基本信息

张玉军  网络技术研究中心主任、研究员
电子邮件: zhmj@ict.ac.cn
通信地址: 北京中关村科学院南路6号
邮政编码: 100190

研究领域

智能网络与系统,互联网体系结构

教育背景

2009-09--2010-09   加州大学洛杉矶分校(UCLA)   访问学者
1999-09--2004-06   中国科学院研究生院   博士
1995-09--1999-06   南开大学   学士

工作经历

   
工作简历
2013-09~现在, 中国科学院计算技术研究所, 研究员
2005-12~2013-09,中国科学院计算技术研究所, 副研究员
2004-09~2005-11,中国科学院计算技术研究所, 助理研究员

教授课程

计算机网络
计算机网络(研讨课)
高级计算机网络

专利与奖励

   

出版信息

   
发表论文
[1] Meng Xuying, Wang Yequan, Ma Runxin, Luo Haitong, Li Xiang, Zhang Yujun. Packet Representation Learning for Traffic Classification. KDDnull. 2022, [2] Ren QingQing, Zhu Shuyong, Meng Xuying, Zhang Yujun. A High-performance FPGA-based Accelerator for Gradient Compression. Data Compression Conference (DCC)null. 2022, [3] Zhang Weiyao, Meng Xuying, Zhang Yujun. Dual-track Protocol Reverse Analysis Based on Share Learning. International Conference on Computer Communications (INFOCOM)null. 2022, [4] Meng Xuying, Wang Suhang, Liang Zhimin, Yao Di, Zhou Jihua, Zhang Yujun. Semi-supervised anomaly detection in dynamic communication networks. INFORMATION SCIENCES[J]. 2021, 571: 527-542, [5] Wu, Danye, Xu, Zhiwei, Chen, Bo, Zhang, Yujun, Han, Zhu. Enforcing Access Control in Information-Centric Edge Networking. IEEE TRANSACTIONS ON COMMUNICATIONS[J]. 2021, 69(1): 353-364, https://www.webofscience.com/wos/woscc/full-record/WOS:000608689300024.
[6] Qin, Yana, Wu, Danye, Xu, Zhiwei, Tian, Jie, Zhang, Yujun. Adaptive In-Network Collaborative Caching for Enhanced Ensemble Deep Learning at Edge. MATHEMATICAL PROBLEMS IN ENGINEERING[J]. 2021, 2021: http://dx.doi.org/10.1155/2021/9285802.
[7] Meng Xuying, Yequan Wang, Suhang Wang, Di Yao, Yujun Zhang. Interactive Anomaly Detection in Dynamic Communication Networks. IEEE/ACM Transactions on Networking (TON)[J]. 2021, [8] Ren, Qingqing, Zhou, Liang, Xu, Zhijun, Zhang, Yujun, Zhang, Lei. PacketUsher: Exploiting DPDK to accelerate compute-intensive packet processing. COMPUTER COMMUNICATIONS[J]. 2020, 161: 324-333, http://dx.doi.org/10.1016/j.comcom.2020.07.040.
[9] Meicheng Guo, Zhiwei Xu, Limin Liu, Mengjie Guo, Yujun Zhang. An Adaptive Deep Transfer Learning Model for Rumor Detection without Sufficient Identified Rumors. MATHEMATICAL PROBLEMS IN ENGINEERING[J]. 2020, 2020: https://doaj.org/article/9529939f5a434467843e09edeba2a4c1.
[10] 张蔚瑶, 张磊, 毛建瓴, 许智君, 张玉军. 未知协议的逆向分析与自动化测试. 计算机学报[J]. 2020, 43(4): 653-667, http://lib.cqvip.com/Qikan/Article/Detail?id=7101310156.
[11] Guo, Song, Li, Tao, Kang, Hong, Li, Ning, Zhang, Yujun, Wang, Kai. L-Seg: An end-to-end unified framework for multi-lesion segmentation of fundus images. NEUROCOMPUTING[J]. 2019, 349: 52-63, http://dx.doi.org/10.1016/j.neucom.2019.04.019.
[12] Wang, Miao, Wang, Guiling, Zhang, Yujun, Li, Zhongcheng. A High-Reliability Multi-Faceted Reputation Evaluation Mechanism for Online Services. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2019, 12(6): 836-850, https://www.webofscience.com/wos/woscc/full-record/WOS:000502853000001.
[13] Meng Xuying, Wang Suhang, Shu Kai, Li Jundong, Chen Bo, Liu Huan, Zhang Yujun. Towards privacy preserving social recommendation under personalized privacy settings. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS[J]. 2019, 22(6): 2853-2881, [14] Yang, Haolin, Xu, Zhiwei, Liu, Limin, Guo, Mengjie, Zhang, Yujun, IEEE. Dynamic Slide Window-Based Feature Scoring and Extraction for On-line Rumor Detection with CNN. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [15] Guo, Jiang, Wang, Miao, Chen, Bo, Yu, Shucheng, Zhang, Hanwen, Zhang, Yujun, IEEE. Enabling Blockchain Applications over Named Data Networking. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [16] Guo, Song, Wang, Kai, Kang, Hong, Zhang, Yujun, Gao, Yingqi, Li, Tao. BTS-DSN: Deeply supervised neural network with short connections for retinal vessel segmentation. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS[J]. 2019, 126: 105-113, http://dx.doi.org/10.1016/j.ijmedinf.2019.03.015.
[17] Meng Xuying, Wang Suhang, Shu Kai, Li Jundong, Chen Bo, Liu Huan, Zhang Yujun. Personalized Privacy-Preserving Social Recommendation. THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCEnull. 2018, 3796-3803, [18] Meng Xuying, Wang Suhang, Liu Huan, Zhang Yujun. Exploiting Emotion on Reviews for Recommender Systems. THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCEnull. 2018, 3788-3795, [19] Tian, Jie, Wang, Yi, Liang, Xiaoyuan, Wang, Guiling, Zhang, Yujun. WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks. AD HOC NETWORKS[J]. 2017, 67: 40-52, http://dx.doi.org/10.1016/j.adhoc.2017.10.005.
[20] Duan, Rongchang, Zhao, Qinglin, Zhang, Hanwen, Zhang, Yujun, Li, Zhongcheng. Modeling and performance analysis of RI-MAC under a star topology. COMPUTER COMMUNICATIONS[J]. 2017, 104: 134-144, http://dx.doi.org/10.1016/j.comcom.2017.01.004.
[21] Wang, Fei, Xu, Yongjun, Zhang, Hanwen, Zhang, Yujun, Zhu, Liehuang. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2016, 65(2): 896-911, https://www.webofscience.com/wos/woscc/full-record/WOS:000370754000033.
[22] Wu, Danye, Xu, Zhiwei, Chen, Bo, Zhang, Yujun, IEEE. What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 481-488, [23] 孟绪颖, 许志伟, 王淼, 张瀚文, 张玉军. Adaptive Multi-feature Model for Personalized Search Re-ranking. IEEE Symposium on Computers and Communication (ISCC)[J]. 2016, [24] Meng Xuying, Xu Zhiwei, Chen Bo, Zhang Yujun. Privacy-preserving Query Log Sharing Based on Prior N-word Aggregation. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 722-729, [25] Xu Zhiwei, Chen Bo, Wang Ninghan, Zhang Yujun, Li Zhongcheng, Kanhere S, Tolle J, Cherkaoui S. ELDA: Towards Efficient and Lightweight Detection of Cache Pollution Attacks in NDN. 40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015)null. 2015, 82-90, [26] 张瀚文, 许智君, 张玉军, 李忠诚. 基于主-备关系的PMIPv6区域移动锚点容错方案. 计算机学报[J]. 2015, 38(3): 578-588, http://lib.cqvip.com/Qikan/Article/Detail?id=664122165.
[27] 张瀚文, 张玉军, 许智君, 马超, 李忠诚, 周继华. 基于多HA部署的MIPv6网络服务可用性提升方法. 计算机学报[J]. 2014, 37(11): 2309-2316, http://lib.cqvip.com/Qikan/Article/Detail?id=663089081.
[28] Yan, Tan, Zhang, Wensheng, Wang, Guiling, Zhang, Yujun. Access Points Planning in Urban Area for Data Dissemination to Drivers. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2014, 63(1): 390-402, https://www.webofscience.com/wos/woscc/full-record/WOS:000330114300031.
[29] Zhang, Yujun, Yan, Tan, Tian, Jie, Hu, Qi, Wang, Guiling, Li, Zhongcheng. TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks. AD HOC NETWORKS[J]. 2014, 21: 109-122, http://dx.doi.org/10.1016/j.adhoc.2014.05.012.
[30] Zhang, Yujun, Wang, Guiling, Hu, Qi, Li, Zhongcheng, Tian, Jie, IEEE. Design and Performance Study of a Topology-Hiding Multipath Routing Protocol for Mobile Ad Hoc Networks. 2012 PROCEEDINGS IEEE INFOCOMnull. 2012, 10-18, [31] 谢高岗, 张玉军, 李振宇, 孙毅, 谢应科, 李忠诚, 刘韵洁. 未来互联网体系结构研究综述. 计算机学报[J]. 2012, 35(6): 1109-1119, http://lib.cqvip.com/Qikan/Article/Detail?id=42421485.
[32] 赵庆林, 李忠诚, 张玉军, 李军. 层次化移动IP的性能分析. 计算机学报[J]. 2005, 28(7): 1236-1241, http://lib.cqvip.com/Qikan/Article/Detail?id=16070309.
发表著作
(1) 可信的移动IPv6网络及协议, Trusted mobile IPv6 network and protocols, 科学出版社, 2008-03, 第 1 作者

科研活动

   
科研项目
( 1 ) 未来互联网安全与可信机理, 主持, 国家级, 2012-01--2016-08
( 2 ) 后IP网络体系结构及其机理探索, 参与, 国家级, 2012-01--2016-12
( 3 ) 网络应用及安全测试仪表, 主持, 部委级, 2014-11--2017-10
( 4 ) 网络安全设备的测试方法及工具, 主持, 国家级, 2014-01--2017-06
( 5 ) 基于入侵容忍的移动自组织网络路由设计, 主持, 国家级, 2012-01--2015-12
( 6 ) 信息中心网络路由聚合机制研究, 主持, 国家级, 2017-01--2020-12
( 7 ) 信息中心网络服务评价、传输及选择机制的研究与实现, 主持, 国家级, 2017-01--2019-12
( 8 ) 互联网基础服务测试验证, 主持, 部委级, 2018-11--2022-12
( 9 ) 基于用户反馈的个性化推荐算法研究, 主持, 国家级, 2020-01--2023-12