钱俊彦 教授  


职称:教授/博导

研究方向:智能安全;形式化分析与验证;VLSI容错

电子邮件:qianjunyan@gxnu.edu.cn

通信地址:广西桂林市七星区育才路15号广西师范大学计算机科学与工程学院

 

招收博士和硕士研究生

招收专业:

    博士生:软件工程;

    学硕:计算机科学与技术、软件工程;

    专硕:计算机技术、软件工程、电子信息

招生需求:

    1、招收硕士生不强调本科是计算机专业,只要数学或相关工科专业都可;若愿意继续读博或出国深造更佳。

    2、认同中国优秀传统文化,拥有贤善的人格,诚信的品质,无抽烟等不良习惯。

    3、若你具有兼济天下的大志向、或较扎实的数学基础、或较强的英文阅读、或较强的编程能力,将可能取得更好的成绩。

心得:以德为先、以学为本、以勤为径。


[个人简介] [科研项目] [代表性成] [主要教学工作]


(一)人简介

钱俊彦,男,教授/博导,广西师大“漓江学者”,计算机学会理论计算机科学、形式化方法、分布式计算与系统专委会委员,主要研究方向:形式化验证、智能安全、VLSI容错等。广西“十百千”人才工程第二层次人选,广西高校卓越学者,2013年获广西青年科技奖;2011和2004年分别获广西区自然科学和科技进步三等奖。主持国家自然科学基金、广西自然科学基金等项目20多项。在计算机领域的国际顶级期刊IEEE TSE、IEEE TPDS、IEEE TCAD、ACM TOSEM、IEEE T RELIAB、IEEE TFS,国内一级学报《计算机学报》、《软件学报》、《电子学报》,以及ACM MobiCom等重要国际会议上发表学术论文100多篇。获发明专利11项,实用新型专利1项,软件著作权13项。


(二)科研项目

“基于开关结构的VLSI处理器阵列降阶重构技术研究”国家自然科学地区基金,编号:62162004,2022.01-2025.12, 主持

“基于下推网络的实时并发递归程序可达性分析及增量式验证”,国家自然科学地区基金,编号: 61562015,2016.01-2019.12,主持

“基于抽象和符号技术的并发软件验证研究”,国家自然科学地区基金,编号:61063002,2011.01-2013.12,主持

“基于依赖公式抽象的软件模型检测研究”,国家自然科学基金地区项目,编号:60663005,2007.01-2009.12,主持


(三)代表性成果

1、论文

[1] Junyan Qian,Kunzhu Qiu, Hao Ding*, Huimin Zhang and Zhongyi Zhai*. An Efficient Bottleneck Planes Exclusion Method for Reconfiguring 3D VLSI Arrays. IEEE Transactions on Parallel and Distributed Systems, 2023, Accept. CCFA类

[2] Yang Wang, Peng Zhang, MaolinSun,Zeyu Lu, Yibiao Yang, YutianTang*,Junyan Qian*, ZhiLi*,Yuming Zhou*. Uncovering bugs in code coverageprofilers via control flow constraint solving. IEEE Transactions on Software Engineering, 2023, 49(11): 4964 - 4987. DOI: 10.1109/TSE.2023.3321381  CCF A类

[3] Hao Ding, Yanlong he,zhongyi zhai, zhi li, Junyan Qian*, Lingzhong Zhao*. Efficient Three-Dimensional Processor Array ReconfigurationAlgorithms Based on Bucket Effect. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023, Early Access. DOI: 10.1109/TCAD.2023.3337196. CCFA类

[4] Junyan Qian, Hao Ding, HanpengXiao, Zhide Zhou, Lingzhong Zhao, and Zhongyi Zhai. Efficient ReconfigurationAlgorithm with Flexible Rerouting Schemes for Constructing 3D VLSI Sub-Arrays. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems(TCAD), 2020, 39(1): 267-271. DOI:10.1109/TCAD.2019.2891984. CCF-A类

[5] Junyan Qian, Zhide Zhou,Tianlong Gu, Lingzhong Zhao, Liang Chang. Optimal Reconfiguration ofHigh-Performance VLSI Subarrays with Network Flow. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(12): 3575-3587. CCF-A类

[6] Zhongyi Zhai, Junyan Qian*,Yuan Tao, Lingzhong Zhao, Bo Cheng. A Lightweight Timestamp-based MAC DetectionScheme for XOR Network Coding in Wireless Sensor Networks. ACM MobiCom 2018:735-737. CCF-A类

[7] Yuming Zhou, Yibiao Yang,Hongmin Lu, Lin Chen, Yangyang Zhao, Junyan Qian, Baowen Xu. How far we haveprogressed in the journey? An examination of cross-project defect prediction. ACM TOSEM, 2018, 27(1):1-51.  CCF-A类

[8] Haiyu Pan, Yongzhi Cao, LiangChang, Junyan Qian, Yuming Lin. Fuzzy Alternating Refinement Relations Underthe Godel Semantics. IEEE Transactions on Fuzzy Systems. 2021, 29(5): 953-964. DOI: 10.1109/TFUZZ.2020.296586. 中科院SCI一区\ CCF B类

[9] Haiyu Pan, Fu Song, YongzhiCao, and Junyan Qian. Fuzzy pushdown termination games. IEEE Transactions on Fuzzy Systems (TFS), 2019, 27(4): 760-774. 中科院SCI一区\CCF B类

[10] Hao Ding, Junyan Qian*,Bisheng Huang, Lingzhong Zhao, Zhongyi Zhai. Flexible scheme for reconfiguring2D mesh-connected VLSI subarrays under row and column rerouting. Journal ofParallel and Distributed Computing, 2021, 151:1–12. https://doi.org/10.1016/j.jpdc.2021.01.003. CCF B类

[11] Hao Ding, Junyan Qian*,Lingzhong Zhao, Zhongyi Zhai. A high-performance VLSI arrayreconfiguration scheme based on network flow under row and column rerouting.Journal of Parallel and Distributed Computing, 2021, 158:176–185. https://doi.org/10.1016/j.jpdc.2021.08.005. CCF B类

[12] Junyan Qian; Fan Shi; YongCai; Haiyu Pan*. Approximate Safety Properties in Metric Transition Systems. IEEE Transactions on Reliability, 2022, 71(1): 221-234. 10.1109/TR.2021.3139616.中科院SCI二区\CCF C类

[13] Zhongyi Zhai, Guibing Lai, Bo Cheng, Junyan Qian*,Lingzhong Zhao*, and Jinsong Wu. Lightweight Secure Detection Service forMalicious Attacks in WSN with timestamp-based MAC. IEEE Transactions on Networkand Service Management, 2022, 19(4): 5299–5311. DOI 10.1109/TNSM.2022.3194205.Early Access Article. 中科院SCI二区

[14] Yu Q, Zhu Y, Han H, Zhao Y, Jiang S, Qian J. Evolutionary measures andtheir correlations with the performance of cross-version defect prediction forobject-oriented projects. J Softw Evol Proc. 2023, e2625. https://doi.org/10.1002/smr.2625. CCF B类

[15] Shujuan Jiang, Jieqiong Chen,Yanmei Zhang, Junyan Qian, Rongcun Wang, Meng Xue. An Evolutionary Approach toGenerating Test Data for Data flow Test. IET Software, 2018, 12(4): 318-323(2018).CCF-B类

[16] Lina Gong, Shujuan Jiang, Lili Bo and Li Jiang, JunyanQian. A Novel Class-Imbalance Learning Approach for Both Within-Project andCross-Project Defect Prediction. IEEE Transactions on Reliability. DOI: 10.1109/TR.2019.2895462. 中科院SCI二区\CCF C类

[17] Yanmei Zhang; Shujuan Jiang*;Yanru Ding; Guan Yuan; Junjie Liu; Dongyu Lu; Junyan Qian*.  Generating OptimalClass Integration Test Orders Using Genetic Algorithms. International Journal of Software Engineering and Knowledge Engineering, 2022, 32(6):871-892. CCFC类

[18] Junyan Qian,FuhaoMo, HaoDing, ZhideZhou, LingzhongZhao, ZhongyiZhai*. An improvedalgorithm for accelerating reconfiguration of VLSI array. Integration-the VLSI Journal, 2021, 79: 124-132. https://doi.org/10.1016/j.vlsi.2021.04.005CCF C类

[19] Hao Ding, JunyanQian*, Lingzhong Zhao, Zhongyi Zhai. A mathematical programming method forconstructing the shortest interconnection VLSI arrays. Integration-the VLSI Journal, 2021, 81:167-174. https://doi.org/10.1016/j.vlsi.2021.07.004CCF C类

[20] Chenghua Tang, Yang Xiang, YuWang, Junyan Qian* and Baohua Qiang. Detection and Classification of AnomalyIntrusion Using Hierarchy Clustering and SVM. Security and CommunicationNetworks. 2016, 9: 3401–3411. CCF-C类

[21] Zhongyi Zhai, Peipei Liu,Lingzhong Zhao*, Junyan Qian*, Bo Cheng. An efficiency‑enhanced deeplearning model for citywide crowd flows prediction. International Journal ofMachine Learning and Cybernetics, https://doi.org/10.1007/s13042-021-01282-z.(SCI+EI)

[22] Junyan Qian, Zhide Zhou,Lingzhong Zhao, Jingwei Zhang, Fengying Li. Accelerating Reconguration for VLSIArrays with A-star Algorithm. IEEJ Transactions on Electrical and ElectronicEngineering, 2018: 13(10):1511-1519. (SCI+EI)

[23] Junyan Qian, Yiping Wang,Liang Chang, Zhide Zhou, Lingzhong Zhao. A mathematical model for reconfiguringVLSI subarrays under row and column rerouting. IEEE Access, 2017, 5: 23912 –23919. (SCI+EI)

[24] Junyan Qian, ZhangshunBai,Zhide Zhou, Lingzhong Zhao,Liang Chang. Effcient Abstraction Algorithms forAccelerating Reconfiguration of VLSI Arrays. IEEJ Transactions on Electricaland Electronic Engineering, 2017, 12(5): 759–769. (SCI+EI)

[25] Junyan Qian, Cong Chen,Lingzhong Zhao, Yunchuan Guo. An Efficient Method for Reconfiguring PowerEfficient VLSI Array with Maximum Satisfiability. IEEJ Transactions onElectrical and Electronic Engineering, 2018,13(5):770-776. (SCI+EI)

[26] Junyan Qian, Wei Cao, Jia Hu,Jingwei Zhang, Zhoubo Xu, Zhide Zhou. Satisfiability-Based Method forReconfiguring Power Efficient VLSI Array. IEICE Electronics Express, 2016, 13(23): 1-11.  (SCI+EI)

[27] Junyan Qian, Zhide Zhou,Lingzhong Zhao, Tianlong Gu, Liang Chang. An Integer programming method forconstructing tightly coupled VLSI subarrays. IEICE Electronics Express, 13(11): 1-9. (SCI+EI)

[28] Bo Cheng, Shuai Zhao, JunyanQian, Zhongyi Zhai, Junliang Chen. Lightweight Service Mashup Middleware withREST Style Architecture for IoT Applications. IEEE Transactions on Network andService Management, 2018, 15(3): 1063-1075. (SCI+EI)

[29] Junyan Qian and Baowen Xu.Formal Verification for C Program. Informatica, 18(2), 289-304, 2007. (SCI)

[30] Junyan Qian and Baowen Xu.Model Checking for Timed Statecharts. Proceedings of the 25th FORTE,Lecture Notes in Computer Science 3731, Oct. 2005,pp.261-274.  (SCI+EI, CCF-C类会议)

[31] 钱俊彦,徐力,古天龙,赵岭忠,蔡国永. 基于时间动态下推网络可达性分析.电子学报, 2017, 45 (9): 2241-2249.(EI, CCF-中文A类期刊)

[32] 于巧,姜淑娟,张艳梅,王兴亚,高鹏飞,钱俊彦*.分类不平衡对软件缺陷预测模型性能的影响研究.计算机学报, 2018,41(4):809-824. (EI, CCF-中文A类期刊)

[33] 钱俊彦,甘鹏程,郭云川,赵岭忠,古天龙.基于时间多栈下推网络的实时系统验证.计算机学报,2016, 39(11):2253-2269. (EI, CCF-中文A类期刊)

[34] 赵岭忠,翟仲毅,钱俊彦*,郭云川.基于Mini-trace和ASP的CSP模型检测.软件学报,2015, 26(10): 2521-2544. (EI,CCF-中文A类期刊)

[35] 钱俊彦,赵岭忠,蔡国永.基于完备抽象解释的性质强保留抽象研究.计算机学报, 2014,37(8):1754-1767. (EI,CCF-中文A类期刊)

[36] 钱俊彦,贾书贵,赵岭忠,郭云川.基于上下文定界的递归队列并发程序可达性分析.计算机学报. 2014, 37(12):2574-2584. (EI, CCF-中文A类期刊)

[37] 钱俊彦,徐宝文.基于完备抽象解释的模型检验CTL公式研究.计算机学报, 2009,31(5):101-110. (EI,CCF-中文A类期刊)

[38] 丁艳茹,张艳梅,姜淑娟,袁冠,王荣存,钱俊彦.面向类集成测试序列生成的强化学习研究.软件学报, 2022,33(5):1674-1698.DOI: 10.13328/j.cnki.jos.006555. (EI, CCF-中文A类期刊)

2、发明专利

[1]钱俊彦,贾书贵,赵岭忠,蔡国永,郭云川.基于上下文定界的队列通信并发递归程序验证方法,专利号:ZL201210450761.8, 申请日:2013.2,授权公告日:2015-8-26

[2]钱俊彦;曾宇清;赵岭忠;郭云川;李凤英.基于树语义的异步动态下推网络可达性分析方法. 专利号: ZL201410470378.8.申请日:2014-09-16,授权公告日:2017-10-17

[3]钱俊彦;甘鹏程;郭云川;赵岭忠;古天龙.时间多栈下推网络的动态转换方法. 专利号: ZL201510581423.1. 申请日:2015-09-14,授权公告日:2018-8-14

[4]钱俊彦;甘鹏程;郭云川;赵岭忠;古天龙.时间多栈下推网络的静态转换方法. 专利号: ZL201510581206.2  申请日:2015-09-14,授权公告日:2018-9-25

[5]钱俊彦;徐力;古天龙;赵岭忠;蔡国永.时间动态下推网络的转换方法. 专利号:  ZL201510581987.5 申请日:2015-09-14,授权公告日:2018-1-30

[6]钱俊彦,周志德,古天龙,赵岭忠,常亮.一种快速重构高性能目标阵列的方法. 专利号: ZL201610628003.9,申请日:2016-12-14,授权公告日:2019-12-02

[7]钱俊彦,邵怀禹,翟仲毅,赵岭忠,李杰. 一种基于区块链的隐私数据保护方法.ZL202010948750.7, 授权公告日:2021-6-22       

[8]钱俊彦;沈荔萍;翟仲毅;赵岭忠;李杰.面向稀有攻击的网络入侵检测方法.ZL202010928410.8, 授权公告日:2022-4-1


(四)主要教学工作

程序分析与验证(研究生)

信息检索(工程硕士)

数据库原理(本科生)

数据结构(本科生)

软件工程(本科生)

形式语言与自动机(本科生)

面向对象程序设计(本科生)

Windows程序设计(本科生)

Delphi程序设计(本科生)

数据库应用技术(本科生)



  






  • 地址 :广西师范大学育才校区育才路15号
  • 邮编:541004
版权所有:广西师范大学计算机科学与工程学院 备案号:桂ICP备05000954号-1