distribution of linear codes", IEEE Trans. Inform. Theory, vol.46, no.6, pp.2197-2203, 2000.

6). F. Fu, T. Klove, Y. Luo and V. K. Wei, "On the Svanstrom bound for ternary constant weight codes", IEEE Trans. Inform. Theory, vol.47, no.5, pp.2061-2064, 2001.

7). O. Geil, S. Martin, R. Matsumoto, D. Ruano and Y. Luo, "Relative generalized Hamming weights of one-point algebraic geometric codes", IEEE Trans. Inform. Theory, vol.60, no.10, pp.5938-5949, 2014.

8)  Yuan Luo, Chaoping Xing and Lin You, Construction of sequences with high nonlinear complexity from function fields, IEEE Transactions on Information Theory, Vol.63, No.12, pp.7646-7650, 2017 

9) Lingfei Jin, Yuan Luo and Chaoping Xing, Repairing algebraic geometry codes, IEEE Transactions on Information Theory, Vol. 64, No. 2, pp. 900-908, 2018.

10) Yuan Luo , Chaoping Xing and Chen Yuan, “Optimal locally repairable codes of distance 3 and 4 via cyclic codes,” IEEE Transactions on Information Theory, to be published in 2018.



Others:

In 2019:

[4] Bin Dai and Yuan Luo, “An Improved Feedback Coding Scheme for the Wire-tap Channel,” IEEE Transactions on Information Forensics & Security, vol.14, no.1, pp.262-271, 2019.

[3] Yuan Luo , Chaoping Xing and Chen Yuan, “Optimal locally repairable codes of distance 3 and 4 via cyclic codes,” IEEE Transactions on Information Theory, vol. 65, pp. 1045-1053, 2019.

[2] Min Zeng, Yuan Luo, Min-Kyu Song, Hong-Yeop Song, “The F_M-linear Complexity of M-ary Sidel’nikov Sequences of Period p?1=f?Mλ ,” Proceedings of 2019 IEEE International Symposium on Information Theory, Paris, France, July 7-12, 2019.

[1] Pin Fang, Yuan Luo and Yisen Wang, Self-attentive networks for one-shot image recognition, Proceedings of 2019 IEEE International Conference on Multimedia and Expo (ICME), Shanghai, China, July 8-12, 2019.


In 2018:

[6] Jingzhao Wang, Tinghan Wang and Yuan Luo, “Storage and Repair Bandwidth Tradeoff for Distributed Storage Systems with Clusters and Separate Nodes,” to be published in SCIENCE CHINA Information Sciences, 2018. SCIS-2018-0131

[5] Dan He, Yuan Luo and Wangmei Guo, “Arbitrarily Varying Wiretap Channel: a New Scheme for the Proof of Strong Secrecy,” Proceedings of 2018 IEEE International Symposium on Information Theory, Talisa Hotel in Vail, Colorado, USA, Jun. 17-22, 2018.

[4] 《信息通信技术》2018年创刊周年第1期,主题:人工智能运营与机器学习理论,策划指导:董振江?骆源。

[3] Ali Moharrer, Wei Shuangqing and Luo Yuan, Layered Synthesis of Latent Gaussian Trees: an Information Theoretic Approach to Generative Problems, Information and Communications Technologies, No.1, pp.35-41, 2018. (Invited paper in Chinese)

[2] Lingfei Jin, Yuan Luo and Chaoping Xing, Repairing algebraic geometry codes, IEEE Transactions on Information Theory, Vol. 64, No. 2, pp. 900-908, 2018. Impact Factor 2.68

[1] Chenchen Zhang, Yuan Luo and Yan Chen, A Low Complexity SCMA Detector Based on Discretization, IEEE Transactions on Wireless Communications, Vol. 17, No. 4, pp. 2333-2345, 2018.  Impact Factor 4.95 科学院2区


In 2017 

[6] Yuan Luo, Chaoping Xing and Lin You, Construction of sequences with high nonlinear complexity from function fields, IEEE Transactions on Information Theory, Vol.63, No.12, pp.7646-7650, 2017

[5] Bin Dai, Zheng Ma and Yuan Luo, "Finite State Markov Wiretap Channel with Delayed Feedback", IEEE Transactions on Information Forensics & Security, VOL. 12, NO. 3, pp.746-759 , 2017. Impact Factor 4.33 科学院2

[4] Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Wen Zhuo, Chao Yang, Yanmin Zhu, Jiadi Yu, Yuan Luo, "Pothole in the Dark: Perceiving Pothole Profiles with Participatory Urban Vehicles", IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1408-1419, 2017 Impact Factor 3.82 科学院2

[3] Chenchen Zhang and Yuan Luo, Approximating the Differential Entropy of Gaussian Mixtures, Proceedings of IEEE GLOBECOM 2017, Singapore, Dec. 4-8, 2017.

[2] Qiran Shi, Chenchen Zhang, Yuan Luo, Low-Complexity RMS Delay Spread Estimation for Wireless OFDM Systems, Proceedings of the 17th IEEE International Conference on Communication Technology, October 27-30, 2017, Chengdu, China.

[1] Akram Hussain and Yuan Luo, Generalized Bidirectional limited magnitude error correcting code for Flash memory, Proceedings of the 11th Annual International Conference on Combinatorial Optimization and Applications 2017, Dec 16-18, 2017 Shanghai, China.

 

In 2016:

[11] Xinchun Yu, Yuan Luo and Xujian Chen, “An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail”, IEEE Transactions on Vehicular Technology, vol.65, no.10, pp.8658-8668, 2016. Impact Factor 2.24

[10] Dan He, Wangmei Guo and Yuan Luo, "Secrecy Capacity of the Extended Wiretap Channel II with Noise", Entropy, vol.18, no.11, 2016. Impact Factor 1.74

[9] Bin Dai, Zheng Ma and Yuan Luo, "Finite State Markov Wiretap Channel with Delayed Feedback", IEEE Transactions on Information Forensics & Security, accepted, T-IFS-06293-2016. Impact Factor 2.44

[8] 骆源,过敏意,"计算机学科本硕博贯通培养机制探讨", 计算机教育,2016年第51-4页。

[7] Dongxin Liu, Fan Wu, Linghe Kong, Shaojie Tang, Yuan Luo, Guihai Chen, "Training-Free Indoor White Space Exploration", Special Issue on Spectrum Sharing and Aggregation for Future Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.34, no.10, pp.2589-2604, 2016. Impact Factor 3.67

[6] Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Wen Zhuo, Chao Yang, Yanmin Zhu, Jiadi Yu, Yuan Luo, "Pothole in the Dark: Perceiving Pothole Profiles with Participatory Urban Vehicles", IEEE Transactions on Mobile Computing, vol. , no. , pp. , doi:10.1109/TMC.2016.2597839. Aug. 2016 Impact Factor 2.45

[5] Chenchen Zhang, Yuan Luo and Guangtao Xue, "A new construction of threshold cryptosystems based on RSA", Information Sciences, vol.363, pp.140-153, 2016. Impact Factor 3.36

[4] Dan He, Yuan Luo and Ning Cai, "Strong Secrecy Capacity of the Wiretap Channel II with DMC Main Channel", Proceedings of 2016 IEEE International Symposium on Information Theory, pp.505-509, Barcelona, Spain, July 10-15, 2016.

[3] Yaning Xu, Qiyuan He and Yuan Luo, "Optimal Repair for Distributed Storage Codes in Vehicular Networks", 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.

[2] Qiyuan He, Yaning Xu and Yuan Luo, " I/O Optimized Recovery Algorithm in Vehicular Network Using PM-RBT Codes ", 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.

[1] Songfan Xie and Yuan Luo, "A Seamless Dual-Link Handover Scheme with Optimized Threshold for C/U Plane Network in High-Speed Rail", The 2016 IEEE 83rd Vehicular Technology Conference, Nanjing, China, 15-18 May 2016.

 

 

In 2015:

 

[9] Min Zeng, Yuan Luo and Guang Gong, "Sequences with Good Correlation Property Based on Depth and Interleaving Techniques", Designs, Codes and Cryptography, vol.77, no.1, pp.255-275, 2015.

[8] Chuliang Weng, Jianfeng Zhan and Yuan Luo, "TSAC: Enforcing Isolation of Virtual Machines in Clouds", IEEE Transactions on Computers, vol. 64, no. 5, pp.1470-1482, 2015.

[7] C. Zhang, X. Chen and Y. Luo, "Threshold Optimization for ISI-free Region Detection in High-Mobility Fading Channels," Proceedings of the Fourth International Workshop on High Mobility Wireless Communications (HMWC’2015),  Xi’an, China, Oct. 21-23, 2015.

[6] Zhenyi Liao and Yuan Luo, A Stack-based Lightweight Approach to Detect Kernel-level Rookits, Proceedings of the 2015 International Conference on Progress in Informatics and Computing, Nanjing, Dec 18-20, 2015.

[5] Xinchun Yu, Yuan Luo and Xujian Chen, “An Optimized Seamless Dual-Link Handover Scheme for High-Speed Rail”, IEEE Transactions on Vehicular Technology, DOI 10.1109/TVT.2015.2508485, 2015.

[4] B. Dai, A. J. Han Vinck, Y. Luo and Z. Ma, “Capacity-equivocation region of a special case of wiretap channel with noiseless feedback”, Journal of Communications and Networks, vol. 17, no. 1, pp. 21-26, 2015. 

[3] X. Liu and Y. Luo, "On the bounds and achievability about the ODPC of GRM(2,m)* over prime field for increasing message length", Designs, Codes and Cryptography, vol. 74, no. 3, pp. 533-557, 2015.

[2] X. Dong, J. YuY. ZhuY. ChenY. Luo and M. Li, “SECO: Secure and Scalable Data Collaboration Services in Cloud Computing,” Computers & Security, vol. 50, no. C, pp.91-105, May 2015.

[1] Z. Zhuang, B. Dai, Y. Luo and A. J. Han Vinck, "Secure Error-Correcting Network Codes with Side Information Leakage," IET Communications, vol. 9, no. 8, pp.1068-1075, 2015.

 



In 2014:  

 

[14] X. Chen, C. Zhang and Y. Luo, "Low-Complexity ISI-free Region Detection for OFDM Systems in High-Mobility Fading Channels," Proceedings of the Third International Workshop on High Mobility Wireless Communications (HMWC’2014), pp. 155-159, Beijing, China, November 1-3, 2014. One of the best student paper awards.

[13] M. Zeng, Y. Luo and A. J. Han Vinck, "A Construction of Long Period Sequences Based on Lightweight Generation and High Probability," IEEE Transactions on Communications, vol. 62, no. 11, pp. 4012-4023, 2014.

[12] J. Zhang, X. Dong, J. Yu, Y. Luo, M. Li and B. Wu, "Differentially Private Multidimensional Data Publication", China Communications, vol. 11, no. 13, pp.79-85, 2014.

[11] S. Huang and Y. Luo, "Achieve Distributed, Scalable and Effective Access Control in Cloud Storage Services," Proceedings of the 2014 International Conference on Information and Network Security (ICINS 2014), Beijing, China, Nov. 14-16, 2014.

[10] Y. Mao, X. Chen and Y. Luo, "HVSM: An In-Out-VM Security Monitoring Architecture in IaaS Cloud," Proceedings of the 2014 International Conference on Information and Network Security (ICINS 2014), Beijing, China, Nov. 14-16, 2014.

[9] X. Liu and Y. Luo, "The weight distributions of some cyclic codes with three or four nonzeros over F3", Designs, Codes and Cryptography, vol. 73, no. 3, pp. 747-768, 2014.

[8] X. Liu, M. Harrison and Y. Luo, "A note on the five valued conjectures of Johansen, Helleseth, Kholosha and zeta functions", IEEE Communications Letters, pp.1483-1486, vol. 18, no. 9, 2014.

[7] O. Geil, S. Martin, R. Matsumotoy, D. Ruano and Y. Luo, "Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes", Proceedings of 2014 IEEE Information Theory Workshop, pp. 137-141, Hobart, Tasmania, Australia, Nov. 2-5, 2014.

[6] O. Geil, S. Martin, R. Matsumoto, D. Ruano and Y. Luo, "Relative generalized Hamming weights of one-point algebraic geometric codes", IEEE Trans. Inform. Theory, vol.60, no.10, pp.5938-5949, 2014.

[5] X. Liu and Y. Luo, "The Weight Distributions of a Class of Cyclic Codes with Three Nonzeros over F3", Journal of Applied Mathematics, Volume 2014, Article ID 686138, DOI: 10.1155/2014/686138.

[4] Zhuojun Zhuang, Bin Dai, Yuan Luo and A. J. Han Vinck, "On the relative profiles of a linear code and a subcode", Designs, Codes and Cryptography, vol.72, no. 2, pp. 219-247, 2014.

[3] Xiaogang Liu, Yuan Luo and Kenneth W. Shum, "On the Optimum Cyclic Subcode Chains of RM(2, m)* for Increasing Message Length", IEEE Transactions on Communications, pp. 2145-2155, vol.62, no.7, 2014.

[2] Min Zeng, Yuan Luo and Guang Gong, "New Binary Sequences With Good Correlation Based on High-Order Difference and Interleaving Techniques", Proceedings of IEEE International Symposium on Information Theory, pp. 1663-1666, Honolulu, HI, USA, June 2014.

[1] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li,  "Achieving an Effective, Scalable and Privacy-preserving Data Sharing Service in Cloud Computing", Computers & Security, Vol.42, Pages 151–164, May 2014.

  

In 2013:

 

[15] Chuliang Weng, Minyi Guo, Yuan Luo, Minglu Li, "Hybrid CPU Management for Adapting to the Diversity of Virtual Machines", IEEE Transactions on Computers, vol.62, no.7, pp.1332-1344, 2013.

[14] Zhuojun Zhuang, Yuan Luo and Bin Dai, "Code constructions and existence bounds for relative generalized Hamming weight", Designs, Codes and Cryptography, vol. 69, no. 3, pp.275-297, 2013.

[13] MAO Yaqiang, WANG Yao, LUO Yuan, "A Design of Dynamic Integrity Measurement Framework towards the Cloud", http://www.paper.edu.cn, Feb. 2013. (in Chinese)

[12] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, and Minglu Li, "Achieving Secure and Efficient Data Collaboration in Cloud Computing", Proceedings of 2013 IEEE/ACM 21st International Symposium on Quality of Service  (IWQoS), Pages 195-200, Montreal, Canada, June 2013.

[11] Xujian Chen, Chunshu Li and Yuan Luo, "A Seamless Dual-Link Handover Scheme Suitable for High-Speed Rail", Proceedings of the 2013 International Workshop on High Mobility Wireless Communications (HMWC2013), Pages 91-95, Shanghai, China, Nov. 2013.

[10] Fengfeng Ning, Chuliang Weng, and Yuan Luo, "Virtualization I/O Optimization Based on Shared Memory", Proceedings of the IEEE International Conference on Big Data 2013 (IEEE BigData 2013), Pages 70-77, Santa Clara, USA, Oct. 6-9, 2013.

[9] Xiaogang Liu and Yuan Luo, "On the bounds and achievability about the ODPC of GRM(2,m)* over prime field for increasing message length", Designs, Codes and Cryptography, DOI: 10.1007/s10623-013-9877-5, accepted for publication in August 2013. 

[8] Bin Dai, A. J. Han Vinck and Yuan Luo, "Wiretap Channel in the Presence of Action-Dependent States and Noiseless Feedback", Journal of Applied Mathematics, Volume 2013, Article ID 423619.

[7] Bin Dai, A. J. Han Vinck, Yuan Luo and Xiaohu Tang, "Wiretap Channel with Action-Dependent Channel State Information", Entropy, vol.15, no.2, pp.445-473, 2013.

[6] Bin Dai, A. J. Han Vinck, Yuan Luo and Zhuojun Zhuang, "Capacity Region of a New Bus Communication Model." Entropy, vol.15, no. 2: pp.678-697, 2013.

[5] Min Zeng and Yuan Luo, "Depth, ultimate period, and distribution of sequences of period p^r-1", Invited Paper in the Proceedings of the 8th International Conference on Communications and Networking in China, Guilin, China, Pages 891-896, August 2013. 

[4] Min Zeng, Yuan Luo, and Guang Gong, "A Constuction of Sequence With Low Correlation Based on High-order Difference", one of the best papers of 中国通信学会第一届信息通信博士论坛, Beijing, China, Apr. 2013.

[3] Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, and Minglu Li, "P2E: Privacy-preserving and Effective Cloud Data Sharing Service", Proceedings of IEEE Globecom 2013,  Atlanta  USA, Dec. 09-13 2013.

[2] Peng Gao and Yuan Luo, " Unsupervised Strategies for Shilling Attack Detection in Recommender System ", Communications Technology, vol.46, no.04, pp. 5-12, 2013. ( in Chinese.)

[1] Xufu Luo and Yuan Luo, "Research on Virtual Machine System Security Protocols Based on TPM", Jisuanji Yu Xiandaihua, no. 7, pp. 30-33, 2013. ( in Chinese.)

 


In 2012:

 

[8] Bin Dai and Yuan Luo, "Some New Results on the Wiretap Channel with Side Information", Entropy, vol.14, no.9, pp.1671-1702, 2012.

[7] Guangtao Xue, Yuan Luo, Jiadi Yu, Minglu Li, "A Novel Vehicular Location Prediction based on Mobility Patterns for Routing in Urban VANET", EURASIP Journal on Wireless Communications and Networking, 2012:222, 2012.

[6] M. Zeng, Y. Luo and G. Gong, "Rotating-table game and construction of periodic sequences with lightweight calculation", Proceedings of 2012 IEEE International Symposium on Information Theory, pp 1221-1225, Cambridge, USA, July 1 to July 6, 2012.

[5] B.Dai, A. J. Han Vinck, Y. Luo and Z. Zhuang, "Degraded Broadcast Channel with Noncausal Side Information, Confidential Messages and Noiseless Feedback", Proceedings of 2012 IEEE International Symposium on Information Theory, pp 438-442, Cambridge, USA, July 1 to July 6, 2012.

[4] B.Dai, A. J. Han Vinck, Y. Luo and Z. Zhuang, "Capacity Region of Non-degraded Wiretap Channel with Noiseless feedback", Proceedings of 2012 IEEE International Symposium on Information Theory, Pages 244-248, Cambridge, USA, July 1 to July 6, 2012.

[3] Dan He and Yuan Luo, "A Kind of Non-DMC Erasure Wiretap Channel", Proceedings of 2012 14th International Conference on Communication Technology, Pages 1082-1087, Chengdu, China, Nov. 9th-11th, 2012. One of the best papers of the conference.

[2] Zhuojun ZHUANG, Yuan LUO, Bin DAI, "Upper Bounds on Relative Length/Dimension Profile", Proceedings of the 17th National Youth Communication Conference of China, Pages 33-39, Qing Dao, China, July 2012. ( in Chinese.)

[1] Yao Wang and Yuan Luo, "An In-Out-VM MeasurementArchitecture against Dynamic Attacks in Clouds", Proceedings of 2012 14th International Conference on Communication Technology, Pages 761-767, Chengdu, China, Nov. 9th-11th, 2012.

 

In 2011:

 

[1] Q. Liu, G. Wang, C. Weng, Y. Luo, and M. Li, “A Mandatory Access Control Framework in Virtual Machine System with Respect to Multilevel Security II: Implementation,” China Communications, vol. 8, no. 2, pp. 86–94, 2011.

[2] Zihui Liu, Xin-Wen Wub, Yuan Luo, Wende Chen. “New code equivalence based on relative generalized Hamming weights,” Information Sciences, vol. 181, pp. 4308-4317, 2011.

[3] Lei Yu, Chuliang Weng, Minglu Li, Yuan Luo. "SNPdisk: an Efficient Para-virtualization Snapshot Mechanism for Virtual Disks in Private Clouds," IEEE Network, vol. 25, no. 4, pp.  20-26, 2011.

[4] Z. Zhuang, Y. Luo, A. J. Han Vinck, Bin Dai, Some new bounds on relative generalized Hamming weight, in: 13th International Conference on Communication Technology, Jinan, China, pp. 971-974, Sep. 2011.

[5] Z. Zhuang, Y. Luo, A. J. Han Vinck, Bin Dai, On the RDLP and IRDLP of a linear code and a linear subcode, 13th International Conference on Communication Technology, Jinan, China, pp. 975-978, Sep. 2011.

[6] J. Yan, Z. Zhuang, Y. Luo, "On the optimum distance profiles of some quasi cyclic codes," 13th International Conference on Communication Technology, Jinan, China, pp. 979-983, Sep. 2011.

[7] Min Zeng and Yuan Luo, "On the Second Depth Distribution of Vectors Over Fq", Journal of Computational Information Systems, vol. 7, no. 5, 1738-1743, 2011.

 

In 2010:

 

[1] Y. Luo, A. J. Han Vinck and Yanling Chen, "On the optimum distance profiles about linear block codes", IEEE Trans. on Inform. Theory, vol.56, no.3, pp.1007-1014, 2010.

[2] Q. Liu, G. Wang, C. Weng, Y. Luo and M. Li, "A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory", China Communications, vol.7, no.4, pp.137-143, 2010. One of the best papers of 2010 Annual Conference of China Institute of Communications.

[3] X. He, Y. Luo, "Mutual Information Based Similarity Measure for Collaborative Filtering", Proceedings of 2010 IEEE International Conference on Procgress in Informatics and Computing, Shanghai, China, pp. 1117-1121, Dec. 10-12, 2010.

[4] B. Dai, Y. Luo, A.J.Han.Vinck, "Cpacity region of  broadcast channels With private message and causal side information”, Proceedings of the 3rd International Congress on Image and Signal Processing, Yantai, China, pp. 3770-3773, Oct. 16-18, 2010.

[5] Z. Zhuang, Y. Luo, A. J. Han Vinck, “Secure error-correcting network codes with side information from source,”  Proceedings of the 2010 International Conference on Communications and Intelligence Information Security, Guangxi, China, pp.55-59, Oct. 2010. 

[6] Q. Liu, C. Weng, M. Li, and Y. Luo "An In-VM Measuring Framework for Virtual Machines in Cloud", IEEE Security & Privacy,  Vol. 8, no. 6, pp. 56-62, 2010.

[7] M. Houllier and Y. Luo, "Information Distances over Clusters", Proceedings of the 7th International Symposium on Neural Networks, Shanghai, China, June 6-9, 2010. Lecture Notes in Computer Science, Part I, vol. 6063, p.355-364, 2010.

[8] ZHANG Qiang, LUO Yuan, WENG Chuliang and  LI Minglu, "A Trust-Based Detecting Mechanism in Secure Recommender Systems", Microcomputer Information, vol. 26, no. 3, pages 68-70, 2010. (in Chinese)

[9] LIU Qian, LUO Yuan, WENG Chuliang and LI Minglu, "Security protocols based on trusted platform module for virtual machine system", Information Security and Technology, vol. 6, pp. 49-55, 2010. (in Chinese)

 

Before 2009:

 

1). Z. Liu, W. Chen and Y. Luo, "The relative generalized Hamming weight of linear q-ary codes and their subcodes", Designs, codes and cryptography, vol.48, no.2, pp.111-123, 2008.

2). P. Wang, Y. Luo and A. J. Han Vinck, "Quotient Subcode Set and the Coordinated Wiretap Channel II", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.e91, no.12, pp.3731-3737, 2008. 

3). Y. Luo, W. Chen and A. J. Han Vinck, "The determination of the chain good weight hierarchies with high dimension", SIAM Journal on Discrete Mathematics, vol.17, no.2, pp.196-209, 2004.

4). Y. Luo, W. Chen and F. Fu, "A new kind of geometric structures determining the chain good weight hierarchies", Discrete Mathematics, vol.260c, pp.101-117, 2003.

5). F. Fu, T. Klove, Y. Luo and V. K. Wei, "On equidistant constant weight codes", Discrete Applied Mathematics, vol.128, pp.157-164, 2003.

6). H. Zhu, Y. Luo, C. Weng, M. Li, "A Collaborative Filtering Recommendation Model Using Polynomial Regression Approach", pp.134-138, 2009 Fourth ChinaGrid Annual Conference, 2009.

7). Q. Zhang, Y. Luo, C. Weng, M. Li, "A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems", 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, Shanghai China July 2009.

8). Y. Luo, A. J. Han Vinck, "On a Classification of Cyclic Subcode Chains", Proceedings of the 2009 Fourth International ICST Conference on Communications and Networking in China, August 2009, Xi an, China.

9). J. Yu, Y. Luo and M. Li, "Security Research on an Information-Theoretically Secure Secret Key Agreement Using LDPC Matrices", IEEE China Grid 2008.

10). Z. Zhuang, Y. Luo, M. Li and C. Weng, "A Resource Scheduling Strategy for Intrusion Detection on Multi-Core Platform", Proceedings of the 2008 IEEE IFIP International Conference on Network and Parallel Computing (NPC 2008) , October 2008, Shanghai, China.

11). Z. Zhuang, Y. Luo, M. Li and C. Weng, "A Reasonable Approach for Defining Load Index in Parallel Computing", The 2008 International Conference On Embedded and Ubiquitous Computing(EUC 2008).

12). Z. Zhuang, Y. Luo, M. Li and C. Weng, "An Abstract Model for Intrusion Detection on Multi-Core Platform", IEEE China Grid 2008.

13). A. J. Han Vinck and Y. Luo, "Optimum Distance Profiles of Linear Block Codes", 2008 IEEE International Symposium on Information Theory, Canada.
14). B. Dai and Y. Luo, "Wiretap Channel with Side Information from Part of Encoder", the First International Workshop on High Performance Network (HPN2008), Proceedings of the 2008 IEEE IFIP International Conference on Network and Parallel Computing (NPC 2008) , October 2008, Shanghai, China. 

15). P. Wang, Y. Luo and A. J. Han Vinck, " Quotient Subcode Set and Inverse Relative Dimension/ Length Profile", IEEE IWSDA 2007, p128-133.

16). Y. Luo, F. Fu, A. J. Han Vinck and W. Chen, "Bounds and constructions for q-ary constant composition code". 2002 IEEE International Symposium on Information Theory, June 30-July 5, Lausanne, Switzerland.

17). Y. Luo, F. Fu, C. Mitrpant and A. J. Han Vinck,“A Generalization of MDS Codes”, 2004 IEEE International Symposium on Information Theory, June 27-July 2, Chicago, USA.

18). Y. Luo, W. Chen and F. Fu, "On the weight hierarchies satisfying the chain condition", AAECC 2001 , November 26-30, Melbourne, Australia.

19). C. Mitrpant, Y. Luo and A. J. Han Vinck, "On the wire-tap channel of type II with side information," 2003 IEEE International Symposium on Information Theory, June 29-July 4, Yokohama, Japan.

20). C. Mitrpant, Y. Luo and A. J. Han Vinck, "Achieving the Perfect Secrecy for the Gaussian Wiretap Channel with Side Information", 2004 IEEE International Symposium on Information Theory, June 27-July 2, Chicago, USA.

21). F. Fu, T. Kl?ve, Y. Luo and V. K. Wei, "On the Svanstr?m bound for ternary constant weight codes", 2001 IEEE International Symposium on Information Theory, June 24-29, Washington, D.C., USA. 

22). F. Fu, T. Kl?ve, Y. Luo and V. K. Wei, "On equidistant constant weight codes", WCC 2001, January 8-12, Paris, France. 

23). Y. Luo, F. Fu and K. Chen, "Relative Dimension/Length Profile and Its Conjugate", FIFTH SHANGHAI CONFERENCE ON COMBINATORICS, May 14-18, Shanghai, 2005.

24). B. Dai, Y. Luo, "A variation of the coding scheme in the wiretap channel of type II", ECTI2006, pp.191-194, May 10-13, Thailand.

25). Y. Luo, "Three versions of depths of vectors over GF(2) and linear complexity", IEEE the 5th Asia-Europe Workshop on Concepts in Information Theory, 2006, Korea.

26). Y. Luo and Z. Zhang, "Neural network models for design of block cipher system", Systems Science and Mathematical Sciences, vol.11, no.2, pp.161-167, 1998. 

27). M. Zeng and Y. Luo, "On the third depth distribution and the period of sequence (E-1)m(S) over F2, Journal on Communications", vol. 29, no. 4,pp.51-56, 2008. (in Chinese)

28). Y. Luo, F. Fu and Z. Du, "A bound on the discrete entropy, Journal on Communications", vol.18, no.10, pp.66-69, 1997. (in Chinese)

29). F. Fu and Y. Luo, Depth distribution on linear block code, Chinese Science Bulletin, vol.43, no.19, pp.2046-2049, 1998. (in Chinese)

30). M. Zeng and Y. Luo, On the two kinds of depth distribution over F2, Journal of Shanghai Jiao Tong University, vol.42, no.12, pp.2060-2064, 2008. (in Chinese)

31). Y. Luo and Z. Zhuang, Classic channels related network coding, ZTE Communications, vol.15, no.1, pp.15-19, 2009. (in Chinese)



Chinese Patents:

 

专利1基于TPM的虚拟机安全协议方法,发明专利号:ZL200810203006.3  骆源, 方喆, 李明禄, 翁楚良,授权日 2013-03-20 

专利2虚拟化环境中的强制访问控制方法及装置,发明专利号:ZL200810203451.X 翁楚良, 王观海, 骆源, 李明禄,授权日2012-08-22

专利3安全分散式虚拟存储池系统,发明专利号:ZL201110094381.0 翁楚良、于磊、李明禄、骆源,授权日2013-08-21 

专利4编码方法、解码方法、编码器及解码器,发明专利号:ZL201110219826.3 颜金洲, 骆源, 金莹, 魏岳军,授权日 20160330

专利5城区出租车动态在线调度优化系统及其方法,发明专利号 ZL201310072227.2 薛广涛, 邹庆楠, 骆源, 俞嘉地, 朱弘恣,授权日20141231

专利6一种用于高速运载工具的分布式天线通信系统,实用新型专利号 ZL201420197529.2 陈序建, 刘鲁滨, 毛亚强, 黄粟, 骆源  授权日20140910

专利7骆源毛亚强振壹  一种用于虚拟机上的混合监控度量方法及系统,发明专利号:ZL201510141611.2  授权日20180615


Projects:


19. China Program of International S&T Cooperation 2016YFE0100300, 2016-2018.

18. The course, Information and Coding Theory, was selected by Shanghai Municipal Education Commission in 2015 as the demonstration course of English Teaching for foreign students in Shanghai.

17.HIRPO: Huawei Innovation Research Program YB2015090062 2015.11-2016.11:Code Multiple Access with Extensive Transceiver Property


16. National Natural Science Foundation of China under Grant 61571293: Relative Generalized Hamming Weight on Distributed Storage Recovery and Security, 2016.01-2019.12

15. 分布式存储中数据恢复与数据安全的最优编码, 总参预研.

14. The undergraduate student Zhehui Zhang of our group are funded by the Chun-Tsung Program in 2014-2016 on the researches of interference alignment of distributed storage system.

13. Innovation Program of Shanghai Municipal Education Commission under Grant 14ZZ017: Hamming weight, generalized Hamming weight and the trellis structures of LDPC codes, 2014.1-2016.12.

12. National Natural Science Foundation of China under Grant 61271222: The effects of channel state information and feedback on the channel capacity and secrecy capacity of some broadcast channels, 2013.1-2016.12.

11. National Natural Science Foundation of China under Grant 60972033: The optimum distance profile of linear block code, 2010.1-2012.12.

10. National Natural Science Foundation of China under Grant 60402022: The relative dimension/length profile, relative generalized Hamming weight and its applications, 2005.1-2007.12

9. Research Fund for the Doctoral Program of Higher Education of China (No. 20100073110016), 2011.1-2013.12.

8. Participate in National Basic Research Program of China under Grant 2007CB310900 on Virtual Machine

7. Participate in National Basic Research Program of China under Grant 2012CB316100 on Broadband Mobile Communications at High Speeds

6. Participate in National Basic Research Program of China under Grant 2013CB338004 on Theory of Side Channel Attack and Related Defense Method on Cryptographic System.

5. German Research Foundation DFG 2005,7-2005,9: Advanced researches on relative generalized Hamming weight
4. German Research Foundation DFG 2007.8-2007.10: On wiretap channel with side information
3. Huawei Foundation YJCB2009025WL: Researches on short code with high performance in communication systems
2. Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry 2005.1-2006.12: Basic researches on the wiretap channel of type II
1. Foundation of The State Key Laboratory of Integrated Services Networks 2010.7-2012.6: On the capacity region of the wiretap channel with side information

[1]  Min Zeng, Yuan Luo, and Guang Gong, "A Constuction of Sequence With Low Correlation Based on High-order Difference", one of the best papers of 中国通信学会第一届信息通信博士论坛, Beijing, China, Apr. 2013.

[2] Q. Liu, G. Wang, C. Weng, Y. Luo and M. Li, "A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory", China Communications, vol.7, no.4, pp.137-143, 2010. One of the best papers of 2010 Annual Conference of China Institute of Communications.

[3] Dan He and Yuan Luo, "A Kind of Non-DMC Erasure Wiretap Channel", Proceedings of 2012 14th International Conference on Communication Technology, Pages 1082-1087, Chengdu, China, Nov. 9th-11th, 2012. One of the best papers of the conference.

[4] X. Chen, C. Zhang and Y. Luo, "Low-Complexity ISI-free Region Detection for OFDM Systems in High-Mobility Fading Channels," Proceedings of the Third International Workshop on High Mobility Wireless Communications (HMWC’2014), pp. 155-159, Beijing, China, November 1-3, 2014. One of the best student paper awards.

Professional Service

中国平方公里射电天文望远镜SKA第二届专家委员会委员;中国通信学会第四届青年工作委员会副主任委员;大数据试验场联盟副秘书长中国电子学会信息论分会委员



Conference Chair:

1. The 5th Asia-Europe Workshop on Concepts in Information Theory, Jeju, South Korea, October 25-27, 2006. A Tribute to TE SUN HAN

 

Technical Program Committee Chairs:

1. 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, Beijing, China. June 25-27,2010.

2. 2010 International Conference on Progress in Informatics and Computing, Shanghai, China. Dec 10-12, 2010.

3. 2011 International Conference on Network Computing and Information Security (NCIS 11)

4. 2013 IET International Conference on Information and Communications Technologies, Beijing, China, 27-29 April, 2013.

 

Organization Chair:

The Second International Workshop on High Mobility Wireless Communications (HMWC 2013), Shanghai, China, November 1-3, 2013.

Publication Chair: 2011 International Conference on Neural Information Processing

 

TUTORIAL CO-CHAIR:

IEEE WiMob 2011


联系我们 webmaster@cs.sjtu.edu.cn

上海交通大学计算机科学与工程系版权所有 @ 2013