当前位置: X-MOL首页全球导师 国内导师 › 王咪咪

个人简介

个人简介: 2019年博士毕业于 同济大学 计算机科学与技术专业。现任东华大学信息科学与技术学院自动化系讲师。近年来在IEEE TSMC、IEEE/CAA Journal of Automatica Sinica等国内外期刊/会议上发表论文30余篇,申请专利/软著10项,参编行业标准1项,主持或参与项目7项。 近年来主持及参与的项目: 基于Petri网的网络交易行为一致性研究(2020.03-2021.03),青年教师,主持; 基于高级Petri网的网络交易行为可预期性研究(2020.01-2022.12),中央高校自由探索,主持; “风控云”的数据勘探及平台支撑技术上海市科学技术委员会-上海市“科技创新行动计划”高新技术领域项目(2016.07-2018.06),参与; 可信网络交易软件系统试验环境与示范应用(2013.01-2016.12),重大研究计划集成项目,参与; 网络化软件病态免疫机理与方法研究(2013.12-2015.12),面上项目,参与; 基于Petri网的网络化软件行为可信性分析方法研究(2013.01-2016.12),国家自然科学基金项目,参与; 无人机大数据管理系统(2017.01-2019.12),上海市军民融合专项,参与. 专利/软著: 王咪咪,赵培海,“基于伙伴矩阵的交易系统的重叠对应行为一致性检测方法”,公布日:2020.06.05.(已公开) 王咪咪,赵培海,“基于时间Petri网的网络交易系统故障诊断方法”,2020.01.15.(已受理) 赵培海,王咪咪,“一种基于随机Petri网的多个无人机协同系统性能评估方法”,2019.05.26.(已公开) 赵培海,王咪咪, “一种基于空间几何特征的无人机航迹规划方法”,2019.6.10.(已公开) Jiang Changjun, Chen Hongzhong, Yan Chungang, Ding Zhijun, Wang Mimi, Zhao Peihai, “Method for Measuring User Behavior Consistency Based on Complex Correspondence System”.授权国家: Australian, 授权日:2017.01.05, 授权号: AU2017100012. (已授权) Jiang Changjun, Chen Hongzhong, Yan Chungang, Ding Zhijun, Wang Mimi, Zhao Peihai, “Method and System for Branch Process-based Model Consistency Analysis”.授权国家: Australian, 授权日:2018.05.18, 授权号: AU2018100679. (已授权) 蒋昌俊,陈闳中,闫春钢,丁志军,王咪咪,赵培海, “基于复杂对应系统的用户行为一致性度测量方法”,授权日: 2017.03.29. (已授权) 蒋昌俊,陈闳中,闫春钢,丁志军,王咪咪,赵培海,“一种基于分支进程的模型一致性分析方法及系统”,授权日: 2018.03.02. (已授权) 蒋昌俊,闫春钢,丁志军,张亚英,王咪咪,赵培海,“一种基于数据切片一致性的系统检测方法及系统”,授权日: 2020.04.28. (已授权) 赵培海,王咪咪,“UAV航迹行为分析软件V1.0”,软件著作权,申请日:2019.11.25. (已受理) 行业标准: 蒋昌俊, 陈闳中, 闫春钢,丁志军,王咪咪. 《可信业务流程指标行业标准》,中国云体系产业创新战略联盟,标准号:HBT-2005-003, 2015年实行. 教学情况: 研究生课程:《随机过程》

研究领域

主要研究方向为复杂系统建模与验证、并发/协同理论、模型检测、算法优化、Petri网理论等,目前主要从事系统安全检测、风险防控、过程挖掘、非参贝叶斯、因子分析等方面的研究。

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

主要研究成果: 期刊论文: Mimi Wang, Zhijun Ding, Guanjun Liu, Changjun Jiang, Mengchu Zhou. Measurement and Computation of Profile Similarity of Workflow Nets Based on Behavioral Relation Matrix. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018:1-18. (Online:10.1109/TSMC.2018.2852652) Mimi Wang, Zhijun Ding, Peihai Zhao, Wangyang Yu, Changjun Jiang. A dynamic data slice approach to the vulnerability analysis of E-commerce systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018:1-15. (Online:10.1109/TSMC.2018.2862387) Mimi Wang, Guanjun Liu, Peihai Zhao, Chungang Yan, Changjun Jiang. Behavior Consistency Computation for Workflow Nets with Unknown Correspondence. IEEE/CAA Journal of Automatica Sinica. 2018, 5(1): 281-291. Mimi Wang, Zhijun Ding, Changjun Jiang, Peihai Zhao. A Process-profile-based Method to Measure Consistency of E-commerce System. IEEE ACCESS, 2018,6(1):25100-25109. Mimi Wang, Zhijun Ding, Peihai Zhao. Vulnerability Evaluation Method for E-commerce Transaction Systems with Unobservable Transitions. IEEE ACCESS.2020, 8: 101035-101048. Peihai Zhao, Zhijun Ding*, Mimi Wang*, Ruihao Cao. Behavior Analysis for Electronic Commerce Trading Systems: A Survey. IEEE ACCESS. 2019,7,108703-108728. Dongxiang Chen, Zhijun Ding, Chungang Yan, Mimi Wang. A Behavioral Authentication Method for Mobile based on Browsing Behaviors. IEEE/CAA Journal of Automatica Sinica. 2019:1-14. (Online:10.1109/JAS.2019.1911648) Xiangwei Liu, Xianwen Fang, Mimi Wang, Zhixiang Yin. The Behavior Trustworthiness Analysis Methods of Composite Web Services Based on Process Mining. Applied Mathematics & Information Sciences, 2013, 7(5): 1985-1992. Xianwen Fang, Mimi Wang, Zhixiang Yin. Behavior Consistency Analysis Based on the Behavior Profile about Transition Multi-Set of Petri Net. Przeglad Elektrotechniczny (Electrical Review), 2013,9(1):171-173. Xianwen Fang, Mimi Wang, Xiangwei Liu. Analysis method for service composition under behavior constraints based on the behavior profile. Journal of Tsinghua University (Science and Technology), 2012,52(1):98-102. Xianwen Fang, Mimi Wang, Shenbing Wu. A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles. Advances in Intelligent Systems and Computing, 2013,212(2013):587-593. Xiangwei Liu, Mimi Wang, Lu Liu. The analysis of change region about networked control system based on the behavior Profile. Advances in Intelligent Systems and Computing, 2013,212(2013):1221-1228. Xiaomeng Zhang, Peihai Zhao, Mimi Wang. Keystroke Dynamics in Password Authentication for Multi-user Account. Journal of Computational Information Systems, 2015, 11(1): 321-331. Shaoping Jiang, Chungang Yan, Peihai Zhao, Mimi Wang. An Immune Approach for Detecting the User's Behavior of Electronic Transaction Process, Journal of Computational Information Systems, 2015, 11(2):683–692. Mengqing Ji, Peihai Zhao, Mimi Wang, Chungang Yan, Zhong Li, Changjun Jiang. A Kind of Authentication Method based on User Web Browsing Features. (IJMLC), 2017, 7(2): 18-23. 王咪咪,方贤文. Petri网多重变迁集的行为轮廓一致性分析. 计算机工程与设计, 2013,3(2013):935-938. 赵培海,王咪咪.基于三维行为关系图的模型一致性检测方法.计算机科学,2018,45(6):156-160. 赵培海,王咪咪,方贤文. 基于网进程的模型一致性分析方法,计算机科学, 2016,43(11):242-251. 方贤文,王咪咪. 安徽省云计算发展现状及相关对策, 电子商务, 2014,07:14-15. (中文核心) 王昱杰,赵培海,王咪咪.基于键盘行为进行用户识别的方法与应用.计算机科学, 2015,42(11):203-207. 陈冬祥,丁志军,闫春钢,王咪咪. 一种综合多因素的网页浏览行为认证方法,计算机科学. 2018,45(2):181-188. 会议论文: Mimi Wang, Guanjun Liu, Chungang Yan, Changjun Jiang. Modeling and vulnerable points analysis for E-commerce transaction system with a known attack. Lecture Notes in Computer Science, 2016, 10066(2016): 422-436. Mimi Wang, Guanjun Liu, Changjun Jiang, Chungang Yan. Computation of Secure Consistency for Real Systems. 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer International Publishing: LNCS 10066, pp. 84-97, 2016. Mimi Wang, Peihai Zhao. Decomposition of Petri Nets based on the Behavior Relation Matrix. 13th IEEE International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (IEEE ICNC-FSKD), 29-31 July 2017, Guilin, China. 2017:1-6. Peihai Zhao, Mimi Wang*. Performance Analysis of Multiple Unmanned Aerial Vehicle Collaborative Systems based on Stochastic Petri net. 11th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2019:202-206. Peihai Zhao, Mimi Wang*, Ruihao Cao. A Path Planning Method of Unmanned Aerial Vehicle. 11th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2019:178-183. Mimi Wang, Peihai Zhao. Detecting Data Inconsistency Using Data Slicing Based on Petri Nets. The 6th IEEE International Conference on Communication, Electronics and Automation Engineering (IEEE ICCEAE 2017). 25-26 November 2017, Chongqing, China. 2017:1-4. Qiang Liu,Mimi Wang, Peihai Zhao, Chungang Yan, Zhijun Ding. A Behavioral Authentication Method for Mobile Gesture against Resilient User Posture. (IEEE ICSAI). 2016:324-331. Dongxiang Chen, Chungang Yan, Mimi Wang. A New One-Class Classification Method with Multiple Encoder-Decoder Pairs for Images.11th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC 2019). 2019:116-121. Leifeng He, Guanjun Liu, Mimi Wang. A sufficient and necessary condition to decide compatibility for simple circuit inter-organization workflow nets, the 10th APSCC, Zhangjiajie, China, Nov. 16-18, 2016, LNCS 10065, pp. 408-422. Xiaoshuang Song, Peihai Zhao, Mimi Wang, Chungang Yan. A Continuous Identity Verification Method based on Free-Text Keystroke Dynamics. IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC). 2016:206-210. Lei Ma, Chungang Yan, Peihai Zhao, Mimi Wang. A Kind of Mouse Behavior Authentication Method on Dynamic Soft Keyboard. (IEEE SMC). 2016:211-216. Hongbo Zhang, Chungang Yan, Peihai Zhao, Mimi Wang. Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users. (IEEE SMC). 2016: 171-175. Junzhu Zhong, Chungang Yan, Wangyang Yu, Peihai Zhao, Mimi Wang. A Kind of Identity Authentication Method Based on Browsing Behaviors. 7th IEEE International Symposium on Computational Intelligence and Design, 2014: 279-284.

学术兼职

目前担任IEEE、ACM、人工智能学会、自动化学会、计算机学会会员,为IEEE TSMC,IEEE Systems Journal等多个期刊审稿人。

推荐链接
down
wechat
bug