周从华
近期热点
资料介绍
个人简历
周从华,男,1978年生,江苏盐城人,博士,教授,江苏省333工程人才,江苏省六大高峰人才,江苏省双创博士,镇江市金山英才,镇江市优秀创新创业人才,江苏大学京口区新一代信息技术产业研究院院长,江苏大学青年学术带头人。2011.07-2011.12,德国锡根大学访问学者,2014.08-2015.07新加坡南洋理工大学计算机工程学院访问学者。主要研究领域包括:大数据分析技术、数据与系统安全、物联网、模型检测。主持完成国家自然科学基金中德合作交流项目一项,国家自然科学基金青年基金一项,江苏省自然科学基金一项。其他成果[1]发明专利:一种基于系统操作指南的隐通道搜索方法[2]发明专利:一种基于航拍图的简易数字地图制作方法[3]软件系统:扬中市民情E通(已上线)[4]软件系统:突发公共卫生事件现场调查处置系统(已产业化)研究领域
人工智能、大数据分析与应用近期论文
[1]周从华,随机模型检测理论与应用,科学出版社,2014.[2]周从华,邢支虎,刘志锋,王昌达,马尔可夫决策过程的限界模型检测,计算机学报,2013,36(12):2587-2600.[3]ShunrongJiang,JiapengZhang,JingJunMiao,andConghuaZhou,APrivacy-PreservingReauthenticationSchemeforMobileWirelessSensorNetworks.InternationalJournalofDistributedSensorNetworks.Volume2013(2013),ArticleID913782,8pages.[4]ZhifengLiu,ConghuaZhou,YunGeandDongZhang,AlgorithmicVerificationofIntransitiveNoninterferencefor3-domainSecurityPolicieswithaSATSolver,AppliedMathematics&InformationSciences.2013,7(5):1825-1835.[5]刘志锋,孙博,周从华,概率实时时态认知逻辑模型检测中抽象技术的研究,电子学报,2013,41(7):1343-1351.[6]ZHOUConghua,CAOMeiling,AnalysisofFastandSecureProtocolBasedonContinuous-TimeMarkovChain,Chinacommunications,2013,10(8):137-149.[7]周从华,吴海玲,鞠时光.广义不可推断属性符号化算术验证的研究,计算机研究与发展.2012,49(12):2591-2602.[8]周从华,孙博,刘志锋,葛云.概率时态认知逻辑模型检测中三值抽象技术的研究.电子学报,2012,40(10):2052-2061.[9]周从华,叶萌,王昌达,刘志锋,多智体系统中约简状态空间的限界模型检测算法,软件学报,2012,23(11):2835−2861.[10]周从华,鞠时光,一种基于Petri网的隐蔽信息流分析方法,计算机学报,2012,35(8):1688-1699.[11]周从华,刘志锋,王昌达,概率计算树逻辑的限界模型检测,软件学报,2012,23(7):1656-1668.[12]ConghuaZhou,BoSun,AbstractioninModelCheckingReal-TimeTemporalLogicofKnowledge.JournalofComputers.2012,7(2):362-370.[13]周从华,刘志锋,吴海玲,陈松,鞠时光,非传递广义无干扰属性符号化算术验证的研究,中国科学:信息科学,2011,41(11):1310-1327.[14]ConghuaZhou,MeilingCao,MengYe,ZhihaoQian,SAT-basedAlgorithmicVerificationofNoninterference,JournalofComputers.2011,6(11):2310-2320.[15]ConghuaZhou,BoSun,ZhifengLiu,AbstractionforModelCheckingMulti-agentSystems,FrontiersofComputerScienceinChina,2011,5(1):14-25.[16]周从华,刘志锋,吴海玲,陈松,面向无传递性安全策略的语法信息流分析方法,计算机科学与探索,2011,5(2):179-192.[17]ShiguangJu,ConghuaZhou,ZhifengLiu,ChangdaWang,XiangmeiSong,InferenceChannelIdentificationwithModelChecking,Journalofcomputationalinformationsystem,2011,7(3):1001-1012.[18]ConghuaZhou,SongChen,MinchaoWang,HaiyangLi,ZhihaoQian,StructureReductionforVerifyingNoninterferenceproperties,JournalofInformation&ComputationalScience,2011,8(3):446-454[19]吴海玲,周从华,鞠时光,前向可修正属性算术验证的研究,计算机科学2011,38(3):97-102.[20]陈松,周从华,鞠时光,王基,基于Petri网的信息流安全属性的分析与验证,计算机应用研究,2010,27(12):4638-4642.[21]周从华,一种基于满足性判定的并发软件验证策略,软件学报,2009,20(6):1414-1424.[22]ConghuaZhou,LiChen,ShiguangJu,PetriNetsbasedNoninterferenceAnalysis,JournalofComputationalInformationSystems,2009,5(4):1231-1240.[23]ConghuaZhou,SymbolicAlgorithmicVerificationofGeneralizedNoninterference,WSEASTransactionsoncomputers,2009,8(6):976-987.[24]王昌达,鞠时光,周从华,宋香梅,一种隐通道威胁审计的度量方法,计算机学报,2009,32(4):751-762.[25]陈立,鞠时光,周从华,房芳,张翼,基于信息熵的隐通道能力分析,计算机应用研究,2009,25(8):3015-3018.[26]周从华,陈振宇,鞠时光,基于SAT的软件验证,计算机研究与发展,2008,45(s1):124-130.[27]陈振宇,徐宝文,周从华,一种基于消解的变量极小不可满足子公式的提取方法,计算机研究与发展,2008,45(s1):43-47.[28]周从华,刘志锋,基于Petri网的工作流模型简化,计算机科学,2008,35(2):115-119.[29]ConghuaZhou,SAT-basedBoundedModelCheckingforSE-CTL,WSEASTransactionsonComputers,2007,6(9):1057-1064.[30]ZhihongTao,ConghuaZhou,ZhongChen,LifuWang,BoundedmodelcheckingofCTL.JournalofComputerScienceandTechnology,2007,22(1):39-43.[31]周从华,刘志锋,具有过去时态算子的计算树逻辑模型检测,计算机工程,2007,33(22):98-100.[32]周从华,陶志红,陈钟,王立福,基于时态逻辑的工作流分析,计算机科学,2007,34(11):118-123.[33]ConghuaZhou,ZhihongTao,DechengDing,LifuWang,Boundedmodelcheckingforbranching-timetemporallogic.ChineseJournalofElectronics,2006,15(4):675-678.[34]ZhihongTao,ConghuaZhou,HansKleineBuning,LifuWang,SAT-BasedVerificationofBoundedPetriNets,ChineseJournalofElectronics,2006,15(4):567-572.[35]ConghuaZhou,ZhenyuChen.ModelCheckingWorkflowNetbasedonPetriNet.WuhanUniversityJournalofNaturalsciences.2006,11(5):1297-1301.会议论文[1]ConghuaZhou,YongWang,MeilingCao,JianqiShi,YangLiu,FormalAnalysisofMACinIEEE802.11pwithProbabilisticModelChecking.2015InternationalSymposiumonTheoreticalAspectsofSoftwareEngineering(TASE),Pages:55-62.[2]ConghuaZhou,BoSun,ZhifengLiu,AbstractionforModelCheckingtheProbabilisticTemporalLogicofKnowledge,LectureNotesinArtificialIntelligence,2010,6319:209-221.[3]SongChen,ConghuaZhou,ShiguangJu,AnalysisforthecompositionofinformationflowsecuritypropertiesonPetrinet,The2ndInternationalConferenceonInformationScienceandEngineering,2010:1859-1863.[4]ConghuaZhou,LiChen,ShiguangJu,ZhifengLiu,StateSpaceReductionforVerifyingNoninterference,TheThirdIEEEInternationalConferenceOnSecureSoftwareIntegrationandReliabilityImprovement,2009,pages:132-140.[5]HailingWu,QingjieXie,ConghuaZhou,EstablishingFingerprintPollutionSourceIdentificationSystemoftheAccidentalWaterPollutionEmergencyBasedonMapInfo,Proceedingsofthe2009FirstIEEEInternationalConferenceonInformationScienceandEngineeringtableofcontentsPages:2051-2054.[6]LiChen,ShiguangJu,ConghuaZhou,YiZhang,Covertchannelcapacityanalysisbasedonentropy,2008InternationalSymposiumonInformationScienceandEngineering,ISISE2008,v1,p363-367.[7]ConghuaZhou,ZhenyuChen,ZhihongTao,QBF-BasedSymbolicModelCheckingforKnowledgeandTime.InProc.ofInternationalConferenceonTheoryandApplicationsofModelsofComputation(TAMC07),LNCS,4484,386-397.[8]ConghuaZhou,ShiguangJu,SAT-basedBoundedModelCheckingforSE-LTL,InProc.Ofthe8thInternationalConferenceonSoftwareEngineering,ArtificialIntelligence,NetworkingandParallel/DistributedComputing,2007,pages:582-587.[9]ConghuaZhou,Acompositionalsymbolicverificationframeworkforconcurrentsoftware,Proceedingsofthe2ndinternationalconferenceonScalableinformationsystems,2007.[10]ConghuaZhou,DechengDing,ImprovedSAT-basedBoundedModelChecking.InProc.ofInternationalConferenceonTheoryandApplicationsofModelsofComputation(TAMC06),LNCS,3959,611-620.[11]ZhenyuChen,ConghuaZhou,andDechengDing.Automaticabstractionrefinementforpetrinetsverification.InProc.ofthe10thIEEEInternationalHigh-LevelDesignValidationandTestWorkshop,pages168-174,2005.标签: 江苏大学 计算机科学与通信工程学院
相关热点
最新收录
- 椛岛光 06-01
- 星乃梦奈(ほしの ゆな 06-01
- 沖田奈奈 沖田奈々(Nana 06-01
- 藤仁依那 藤にいな(Niina 06-01
- 矢田步美 矢田あゆみ(Ay 06-01
- 妹岳夏目 妹岳なつめ(Na 06-01
- 麻仓香穗里 麻仓かほり 06-01
- 立花广美 (立花ひろみ H 05-31
- 里中瑞穗(里中みずほ Mi 05-31
- 结月莉亚(結月りあ) 05-31