<div class> <p> </p> <br/> <table width> <tbody> <tr> <td width> 姓名: 夏正友</td> <td width> 性 别: 男</td> <td> 行政职务 :</td> <td width> </td> </tr> <tr> <td width> 专业技术职务: 副教授</td> <td> 办公电话:</td> <td> 导师类别: 硕士生导师</td> <td width> </td> </tr> <tr> <td width> 最后学历: 博士毕业</td> <td> 最后学位: 博士</td> <td> 最后毕业学校: 复旦大学</td> <td width> </td> </tr> <tr> <td width> 电子邮件: zhengyou_xia@nuaa.edu.cn</td> <td> </td> <td> </td> <td width> </td> </tr> <tr> <td width> 工作单位: 计算机科学与技术学院</td> <td> </td> <td> </td> <td width> </td> </tr> <tr> <td colspan> ◇ </strong>主学科研究方向: </strong></td> </tr> <tr> <td colspan width> 二级学科名称(主): 计算机科学与技术 (招收硕士研究生)</td> <td colspan> 学科代码11: 081200</td> </tr> <tr> <td colspan valign> 数据分析与挖掘:(1)Web数据分析与挖掘;(2)金融数据挖掘与分析</td> </tr> <tr> <td colspan width> <table border cellpadding width> <tbody> <tr> <td colspan width> ◇ </strong>辅学科研究方向: </strong></td> </tr> <tr> <td width> 二级学科名称(辅): 软件工程 (招收硕士研究生)</td> <td width> 学科代码: 083500</td> </tr> <tr> <td colspan valign width> 1)Web数据分析与挖掘;(</td> </tr> </tbody> </table> </td> </tr> <tr> <td colspan width> <table border cellpadding width> <tbody> <tr> <td colspan width> ◇ </strong>辅学科研究方向: </strong></td> </tr> <tr> <td width> 二级学科名称(辅): 安全科学与工程 (招收硕士研究生)</td> <td width> 学科代码: 083700</td> </tr> <tr> <td colspan valign width> 2)金融数据挖掘与分析</td> </tr> </tbody> </table> </td> </tr> <tr> <td colspan> ◇ </strong>个人简历(学历、学术经历及社会兼职): </strong></td> </tr> <tr> <td colspan valign> 在IEEE internet computing,Computer Standards & Interfaces ,Microprocessors and Microsystems,Advances in Engineering Software,ICGA journal,LNCS&AI和软件学报等国内外期刊和国际会议上发表22篇论文,其中被SCI检索15篇。曾任IEEE network,Computer Standards & Interfaces ,information Science,wireless network,Journal of Computer Science & Technology (JCST)等多家国际期刊审稿人。</td> </tr> <tr> <td colspan> ◇ </strong>发表学术论文,</strong>出版专著情况: </strong></td> </tr> <tr> <td colspan valign> 主要期刊论文<br/> 1. A last updating evolution model for online social networks,Physica A: Statistical Mechanics and its Applications http://dx.doi.org/10.1016/j.physa.2013.01.006 2013年出版,现在线.(SCI检索)<br/> 2. “Community detection based on a semantic network,” Knowledge-Based Systems., pp. 30-39, Vol. 26, February 2012. (SCI检索)<br/> 3. “A sock puppet detection algorithm on virtual spaces,” Knowledge-Based Systems, pp. 366-377, Vol. 37, January 2013。(SCI检索)<br/> 4. Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network, Knowledge-Based Systems, Elsevier, 2008Vol.21 (No.5), pp434-442. (SCI检索)<br/> 5. Extending RSVP for quality of security service, IEEE Internet Computing ,2006(2),March/April,pp51-57. (SCI检索)<br/> 6. DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network , Computer Standards & Interfaces , Elsevier, 2006,Vol.28,No.6,pp660-669. (SCI检索)<br/> 7. Using the Loopy Belief Propagation in Siguo, ICGA Journal 2007, 30(4),pp209-220. (SCI检索)<br/> 8. ChenLing Gu,The Role of Belief in the Emergence of Social Conventions in Artificial Social System, Advanced Materials Research, 2010,Vol.159,pp210-215. (EI检索)<br/> 9. A novel defense model for dynamic topology network based on mobile agent. Microprocessors and Microsystems, Elsevier Science, 2006,Vol.29, No.6, pp543-562. (SCI检索)<br/> 10. Autonomous trust construction in multi-agent systems- a graph theory methodology. Advances in Engineering Software, Elsevier Science, 2006,Vol.36, No.2, pp346-352. (SCI检索)<br/> 11. .需求装载代码协议的安全缺陷分析.2005,16(6),软件学报1175-1181. 6-15. (EI检索)<br/> 12. 主动网络安全结构模型设计(英文), 软件学报2002,13(8):1352-1361,8-15. (EI检索)<br/> 13. BBS在线复杂网络及其成员交互特性研究,复杂系统与复杂科学,2009,第6卷,第4期。<br/> 国际会议论文清单如下:<br/> 14. ,Cyber computing:from plant ecology to cyber ecology, 2013 International Conference on Computer Software, Data Handling and Applications, ShengYang,China.<br/> 15. “Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis,” Proceeding of 2012 International Conference on Web information Systems and Mining, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012.<br/> 16. ,“Segmentation of CAPTCHAs Based on Complex Networks,” Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012<br/> 17. A Link Analysis Model Based on Online Social Networks, WISM11, Sep 24-25, 2011, Taiyuan<br/> 18. “Authentication of online authorship or article Based on hypothesis testing model,” Proceedings of 2011 IEEE International Conference on Computational Science and Engineering, pp. 3-8, Dalian, Liaoning, China, Aug. 24-26, 2011.<br/> 19. User Character and Communication Pattern Detecting on Social Network Site, International Conference on Engineering Computation,Mar-3,2009,pp1161-1166.<br/> 20. Measuring User Prestige and Interaction Preference on Social Network Site, Eigth IEEE/ACIS International Conference on Computer and Information Science,2009,pp876-880.<br/> 21. Emergence of Social Rumor Modeling, Analysis, and Simulations ,ICCS,2007, Lecture Notes in Computer Science.<br/> 22. Artificial life environment and information flow model. Cellular Automata. Lecture Notes in Computer Science, Vol. 3305, pp.650-659, Springer-Verlag Heidelberg. 2004-9-15.<br/> 23. A novel grid node by node security model. Grid and Cooperative Computing. Lecture Notes in Computer Science, Vol. 3251, pp.356-363, Springer-Verlag Heidelberg.<br/> 24. A novel policy and information flow security model for active network. Intelligence and Security Informatics. Lecture Notes in Computer Science, Vol. 3073, pp.42-55, Springer-Verlag Heidelberg.<br/> 25. An access control model for active network. The Ninth IEEE Symposium on Computers and Communication (ISCC2004), Alexander, Egypt, Jun 2004..<br/> 26. ,A Kind of network security behavior mode1 Based on game theory ,2003年8月,IEEE PDCAT.<br/> 27. , Evaluation Function for Siguo Game based on Two Attitudes, FSDK, Lecture Notes in Computer Science, 2006, 4223: 1322-1331.<br/> 28. Dynamic security service negotiation to ensure security for information sharing on the Internet. Intelligence and Security Informatics. Lecture Notes in Computer Science 3495: 640-641.<br/> 29. Analyze and Guess Type of Piece in the Computer Game Intelligent System, FSDK(2), Lecture Notes in Computer Science, 2005, 3614: 1174~1183.<br/> </td> </tr> <tr> <td colspan> ◇ </strong>科研成果获奖及专利: </strong></td> </tr> <tr> <td colspan valign> 专利项项,软件著作权1项</td> </tr> <tr> <td colspan> ◇ </strong>承担的科研项目情况: </strong></td> </tr> <tr> <td colspan valign> 承当国家和省部级项目各1项</td> </tr> <tr> <td colspan> ◇ </strong>指导研究生情况: </strong></td> </tr> <tr> <td colspan valign> <br/> 指导研究生18名</td> </tr> <tr> <td colspan> ◇ </strong>备注: </strong></td> </tr> <tr> <td colspan valign> <br/> 联系方式:QQ 79826274.</td> </tr> </tbody> </table> <br/> <p> *如果发现导师信息存在错误或者偏差,欢迎随时与我们联系,以便进行更新完善。联系方式>></a></p> </div>