热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
周从华
2023-05-11 08:35
  • 周从华
  • 周从华 - 教授 博士-江苏大学-计算机科学与通信工程学院-个人资料

近期热点

资料介绍

个人简历


周从华,男,1978年生,江苏盐城人,博士,教授,江苏省333工程人才,江苏省六大高峰人才,江苏省双创博士,镇江市金山英才,镇江市优秀创新创业人才,江苏大学京口区新一代信息技术产业研究院院长,江苏大学青年学术带头人。2011.07-2011.12,德国锡根大学访问学者,2014.08-2015.07新加坡南洋理工大学计算机工程学院访问学者。主要研究领域包括:大数据分析技术、数据与系统安全、物联网、模型检测。主持完成国家自然科学基金中德合作交流项目一项,国家自然科学基金青年基金一项,江苏省自然科学基金一项。
其他成果
[1]发明专利:一种基于系统操作指南的隐通道搜索方法
[2]发明专利:一种基于航拍图的简易数字地图制作方法
[3]软件系统:扬中市民情E通(已上线)
[4]软件系统:突发公共卫生事件现场调查处置系统(已产业化)

研究领域


人工智能、大数据分析与应用

近期论文


[1]周从华,随机模型检测理论与应用,科学出版社,2014.
[2]周从华,邢支虎,刘志锋,王昌达,马尔可夫决策过程的限界模型检测,计算机学报,2013,36(12):2587-2600.
[3]ShunrongJiang,JiapengZhang,JingJunMiao,andConghuaZhou,APrivacy-PreservingReauthenticationSchemeforMobileWirelessSensorNetworks.InternationalJournalofDistributedSensorNetworks.Volume2013(2013),ArticleID913782,8pages.
[4]ZhifengLiu,ConghuaZhou,YunGeandDongZhang,AlgorithmicVerificationofIntransitiveNoninterferencefor3-domainSecurityPolicieswithaSATSolver,AppliedMathematics&InformationSciences.2013,7(5):1825-1835.
[5]刘志锋,孙博,周从华,概率实时时态认知逻辑模型检测中抽象技术的研究,电子学报,2013,41(7):1343-1351.
[6]ZHOUConghua,CAOMeiling,AnalysisofFastandSecureProtocolBasedonContinuous-TimeMarkovChain,Chinacommunications,2013,10(8):137-149.
[7]周从华,吴海玲,鞠时光.广义不可推断属性符号化算术验证的研究,计算机研究与发展.2012,49(12):2591-2602.
[8]周从华,孙博,刘志锋,葛云.概率时态认知逻辑模型检测中三值抽象技术的研究.电子学报,2012,40(10):2052-2061.
[9]周从华,叶萌,王昌达,刘志锋,多智体系统中约简状态空间的限界模型检测算法,软件学报,2012,23(11):2835−2861.
[10]周从华,鞠时光,一种基于Petri网的隐蔽信息流分析方法,计算机学报,2012,35(8):1688-1699.
[11]周从华,刘志锋,王昌达,概率计算树逻辑的限界模型检测,软件学报,2012,23(7):1656-1668.
[12]ConghuaZhou,BoSun,AbstractioninModelCheckingReal-TimeTemporalLogicofKnowledge.JournalofComputers.2012,7(2):362-370.
[13]周从华,刘志锋,吴海玲,陈松,鞠时光,非传递广义无干扰属性符号化算术验证的研究,中国科学:信息科学,2011,41(11):1310-1327.
[14]ConghuaZhou,MeilingCao,MengYe,ZhihaoQian,SAT-basedAlgorithmicVerificationofNoninterference,JournalofComputers.2011,6(11):2310-2320.
[15]ConghuaZhou,BoSun,ZhifengLiu,AbstractionforModelCheckingMulti-agentSystems,FrontiersofComputerScienceinChina,2011,5(1):14-25.
[16]周从华,刘志锋,吴海玲,陈松,面向无传递性安全策略的语法信息流分析方法,计算机科学与探索,2011,5(2):179-192.
[17]ShiguangJu,ConghuaZhou,ZhifengLiu,ChangdaWang,XiangmeiSong,InferenceChannelIdentificationwithModelChecking,Journalofcomputationalinformationsystem,2011,7(3):1001-1012.
[18]ConghuaZhou,SongChen,MinchaoWang,HaiyangLi,ZhihaoQian,StructureReductionforVerifyingNoninterferenceproperties,JournalofInformation&ComputationalScience,2011,8(3):446-454
[19]吴海玲,周从华,鞠时光,前向可修正属性算术验证的研究,计算机科学2011,38(3):97-102.
[20]陈松,周从华,鞠时光,王基,基于Petri网的信息流安全属性的分析与验证,计算机应用研究,2010,27(12):4638-4642.
[21]周从华,一种基于满足性判定的并发软件验证策略,软件学报,2009,20(6):1414-1424.
[22]ConghuaZhou,LiChen,ShiguangJu,PetriNetsbasedNoninterferenceAnalysis,JournalofComputationalInformationSystems,2009,5(4):1231-1240.
[23]ConghuaZhou,SymbolicAlgorithmicVerificationofGeneralizedNoninterference,WSEASTransactionsoncomputers,2009,8(6):976-987.
[24]王昌达,鞠时光,周从华,宋香梅,一种隐通道威胁审计的度量方法,计算机学报,2009,32(4):751-762.
[25]陈立,鞠时光,周从华,房芳,张翼,基于信息熵的隐通道能力分析,计算机应用研究,2009,25(8):3015-3018.
[26]周从华,陈振宇,鞠时光,基于SAT的软件验证,计算机研究与发展,2008,45(s1):124-130.
[27]陈振宇,徐宝文,周从华,一种基于消解的变量极小不可满足子公式的提取方法,计算机研究与发展,2008,45(s1):43-47.
[28]周从华,刘志锋,基于Petri网的工作流模型简化,计算机科学,2008,35(2):115-119.
[29]ConghuaZhou,SAT-basedBoundedModelCheckingforSE-CTL,WSEASTransactionsonComputers,2007,6(9):1057-1064.
[30]ZhihongTao,ConghuaZhou,ZhongChen,LifuWang,BoundedmodelcheckingofCTL.JournalofComputerScienceandTechnology,2007,22(1):39-43.
[31]周从华,刘志锋,具有过去时态算子的计算树逻辑模型检测,计算机工程,2007,33(22):98-100.
[32]周从华,陶志红,陈钟,王立福,基于时态逻辑的工作流分析,计算机科学,2007,34(11):118-123.
[33]ConghuaZhou,ZhihongTao,DechengDing,LifuWang,Boundedmodelcheckingforbranching-timetemporallogic.ChineseJournalofElectronics,2006,15(4):675-678.
[34]ZhihongTao,ConghuaZhou,HansKleineBuning,LifuWang,SAT-BasedVerificationofBoundedPetriNets,ChineseJournalofElectronics,2006,15(4):567-572.
[35]ConghuaZhou,ZhenyuChen.ModelCheckingWorkflowNetbasedonPetriNet.WuhanUniversityJournalofNaturalsciences.2006,11(5):
1297-1301.
会议论文
[1]ConghuaZhou,YongWang,MeilingCao,JianqiShi,YangLiu,FormalAnalysisofMACinIEEE802.11pwithProbabilisticModelChecking.2015InternationalSymposiumonTheoreticalAspectsofSoftwareEngineering(TASE),Pages:55-62.
[2]ConghuaZhou,BoSun,ZhifengLiu,AbstractionforModelCheckingtheProbabilisticTemporalLogicofKnowledge,LectureNotesinArtificialIntelligence,2010,6319:209-221.
[3]SongChen,ConghuaZhou,ShiguangJu,AnalysisforthecompositionofinformationflowsecuritypropertiesonPetrinet,The2ndInternationalConferenceonInformationScienceandEngineering,2010:1859-1863.
[4]ConghuaZhou,LiChen,ShiguangJu,ZhifengLiu,StateSpaceReductionforVerifyingNoninterference,TheThirdIEEEInternationalConferenceOnSecureSoftwareIntegrationandReliabilityImprovement,2009,pages:132-140.
[5]HailingWu,QingjieXie,ConghuaZhou,EstablishingFingerprintPollutionSourceIdentificationSystemoftheAccidentalWaterPollutionEmergencyBasedonMapInfo,Proceedingsofthe2009FirstIEEEInternationalConferenceonInformationScienceandEngineeringtableofcontentsPages:2051-2054.
[6]LiChen,ShiguangJu,ConghuaZhou,YiZhang,Covertchannelcapacityanalysisbasedonentropy,2008InternationalSymposiumonInformationScienceandEngineering,ISISE2008,v1,p363-367.
[7]ConghuaZhou,ZhenyuChen,ZhihongTao,QBF-BasedSymbolicModelCheckingforKnowledgeandTime.InProc.ofInternationalConferenceonTheoryandApplicationsofModelsofComputation(TAMC07),LNCS,4484,386-397.
[8]ConghuaZhou,ShiguangJu,SAT-basedBoundedModelCheckingforSE-LTL,InProc.Ofthe8thInternationalConferenceonSoftwareEngineering,ArtificialIntelligence,NetworkingandParallel/DistributedComputing,2007,pages:582-587.
[9]ConghuaZhou,Acompositionalsymbolicverificationframeworkforconcurrentsoftware,Proceedingsofthe2ndinternationalconferenceonScalableinformationsystems,2007.
[10]ConghuaZhou,DechengDing,ImprovedSAT-basedBoundedModelChecking.InProc.ofInternationalConferenceonTheoryandApplicationsofModelsofComputation(TAMC06),LNCS,3959,611-620.
[11]ZhenyuChen,ConghuaZhou,andDechengDing.Automaticabstractionrefinementforpetrinetsverification.InProc.ofthe10thIEEEInternationalHigh-LevelDesignValidationandTestWorkshop,pages168-174,2005.

相关热点

扫码添加好友