当前位置: X-MOL首页全球导师 国内导师 › 朱二周

个人简介

个人简历 2016/12-至今,安徽大学,副教授; 2012/07-2015/12,安徽大学,讲师; 2008/09-2012/06,上海交通大学,研究生/博士; 2005/09-2008/06,安徽大学,研究生/硕士; 2000/09-2004/07,安徽大学,本科/学士。 2.专利 1.朱二周,马刚,刘锋,张静. 一种Android环境下钓鱼网站检测方法及其检测系统. 发明专利CN107438083A,已授权2019.07.09. 2.朱二周,周泽人,李学俊.基于动态二进制平台检测运行时程序漏洞的方法. 发明专利CN107526970A,已授权2020.4.19. 3.朱二周,高新,刘锋.一种基于改进K-means算法和新聚类有效性指标的聚类分析方法. 发明专利CN110909792A,实审中. 3.已完成的科研项目 1.移动云计算环境下软件跨平台运行与安全机制关键技术研究,国家自然科学基金青年项目, 61300169, 2014.01~2016.12, 22万元, 主持. 2.装备自动化制造模拟台显控制软件,企业委托横向课题, 2015.07~2015.11, 20.3万元(到账经费20.1万元), 主持. 3.基于进程级虚拟机的移动平台程序分析关键技术研究,安徽省高等学校自然科学研究项目(重点), KJ2018A0022, 2018.01~2019.12, 6万元, 主持. 在研项目 1.基于虚拟化与程序分析的Android平台程序安全与数据保护研究,安徽省自然科学基金(面上项目), 2020年新项目(已公示),主持.

研究领域

程序安全 机器学习(信息安全) 数据挖掘

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

1.朱二周*,孙悦,张远翔,高新,马汝辉, 李学俊.基于混合聚类算法和新聚类有效性指标的最佳类簇数确定方法.软件学报(已录用). 2.Erzhou Zhu, Yinyin Ju, Dawei Liu, Yang Li, Dong Liu, Zhujuan Ma*. Effective Hierarchical Cluster Analysis Based on New Clustering Validity Index. Journal of Computers (Taiwan, China), 31(1), 2020, pp.119-133. EI-Index. 3.Erzhou Zhu*, Meng Li, Feng Liu, Futian Wang*. TIMOM: a novel time influence multi-objective optimization cloud data storage model for business process management. In: Proceedings of the 19th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2019), Melbourne, Australia, Dec. 9-11, 2019.pp. 315-329. CCF-C 4.Erzhou Zhu*, Yuanxiang Zhang, Peng Wen, Feng Liu. Fast and Stable Clustering Analysis based on Grid-mapping K-means Algorithm and New Clustering Validity Index. Neurocomputing, Volume 363, 2019, pp.149-170. CCF-C, SCI-2. 5.Erzhou Zhu, Yuyang Chen, Chengcheng Ye, Xuejun Li, Feng Liu*. OFS-NN: An Effective Phishing Websites Detection Model Based on Optimal Feature Selection and Neural Network. IEEE ACCESS, Vol.7, 2019, pp.73271-73284. SCI-2. 6.Erzhou Zhu*, Peng Wen, Kanqi Ni, Ruhui Ma*. Implementation of an Effective Dynamic Concolic Execution Framework for Analyzing Binary Programs. Computers & Security, Vol. 86, 2019, pp.1-27. CCF-B, SCI-3. 7.Erzhou Zhu, Zhujuan Ma*, Hui Sun, Feng Liu. The Implementation of a Secret Information Hiding Framework Based on Hash Function and Invisible ASCII Characters Replacement. Journal of Computers (tw), 30 (3), 2019, pp.28-43. EI-Index 8.Erzhou Zhu*, Ruhui Ma. An effective partitional clustering algorithm based on new clustering validity index. Applied Soft Computing, Vol.71, 2018, pp. 608-621. SCI-2 9.Erzhou Zhu, Binbin Zhu, Peng Wen, Feng Liu, Xuejun Li, Futian Wang*. Effective Clustering Analysis based on New Designed CVI and Improved Clustering Algorithms. In: Proceedings of the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2018), Melbourne, Australia, Dec. 11-13, 2018, pp.766-772. CCF-C 10.Erzhou Zhu, Dong Liu, Chengcheng Ye, Feng Liu, Xuejun Li, Hui Sun*. Effective phishing website detection based on improved BP neural network and dual feature evaluation. In: Proceedings of the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2018), Melbourne, Australia, Dec. 11-13, 2018, pp.759-765. CCF-C 11.Erzhou Zhu, Peng Wen, Binbin Zhu, Feng Liu, Futian Wang, Xuejun Li*. Effective Clustering Analysis Based on New Designed Clustering Validity Index and Revised K-means Algorithm for Big Data. In: Proceedings of the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2018), Melbourne, Australia, Dec. 11-13, 2018, pp.96-102. CCF-C 12.Erzhou Zhu, Chengcheng Ye, Dong Liu, Feng Liu, Futian Wang, Xuejun Li*. An Effective Neural Network Phishing Detection Model Based on Optimal Feature Selection. In: Proceedings of the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2018), Melbourne, Australia, Dec. 11-13, 2018, pp.781-787. CCF-C 13.Erzhou Zhu, Peng Li, Zhujuan Ma*, Xuejun Li, Feng Liu. Effective and Optimal Clustering Based on New Clustering Validity Index. In: Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD 2018), Nanjing, China, May 9 - 11, 2018, pp.529-534. CCF-C 14.Erzhou Zhu, Zeren Zhou, Zhujuan Ma, Xuejun Li*, Feng Liu. Secure and Efficient Collaborative Auction Scheme for Spectrum Resource Reallocation. In: Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD 2018), Nanjing, China, May 9 - 11, 2018, pp.396-400. CCF-C 15.Feng Liu, Pengpeng Luo, Zhujuan Ma, Cheng Zhang, Yiwen Zhang, Erzhou Zhu*. Security Secret Information Hiding Based on Hash Function and Invisible ASCII Characters Replacement. In: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016), Tianjin, China, 2016, pp.1963-1969. CCF-C 16.Zhujuan Ma, Erzhou Zhu*, Yiwen Zhang, Cheng Zhang. Ensuring the Security of Text-based Information Transmission by Utilizing Invisible ASCII Characters. International Journal of Simulation Systems, Science & Technology, Volume 45, 2016, Article No. 34. EI-index 17.Erzhou Zhu, Feng Liu, Zuo Wang, Alei Liang, Yiwen Zhang, Xuejian Li, Xuejun Li*. Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs. Computers & Security, Volume 52, 2015, pp. 51-69. CCF-B, SCI-3 18.Erzhou Zhu, Ruhui Ma*, Yang Hou, Yindong Yang, Feng Liu, Haibing Guan. Two-Phase Execution of Binary Applications on CPU/GPU Machines. Computers & Electrical Engineering (CAEE), 40(5), July 2014, 1567-1579. SCI-4 19.Ruhui Ma, Fanfu Zhou, Erzhou Zhu*, Haibing Guan. Performance Tuning Towards a KVM-based Embedded Real-time Virtualization System. Journal of Information Science and Engineering (JiSE), 2013, 29(5), pp.1021-1035. SCI-4 20.Haibing Guan, Erzhou Zhu*, Hongxi Wang, Ruhui Ma, Yindong Yang, Bin Wang. SINOF: A dynamic-static combined framework for dynamic binary translation. Journal of Systems Architecture-Embedded Systems Design (JSA), 2012, 58(8), pp.305-317. CCF-B, SCI-4

推荐链接
down
wechat
bug