十大靠谱的菠菜网 十大靠谱的菠菜网
 
 
人才培養
 
 
師資力量 當前位置: 學院首頁 > 人才培養 > 師資力量 > 教授 > 正文
 
教授  教授 |  副教授 |  講師 |  其他專技 |
 
周從華
發布日期:2023-06-03   浏覽次數:
 


教師姓名:

周從華

職務職稱:

教授

所屬系部:

網絡空間安全系、軟件系統研究所

研究方向:

人工智能、大數據分析與應用

聯系電話:

0511-88791299-536

電子郵箱:

chzhou@ujs.edu.cn

個人簡介

周從華,男,1978年生,江蘇鹽城人,博士,教授,江蘇省333工程人才,江蘇省六大高峰人才,江蘇省雙創博士,鎮江市金山英才,鎮江市優秀創新創業人才,十大靠谱的菠菜网京口區新一代信息技術産業研究院院長,十大靠谱的菠菜网青年學術帶頭人。2011.07-2011.12,德國錫根大學訪問學者,2014.08-2015.07新加坡南洋理工大學計算機工程學院訪問學者。主要研究領域包括:大數據分析技術、數據與系統安全、物聯網、模型檢測。主持完成國家自然科學基金中德⏭➰交流項目一項,國家自然科學基金青年基金一項,江蘇省自然科學基金一項。

教研成果

期刊論文
[1]周從華,随機模型檢測理論與應用,科學出版社,2014.
[2]周從華,邢支虎,劉志鋒,王昌達, 馬爾可夫決策過程的限界模型檢測,計算機學報,2013,36(12):2587-2600.
[3]Shunrong Jiang, Jiapeng Zhang, JingJun Miao, and Conghua Zhou, A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks. International Journal of Distributed Sensor Networks. Volume 2013 (2013), Article ID 913782, 8 pages.
[4]Zhifeng Liu, Conghua Zhou, Yun Ge and Dong Zhang, Algorithmic Verification of Intransitive Noninterference for 3-domain Security Policies with a SAT Solver, Applied Mathematics & Information Sciences. 2013,7(5):1825-1835.
[5]劉志鋒, 孫博, 周從華, 概率實時時态認知邏輯模型檢測中抽象技術的研究, 電子學報,2013,41(7):1343-1351.
[6]ZHOU Conghua, CAO Meiling , Analysis of Fast and Secure Protocol Based on Continuous-Time Markov Chain, China communications, 2013,10(8):137-149.
[7]周從華,吳海玲,鞠時光.廣義不可推斷屬性符号化算術驗證的研究,計算機研究與發展.2012,49(12):2591-2602.
[8]周從華, 孫博, 劉志鋒, 葛雲. 概率時态認知邏輯模型檢測中三值抽象技術的研究. 電子學報,2012,40(10):2052-2061.
[9]周從華, 葉 萌, 王昌達, 劉志鋒, 多智體系統中約簡狀态空間的限界模型檢測算法,軟件學報, 2012,23(11):2835−2861.
[10]周從華,鞠時光,一種基于Petri網的隐蔽信息流分析方法,計算機學報,2012,35(8):1688-1699.
[11]周從華, 劉志鋒,王昌達,概率計算樹邏輯的限界模型檢測,軟件學報,2012,23(7):1656-1668.
[12]Conghua Zhou, Bo Sun, Abstraction in Model Checking Real-Time Temporal Logic of Knowledge. Journal of Computers. 2012,7(2):362-370.
[13]周從華,劉志鋒,吳海玲,陳松,鞠時光,非傳遞廣義無幹擾屬性符号化算術驗證的研究,中國科學:信息科學, 2011,41(11):1310-1327.
[14]Conghua Zhou, Meiling Cao, Meng Ye, Zhihao Qian, SAT-based Algorithmic Verification of Noninterference, Journal of Computers. 2011,6(11):2310-2320.
[15]Conghua Zhou, Bo Sun, Zhifeng Liu, Abstraction for Model Checking Multi-agent Systems,Frontiers of Computer Science in China,2011,5(1):14-25.
[16]周從華,劉志鋒,吳海玲,陳松,面向無傳遞性安全策略的語法信息流分析方法,計算機科學與探索, 2011,5(2):179-192.
[17]Shiguang Ju, Conghua Zhou, Zhifeng Liu, Changda Wang, Xiangmei Song, Inference Channel Identification with Model Checking, Journal of computational information system, 2011,7(3): 1001-1012.
[18]Conghua Zhou, Song Chen, Minchao Wang, Haiyang Li, Zhihao Qian, Structure Reduction for Verifying Noninterference properties, Journal of Information & Computational Science, 2011,8(3):446-454
[19]吳海玲, 周從華, 鞠時光, 前向可修正屬性算術驗證的研究, 計算機科學2011,38(3):97-102.
[20]陳松,周從華,鞠時光,王基,基于Petri網的信息流安全屬性的分析與驗證,計算機應用研究,2010,27(12):4638-4642.
[21]周從華, 一種基于滿足性判定的并發軟件驗證策略,軟件學報,2009,20(6):1414-1424.
[22]Conghua Zhou, Li Chen, Shiguang Ju, Petri Nets based Noninterference Analysis, Journal of Computational Information Systems,2009, 5(4):1231-1240.
[23]Conghua Zhou, Symbolic Algorithmic Verification of Generalized Noninterference, WSEAS Transactions on computers, 2009,8(6):976-987.
[24]王昌達,鞠時光,周從華,宋香梅,一種隐通道威脅審計的度量方法, 計算機學報,2009,32(4):751-762.
[25]陳立, 鞠時光, 周從華, 房芳, 張翼, 基于信息熵的隐通道能力分析, 計算機應用研究,2009,25(8):3015-3018.
[26]周從華,陳振宇,鞠時光,基于SAT的軟件驗證,計算機研究與發展,2008,45(s1):124-130.
[27]陳振宇,徐寶文,周從華,一種基于消解的變量極小不可滿足子公式的提取方法,計算機研究與發展,2008,45(s1):43-47.
[28]周從華,劉志鋒, 基于Petri網的工作流模型簡化,計算機科學,2008,35(2):115-119.
[29]Conghua Zhou,SAT-based Bounded Model Checking for SE-CTL, WSEAS Transactions on Computers,2007,6(9):1057-1064.
[30]Zhihong Tao, Conghua Zhou, Zhong Chen, Lifu Wang, Bounded model checking of CTL. Journal of Computer Science and Technology,2007,22(1):39-43.
[31]周從華,劉志鋒,具有過去時态算子的計算樹邏輯模型檢測, 計算機工程,2007,33(22):98-100.
[32]周從華,陶志紅,陳鐘,王立福,基于時态邏輯的工作流分析, 計算機科學,2007,34(11):118-123.
[33]Conghua Zhou, Zhihong Tao, Decheng Ding, Lifu Wang,Bounded model checking for branching-time temporal logic. Chinese Journal of Electronics, 2006, 15(4):675-678.
[34]Zhihong Tao, Conghua Zhou, Hans Kleine Buning, Lifu Wang, SAT-Based Verification of Bounded Petri Nets, Chinese Journal of Electronics,2006,15(4):567-572.
[35]Conghua Zhou, Zhenyu Chen. Model Checking Workflow Net based on Petri Net. Wuhan University Journal of Natural sciences.2006,11(5):
1297-1301.

會議論文
[1]Conghua Zhou, Yong Wang, Meiling Cao, Jianqi Shi, Yang Liu, Formal Analysis of MAC in IEEE 802.11p with Probabilistic Model Checking. 2015 International Symposium on Theoretical Aspects of Software Engineering (TASE), Pages:55-62.
[2]Conghua Zhou, Bo Sun, Zhifeng Liu,Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge, Lecture Notes in Artificial Intelligence,2010,6319:209-221.
[3]Song Chen, Conghua Zhou, Shiguang Ju, Analysis for the composition of information flow security properties on Petri net, The 2nd International Conference on Information Science and Engineering,2010: 1859-1863.
[4]Conghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu, State Space Reduction for Verifying Noninterference, The Third IEEE International Conference On Secure Software Integration and Reliability Improvement,2009, pages:132-140.
[5]Hailing Wu, Qingjie Xie, Conghua Zhou, Establishing Fingerprint Pollution Source Identification System of the Accidental Water Pollution Emergency Based on MapInfo, Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering table of contents Pages: 2051-2054.
[6]Li Chen, Shiguang Ju, Conghua Zhou, Yi Zhang, Covert channel capacity analysis based on entropy, 2008 International Symposium on Information Science and Engineering, ISISE 2008, v 1, p 363-367.
[7]Conghua Zhou, Zhenyu Chen, Zhihong Tao, QBF-Based Symbolic Model Checking for Knowledge and Time. In Proc. of International Conference on Theory and Applications of Models of Computation( TAMC07), LNCS, 4484, 386-397.
[8]Conghua Zhou, Shiguang Ju,SAT-based Bounded Model Checking for SE-LTL,In Proc. Of the 8th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing,2007, pages:582-587.
[9]Conghua Zhou, A compositional symbolic verification framework for concurrent software, Proceedings of the 2nd international conference on Scalable information systems, 2007.
[10]Conghua Zhou, Decheng Ding, Improved SAT-based Bounded Model Checking.In Proc. of International Conference on Theory and Applications of Models of Computation( TAMC06), LNCS, 3959, 611-620.
[11]Zhenyu Chen, Conghua Zhou, and Decheng Ding. Automatic abstraction refinement for petri nets verification. In Proc. of the 10th IEEE International High-Level Design Validation and Test Workshop, pages 168-174,2005.

其他成果
[1]發明專利:一種基于系統操作指南的隐通道⚜⭐〰✝方法
[2]發明專利:一種基于航拍圖的簡易數字地圖制作方法
[3]軟件系統:揚中市民情E通(已上線)
[4] 軟件系統:突發公共衛生事件現場調查處置系統(已産業化)

版權所有·十大靠谱的菠菜网,最全菠菜导航网,菠菜大平台
Copyright (C) 2018-2023.cs.ujs.edu.cn. All rights resterved
☯⚜☯:江蘇省鎮江市京口區學府路301号.十大靠谱的菠菜网 郵編:212013   歡迎來到十大靠谱的菠菜网,最全菠菜导航网,菠菜大平台!
Baidu
sogou