个人简介
个人简介:
于2011年毕业于同济大学,获得计算机科学与技术专业本科学位并直接攻读博士,于2017年毕业于同济大学,获得工学博士学位。2017至今在东华大学计算机科学与技术学院担任讲师。在读博士期间,进行了网络交易风控模型研究并进行了非参贝叶斯相关建模分析;现一直从事时序数据挖掘、概率图模型分析方面的研究工作,以及人工智能方面的教学与科研工作。
讲授课程:
人工智能
编译原理
近期主持的科研项目:
[1] 上海市经济信息化委军民融合专项子课题,“无人机大数据管理系统”,2017/01-2019/12.
[2] 东华大学青年教师启动资助项目“基于深度学习的网络用户行为数据建模与可信认证研究”,2018/03 – 2019/03.
近几年的论著、专利:
[1] Changjun Jiang, Hongzhong Chen, Chungang Yan, Zhijun Ding, Mimi Wang, Peihai Zhao , METHOD AND SYSTEM FOR BRANCH PROCESS-BASED MODEL CONSISTENCY ANALYSIS, 2018.06.13, 澳大利亚, AU2018100679.
[2] Changjun Jiang, Hongzhong Chen, Chungang Yan, Zhijun Ding, Mimi Wang, Peihai Zhao, METHOD FOR MEASURING USER BEHAVIOR CONSISTENCY DEGREE BASED ON COMPLEX CORRESPONDENCE SYSTEM, 2017.1.19, 澳大利亚, AU2017100012
[3] 蒋昌俊; 闫春钢; 丁志军; 张亚英; 景晨; 赵培海, 一种基于用户行为模型的身份认证方法及系统, 2017.1.10 (公开), 中国, CN2017100168646
[4] 蒋昌俊; 闫春钢; 丁志军; 张亚英; 王咪咪; 赵培海, 一种基于数据切片一致性的系统检测方法及系统, 2017.5.3 (公开), 中国, CN2017103063241
[5] 蒋昌俊; 陈闳中; 闫春钢; 丁志军; 王咪咪; 赵培海, 一种基于分支进程的模型一致性分析方法及系统, 2018.03.02 (授权), 中国, ZL2015107287242
[6] 蒋昌俊; 陈闳中; 闫春钢; 丁志军; 王咪咪; 赵培海, 基于复杂对应系统的用户行为一致性度测量方法, 2017.6.13 (授权), 中国, ZL2014103277092
[7] 蒋昌俊; 陈闳中; 闫春钢; 丁志军; 于汪洋; 赵培海, 基于Web用户行为模式的身份认证方法, 2015.11.04 (授权), 中国, ZL2012104456813
研究领域
主要研究方向:
概率图模型分析
统计机器学习
时间序列数据挖掘
近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
主要论文研究成果:
[1] Peihai Zhao, Zhijun Ding, Mimi Wang and Rruihao Cao, Behavior Analysis for Electronic Commerce Trading Systems: A Survey, IEEE Access, vol. 7, pp. 108703-108728, 2019.
[2] Mimi Wang; Guanjun Liu; Peihai Zhao*; Chungang Yan; Changjun Jiang, Behavior consistency computation for workflow nets with unknown correspondence, IEEE/CAA Journal of Automatica Sinica, 5(1), pp 281-291, 2018.
[3] Mimi Wang; Zhijun Ding; Peihai Zhao; Wangyang Yu; Changjun Jiang, A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp 1-15, 2018.
[4] Mimi Wang; Zhijun Ding; Changjun Jiang; Peihai Zhao, A Process-Profile-Based Method to Measure Consistency of E-Commerce System, IEEE Access, vol. 6, pp 25100-25109, 2018.
[5] 赵培海; 王咪咪, 基于三维行为关系图的模型一致性检测方法, 计算机科学, 45(06), pp 156-160+165, 2018.
[6] Mimi Wang; Peihai Zhao*, Decomposition of Petri Nets based on the Behavior Relation Matrix, 2017 IEEE 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2017.7.29-2017.7.31, pp 508-514, Guilin, CHINA, 2017.
[7] Mengqing Ji; Peihai Zhao; Mimi Wang; Chungang Yan; Zhong Li; Changjun Jiang, A kind of authentication method based on user web browsing features, International Journal of Machine Learning and Computing, 7(2), pp 18-23, 2017.
[8] Peihai Zhao; Chungang Yan; Changjun Jiang, Authenticating Web User's Identity through Browsing Sequences Modeling, 16th IEEE International Conference on Data Mining Workshops (ICDMW), 2016.12.12-2016.12.15, pp 335-342, Barcelona, SPAIN, 2016.
[9] 赵培海; 王咪咪; 方贤文, 基于网进程的模型一致性分析方法, 计算机科学, 43(11), pp 242-245+251, 2016.
[10] Xiaoshuang Song; Peihai Zhao; Mimi Wang; Chungang Yan, A Continuous Identity Verification Method based on Free-Text Keystroke Dynamics, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 206-210, Budapest, HUNGARY, 2016.
[11] Hongbo Zhang; Chungang Yan; Peihai Zhao; Mimi Wang, Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 171-175, Budapest, HUNGARY, 2016.
[12] Lei Ma; Chungang Yan; Peihai Zhao; Mimi Wang, A Kind of Mouse Behavior Authentication Method on Dynamic Soft Keyboard, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 211-216, Budapest, HUNGARY, 2016.
[13]Qiang Liu; Mimi Wang; Peihai Zhao; Chungang Yan; Zhijun Ding, A Behavioral Authentication Method for Mobile Gesture Against Resilient User Posture, 2016 3rd International Conference on Systems and Informatics (ICSAI), 2016.11.19-2016.11.21, pp 324-331, Shanghai, CHINA, 2016.
[14]Xiaomeng Zhang; Peihai Zhao; Mimi Wang, Keystroke dynamics in password authentication for multi-user account, Journal of Computational Information Systems, 11(1), pp 321-331, 2015.
[15]Shaoping Jiang; Chungang Yan; Peihai Zhao; Mimi Wang, An immune approach for detecting the user's behavior of electronic transaction process, Journal of Computational Information Systems, 11(2), pp 683-692, 2015.
[16]王昱杰; 赵培海; 王咪咪, 基于键盘行为进行用户识别的方法与应用, 计算机科学, 42(11), pp 203-207+234, 2015.
[17]Junzhu Zhong; Chungang Yan; Peihai Zhao; Mimi Wang; Wangyang Yu, A Kind of Identity Authentication Method Based on Browsing Behaviors, 2014 the 7th International Symposium on Computational Intelligence and Design (ISCID), 2014.12.13-2014.12.14, Hangzhou, CHINA, 2014.