夏正友
Associate Professor Supervisor of Master's Candidates
Gender:Male
Education Level:复旦大学
Degree:Doctoral Degree in Science
School/Department:College of Computer Science and Technology
Contact Information:QQ:3207382201 微信:13851514963
E-Mail:
2001.9 -- 2004.6
复旦大学  计算机应用技术  With Certificate of Graduation for Doctorate Study  Doctoral Degree in Science
1996.9 -- 1999.2
南京理工大学  机械电子  With Certificate of Graduation for Study as Master's Candidates  Master's Degree in Engineering
1993.9 -- 1996.7
合肥工业大学  计算机应用专业  Graduate with a professional diploma  无学位
1989.9 -- 1993.7
黄山林业学校  林学  中等专科毕业  无学位
1989.9 -- 1993.7
黄山林业学校  林学  中等专科毕业  无学位
网络,数据挖掘,信息安全
2004.6 -- Now
南京航空航天大学
1999.4 -- 2001.9
上海SYSCOM公司
1993.7 -- 1996.9
安徽省无为县洪巷镇政府
在IEEE internet computing,Computer Standards & Interfaces ,Microprocessors and Microsystems,Advances in Engineering Software,ICGA journal,LNCS&AI和软件学报等国内外期刊和国际会议上发表22篇论文,其中被SCI检索15篇。曾任IEEE network,Computer Standards & Interfaces ,information Science,wireless network,Journal of Computer Science & Technology (JCST)等多家国际期刊审稿人。
大数据分析与挖掘:(1)Web大数据分析与挖掘;(2)金融大数据挖掘与分析
1)Web大数据分析与挖掘;(
2)金融大数据挖掘与分析
主要期刊论文
Zhan Bu, Zhengyou Xia *, A last updating evolution model for online social networks,Physica A: Statistical Mechanics and its Applications Volume 392, Issue 9, 1 May 2013, Pages 2240–2247 (SCI检索)
Zhengyou Xia * , Zhan Bu, “Community detection based on a semantic network,” Knowledge-Based Systems., pp. 30-39, Vol. 26, February 2012. (SCI检索)
Bu Z, Zhang C, Xia Z, et al. A fast parallel modularity optimization algorithm (FPMQA) for community detection in online social network[J]. Knowledge-Based Systems, 2013, 50: 246-259.(SCI检索)
Zhan Bu, Zhengyou Xia *, “A sock puppet detection algorithm on virtual spaces,” Knowledge-Based Systems, pp. 366-377, Vol. 37, January 2013。(SCI检索)
ZhengYou Xia *, Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network, Knowledge-Based Systems, Elsevier, 2008Vol.21 (No.5), pp434-442. (SCI检索)
ZhengYou xia *, Yunan Hu, Extending RSVP for quality of security service, IEEE Internet Computing ,2006(2),March/April,pp51-57. (SCI检索)
ZhengYou Xia * ,Jian Wang, DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network , Computer Standards & Interfaces , Elsevier, 2006,Vol.28,No.6,pp660-669. (SCI检索)
ZhengYou Xia *, YongPing Zhu, Using the Loopy Belief Propagation in Siguo, ICGA Journal 2007, 30(4),pp209-220. (SCI检索)
ZhengYou Xia *, Jian Wang, Dynamically negotiated security service for multicast application in the active network, IEE Proceedings-Communications, Feb. 2006, Volume: 153, pp31 – 38. (SCI检索)。
zhengyou xia, zhan bu,Cyber Computing: Authentication of Online Authorship or Article Based on Support Vector Machine,ICIC express letter,vol5,No.1,2014 (EI检索)
ZhengYou Xia *, ChenLing Gu,The Role of Belief in the Emergence of Social Conventions in Artificial Social System, Advanced Materials Research, 2010,Vol.159,pp210-215. (EI检索)
YiChuan.Jiang, ZhengYou.Xia, et al. A novel defense model for dynamic topology network based on mobile agent. Microprocessors and Microsystems, Elsevier Science, 2006,Vol.29, No.6, pp543-562. (SCI检索)
YiChuan.Jiang, ZhengYou.Xia, et al. Autonomous trust construction in multi-agent systems- a graph theory methodology. Advances in Engineering Software, Elsevier Science, 2006,Vol.36, No.2, pp346-352. (SCI检索)
夏正友*,..需求装载代码协议的安全缺陷分析.2005,16(6),软件学报1175-1181. 6-15. (EI检索)
夏正友*,主动网络安全结构模型设计(英文), 软件学报2002,13(8):1352-1361,8-15. (EI检索)
荣波,夏正友*,BBS在线复杂网络及其成员交互特性研究,复杂系统与复杂科学,2009,第6卷,第4期。
国际会议论文清单如下:
Zhan Bu, C Zhang, Zheng Xia, Current Attitude Prediction Model Based on Game Theory,Web Information Systems Engineering–WISE 2013, 469-478.
Zhengyou xia * ,Zhan Bu,Cyber computing:from plant ecology to cyber ecology, 2013 International Conference on Computer Software, Data Handling and Applications, ShengYang,China.
Rui Yang, Zhan Bu and Zhengyou Xia * “Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis,” Proceeding of 2012 International Conference on Web information Systems and Mining, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012.
Kun Fang, Zhan Bu and Zhengyou Xia *,“Segmentation of CAPTCHAs Based on Complex Networks,” Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012
Zhan Bu and Zhengyou Xia *, A Link Analysis Model Based on Online Social Networks, WISM'11-AICI'11, Sep 24-25, 2011, Taiyuan
Quan Shou, Zhan Bu and Zhengyou Xia *,“Authentication of online authorship or article Based on hypothesis testing model,” Proceedings of 2011 IEEE International Conference on Computational Science and Engineering, pp. 3-8, Dalian, Liaoning, China, Aug. 24-26, 2011.
Huang LaiLei,ZhengyouXia *, User Character and Communication Pattern Detecting on Social Network Site, International Conference on Engineering Computation,Mar-3,2009,pp1161-1166.
Huang LaiLei,ZhengyouXia *, Measuring User Prestige and Interaction Preference on Social Network Site, Eigth IEEE/ACIS International Conference on Computer and Information Science,2009,pp876-880.
ZhengYou.Xia *, LaiLei Huang Emergence of Social Rumor Modeling, Analysis, and Simulations ,ICCS,2007, Lecture Notes in Computer Science.
ZhengYou.Xia *, Y.C.Jiang. Artificial life environment and information flow model. Cellular Automata. Lecture Notes in Computer Science, Vol. 3305, pp.650-659, Springer-Verlag Heidelberg. 2004-9-15.
ZhengYou.Xia *, Y.C.Jiang. A novel grid node by node security model. Grid and Cooperative Computing. Lecture Notes in Computer Science, Vol. 3251, pp.356-363, Springer-Verlag Heidelberg.
ZhengYou Xia *, Y.C.Jiang. A novel policy and information flow security model for active network. Intelligence and Security Informatics. Lecture Notes in Computer Science, Vol. 3073, pp.42-55, Springer-Verlag Heidelberg.
ZhengYou Xia *, Y.C.Jiang, Y.P.Zhong, S.Y.Zhang. An access control model for active network. The Ninth IEEE Symposium on Computers and Communication (ISCC2004), Alexander, Egypt, Jun 2004..
ZhengYou Xia *,A Kind of network security behavior mode1 Based on game theory ,2003年8月,IEEE PDCAT.
ZhengYou Xia *, YongPing Zhu, Hui Lu, Evaluation Function for Siguo Game based on Two Attitudes, FSDK, Lecture Notes in Computer Science, 2006, 4223: 1322-1331.
Zhengyou Xia *,Y.C.Jiang, J.Wang. Dynamic security service negotiation to ensure security for information sharing on the Internet. Intelligence and Security Informatics. Lecture Notes in Computer Science 3495: 640-641.
ZhengYou Xia *, YunAn Hu, Jian Wang, YinChuan Jiang, et al, Analyze and Guess Type of Piece in the Computer Game Intelligent System, FSDK(2), Lecture Notes in Computer Science, 2005, 3614: 1174~1183.
专利项1项,软件著作权1项
承当国家和省部级项目各1项,空军XXX项目,
从2005年开始指导研究生,目前毕业16人,在校研究生6名,每年招2名研究生。
想报考我的学生必须提前和我联系,联系方式:QQ 3207382201, EMAIL:zhengyou_xia@nuaa.edu.cn