南京航空航天大学计算机科学与技术学院导师介绍:夏正友的内容如下,更多考研资讯请关注我们考研派网站的更新!敬请收藏本站。或下载我们的考研派APP和考研派微信公众号(里面有非常多的免费考研资源可以领取哦)[南京航空航天大学自动化学院导师介绍汇总表(二] [南京航空航天大学自动化学院导师介绍汇总表(一] [南京航空航天大学航空宇航学院导师介绍:孙慧] [南京航空航天大学航空宇航学院导师介绍:冷小] [南京航空航天大学航天学院导师介绍:全荣辉] [南京航空航天大学航天学院导师介绍:方美华]
为你答疑,送资源
95%的同学还阅读了: [2022南京航空航天大学研究生招生目录] [南京航空航天大学研究生分数线[2013-2021]] [南京航空航天大学王牌专业排名] [南京航空航天大学考研难吗] [南京航空航天大学研究生院] [南京航空航天大学考研群] [南京航空航天大学研究生学费] 南京航空航天大学保研夏令营 南京航空航天大学考研调剂2022最新信息 [南京航空航天大学研究生辅导] [考研国家线[2006-2021]] [2022年考研时间:报名日期和考试时间]
南京航空航天大学计算机科学与技术学院导师介绍:夏正友正文
姓名: 夏正友 | 性 别: 男 | 行政职务 : | |||||||
专业技术职务: 副教授 | 办公电话: | 导师类别: 硕士生导师 | |||||||
最后学历: 博士毕业 | 最后学位: 博士 | 最后毕业学校: 复旦大学 | |||||||
电子邮件: zhengyou_xia@nuaa.edu.cn | |||||||||
工作单位: 计算机科学与技术学院 | |||||||||
◇ 主学科研究方向: | |||||||||
二级学科名称(主): 计算机科学与技术 (招收硕士研究生) | 学科代码11: 081200 | ||||||||
数据分析与挖掘:(1)Web数据分析与挖掘;(2)金融数据挖掘与分析 | |||||||||
|
|||||||||
|
|||||||||
◇ 个人简历(学历、学术经历及社会兼职): | |||||||||
在IEEE internet computing,Computer Standards & Interfaces ,Microprocessors and Microsystems,Advances in Engineering Software,ICGA journal,LNCS&AI和软件学报等国内外期刊和国际会议上发表22篇论文,其中被SCI检索15篇。曾任IEEE network,Computer Standards & Interfaces ,information Science,wireless network,Journal of Computer Science & Technology (JCST)等多家国际期刊审稿人。 | |||||||||
◇ 发表学术论文,出版专著情况: | |||||||||
主要期刊论文 1. A last updating evolution model for online social networks,Physica A: Statistical Mechanics and its Applications http://dx.doi.org/10.1016/j.physa.2013.01.006 2013年出版,现在线.(SCI检索) 2. “Community detection based on a semantic network,” Knowledge-Based Systems., pp. 30-39, Vol. 26, February 2012. (SCI检索) 3. “A sock puppet detection algorithm on virtual spaces,” Knowledge-Based Systems, pp. 366-377, Vol. 37, January 2013。(SCI检索) 4. Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network, Knowledge-Based Systems, Elsevier, 2008Vol.21 (No.5), pp434-442. (SCI检索) 5. Extending RSVP for quality of security service, IEEE Internet Computing ,2006(2),March/April,pp51-57. (SCI检索) 6. DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network , Computer Standards & Interfaces , Elsevier, 2006,Vol.28,No.6,pp660-669. (SCI检索) 7. Using the Loopy Belief Propagation in Siguo, ICGA Journal 2007, 30(4),pp209-220. (SCI检索) 8. ChenLing Gu,The Role of Belief in the Emergence of Social Conventions in Artificial Social System, Advanced Materials Research, 2010,Vol.159,pp210-215. (EI检索) 9. A novel defense model for dynamic topology network based on mobile agent. Microprocessors and Microsystems, Elsevier Science, 2006,Vol.29, No.6, pp543-562. (SCI检索) 10. Autonomous trust construction in multi-agent systems- a graph theory methodology. Advances in Engineering Software, Elsevier Science, 2006,Vol.36, No.2, pp346-352. (SCI检索) 11. .需求装载代码协议的安全缺陷分析.2005,16(6),软件学报1175-1181. 6-15. (EI检索) 12. 主动网络安全结构模型设计(英文), 软件学报2002,13(8):1352-1361,8-15. (EI检索) 13. BBS在线复杂网络及其成员交互特性研究,复杂系统与复杂科学,2009,第6卷,第4期。 国际会议论文清单如下: 14. ,Cyber computing:from plant ecology to cyber ecology, 2013 International Conference on Computer Software, Data Handling and Applications, ShengYang,China. 15. “Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis,” Proceeding of 2012 International Conference on Web information Systems and Mining, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012. 16. ,“Segmentation of CAPTCHAs Based on Complex Networks,” Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012 17. A Link Analysis Model Based on Online Social Networks, WISM'11-AICI'11, Sep 24-25, 2011, Taiyuan 18. “Authentication of online authorship or article Based on hypothesis testing model,” Proceedings of 2011 IEEE International Conference on Computational Science and Engineering, pp. 3-8, Dalian, Liaoning, China, Aug. 24-26, 2011. 19. User Character and Communication Pattern Detecting on Social Network Site, International Conference on Engineering Computation,Mar-3,2009,pp1161-1166. 20. Measuring User Prestige and Interaction Preference on Social Network Site, Eigth IEEE/ACIS International Conference on Computer and Information Science,2009,pp876-880. 21. Emergence of Social Rumor Modeling, Analysis, and Simulations ,ICCS,2007, Lecture Notes in Computer Science. 22. Artificial life environment and information flow model. Cellular Automata. Lecture Notes in Computer Science, Vol. 3305, pp.650-659, Springer-Verlag Heidelberg. 2004-9-15. 23. A novel grid node by node security model. Grid and Cooperative Computing. Lecture Notes in Computer Science, Vol. 3251, pp.356-363, Springer-Verlag Heidelberg. 24. A novel policy and information flow security model for active network. Intelligence and Security Informatics. Lecture Notes in Computer Science, Vol. 3073, pp.42-55, Springer-Verlag Heidelberg. 25. An access control model for active network. The Ninth IEEE Symposium on Computers and Communication (ISCC2004), Alexander, Egypt, Jun 2004.. 26. ,A Kind of network security behavior mode1 Based on game theory ,2003年8月,IEEE PDCAT. 27. , Evaluation Function for Siguo Game based on Two Attitudes, FSDK, Lecture Notes in Computer Science, 2006, 4223: 1322-1331. 28. Dynamic security service negotiation to ensure security for information sharing on the Internet. Intelligence and Security Informatics. Lecture Notes in Computer Science 3495: 640-641. 29. Analyze and Guess Type of Piece in the Computer Game Intelligent System, FSDK(2), Lecture Notes in Computer Science, 2005, 3614: 1174~1183. |
|||||||||
◇ 科研成果获奖及专利: | |||||||||
专利项项,软件著作权1项 | |||||||||
◇ 承担的科研项目情况: | |||||||||
承当国家和省部级项目各1项 | |||||||||
◇ 指导研究生情况: | |||||||||
指导研究生18名 |
|||||||||
◇ 备注: | |||||||||
联系方式:QQ 79826274. |
*如果发现导师信息存在错误或者偏差,欢迎随时与我们联系,以便进行更新完善。联系方式>>
添加南京航空航天大学学姐微信,或微信搜索公众号“考研派之家”,关注【考研派之家】微信公众号,在考研派之家微信号输入【南京航空航天大学考研分数线、南京航空航天大学报录比、南京航空航天大学考研群、南京航空航天大学学姐微信、南京航空航天大学考研真题、南京航空航天大学专业目录、南京航空航天大学排名、南京航空航天大学保研、南京航空航天大学公众号、南京航空航天大学研究生招生)】即可在手机上查看相对应南京航空航天大学考研信息或资源。
本文来源:http://m.okaoyan.com/nanjinghangkonghangtian/daoshi_474045.html