English | 学校主页 | 联系我们

教授名录
您当前所在的位置: 网站首页 >> 师资队伍 >> 教授名录 >> 正文

    聂廷远

    发布人:曲良波    时间:2020-06-11   点击:[]

    undefined

    姓名

    聂廷远

    单位部门

    电子信息工程教研室

    职称职务

    教授

    联系方式

    tynie@qut.edu.cn

    通讯地址

    266525青岛市黄岛区嘉陵江东路777号

    个人简介

    聂廷远,男,1971 年12 月生。工学学士(武汉理工大学1993),理学硕士(日本高知大学2005),理学博士(日本高知大学2008)。青岛理工大学教授,硕士研究生导师。主要从事VLSI系统的最优化方法研究、IP保护技术及复杂网络等方面的研究。

    学术兼职

    IEEE、IEICE、CCF会员、IEEE部分期刊审稿人。

    研究领域

    1.VLSI CAD系统的设计,VLSI布图规划(Floorplanning)、布局(Placement)、布线(Routing)过程中的最优化方法研究。

    2.IP(Intellectual Property)保护技术:VLSI芯片知识产权保护数字水印、指纹方法研究。

    3.复杂网络安全研究。

    4.机器学习在VLSI优化中的应用。

    教科研情况

    一、课程教学

    本科生授课:《信息学科导论》、《EDA技术及应用》

    研究生授课:《集成电路设计》

    二、代表性科研与教学项目

    1.“一种新型的保护IP(知识产权)计算机水印技术”,教育部留学回国人员科研启动基金(教外司留【2010】1174号),4.5万元,2010-2012,负责人;

    2.“SoC设计中的IP保护后端设计方法研究”,山东省科技厅自然基金(ZR2009GL7,已结题),3.0万元,2009-2011,负责人;

    3.“用于IP保护的数字水印写入算法研究”,山东省教育厅高校科技计划项目(J09LG10,已结题),4.5万元,2009-2011,负责人;

    4.“基于最优化处理的芯片设计保护指纹方法研究”,青岛市产学研合作引导计划(应用基础研究13-1-4-164-jch,已结题),5.0万,2013.12-2015.9,负责人;

    5.“层次式集成电路知识产权(IP)保护指纹方法研究”,国家自然基金面上项目(61572269),63.0万元,2016.1- 2019.12,负责人;标注:国家自然科学基金资助项目61572269(Project 61572269 supported by NSFC)。

    学术成果

    一、代表性论文与会议报告

    [1]Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga. A Post Layout Watermarking Method for IP Protection. 2005 IEEE International Symposium on Circuit and Systems (ISCAS05) Proceedings, pp. 6206-6209, May, 2005. (EI)

    [2]Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga. A Watermarking System for IP Protection by a Post Layout Incremental Router. 42nd Design Automation Conference (DAC05), pp. 218-221, June, 2005. (EI)

    [3]Tingyuan Nie, Masahiko Toyonaga.An Efficient and Reliable Watermarking System for IP Protection.IEICE Trans. Fundamentals Vol.E90-A, No.9, pp.1932-1939, Sep. 2007. (SCI)

    [4]Tingyuan Nie, Teng zhang.A Study of DES and Blowfish Encryption Algorithm.In TENCON 2009, pp.1-4, Nov. 2009, Singapore. (EI)

    [5]Tingyuan Nie, Yansheng Li, Xiaoke Xu, Masahiko Toyonaga.Performance Evaluation for Watermarking Techniques.ICBECS 2010, pp.548-551, 2010. (EI)

    [6]Tingyuan Nie, Chuanwang Song, Xulong Zhi.Performance Evaluation of DES and Blowfish Algorithms.ICBECS 2010, pp.581-584, 2010. (EI)

    [7]Tingyuan Nie, Yansheng Li, Chuanwang Song.Performance Evaluation for CAST and RC5 Encryption Algorithms.CCIE 2010, pp.106-109,2010. (EI)

    [8] Y.Yoshida, S.Bandou,Tingyuan Nie, M.Toyonaga.A Study of Cross-Talk Free Cost Function for Placement.2007 Shikoku-section joint convention record of the institutes of electrical and related engineers (in Japanese), p2, 2007.

    [9]Nie Tingyuan, Ji Yuchao, Li Yansheng.Estimation of Energy Consumption and Memory Utilization for Block Ciphers.ICMSIE 2010,pp.393-396, 2010.

    [10]Yansheng Li,Tingyuan Nie, Chuanwang Song.A Proposal of Fiber Sensing System Using low Reflectivity FBG.ICRS2010 Proceedings, 2010.

    [11]聂廷远,刘海涛,周立俭. 基于线网拆分的数字水印增强技术 (Enhanced Watermarking Technique through Net decomposition). 微电子学与计算机,28(7):86-88,2011. (中文核心)

    [12]Tingyuan Nie, Haitao Liu, Lijian Zhou.A Watermarking Technique by Timing Modification on FPGA. American Journal of Engineering and Technology Research, Vol.11,No.9, pp.2080-2087, 2011.(EI)

    [13]聂廷远,刘海涛,周立俭, 李言胜. FPGA IP核数字水印保护与检测技术(Digital Watermarking protection and Detection Technique for FPGA-Based IP-Cores). 半导体技术, 37(8):585-589, 2012. (中文核心)

    [14]Tingyuan Nie, Haitao Liu, Lijian Zhou.ATime-constrainedWatermarking Technique on FPGA.2012 International Conference on Industrial Control and Electronics Engineering, pp.795-798, 2012.(EI)

    [15]聂廷远,贾萧,周立俭, 李言胜. 计算机硬件设计安全问题研究 (Research on Security Issues of Computer Hardware Design), 信息网络安全, 2012(10):17-19, 2012.

    [16]聂廷远,刘海涛,周立俭,李言胜. 利用LUT替换的FPGA保护数字水印技术 (LUT Replacement Based FPGA watermarking technique for IP Protection), 微电子学与计算机, 30(1):21-23, 2013. (中文核心)

    [17]Tingyuan Nie,Yansheng Li,Lijian Zhou,Masahiko Toyonaga.A Multilevel Fingerprinting Method for FPGA IP Protection.IEEE International Symposium on Circuits and Systems (ISCAS2013), pp.1789-1792, 2013.(EI)

    [18]聂廷远,贾萧,万胜伟,周立俭,孙洁, 多重加密的数字水印生成方法 (A Secure Method for Watermark Generation), 计算机工程与设计, 34(9):3054-3057,2013. (中文核心)

    [19]Tingyuan Nie, Jie Sun, Aiguo Ji,andZhe-ming Lu, Circuit Partitioning Based Fingerprinting Method for IP Protection, IEICE Electronics Express, Vol.10,No.7,pp. 20130138, 2013.(SCI)

    [20]Tingyuan Nie, Lijian Zhou, and Yansheng Li, Hierarchical Watermarking Method for FPGA IP Protection, IETE Technical Review, Vol.30No.5,pp.367-374,2013.(SCI)

    [21]Tingyuan Nie, Lijian Zhou, Zhe-Ming Lu,Power Evaluation Methods for Data Encryption Algorithms, IET Software,Vol.8,No.1, pp.12-18, 2014.(SCI)

    [22]LijianZhou, Wanquan Liu, Zhe-Ming Lu, andTingyuan Nie.Face recognition via curvelets and local ternary pattern-based features. IEICE Transactions on Information and Systems,Vol.E97-D,No.4,pp.1004-1007,2014. (SCI)

    [23]Lijian Zhou, Wanquan Liu, Zhe-ming Lu,andTingyuan Nie.Face Recognition Approach Based on Curvelets and Local Binary Pattern Features with Local Property Preservation. The Journal of Systems and Software, Vol.95,pp.209-216,2014. (SCI)

    [24]Lijian Zhou,Yukai Xu,Zhe-Ming Lu,andTingyuan Nie.Face Recognition Based on Multi-Wavelet and Sparse Representation. Journal of Information Hiding and Multimedia Signal Processing.Vol.5, No.3, pp.406-414,2014.(EI)

    [25]Zhi-Wei Zhang, Ming-Hui Wang, Zhe-Ming Lu,Ting-Yuan Nie.Color Image Retrieval Utilizing Extended Fast VQ Codeword Search Technique and Vector Composition-Based Feedback.International Journal of Innovative Computing, Information and Control.Vol.10, No.4, pp.1369-1379,2014.(EI)

    [26]Xu Ding, Zhe-Ming Lu,Fa-Xin Yu,Ting-Yuan Nie,Jie Sun.A Robust Blind Image Watermarking Scheme Basedon Classified Vector Quantization.Journal of Information Hiding and Multimedia Signal Processing. Vol.6, No.1, pp. 74-80, 2015.(EI)

    [27]Feifei Liu, Lijian Zhou,Zhe-Ming Lu,Tingyuan Nie.Palmprint Feature Extraction Based on CurveletTransform.Journal of Information Hiding and Multimedia Signal Processing. Vol.6, No.1, pp. 131-139, 2015.(EI)

    [28]聂廷远, 郭征, 李贺. 基于介度相关性的无标度网络抗毁性研究(Study ofinvulnerabilityof scale-free network through correlation of betweenness and degree),计算机工程与设计, 35(12):4140-4144,2014. (中文核心)

    [29]Tingyuan Nie,Zheng Guo,Kun Zhao, Zhe-Ming Lu.New attack strategies for complex networks.Physica A.Vol.424,No.15,pp.248-253,2015.(SCI)

    [30]Meilei Lv, Xinling Guo, Jiaquan Chen, Zhe-Ming Lu,Tingyuan Nie.Second order centrality correlation in scale-free networks.International Journal of Modern Physics C(IJMPC).Vol.26,No.10, 1550116(1-10),2015.(SCI)

    [31] Jie Sun, Lijian Zhou, Zhe-Ming Lu, andTingyuan Nie. Iris Recognition Based on Local Gabor Orientation Feature Extraction. IEICE Transactions on Information and Systems.E98.D(8):1604-1608,2015.(SCI)

    [32]聂廷远, 郭征, 李坤龙,复杂网络的攻击策略研究(A Study of Attack Strategies for Complex Networks),计算机仿真, 32(7):286-289,2015.

    [33] 郭征,郭鑫泠,宋传旺,聂廷远. 小世界网络抗毁性及介-度相关性研究, 信息网络安全, 2014(10):81-85, 2014.

    [34]Tingyuan Nie,Zhe-Ming Lu,Lijian Zhou. Fingerprinting methods for intellectual property protection using constraints in circuit partitioning.IET Circuits Devices & Systems,Vol.10, No.3, pp.237-243, 2016.(SCI)

    [35]Tingyuan Nie, Zheng Guo, Kun Zhao, Zhe-Ming Lu. Using mapping entropy to identify node centrality in complex networks. Physica A: Statistical Mechanics & Its Applications, Vol.453, pp. 290-297, 2016.(SCI)

    [36]Tingyuan Nie, Zheng Guo, Kun Zhao, Zhe-Ming Lu. The Dynamic Correlation between degree and betweenness of complex network under attack. Physica A: Statistical Mechanics & Its Applications, Vol.457, pp. 129-137, 2016.(SCI)

    [37]Zhao Kun, Lu Zheming,Nie Tingyuan, Li Yansheng, Song Chuanwang. An improved two-phased approximation of minimum connected dominating sets in unit disk graphs using two-hop degree centrality. International Journal of Innovative Computing, Information and Control (IJICIC), Vol.12, No.5, pp.1553-1564, 2016. (EI)

    [38]聂廷远,李坤龙,高久顼. 布图规划约束对VLSI设计性能的影响(The Influence on VLSI Design Performance by Constraints in Floorplanning),微电子学与计算机, 33(11):104-108, 2016.

    [39] Siyuan Hao, Wei Wang, Yuanxin Ye, Tingyuan Nie, Lorenzo Bruzzone. Two-Stream Deep Architecture for Hyperspectral Image Classification. IEEE Transactions on Geoscience and Remote Sensing, Vol.56, No.4, pp.2349-2361, 2018.

    [40]Tingyuan Nie, Xinling Guo, Mengda Lin, Kun Zhao. Evaluation of invulnerability of scale-free networks using total information of local sub-graph. International Journal of Modern Physics C(IJMPC), Vol.29, No.08, pp.1-12,July,2018.

    [41]Tingyuan Nie, Jiuxu Gao, Lijian Zhou. Constraint Propagation in Physical Design of Circuit. IET Circuits Devices & Systems,Vol.14, No.1, pp.66-71,Jan.2020.(SCI)

    [42]Tingyuan Nie, Bo Fan, Zuyuan Zhu, Lijian Zhou. Performance and Correlations of Weighted Circuit Networks. IEEE Access, Vol.8, No.1, pp.72683-72693, Dec. 2020.

    二、代表性著作

    1.“Watermarking(Volume 2), Chapter 6: Performance Evaluation for IP Protection Watermarking Techniques”, ISBN 978-953-51-0619-7,InTech Open Access Publisher.

    2. 陆哲明, 聂廷远, 吉爱国. 《信息隐藏概论》. 电子工业出版社, 2014-11.

    三、专利与软件著作权

    1. 发明专利:“数字水印方法”,专利号:ZL201010194172.9,取得日:2012.05.30;

    2. 发明专利:“基于分区固定的IP保护指纹方法”,专利号:201410241695.2,取得日:2016.12.28;

    3.发明专利:“一种电路ID生成方法”,专利号:201710639133.7,取得日:2020.03.17;

    4.发明专利:“一种安全的IP分发方法”,专利号:201811522377.8,取得日:2021.06.01;

    5.软件著作权: “对称加密算法性能评价系统1.010”,(专利号:2010SR046240),取得日:2010.07.19;

    6.软件著作权: “Benchmark约束嵌入系统V1.0”,(专利号:2016SR178968),取得日:2016.07.13;

    7.软件著作权:“FPGA模块复杂网络信息提取软件V1.0”,(专利号:2016SR313268),取得日:2016.10.31;

    8. 软件著作权: “复杂网络转换与处理软件1.0.0”,(专利号:2016SR513247),取得日:2018.04.16;


    上一条:赵景波

    关闭