研招网 > 江苏研招网 > 南京航空航天大学 > 导师介绍

南航计算机科学与技术学院导师介绍:夏正友

 


姓名: 夏正友 性 别: 男 行政职务 :  
专业技术职务: 副教授 办公电话: 导师类别: 硕士生导师  
最后学历: 博士毕业 最后学位: 博士 最后毕业学校: 复旦大学  
电子邮件: zhengyou_xia@nuaa.edu.cn      
工作单位: 计算机科学与技术学院      
主学科研究方向:
二级学科名称(主): 计算机科学与技术 (招收硕士研究生) 学科代码11: 081200
数据分析与挖掘:(1)Web数据分析与挖掘;(2)金融数据挖掘与分析
辅学科研究方向:
二级学科名称(辅): 软件工程 (招收硕士研究生) 学科代码: 083500
1)Web数据分析与挖掘;(
辅学科研究方向:
二级学科名称(辅): 安全科学与工程 (招收硕士研究生) 学科代码: 083700
2)金融数据挖掘与分析
个人简历(学历、学术经历及社会兼职):
在IEEE internet computing,Computer Standards & Interfaces ,Microprocessors and Microsystems,Advances in Engineering Software,ICGA journal,LNCS&AI和软件学报等国内外期刊和国际会议上发表22篇论文,其中被SCI检索15篇。曾任IEEE network,Computer Standards & Interfaces ,information Science,wireless network,Journal of Computer Science & Technology (JCST)等多家国际期刊审稿人。
发表学术论文,出版专著情况:
主要期刊论文
1. A last updating evolution model for online social networks,Physica A: Statistical Mechanics and its Applications http://dx.doi.org/10.1016/j.physa.2013.01.006 2013年出版,现在线.(SCI检索)
2. “Community detection based on a semantic network,” Knowledge-Based Systems., pp. 30-39, Vol. 26, February 2012. (SCI检索)
3. “A sock puppet detection algorithm on virtual spaces,” Knowledge-Based Systems, pp. 366-377, Vol. 37, January 2013。(SCI检索)
4. Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network, Knowledge-Based Systems, Elsevier, 2008Vol.21 (No.5), pp434-442. (SCI检索)
5. Extending RSVP for quality of security service, IEEE Internet Computing ,2006(2),March/April,pp51-57. (SCI检索)
6. DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network , Computer Standards & Interfaces , Elsevier, 2006,Vol.28,No.6,pp660-669. (SCI检索)
7. Using the Loopy Belief Propagation in Siguo, ICGA Journal 2007, 30(4),pp209-220. (SCI检索)
8. ChenLing Gu,The Role of Belief in the Emergence of Social Conventions in Artificial Social System, Advanced Materials Research, 2010,Vol.159,pp210-215. (EI检索)
9. A novel defense model for dynamic topology network based on mobile agent. Microprocessors and Microsystems, Elsevier Science, 2006,Vol.29, No.6, pp543-562. (SCI检索)
10. Autonomous trust construction in multi-agent systems- a graph theory methodology. Advances in Engineering Software, Elsevier Science, 2006,Vol.36, No.2, pp346-352. (SCI检索)
11. .需求装载代码协议的安全缺陷分析.2005,16(6),软件学报1175-1181. 6-15. (EI检索)
12. 主动网络安全结构模型设计(英文), 软件学报2002,13(8):1352-1361,8-15. (EI检索)
13. BBS在线复杂网络及其成员交互特性研究,复杂系统与复杂科学,2009,第6卷,第4期。
国际会议论文清单如下:
14. ,Cyber computing:from plant ecology to cyber ecology, 2013 International Conference on Computer Software, Data Handling and Applications, ShengYang,China.
15. “Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis,” Proceeding of 2012 International Conference on Web information Systems and Mining, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012.
16. ,“Segmentation of CAPTCHAs Based on Complex Networks,” Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012
17. A Link Analysis Model Based on Online Social Networks, WISM'11-AICI'11, Sep 24-25, 2011, Taiyuan
18. “Authentication of online authorship or article Based on hypothesis testing model,” Proceedings of 2011 IEEE International Conference on Computational Science and Engineering, pp. 3-8, Dalian, Liaoning, China, Aug. 24-26, 2011.
19. User Character and Communication Pattern Detecting on Social Network Site, International Conference on Engineering Computation,Mar-3,2009,pp1161-1166.
20. Measuring User Prestige and Interaction Preference on Social Network Site, Eigth IEEE/ACIS International Conference on Computer and Information Science,2009,pp876-880.
21. Emergence of Social Rumor Modeling, Analysis, and Simulations ,ICCS,2007, Lecture Notes in Computer Science.
22. Artificial life environment and information flow model. Cellular Automata. Lecture Notes in Computer Science, Vol. 3305, pp.650-659, Springer-Verlag Heidelberg. 2004-9-15.
23. A novel grid node by node security model. Grid and Cooperative Computing. Lecture Notes in Computer Science, Vol. 3251, pp.356-363, Springer-Verlag Heidelberg.
24. A novel policy and information flow security model for active network. Intelligence and Security Informatics. Lecture Notes in Computer Science, Vol. 3073, pp.42-55, Springer-Verlag Heidelberg.
25. An access control model for active network. The Ninth IEEE Symposium on Computers and Communication (ISCC2004), Alexander, Egypt, Jun 2004..
26. ,A Kind of network security behavior mode1 Based on game theory ,2003年8月,IEEE PDCAT.
27. , Evaluation Function for Siguo Game based on Two Attitudes, FSDK, Lecture Notes in Computer Science, 2006, 4223: 1322-1331.
28. Dynamic security service negotiation to ensure security for information sharing on the Internet. Intelligence and Security Informatics. Lecture Notes in Computer Science 3495: 640-641.
29. Analyze and Guess Type of Piece in the Computer Game Intelligent System, FSDK(2), Lecture Notes in Computer Science, 2005, 3614: 1174~1183.
 
科研成果获奖及专利:
专利项项,软件著作权1项
承担的科研项目情况:
承当国家和省部级项目各1项
指导研究生情况:

指导研究生18名
备注:

联系方式:QQ 79826274.

  *如果发现导师信息存在错误或者偏差,欢迎随时与我们联系,以便进行更新完善。联系方式>>

考研帮最新资讯更多

考研帮地方站

你可能会关心:

查看目标大学的更多信息

分数线、报录比、招生简章
一个都不能错过

× 关闭