头像

黄新力

教授、博士生导师

太阳成集团tyc33455cc      

个人资料

  • 部门: 太阳成集团tyc33455cc
  • 毕业院校: 上海交通大学
  • 学位: 博士,计算机系统结构
  • 学历: 研究生毕业
  • 邮编: 200062
  • 联系电话: 021-62233627
  • 传真: N/A
  • 电子邮箱: xlhuang@cs.ecnu.edu.cn
  • 办公地址: 中山北路校区
  • 通讯地址: 上海市中山北路3663号

教育经历

工作经历

个人简介

黄新力,现任太阳成集团tyc33455cc教授、博士生导师,研究兴趣集中在网络与智能计算系统领域,目前的研究工作涉及可扩展分布式系统与网络、分布式机器学习与边缘智能、可信与安全人工智能系统、智能物联网与数据分析等方向。

2007年4月毕业于上海交通大学计算机科学与工程系,获计算机系统结构专业工学博士学位;2007年7月起至今在太阳成集团计算机科学技术系、太阳成集团tyc33455cc从事教学和科研工作,先后受聘讲师、副教授、教授、博士生导师;2011年受国家留学基金委资助,公派访学美国德克萨斯大学-圣安东尼奥分校(UTSA)计算机科学系。

以第一/通讯作者在国内外期刊和会议上发表学术论文50余篇,申请/授权技术发明专利10余项,登记软件著作权10余项;任TPDS、TMC、TON、TKDE、TKDD、IPM、中国科学、计算机学报、软件学报等学术期刊审稿人,科技部/教育部/上海市等基金项目、人才计划与科技奖励评审专家。

主持国家重点研发计划“物联网与智慧城市关键技术及示范”重点专项、国家自然科学基金、教育部博士点基金、上海市“物联网与智慧城市”重大专项、上海市“科技创新行动计划”高新技术领域重大专项、上海市“科技创新行动计划”信息技术领域重点专项、上海市“人工智能创新发展”重点专项及企事业单位委托科研项目课题10余项;参与国家重点研发计划基础前沿类重点专项、国家自然科学基金重大国际(地区)合作研究项目、国家高技术研究发展计划“网格计算”重大专项、上海市基础研究重大项目、上海市科技攻关重大专项、太阳成集团“幸福之花”先导研究基金“智能+”领域重点专项等重要项目课题多项。

长期参与上海市“新型城域物联专网”、“新型智慧城市”和“城市数字化转型”规划建设,参与上海市“城市运行数字体征系统”规划设计(1.0版已发布,中国首个,见官网报道),参与上海市“一网统管”数字化转型技术体系和赋能平台建设,参与“上海感知试验场”和“上海大数据试验场”规划建设;作为署名起草人,制定上海市《新型城域物联专网建设导则》、《新型城域物联感知基础设施建设导则》(经上海市人民政府批准,已正式发布实施,见市政府官网);作为署名起草人,制定上海市通信制造业行业协会《移动通信用户感知度测评规范》团体标准T/SHCIA000001-2020、上海市物联网行业协会《非机动车棚物联网数据采集与管理》团体标准T/SIOT025-2021(均已正式颁布实施);致力解决新型城域物联专网/物联感知基础设施“怎么建、怎么测、怎么用”重大难题,荣获“个人杰出贡献奖”(高校唯一奖项),项目研究成果获科技部推荐选送,参加国家“十三五”重大科技成果展。2023年5月,“面向城市安全治理的物联网关键技术及应用”项目成果获上海市技术发明一等奖。

社会兼职

  • IEEE会员、ACM会员、CCF会员、上海市计算机学会会员

  • 国际期刊审稿人:IEEE Transactions on Parallel and Distributed Systems (TPDS)、IEEE Transactions on Mobile Computing (TMC)、IEEE/ACM Transactions on Networking (TON)、IEEE Transactions on Network and Service Management (TNSM)、IEEE Transactions on Knowledge and Data Engineering (TKDE)、IEEE Transactions on Vehicular Technology (TVT)、IEEE Networking Letters (NL)、IEEE Access、Information Processing and Management (IPM)、Expert Systems With Applications (ESWA)、ACM Transactions on Knowledge Discovery from Data (TKDD)、ACM Transactions on Data Science (TDS)、Computer Networks (COMNET)、Knowledge-Based Systems (KBS)、Science Reports、Journal of Cyber Security、International Journal of Machine Learning and Cybernetics、Journal of Computer Science and Technology (JCST)、International Journal of Network Security (IJNS)、计算机学报、软件学报、中国科学:信息科学 (SCIS)等

  • 国际会议审稿人:International Conference on Web Information Systems Engineering (WISE)、IEEE International Performance Computing and Communications Conference (IPCCC)、IEEE International Conference on Parallel and Distributed Systems (ICPADS)、International Conference on Embedded and Ubiquitous Computing (EUC)、International Workshop on Internet and Network Economics (WINE)、International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)、International Conference on Intelligent Cloud Computing (ICC)、International Conference on Distributed Computing and Networking (ICDCN)等

  • 科技部国家科技专家库入库专家

  • 国家自然科学基金项目评审专家(自2009年起)

  • 科技部、教育部人才计划评审专家

  • 上海市科学技术奖评审专家

  • 中国科协、工信部、上海市等主办的多个全国和市级科创大赛评委

  • 上海市物联网行业协会、上海市感知专业委员会、上海市数字基础设施协会,专业委员

  • 上海市《新型城域物联专网建设导则》(2018版、2019版、2020版、2021版)主要起草人

  • 上海市《新型城域物联专网综合测评导则》(2019版)主要起草人

  • 上海市《新型城域物联专网白皮书》(2019版)主要起草人

  • 通信制造行业团体标准《移动通信用户感知度测评规范》(T/SHCIA000001-2020)主要起草人

  • 物联网行业团体标准《非机动车棚物联网数据采集与管理》(T/SIOT025-2021)主要起草人

研究方向

课题组长期致力于网络与智能计算系统的理论研究与应用实践,研究工作从早期的云-网融合与分布式计算逐步拓展到分布式智能计算与可信人工智能系统,面向行业应用需求,围绕系统支撑、智能计算、安全可信等问题持续开展研究,包括:

可扩展分布式系统与网络(Scalable Distributed Systems and Networking)研究面向大规模智能计算的分布式系统架构与网络协同机制,包括系统优化、云-边-端协同、SDN/数据中心/内容中心网络、网络-计算协同优化等,目标是构建高效、可扩展的智能计算基础设施,为智能应用提供系统支撑。

分布式机器学习与边缘智能(Distributed Machine Learning and Edge Intelligence):研究分布式/去中心化学习算法与系统,包括联邦学习、通信与隐私优化、跨设备协同智能、在线社交网络信息传播建模与影响力最大化等,旨在推动智能计算的分布式与边缘化演进,支撑群体智能与网络行为分析。

可信与安全人工智能系统(Trustworthy and Secure AI Systems):研究人工智能系统的鲁棒性、安全性与可信性,包括对抗鲁棒性与防御、隐私泄露与数据重建防护、推荐与生成模型的可信治理、社交平台中的虚假信息检测与传播控制等,目标是构建可解释、可验证、可治理的下一代安全可信AI系统。

智能物联网与数据分析(Intelligent IoT and Data Analytics):研究物联网与数据智能在社会计算与行业应用中的融合,包括多源数据融合、群体行为建模、智慧健康、智慧城市治理与数据驱动决策支持等,旨在提升物联网系统在复杂社会环境中的自主感知、分析与决策能力。


招生信息每年计划招收博士研究生1-2名左右(学术学位博士:计算机应用技术;专业学位博士:智能教育、人工智能)、全日制硕士研究生(学硕:计算机科学与技术;专硕:计算机技术)2-3名、非全日制硕士研究生(专硕:计算机技术)3-4名,欢迎有志于科学研究和技术研发,在上述方向领域兴趣浓、基础好、能力强的优秀员工联系推免或报考!请附上个人基本信息、教育与学习经历、学术研究/科创竞赛/科研实践/项目开发等方面较为详细的介绍材料,以及其它能表明个人成绩或专业技能的材料,发送至:xlhuang AT cs.ecnu.edu.cn专业背景要求:计算机、数学、信息、通信类及相关专业。课题组研究项目丰富、经费充足,能够为员工提供优越的学习科研条件和发展平台。课题组同时欢迎有科研兴趣的优秀本科生到实验室开展科创项目与毕业设计!联系方式同上。

招生与培养

开授课程

  • COMS0031131036.02: Computer Networks, for undergraduates of the Department of Computer Science and Technology, ECNU, Fall (since 2010)

  • COMS0031132033.01: Fundamentals of Network Security, for undergraduates of the Department of Computer Science and Technology, ECNU, Fall (since 2009)

  • CMST0021120059: Advanced Topics on Computer Networks, for M.S.E. & Ph.D. candidates of the Department of Computer Science and Technology, ECNU, Spring (2008~2019)

  • CMST3511102027: Advanced Network Computing: Architectures, Technologies and Progresses, for M.S.E. & Ph.D. candidates of the School of Computer Science and Technology, ECNU, Fall (since 2020)

  • ME003511202013: The Path to Artificial Intelligence, University-wide General Studies Curriculum, for M.S.E. & Ph.D. candidates of university-wide graduates, ECNU, Spring (since 2022)

科研项目

主持的部分科研项目:

  • 国家重点研发计划“物联网与智慧城市关键技术及示范”重点专项课题No.2019YFB2012803城市公共基础设施的预警预报模型及智能决策机制2020.01-2023.12,PI

  • 上海市科技创新行动计划高新技术领域重大专项课题No.19DZ1100401上海城域物联专网关键技术研究及城市级综合试验环境建设2019.07-2021.06,PI

  • 上海市人工智能创新发展重点专项课题No.2018-RGZN-02060新型城域物联专网评估体系研发及环境建设2018.11-2020.12,PI

  • 上海市科技创新行动计划高新技术领域重大专项课题No.18511103302运营级实时大数据高性能处理关键技术研究2018.07-2020.06,PI

  • 企事业单位委托研究项目,No.14506-412312-17117,“LJ-SERVICE新型业务应用平台研发与系统集成”,2017.07-2019.07,PI

  • 企事业单位委托研究项目,No.14506-412312-17052,“基于大数据的智能远程长者关怀系统的设计与实现”,2017.04-2019.04,PI

  • 上海市“科技创新行动计划”信息技术领域重点专项课题,No.13511500400,“基于开放架构的高可靠软件定义网络体系研究”,2013.07-2015.06,PI

  • 国家自然科学基金青年科学基金项目,No.60803127,“对等计算复杂网络的拓扑生成、行为牵引与标靶免疫”,2009.01-2011.12PI

  • 教育部高等学校博士学科点专项科研基金项目,No.200802691053,“对等计算复杂网络的分散式标靶免疫方法研究”,2009.01-2011.12PI

学术成果

Selected Publications:

  • Y. Fu, Y. Zhang, C. Chen, J. Ma, Q. Yuan, R. Tu, X. Huang, W. Ye, X. Luo, M. Deng, MARK: Multi-agent Collaboration with Ranking Guidance for Text-attributed Graph Clustering, In Proceedings of The 63rd Annual Meeting of the Association for Computational Linguistics (ACL2025), Vienna, Austria, July 27 - August 1, 2025.

  • Y. Zhang, S. Meng, C. Chen, M. Peng, H. Gu, and X. Huang*, LinkThief: Combining Generalized Structure Knowledge with Node Similarity for Link Stealing Attack against GNN, In Proceedings of The 32nd ACM Multimedia Conference (MM2024), Melbourne, Australia, October 28 - November 1, 2024.

  • S. Meng, J. Zhou, X. Chen, Y. Liu, F. Lu, and X. Huang*, Structure-Information-Based Reasoning over the Knowledge Graph: A Survey of Methods and Applications, ACM Transactions on Knowledge Discovery from Data, vol. 18, no. 8, pp. 1-42, 2024.

  • H. Gu, X. Zhang, J. Li, H. Wei, B.  Li, and X. Huang*, “Federated Learning Vulnerabilities: Privacy Attacks  with Denoising Diffusion Probabilistic Models,” In  Proceedings of The 33th Web Conference (WWW’2024), Singapore, May 13~17,  2024.

  • B. Li, Z. Chen, Y. Liu, Y. Ma, H. Gu, and X. Huang*, “Federated Learning on Distributed Graphs considering Multiple Heterogeneities,” In Proceedings of The 49th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’2024), Seoul, Korea, 14~19 April 2024.

  • F. Lu, J. Zhou, and X. Huang*,Enhancing the convolution-based knowledge graph embeddings by increasing dimension-wise interactions, Data & Knowledge Engineering, vol. 146, 102184, 2023.

  • C. Yan, X. Huang*, H. Gu and S. Meng, “SimulE: A novel convolution-based model for knowledge graph embedding,” In Proceedings of The 26th Interna-tional Conference on Computer Supported Cooperative Work in Design (CSCWD’2023), Rio de Janeiro, Brazil, May 24~26, 2023.

  • Y. Wen, F. Lu, Y. Liu, and X. Huang*, Attacks and Countermeasures on Blockchains: A Survey from Layering Perspective, Computer Networks, Volume 191, 22 May 2021, 107978. DOI: 10.1016/j.comnet.2021.107978

  • X. Huang, P. Shi, Y. Liu, and F. Xu, Towards Trusted and Efficient SDN Topology Discovery: A Lightweight Topology Verification Scheme, Computer Networks, Volume 170, 7 April 2020, 107119. DOI: 10.1016/j.comnet.2020.107119

  • F. Lu, P. Cong, and X. Huang*, Utilizing Textual Information in Knowledge Graph Embedding: A Survey of Methods and Applications, IEEE Access, vol. 8, pp. 92072-92088, 2020

  • X. Huang, F. Li, K. Cao, T. Wei and S. Hu, Queueing Theoretic Approach for Performance-Aware Modeling of Sustainable SDN Control Planes, IEEE Transactions on Sustainable Computing, vol.5, no. 1, pp. 121-133, 2020. DOI: 10.1109/TSUSC.2018.2889561

  • X. Huang, S. Cheng, K. Cao, P. Cong, T. Wei and S. Hu, A Survey of Deployment Solutions and Optimization Strategies for Hybrid SDN Networks, IEEE Communications Surveys and Tutorials, vol. 21, no. 2, pp. 1483-1507, 2019.

  • Y. Liu, S. Cheng, and X. Huang*, Towards Web-scale and Energy-efficient Hybrid SDNs: Deployment Optimization and Fine-grained Link State Management, In Proceedings of The 21st International Conference on Web Information Systems Engineering (WISE), Amsterdam and Leiden, Netherlands, Oct. 20-24, 2020.

  • Y. Yang, X. Huang*, S. Cheng, S. Chen, and P. Cong, SHSA: A Method of Network Verification with Stateful Header Space Analysis, In Proceedings of The 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS), IEEE Computer Society Press, pp. 232-238, Wuhan, China, Dec. 13-16, 2016.

  • H. Li, X. Huang*, and Z. Zheng, Detection Method of DDoS Attack Based on Software Defined Network and Its Application, Computer Engineering, vol. 42, no. 2, pp. 118-123, 2016. (in Chinese)

  • T. Ren, and X. Huang*, A Modified Max-min Ant Colony Optimization Algorithm for Virtual Machines Replacement in Cloud Datacenter, In Proceedings of The 33rd IEEE International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, Dec. 5-7, 2014.

  • Y. Zhou, and X. Huang*, Scheduling Workflow in Cloud Computing Based on Ant Colony Optimization Algorithm, In Proceedings of The 6th IEEE International Conference on Business Intelligence and Financial Engineering (BIFE), IEEE Computer Society Press, pp. 57-61, Hangzhou, China, Nov. 14-16, 2013.

  • H. Qian, X. Li, and X. Huang, Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model, Informatica, vol. 23, no. 3, pp. 443-460, 2012.

  • L. Yu, X. Huang, and F. You, MSTG: A Multi-Service Traffic Generator for Testing Next Generation Wireless Broadband Communication Systems, In Proceedings of The 1st IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), IEEE Computer Society Press, pp. 580-583, Wuhan, China, Apr. 25-26, 2009.

  • X. Huang, F. Zou, and F. Ma, On Targeted Local Immunization in Scale-free Peer-to-Peer Networks, Journal of Computer Science and Technology, vol. 22, no. 3, pp. 457-468, 2007.

  • X. Huang, and F. Ma, DEAON: Dynamically-Evolving Active Overlay Networks for Scalable Information Retrieval, High Technology Letters (English Language Edition), vol. 13, no. 4, pp. 413-417, 2007.

  • X. Huang, Y. Li, and F. Ma, GToS: Examining the Role of Overlay Topology on System Performance Improvement, In Proceedings of The 7th International Workshop on Distributed Computing (IWDC), Lecture Notes in Computer Science, Springer-Verlag, vol. 3741, pp. 213-225, Kharagpur, India, Dec. 27-30, 2005.

  • X. Huang, F. Ma, and Y. Li, Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization, In Proceedings of The 3rd International Symposium on Parallel and Distributed Processing and Applications (ISPA), Lecture Notes in Computer Science, Springer-Verlag, vol. 3759, pp. 45-53, Nanjing, China, Nov. 2-5, 2005.

  • Y. Li, X. Huang, F. Ma, and F. Zou, Building Efficient Super-Peer Overlay Network for DHT Systems, In Proceedings of The 4th International Conference on Grid and Cooperative Computing (GCC), Lecture Notes in Computer Science, Springer-Verlag, vol. 3795, pp. 787-798, Beijing, China, Nov. 30 - Dec. 3, 2005.

  • X. Huang, F. Ma, and W. Zhang, A Unique Design for High-Performance Decentralized Resources Locating: A Topological Perspective, In Proceedings of The 6th International Conference on Web Information Systems Engineering (WISE), Lecture Notes in Computer Science, Springer-Verlag, vol. 3806, pp. 609-610, New York, NY, USA, Nov. 20-22, 2005.

  • X. Huang, F. Ma, W. Zhang, and Y. Li, On Protection of Threatened Unstructured Overlays: An Economic Defense Model and Its Applications, In Proceedings of The 1st International Workshop on Internet and Network Economics (WINE), Lecture Notes in Computer Science, Springer-Verlag, vol. 3828, pp. 936-946, Hong Kong, China, Dec. 15-17, 2005.

  • X. Huang, W. Zhang, F. Ma, and F. Li, Exploring Small-World-Like Topologies via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays, In Proceedings of The 2nd IFIP International Conference on Embedded and Ubiquitous Computing (EUC), Lecture Notes in Computer Science, Springer-Verlag, vol. 3823, pp. 724-733, Nagasaki, Japan, Dec. 6-9, 2005.

  • Y. Li, X. Huang, F. Zou, and F. Ma, eDSR: A Decentralized Service Registry for e-Commerce, In Proceedings of The 1st IEEE International Conference on e-Business Engineering (ICEBE), IEEE Computer Society Press, pp. 615-618, Beijing, China, Oct. 18-21, 2005.

  • X. Huang, Y. Li, R. Yang, and F. Ma, Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme, In Proceedings of The 6th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), IEEE Computer Society Press, pp. 503-506, Dalian, China, Dec. 5-8, 2005.

  • R. Yang, Q. Xia, W. Wang, Q. Pan, X. Huang, and M. Li, Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks, In Proceedings of The 6th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), IEEE Computer Society Press, pp. 201-204, Dalian, China, Dec. 5-8, 2005.

  • X. Huang, Y. Li, F. Liu, and F. Ma, ToA3: Beyond the Limit of Unstructured P2P Networks, In Proceedings of The 1st Joint International Conference on Autonomic and Autonomous Systems & International Conference on Networking and Services (ICAS&ICNS), IEEE Computer Society Press, pp. 40-45, Papeete, Tahiti, France, Oct. 23-28, 2005

荣誉及奖励

10 访问

相关教师