当前位置: X-MOL首页全球导师 国内导师 › 周从华

个人简介

周从华,男,1978年生,江苏盐城人,博士,教授,江苏省333工程人才,江苏省六大高峰人才,江苏省双创博士,镇江市金山英才,镇江市优秀创新创业人才,江苏大学京口区新一代信息技术产业研究院院长,江苏大学青年学术带头人。2011.07-2011.12,德国锡根大学访问学者,2014.08-2015.07新加坡南洋理工大学计算机工程学院访问学者。主要研究领域包括:大数据分析技术、数据与系统安全、物联网、模型检测。主持完成国家自然科学基金中德合作交流项目一项,国家自然科学基金青年基金一项,江苏省自然科学基金一项。 其他成果 [1]发明专利:一种基于系统操作指南的隐通道搜索方法 [2]发明专利:一种基于航拍图的简易数字地图制作方法 [3]软件系统:扬中市民情E通(已上线) [4]软件系统:突发公共卫生事件现场调查处置系统(已产业化)

研究领域

人工智能、大数据分析与应用

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[1]周从华,随机模型检测理论与应用,科学出版社,2014. [2]周从华,邢支虎,刘志锋,王昌达,马尔可夫决策过程的限界模型检测,计算机学报,2013,36(12):2587-2600. [3]ShunrongJiang,JiapengZhang,JingJunMiao,andConghuaZhou,APrivacy-PreservingReauthenticationSchemeforMobileWirelessSensorNetworks.InternationalJournalofDistributedSensorNetworks.Volume2013(2013),ArticleID913782,8pages. [4]ZhifengLiu,ConghuaZhou,YunGeandDongZhang,AlgorithmicVerificationofIntransitiveNoninterferencefor3-domainSecurityPolicieswithaSATSolver,AppliedMathematics&InformationSciences.2013,7(5):1825-1835. [5]刘志锋,孙博,周从华,概率实时时态认知逻辑模型检测中抽象技术的研究,电子学报,2013,41(7):1343-1351. [6]ZHOUConghua,CAOMeiling,AnalysisofFastandSecureProtocolBasedonContinuous-TimeMarkovChain,Chinacommunications,2013,10(8):137-149. [7]周从华,吴海玲,鞠时光.广义不可推断属性符号化算术验证的研究,计算机研究与发展.2012,49(12):2591-2602. [8]周从华,孙博,刘志锋,葛云.概率时态认知逻辑模型检测中三值抽象技术的研究.电子学报,2012,40(10):2052-2061. [9]周从华,叶萌,王昌达,刘志锋,多智体系统中约简状态空间的限界模型检测算法,软件学报,2012,23(11):2835−2861. [10]周从华,鞠时光,一种基于Petri网的隐蔽信息流分析方法,计算机学报,2012,35(8):1688-1699. [11]周从华,刘志锋,王昌达,概率计算树逻辑的限界模型检测,软件学报,2012,23(7):1656-1668. [12]ConghuaZhou,BoSun,AbstractioninModelCheckingReal-TimeTemporalLogicofKnowledge.JournalofComputers.2012,7(2):362-370. [13]周从华,刘志锋,吴海玲,陈松,鞠时光,非传递广义无干扰属性符号化算术验证的研究,中国科学:信息科学,2011,41(11):1310-1327. [14]ConghuaZhou,MeilingCao,MengYe,ZhihaoQian,SAT-basedAlgorithmicVerificationofNoninterference,JournalofComputers.2011,6(11):2310-2320. [15]ConghuaZhou,BoSun,ZhifengLiu,AbstractionforModelCheckingMulti-agentSystems,FrontiersofComputerScienceinChina,2011,5(1):14-25. [16]周从华,刘志锋,吴海玲,陈松,面向无传递性安全策略的语法信息流分析方法,计算机科学与探索,2011,5(2):179-192. [17]ShiguangJu,ConghuaZhou,ZhifengLiu,ChangdaWang,XiangmeiSong,InferenceChannelIdentificationwithModelChecking,Journalofcomputationalinformationsystem,2011,7(3):1001-1012. [18]ConghuaZhou,SongChen,MinchaoWang,HaiyangLi,ZhihaoQian,StructureReductionforVerifyingNoninterferenceproperties,JournalofInformation&ComputationalScience,2011,8(3):446-454 [19]吴海玲,周从华,鞠时光,前向可修正属性算术验证的研究,计算机科学2011,38(3):97-102. [20]陈松,周从华,鞠时光,王基,基于Petri网的信息流安全属性的分析与验证,计算机应用研究,2010,27(12):4638-4642. [21]周从华,一种基于满足性判定的并发软件验证策略,软件学报,2009,20(6):1414-1424. [22]ConghuaZhou,LiChen,ShiguangJu,PetriNetsbasedNoninterferenceAnalysis,JournalofComputationalInformationSystems,2009,5(4):1231-1240. [23]ConghuaZhou,SymbolicAlgorithmicVerificationofGeneralizedNoninterference,WSEASTransactionsoncomputers,2009,8(6):976-987. [24]王昌达,鞠时光,周从华,宋香梅,一种隐通道威胁审计的度量方法,计算机学报,2009,32(4):751-762. [25]陈立,鞠时光,周从华,房芳,张翼,基于信息熵的隐通道能力分析,计算机应用研究,2009,25(8):3015-3018. [26]周从华,陈振宇,鞠时光,基于SAT的软件验证,计算机研究与发展,2008,45(s1):124-130. [27]陈振宇,徐宝文,周从华,一种基于消解的变量极小不可满足子公式的提取方法,计算机研究与发展,2008,45(s1):43-47. [28]周从华,刘志锋,基于Petri网的工作流模型简化,计算机科学,2008,35(2):115-119. [29]ConghuaZhou,SAT-basedBoundedModelCheckingforSE-CTL,WSEASTransactionsonComputers,2007,6(9):1057-1064. [30]ZhihongTao,ConghuaZhou,ZhongChen,LifuWang,BoundedmodelcheckingofCTL.JournalofComputerScienceandTechnology,2007,22(1):39-43. [31]周从华,刘志锋,具有过去时态算子的计算树逻辑模型检测,计算机工程,2007,33(22):98-100. [32]周从华,陶志红,陈钟,王立福,基于时态逻辑的工作流分析,计算机科学,2007,34(11):118-123. [33]ConghuaZhou,ZhihongTao,DechengDing,LifuWang,Boundedmodelcheckingforbranching-timetemporallogic.ChineseJournalofElectronics,2006,15(4):675-678. [34]ZhihongTao,ConghuaZhou,HansKleineBuning,LifuWang,SAT-BasedVerificationofBoundedPetriNets,ChineseJournalofElectronics,2006,15(4):567-572. [35]ConghuaZhou,ZhenyuChen.ModelCheckingWorkflowNetbasedonPetriNet.WuhanUniversityJournalofNaturalsciences.2006,11(5): 1297-1301. 会议论文 [1]ConghuaZhou,YongWang,MeilingCao,JianqiShi,YangLiu,FormalAnalysisofMACinIEEE802.11pwithProbabilisticModelChecking.2015InternationalSymposiumonTheoreticalAspectsofSoftwareEngineering(TASE),Pages:55-62. [2]ConghuaZhou,BoSun,ZhifengLiu,AbstractionforModelCheckingtheProbabilisticTemporalLogicofKnowledge,LectureNotesinArtificialIntelligence,2010,6319:209-221. [3]SongChen,ConghuaZhou,ShiguangJu,AnalysisforthecompositionofinformationflowsecuritypropertiesonPetrinet,The2ndInternationalConferenceonInformationScienceandEngineering,2010:1859-1863. [4]ConghuaZhou,LiChen,ShiguangJu,ZhifengLiu,StateSpaceReductionforVerifyingNoninterference,TheThirdIEEEInternationalConferenceOnSecureSoftwareIntegrationandReliabilityImprovement,2009,pages:132-140. [5]HailingWu,QingjieXie,ConghuaZhou,EstablishingFingerprintPollutionSourceIdentificationSystemoftheAccidentalWaterPollutionEmergencyBasedonMapInfo,Proceedingsofthe2009FirstIEEEInternationalConferenceonInformationScienceandEngineeringtableofcontentsPages:2051-2054. [6]LiChen,ShiguangJu,ConghuaZhou,YiZhang,Covertchannelcapacityanalysisbasedonentropy,2008InternationalSymposiumonInformationScienceandEngineering,ISISE2008,v1,p363-367. [7]ConghuaZhou,ZhenyuChen,ZhihongTao,QBF-BasedSymbolicModelCheckingforKnowledgeandTime.InProc.ofInternationalConferenceonTheoryandApplicationsofModelsofComputation(TAMC07),LNCS,4484,386-397. [8]ConghuaZhou,ShiguangJu,SAT-basedBoundedModelCheckingforSE-LTL,InProc.Ofthe8thInternationalConferenceonSoftwareEngineering,ArtificialIntelligence,NetworkingandParallel/DistributedComputing,2007,pages:582-587. [9]ConghuaZhou,Acompositionalsymbolicverificationframeworkforconcurrentsoftware,Proceedingsofthe2ndinternationalconferenceonScalableinformationsystems,2007. [10]ConghuaZhou,DechengDing,ImprovedSAT-basedBoundedModelChecking.InProc.ofInternationalConferenceonTheoryandApplicationsofModelsofComputation(TAMC06),LNCS,3959,611-620. [11]ZhenyuChen,ConghuaZhou,andDechengDing.Automaticabstractionrefinementforpetrinetsverification.InProc.ofthe10thIEEEInternationalHigh-LevelDesignValidationandTestWorkshop,pages168-174,2005.

推荐链接
down
wechat
bug