師資
周琳,男,2014年本科畢業(yè)于上海交通大學(xué)信息工程系,2018年博士畢業(yè)于新加坡國(guó)立大學(xué)電子與計(jì)算機(jī)工程系,2019-2020在美國(guó)密歇根大學(xué)安娜堡分校電子工程與計(jì)算機(jī)科學(xué)系從事博士后研究,2020年8月至2025年10月于北京航空航天大學(xué)網(wǎng)絡(luò)空間安全學(xué)院任副教授、博士生導(dǎo)師,2025年11月至今任南方科技大學(xué)自動(dòng)化與智能制造學(xué)院副教授。
周博士入選國(guó)家級(jí)青年人才計(jì)劃(工信部啟明)、北京航空航天大學(xué)卓越百人計(jì)劃、北京航空航天大學(xué)青年拔尖人才計(jì)劃。主要研究方向包括信息論、統(tǒng)計(jì)異常檢測(cè)、無(wú)線通信、網(wǎng)絡(luò)化控制等,長(zhǎng)期聚焦于低時(shí)延、強(qiáng)安全、高可靠通信息系統(tǒng)的理論研究。以第一/通訊作者身份發(fā)表CCF A類期刊論文20篇,其中信息論領(lǐng)域頂級(jí)期刊IEEE Transactions on Information Theory 17篇;以第一作者身份發(fā)表信息論領(lǐng)域英文專著2部、英文教材1部,參編國(guó)家十四五規(guī)劃教材1部。主持國(guó)家級(jí)青年人才項(xiàng)目、國(guó)家自然科學(xué)基金青年項(xiàng)目、北京市自然科學(xué)基金面上項(xiàng)目、北京實(shí)驗(yàn)室等項(xiàng)目,獲2022年中國(guó)指控學(xué)會(huì)科技進(jìn)步一等獎(jiǎng)(3/15)與中國(guó)電子學(xué)會(huì)信息論分會(huì)青年新星。擔(dān)任IEEE TCOM編委,IEEE ISIT/SSP/VTC/WCSP/ICCC等國(guó)際國(guó)內(nèi)會(huì)議TPC member,長(zhǎng)期擔(dān)任IEEE TIT、JSAC、TCOM、TSP等國(guó)際期刊審稿人。研究成果得到了國(guó)內(nèi)外學(xué)者的引用與正面評(píng)價(jià),包括香農(nóng)獎(jiǎng)得主Sergio Verdú教授、Shlomo Shami教授,美國(guó)國(guó)家科學(xué)院院士Vincent Poor教授、中國(guó)科學(xué)院院士尤肖虎教授、英國(guó)皇家工程院院士Lajos Hanzo教授、德國(guó)科學(xué)院院士Holger Boche教授,IEEE TIT主編Venugopal V. Veeravalli教授,IEEE JSAIT主編Tara Javidi教授,麻省理工Yury Polyanskiy教授、加州理工Victoria Kostina教授、劍橋大學(xué)Albert Fabregas教授。
教育經(jīng)歷
2014.8-2018.9,新加坡國(guó)立大學(xué),博士
2010.9-2014.7,上海交通大學(xué),學(xué)士
工作經(jīng)歷
2025.11至今,南方科技大學(xué)自動(dòng)化與智能制造學(xué)院副教授
2020.8-2025.11,北京航空航天大學(xué)網(wǎng)絡(luò)空間安全學(xué)院副教授
2019.1-2020.8,密歇根大學(xué)安娜堡分校博士后
2018.9-2019.1,新加坡國(guó)立大學(xué)博士后
研究領(lǐng)域
信息論,統(tǒng)計(jì)學(xué)習(xí),通信控制一體化,面向信息系統(tǒng)的人工智能
發(fā)表文章
以第一/通訊作者身份發(fā)表CCF A類期刊論文20篇,其中信息論領(lǐng)域頂級(jí)期刊IEEE Transactions on Information Theory 17篇;以第一作者身份發(fā)表信息論領(lǐng)域英文專著2部、英文教材1部,參編國(guó)家十四五規(guī)劃教材1部。
-期刊論文:
[1] Y. Zhang, L. Zhou* and Q. Zhang, “Capacity Region of Covert Secret Key Generation over Binary-Input Multiple Access Channels”, to appear in IEEE Transactions on Information Theory, 2026.
[2] J. Diao and L. Zhou*, "Sequential Outlier Hypothesis Testing Under Universality Constraints," in IEEE Transactions on Information Theory, vol. 71, no. 9, pp. 6602-6625,. 2025.
[3] Y. Wang, L. Bai, Z. Wu and L. Zhou*, "Achievable Second-Order Asymptotics for MAC and RAC With Additive Non-Gaussian Noise," in IEEE Transactions on Information Theory, vol. 71, no. 7, pp. 4953-4975, 2025.
[4] L. Zhu and L. Zhou*, "Exponentially Consistent Outlier Hypothesis Testing for Continuous Sequences," in IEEE Transactions on Information Theory, vol. 71, no. 5, pp. 3287-3304, 2025.
[5] L. Zhou, Q. Wang, J. Wang, L. Bai and A. O. Hero, "Large and Small Deviations for Statistical Sequence Matching," in IEEE Transactions on Information Theory, vol. 70, no. 11, pp. 7532-7562,. 2024.
[6] L. Zhou and A. O. Hero, "Resolution Limits of Non-Adaptive 20 Questions Search for a Moving Target," in IEEE Transactions on Information Theory, vol. 69, no. 9, pp. 5463-5484,. 2023.
[7] L. Bai, Z. Wu and L. Zhou*, "Achievable Refined Asymptotics for Successive Refinement Using Gaussian Codebooks," in IEEE Transactions on Information Theory, vol. 69, no. 6, pp. 3525-3543, 2023.
[8] L. Zhou, L. Bai and A. O. Hero, "Resolution Limits of Non-Adaptive 20 Questions Search for Multiple Targets," in IEEE Transactions on Information Theory, vol. 68, no. 8, pp. 4964-4982, 2022.
[9] L. Zhou, Y. Wei and A. O. Hero, "Second-Order Asymptotically Optimal Outlier Hypothesis Testing," in IEEE Transactions on Information Theory, vol. 68, no. 6, pp. 3585-3607, 2022.
[10] L. Zhou and D. Cao, "Privacy-Utility Tradeoff for Hypothesis Testing Over a Noisy Channel," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4078-4091, 2021.
[11] L. Zhou and A. O. Hero, "Resolution Limits for the Noisy Non-Adaptive 20 Questions Problem," in IEEE Transactions on Information Theory, vol. 67, no. 4, pp. 2055-2073, 2021.
[12] L. Zhou, "Multiple Private Key Generation for Continuous Memoryless Sources With a Helper," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2629-2640, 2020.
[13] L. Zhou and M. Motani, "Non-Asymptotic Converse Bounds and Refined Asymptotics for Two Source Coding Problems," in IEEE Transactions on Information Theory, vol. 65, no. 10, pp. 6414-6440, 2019.
[14] L. Zhou, A. Wolf and M. Motani, "On Lossy Multi-Connectivity: Finite Blocklength Performance and Second-Order Asymptotics," in IEEE Journal on Selected Areas in Communications, vol. 37, no. 4, pp. 735-748, 2019.
[15] L. Zhou, V. Y. F. Tan and M. Motani, "Refined Asymptotics for Rate-Distortion Using Gaussian Codebooks for Arbitrary Sources," in IEEE Transactions on Information Theory, vol. 65, no. 5, pp. 3145-3159, 2019.
[16] L. Zhou, V. Y. F. Tan and M. Motani, "The Dispersion of Mismatched Joint Source-Channel Coding for Arbitrary Sources and Additive Channels," in IEEE Transactions on Information Theory, vol. 65, no. 4, pp. 2234-2251, 2019.
[17] L. Zhou, V. Y. F. Tan, L. Yu and M. Motani, "Exponential Strong Converse for Content Identification With Lossy Recovery," in IEEE Transactions on Information Theory, vol. 64, no. 8, pp. 5879-5897, 2018.
[18] L. Zhou, V. Y. F. Tan and M. Motani, "Achievable Moderate Deviations Asymptotics for Streaming Compression of Correlated Sources," in IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3756-3780, 2018.
[19] L. Zhou, V. Y. F. Tan and M. Motani, "Second-Order and Moderate Deviations Asymptotics for Successive Refinement," in IEEE Transactions on Information Theory, vol. 63, no. 5, pp. 2896-2921, 2017.
[20] L. Zhou, V. Y. F. Tan and M. Motani, "Discrete Lossy Gray–Wyner Revisited: Second-Order Asymptotics, Large and Moderate Deviations," in IEEE Transactions on Information Theory, vol. 63, no. 3, pp. 1766-1791, 2017.
-專著:
[1] Lin Zhou and A. O. Hero, “Twenty Questions: From Parlor Games to Accurate Estimation”, Foundations and Trends in Communications and Information Theory, NOW Publisher, Volume: 22, No: 4, pp: 394–605, 2025.
[2] Lin Zhou and M. Motani, “Finite Blocklength Lossy Source Coding for Discrete Memoryless Sources”, Foundations and Trends in Communications and Information Theory, NOW Publisher, Volume: 20, No: 3, Pages: 157–389, 2023.
-教材:
[1] L. Zhou and L. Bai, “Low-Latency Communication: Theory and Applications”, Textbook, to appear in Springer, 2025/2026.
[2] 白琳, 王景璟, 周琳, 劉棟, 白桐, 王佳星. 通信網(wǎng)絡(luò)安全[M]. 北京: 清華大學(xué)出版社, 2025.
專利:
[1] 周琳,江浩林,吳壯飛. 一種低復(fù)雜度的逐步求精信源編碼方法:中國(guó),2024113236552[P]. 2024-09-23.
[2] 周琳,張瀠心,吳壯飛. 一種基于極化碼的多節(jié)點(diǎn)密鑰生成方法:中國(guó),2024111493010[P]. 2024-08-21.
[3] 周琳,賀英騏,徐金鵬. 一種基于反向信道功率控制的多用戶協(xié)作隱蔽通信方法:中國(guó),2024108425003[P]. 2024-06-27.
[4] 周琳,孫椿淞,袁偉杰,等. 一種基于問答式學(xué)習(xí)的時(shí)延多普勒域自適應(yīng)信道估計(jì)方法:中國(guó),2024104321467[P]. 2024-04-10.
[5] 周琳,孫椿淞,蘇陽(yáng),等. 一種基于隱私問答式學(xué)習(xí)的安全波束對(duì)準(zhǔn)算法:中國(guó),2023113958342[P]. 2023-10-26.
[6] 周琳,賀英騏,徐金鵬. 一種基于功率控制的短波隱蔽通信方法:中國(guó),2023115005454[P]. 2023-11-13.
[7] 周琳,湯辰,刁珺. 一種低復(fù)雜度的面向未知連續(xù)信源的兩階段異常檢測(cè)方法:中國(guó),2023112600956[P]. 2023-09-27.
[8] 周琳,江浩林,吳壯飛. 一種低復(fù)雜度的隱蔽通信編解碼方法:中國(guó),202311093155X[P]. 2023-08-29.
[9] 周琳,白琳,孫椿淞,等. 一種基于問答式學(xué)習(xí)的自適應(yīng)多波束對(duì)準(zhǔn)方法:中國(guó),2023109206812[P]. 2023-07-26.
[10] 周琳,白琳,孫椿淞,等. 一種基于短碼長(zhǎng)信息論的非自適應(yīng)性波束對(duì)準(zhǔn)方法:中國(guó),2022106831605[P]. 2022-06-16.
所獲榮譽(yù)
[1] 中國(guó)指揮與控制學(xué)會(huì)科技進(jìn)步一等獎(jiǎng)(2022年,排名3/15)
[2] 中國(guó)電子學(xué)會(huì)信息論分會(huì)青年新星
學(xué)術(shù)榮譽(yù)
2021.12,入選國(guó)家海外高層次人才計(jì)劃青年項(xiàng)目(QM)
2021.7,入選北航青年拔尖人才計(jì)劃
2019.12,入選北航卓越百人計(jì)劃
