夏正友

Associate Professor   Supervisor of Master's Candidates

Gender:Male

Education Level:复旦大学

Degree:Doctoral Degree in Science

School/Department:College of Computer Science and Technology

Contact Information:QQ:3207382201 微信:13851514963

E-Mail:


Paper Publications

Address allocation scheme based on local MAC address

Hits:

Affiliation of Author(s):计算机科学与技术学院/人工智能学院/软件学院

Journal:Lect. Notes Comput. Sci.

Abstract:Virtualization and scale expansion in cloud data center result in sharp MAC address consumption which also expose some weaknesses in MAC address. The concept of local MAC address is proposed by IEEE standards organization to solve the limitation in traditional MAC address. In order to realize the automatic allocation of the local MAC address, we put forward two address allocation schemes which is appropriate for infrastructured network and ad-hoc network respectively. Our first scheme is a centralized management scheme which needs the usage of an address allocation device, while the other one is a distributed allocation scheme which is more suitable in wireless network without infrastructures. We simulate these two schemes based on OPNET and make an analysis on them. The results shows, our two schemes are feasible in different environment. © Springer Nature Switzerland AG 2018.

ISSN No.:0302-9743

Translation or Not:no

Date of Publication:2018-01-01

Co-author:Fan, Xinran,Ao, Ting

Correspondence Author:xzy

Pre One:A two-stage BFS local community detection algorithm based on node transfer similarity and Local Clustering Coefficient

Next One:An improved optimization of link-based label propagation algorithm

Profile

以下信息由研究生系统导入,请酌情修改完善

在IEEE internet computing,Computer Standards & Interfaces ,Microprocessors and Microsystems,Advances in Engineering Software,ICGA journal,LNCS&AI和软件学报等国内外期刊和国际会议上发表22篇论文,其中被SCI检索15篇。曾任IEEE network,Computer Standards & Interfaces ,information Science,wireless network,Journal of Computer Science & Technology (JCST)等多家国际期刊审稿人。

研究方向:

学科研究方向一:计算机科学与技术

大数据分析与挖掘:(1)Web大数据分析与挖掘;(2)金融大数据挖掘与分析

学科研究方向二:软件工程

1)Web大数据分析与挖掘;(

学科研究方向三:网络空间安全

2)金融大数据挖掘与分析

发表学术论文,出版专著情况:

主要期刊论文

Zhan Bu, Zhengyou Xia *, A last updating evolution model for online social networks,Physica A: Statistical Mechanics and its Applications   Volume 392, Issue 9, 1 May 2013, Pages 2240–2247  (SCI检索)

Zhengyou Xia * , Zhan Bu, “Community detection based on a semantic network,” Knowledge-Based Systems., pp. 30-39, Vol. 26, February 2012. (SCI检索)

Bu Z, Zhang C, Xia Z, et al. A fast parallel modularity optimization algorithm (FPMQA) for community detection in online social network[J]. Knowledge-Based Systems, 2013, 50: 246-259.(SCI检索)

Zhan Bu, Zhengyou Xia *, “A sock puppet detection algorithm on virtual spaces,” Knowledge-Based Systems, pp. 366-377, Vol. 37, January 2013。(SCI检索)

ZhengYou Xia *, Fighting criminals: Adaptive inferring and choosing the next investigative objects in the criminal network,  Knowledge-Based Systems, Elsevier, 2008Vol.21 (No.5), pp434-442. (SCI检索)

ZhengYou xia *, Yunan Hu,  Extending RSVP for quality of security service, IEEE Internet Computing ,2006(2),March/April,pp51-57. (SCI检索)

ZhengYou Xia * ,Jian Wang, DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network ,  Computer Standards & Interfaces , Elsevier, 2006,Vol.28,No.6,pp660-669. (SCI检索)

ZhengYou Xia *, YongPing Zhu, Using the Loopy Belief Propagation in Siguo, ICGA Journal 2007, 30(4),pp209-220. (SCI检索)

ZhengYou Xia *, Jian Wang, Dynamically negotiated security service for multicast application in the active network, IEE Proceedings-Communications, Feb. 2006, Volume: 153, pp31 – 38. (SCI检索)。

zhengyou xia, zhan bu,Cyber Computing: Authentication of Online Authorship or Article Based on Support Vector Machine,ICIC express letter,vol5,No.1,2014 (EI检索)

ZhengYou Xia *, ChenLing Gu,The Role of Belief in the Emergence of Social Conventions in Artificial Social System, Advanced Materials Research, 2010,Vol.159,pp210-215. (EI检索)

YiChuan.Jiang, ZhengYou.Xia, et al. A novel defense model for dynamic topology network based on mobile agent. Microprocessors and Microsystems, Elsevier Science, 2006,Vol.29, No.6, pp543-562. (SCI检索)

YiChuan.Jiang, ZhengYou.Xia, et al. Autonomous trust construction in multi-agent systems- a graph theory methodology. Advances in Engineering Software, Elsevier Science, 2006,Vol.36, No.2, pp346-352. (SCI检索)

夏正友*,..需求装载代码协议的安全缺陷分析.2005,16(6),软件学报1175-1181. 6-15. (EI检索)

夏正友*,主动网络安全结构模型设计(英文), 软件学报2002,13(8):1352-1361,8-15. (EI检索)

荣波,夏正友*,BBS在线复杂网络及其成员交互特性研究,复杂系统与复杂科学,2009,第6卷,第4期。

国际会议论文清单如下:

Zhan Bu, C Zhang, Zheng Xia, Current Attitude Prediction Model Based on Game Theory,Web Information Systems Engineering–WISE 2013, 469-478.

Zhengyou xia * ,Zhan Bu,Cyber computing:from plant ecology to cyber ecology, 2013 International Conference on Computer Software, Data Handling and Applications, ShengYang,China.

Rui Yang, Zhan Bu and Zhengyou Xia * “Automatic Summarization for Chinese Text Using Affinity Propagation Clustering and Latent Semantic Analysis,” Proceeding of 2012 International Conference on Web information Systems and Mining, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012.

Kun Fang, Zhan Bu and Zhengyou Xia *,“Segmentation of CAPTCHAs Based on Complex Networks,” Proceedings of the 4th international conference on Artificial Intelligence and Computational Intelligence, pp. 543-550, Chengdu, Sichuan, China, Oct. 26-28, 2012

Zhan Bu and Zhengyou Xia *, A Link Analysis Model Based on Online Social Networks, WISM'11-AICI'11, Sep 24-25, 2011, Taiyuan

Quan Shou, Zhan Bu and Zhengyou Xia *,“Authentication of online authorship or article Based on hypothesis testing model,” Proceedings of 2011 IEEE International Conference on Computational Science and Engineering, pp. 3-8, Dalian, Liaoning, China, Aug. 24-26, 2011.

Huang LaiLei,ZhengyouXia *, User Character and Communication Pattern Detecting on Social Network Site, International Conference on Engineering Computation,Mar-3,2009,pp1161-1166.

Huang LaiLei,ZhengyouXia *, Measuring User Prestige and Interaction Preference on Social Network Site, Eigth IEEE/ACIS International Conference on Computer and Information Science,2009,pp876-880.

ZhengYou.Xia *, LaiLei Huang Emergence of Social Rumor Modeling, Analysis, and Simulations  ,ICCS,2007, Lecture Notes in Computer Science.

ZhengYou.Xia *, Y.C.Jiang. Artificial life environment and information flow model. Cellular Automata. Lecture Notes in Computer Science, Vol. 3305, pp.650-659, Springer-Verlag Heidelberg. 2004-9-15.

ZhengYou.Xia *, Y.C.Jiang. A novel grid node by node security model. Grid and Cooperative Computing. Lecture Notes in Computer Science, Vol. 3251, pp.356-363, Springer-Verlag Heidelberg.

ZhengYou Xia *, Y.C.Jiang. A novel policy and information flow security model for active network. Intelligence and Security Informatics. Lecture Notes in Computer Science, Vol. 3073, pp.42-55, Springer-Verlag Heidelberg.

ZhengYou Xia *, Y.C.Jiang, Y.P.Zhong, S.Y.Zhang. An access control model for active network. The Ninth IEEE Symposium on Computers and Communication (ISCC2004), Alexander, Egypt, Jun 2004..

ZhengYou Xia *,A Kind of network security behavior mode1 Based on game theory ,2003年8月,IEEE PDCAT.

ZhengYou Xia *, YongPing Zhu, Hui Lu, Evaluation Function for Siguo Game based on Two Attitudes, FSDK, Lecture Notes in Computer Science, 2006, 4223: 1322-1331.

Zhengyou Xia *,Y.C.Jiang, J.Wang. Dynamic security service negotiation to ensure security for information sharing on the Internet. Intelligence and Security Informatics. Lecture Notes in Computer Science 3495: 640-641.

ZhengYou Xia *, YunAn Hu, Jian Wang, YinChuan Jiang, et al, Analyze and Guess Type of Piece in the Computer Game Intelligent System, FSDK(2), Lecture Notes in Computer Science, 2005, 3614: 1174~1183.

科研成果获奖及专利:

专利项1项,软件著作权1项

承担的科研项目情况:

承当国家和省部级项目各1项,空军XXX项目,

指导研究生情况:

从2005年开始指导研究生,目前毕业16人,在校研究生6名,每年招2名研究生。

备注:

想报考我的学生必须提前和我联系,联系方式:QQ 3207382201, EMAIL:zhengyou_xia@nuaa.edu.cn