南京航空航天大學計算機科學與技術(shù)學院導師:夏正友

發(fā)布時間:2021-10-05 編輯:考研派小莉 推薦訪問:
南京航空航天大學計算機科學與技術(shù)學院導師:夏正友

南京航空航天大學計算機科學與技術(shù)學院導師:夏正友內(nèi)容如下,更多考研資訊請關(guān)注我們網(wǎng)站的更新!敬請收藏本站,或下載我們的考研派APP和考研派微信公眾號(里面有非常多的免費考研資源可以領(lǐng)取,有各種考研問題,也可直接加我們網(wǎng)站上的研究生學姐微信,全程免費答疑,助各位考研一臂之力,爭取早日考上理想中的研究生院校。)

南京航空航天大學計算機科學與技術(shù)學院導師:夏正友 正文

 


姓名: 夏正友 性 別: 男 行政職務 :  
專業(yè)技術(shù)職務: 副教授 辦公電話: 導師類別: 碩士生導師  
最后學歷: 博士畢業(yè) 最后學位: 博士 最后畢業(yè)學校: 復旦大學  
電子郵件: zhengyou_xia@nuaa.edu.cn      
工作單位: 計算機科學與技術(shù)學院      
主學科研究方向:
二級學科名稱(主): 計算機科學與技術(shù) (招收碩士研究生) 學科代碼11: 081200
數(shù)據(jù)分析與挖掘:(1)Web數(shù)據(jù)分析與挖掘;(2)金融數(shù)據(jù)挖掘與分析
輔學科研究方向:
二級學科名稱(輔): 軟件工程 (招收碩士研究生) 學科代碼: 083500
1)Web數(shù)據(jù)分析與挖掘;(
輔學科研究方向:
二級學科名稱(輔): 安全科學與工程 (招收碩士研究生) 學科代碼: 083700
2)金融數(shù)據(jù)挖掘與分析
個人簡歷(學歷、學術(shù)經(jīng)歷及社會兼職):
在IEEE internet computing,Computer Standards & Interfaces ,Microprocessors and Microsystems,Advances in Engineering Software,ICGA journal,LNCS&AI和軟件學報等國內(nèi)外期刊和國際會議上發(fā)表22篇論文,其中被SCI檢索15篇。曾任IEEE network,Computer Standards & Interfaces ,information Science,wireless network,Journal of Computer Science & Technology (JCST)等多家國際期刊審稿人。
發(fā)表學術(shù)論文,出版專著情況:
主要期刊論文
1. A last updating evolution model for online social networks,Physica A: Statistical Mechanics and its Applications http://dx.doi.org/10.1016/j.physa.2013.01.006 2013年出版,現(xiàn)在線.(SCI檢索)
2. “Community detection based on a semantic network,” Knowledge-Based Systems., pp. 30-39, Vol. 26, February 2012. (SCI檢索)
3. “A sock puppet detection algorithm on virtual spaces,” Knowledge-Based Systems, pp. 366-377, Vol. 37, January 2013。(SCI檢索)
4. Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network, Knowledge-Based Systems, Elsevier, 2008Vol.21 (No.5), pp434-442. (SCI檢索)
5. Extending RSVP for quality of security service, IEEE Internet Computing ,2006(2),March/April,pp51-57. (SCI檢索)
6. DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network , Computer Standards & Interfaces , Elsevier, 2006,Vol.28,No.6,pp660-669. (SCI檢索)
7. Using the Loopy Belief Propagation in Siguo, ICGA Journal 2007, 30(4),pp209-220. (SCI檢索)
8. ChenLing Gu,The Role of Belief in the Emergence of Social Conventions in Artificial Social System, Advanced Materials Research, 2010,Vol.159,pp210-215. (EI檢索)
9. A novel defense model for dynamic topology network based on mobile agent. Microprocessors and Microsystems, Elsevier Science, 2006,Vol.29, No.6, pp543-562. (SCI檢索)
10. Autonomous trust construction in multi-agent systems- a graph theory methodology. Advances in Engineering Software, Elsevier Science, 2006,Vol.36, No.2, pp346-352. (SCI檢索)
11. .需求裝載代碼協(xié)議的安全缺陷分析.2005,16(6),軟件學報1175-1181. 6-15. (EI檢索)
12. 主動網(wǎng)絡(luò)安全結(jié)構(gòu)模型設(shè)計(英文), 軟件學報2002,13(8):1352-1361,8-15. (EI檢索)
13. BBS在線復雜網(wǎng)絡(luò)及其成員交互特性研究,復雜系統(tǒng)與復雜科學,2009,第6卷,第4期。
國際會議論文清單如下:
14. ,Cyber computing:from plant ecology to cyber ecology, 2013 International Conference on Computer Software, Data Handling and Applications, ShengYang,China.
15. “Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis,” Proceeding of 2012 International Conference on Web information Systems and Mining, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012.
16. ,“Segmentation of CAPTCHAs Based on Complex Networks,” Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012
17. A Link Analysis Model Based on Online Social Networks, WISM'11-AICI'11, Sep 24-25, 2011, Taiyuan
18. “Authentication of online authorship or article Based on hypothesis testing model,” Proceedings of 2011 IEEE International Conference on Computational Science and Engineering, pp. 3-8, Dalian, Liaoning, China, Aug. 24-26, 2011.
19. User Character and Communication Pattern Detecting on Social Network Site, International Conference on Engineering Computation,Mar-3,2009,pp1161-1166.
20. Measuring User Prestige and Interaction Preference on Social Network Site, Eigth IEEE/ACIS International Conference on Computer and Information Science,2009,pp876-880.
21. Emergence of Social Rumor Modeling, Analysis, and Simulations ,ICCS,2007, Lecture Notes in Computer Science.
22. Artificial life environment and information flow model. Cellular Automata. Lecture Notes in Computer Science, Vol. 3305, pp.650-659, Springer-Verlag Heidelberg. 2004-9-15.
23. A novel grid node by node security model. Grid and Cooperative Computing. Lecture Notes in Computer Science, Vol. 3251, pp.356-363, Springer-Verlag Heidelberg.
24. A novel policy and information flow security model for active network. Intelligence and Security Informatics. Lecture Notes in Computer Science, Vol. 3073, pp.42-55, Springer-Verlag Heidelberg.
25. An access control model for active network. The Ninth IEEE Symposium on Computers and Communication (ISCC2004), Alexander, Egypt, Jun 2004..
26. ,A Kind of network security behavior mode1 Based on game theory ,2003年8月,IEEE PDCAT.
27. , Evaluation Function for Siguo Game based on Two Attitudes, FSDK, Lecture Notes in Computer Science, 2006, 4223: 1322-1331.
28. Dynamic security service negotiation to ensure security for information sharing on the Internet. Intelligence and Security Informatics. Lecture Notes in Computer Science 3495: 640-641.
29. Analyze and Guess Type of Piece in the Computer Game Intelligent System, FSDK(2), Lecture Notes in Computer Science, 2005, 3614: 1174~1183.
 
科研成果獲獎及專利:
專利項項,軟件著作權(quán)1項
承擔的科研項目情況:
承當國家和省部級項目各1項
指導研究生情況:

指導研究生18名
備注:

聯(lián)系方式:QQ 79826274.

  *如果發(fā)現(xiàn)導師信息存在錯誤或者偏差,歡迎隨時與我們聯(lián)系,以便進行更新完善。聯(lián)系方式>>

以上老師的信息來源于學校網(wǎng)站,如有更新或錯誤,請聯(lián)系我們進行更新或刪除,聯(lián)系方式

添加南京航空航天大學學姐微信,或微信搜索公眾號“考研派小站”,關(guān)注[考研派小站]微信公眾號,在考研派小站微信號輸入[南京航空航天大學考研分數(shù)線、南京航空航天大學報錄比、南京航空航天大學考研群、南京航空航天大學學姐微信、南京航空航天大學考研真題、南京航空航天大學專業(yè)目錄、南京航空航天大學排名、南京航空航天大學保研、南京航空航天大學公眾號、南京航空航天大學研究生招生)]即可在手機上查看相對應南京航空航天大學考研信息或資源。

南京航空航天大學考研公眾號 考研派小站公眾號
南京航空航天大學

本文來源:http://zgxindalu.cn/nanjinghangkonghangtian/daoshi_474045.html

推薦閱讀