人才培养
 
 
 
 
师资力量 当前位置: 学院首页 > 人才培养 > 师资力量 > 教授 > 正文
 
教授  教授 |  副教授 |  讲师 |  其他专技 |
 
周从华
发布日期:2023-06-03   浏览次数:
 


教师姓名:

周从华

职务职称:

教授

所属系部:

网络空间安全系、软件系统研究所

研究方向:

人工智能、大数据分析与应用

联系电话:

0511-88791299-536

电子邮箱:

chzhou@ujs.edu.cn

个人简介

周从华,男,1978年生,江苏盐城人,博士,教授,江苏省333工程人才,江苏省六大高峰人才,江苏省双创博士,镇江市金山英才,镇江市优秀创新创业人才,d3顶盛体育官网京口区新一代信息技术产业研究院院长,d3顶盛体育官网青年学术带头人。2011.07-2011.12,德国锡根大学访问学者,2014.08-2015.07新加坡南洋理工大学计算机工程学院访问学者。主要研究领域包括:大数据分析技术、数据与系统安全、物联网、模型检测。主持完成国家自然科学基金中德合作交流项目一项,国家自然科学基金青年基金一项,江苏省自然科学基金一项。

教研成果

期刊论文
[1]周从华,随机模型检测理论与应用,科学出版社,2014.
[2]周从华,邢支虎,刘志锋,王昌达, 马尔可夫决策过程的限界模型检测,计算机学报,2013,36(12):2587-2600.
[3]Shunrong Jiang, Jiapeng Zhang, JingJun Miao, and Conghua Zhou, A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks. International Journal of Distributed Sensor Networks. Volume 2013 (2013), Article ID 913782, 8 pages.
[4]Zhifeng Liu, Conghua Zhou, Yun Ge and Dong Zhang, Algorithmic Verification of Intransitive Noninterference for 3-domain Security Policies with a SAT Solver, Applied Mathematics & Information Sciences. 2013,7(5):1825-1835.
[5]刘志锋, 孙博, 周从华, 概率实时时态认知逻辑模型检测中抽象技术的研究, 电子学报,2013,41(7):1343-1351.
[6]ZHOU Conghua, CAO Meiling , Analysis of Fast and Secure Protocol Based on Continuous-Time Markov Chain, China communications, 2013,10(8):137-149.
[7]周从华,吴海玲,鞠时光.广义不可推断属性符号化算术验证的研究,计算机研究与发展.2012,49(12):2591-2602.
[8]周从华, 孙博, 刘志锋, 葛云. 概率时态认知逻辑模型检测中三值抽象技术的研究. 电子学报,2012,40(10):2052-2061.
[9]周从华, 叶 萌, 王昌达, 刘志锋, 多智体系统中约简状态空间的限界模型检测算法,软件学报, 2012,23(11):2835−2861.
[10]周从华,鞠时光,一种基于Petri网的隐蔽信息流分析方法,计算机学报,2012,35(8):1688-1699.
[11]周从华, 刘志锋,王昌达,概率计算树逻辑的限界模型检测,软件学报,2012,23(7):1656-1668.
[12]Conghua Zhou, Bo Sun, Abstraction in Model Checking Real-Time Temporal Logic of Knowledge. Journal of Computers. 2012,7(2):362-370.
[13]周从华,刘志锋,吴海玲,陈松,鞠时光,非传递广义无干扰属性符号化算术验证的研究,中国科学:信息科学, 2011,41(11):1310-1327.
[14]Conghua Zhou, Meiling Cao, Meng Ye, Zhihao Qian, SAT-based Algorithmic Verification of Noninterference, Journal of Computers. 2011,6(11):2310-2320.
[15]Conghua Zhou, Bo Sun, Zhifeng Liu, Abstraction for Model Checking Multi-agent Systems,Frontiers of Computer Science in China,2011,5(1):14-25.
[16]周从华,刘志锋,吴海玲,陈松,面向无传递性安全策略的语法信息流分析方法,计算机科学与探索, 2011,5(2):179-192.
[17]Shiguang Ju, Conghua Zhou, Zhifeng Liu, Changda Wang, Xiangmei Song, Inference Channel Identification with Model Checking, Journal of computational information system, 2011,7(3): 1001-1012.
[18]Conghua Zhou, Song Chen, Minchao Wang, Haiyang Li, Zhihao Qian, Structure Reduction for Verifying Noninterference properties, Journal of Information & Computational Science, 2011,8(3):446-454
[19]吴海玲, 周从华, 鞠时光, 前向可修正属性算术验证的研究, 计算机科学2011,38(3):97-102.
[20]陈松,周从华,鞠时光,王基,基于Petri网的信息流安全属性的分析与验证,计算机应用研究,2010,27(12):4638-4642.
[21]周从华, 一种基于满足性判定的并发软件验证策略,软件学报,2009,20(6):1414-1424.
[22]Conghua Zhou, Li Chen, Shiguang Ju, Petri Nets based Noninterference Analysis, Journal of Computational Information Systems,2009, 5(4):1231-1240.
[23]Conghua Zhou, Symbolic Algorithmic Verification of Generalized Noninterference, WSEAS Transactions on computers, 2009,8(6):976-987.
[24]王昌达,鞠时光,周从华,宋香梅,一种隐通道威胁审计的度量方法, 计算机学报,2009,32(4):751-762.
[25]陈立, 鞠时光, 周从华, 房芳, 张翼, 基于信息熵的隐通道能力分析, 计算机应用研究,2009,25(8):3015-3018.
[26]周从华,陈振宇,鞠时光,基于SAT的软件验证,计算机研究与发展,2008,45(s1):124-130.
[27]陈振宇,徐宝文,周从华,一种基于消解的变量极小不可满足子公式的提取方法,计算机研究与发展,2008,45(s1):43-47.
[28]周从华,刘志锋, 基于Petri网的工作流模型简化,计算机科学,2008,35(2):115-119.
[29]Conghua Zhou,SAT-based Bounded Model Checking for SE-CTL, WSEAS Transactions on Computers,2007,6(9):1057-1064.
[30]Zhihong Tao, Conghua Zhou, Zhong Chen, Lifu Wang, Bounded model checking of CTL. Journal of Computer Science and Technology,2007,22(1):39-43.
[31]周从华,刘志锋,具有过去时态算子的计算树逻辑模型检测, 计算机工程,2007,33(22):98-100.
[32]周从华,陶志红,陈钟,王立福,基于时态逻辑的工作流分析, 计算机科学,2007,34(11):118-123.
[33]Conghua Zhou, Zhihong Tao, Decheng Ding, Lifu Wang,Bounded model checking for branching-time temporal logic. Chinese Journal of Electronics, 2006, 15(4):675-678.
[34]Zhihong Tao, Conghua Zhou, Hans Kleine Buning, Lifu Wang, SAT-Based Verification of Bounded Petri Nets, Chinese Journal of Electronics,2006,15(4):567-572.
[35]Conghua Zhou, Zhenyu Chen. Model Checking Workflow Net based on Petri Net. Wuhan University Journal of Natural sciences.2006,11(5):
1297-1301.

会议论文
[1]Conghua Zhou, Yong Wang, Meiling Cao, Jianqi Shi, Yang Liu, Formal Analysis of MAC in IEEE 802.11p with Probabilistic Model Checking. 2015 International Symposium on Theoretical Aspects of Software Engineering (TASE), Pages:55-62.
[2]Conghua Zhou, Bo Sun, Zhifeng Liu,Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge, Lecture Notes in Artificial Intelligence,2010,6319:209-221.
[3]Song Chen, Conghua Zhou, Shiguang Ju, Analysis for the composition of information flow security properties on Petri net, The 2nd International Conference on Information Science and Engineering,2010: 1859-1863.
[4]Conghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu, State Space Reduction for Verifying Noninterference, The Third IEEE International Conference On Secure Software Integration and Reliability Improvement,2009, pages:132-140.
[5]Hailing Wu, Qingjie Xie, Conghua Zhou, Establishing Fingerprint Pollution Source Identification System of the Accidental Water Pollution Emergency Based on MapInfo, Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering table of contents Pages: 2051-2054.
[6]Li Chen, Shiguang Ju, Conghua Zhou, Yi Zhang, Covert channel capacity analysis based on entropy, 2008 International Symposium on Information Science and Engineering, ISISE 2008, v 1, p 363-367.
[7]Conghua Zhou, Zhenyu Chen, Zhihong Tao, QBF-Based Symbolic Model Checking for Knowledge and Time. In Proc. of International Conference on Theory and Applications of Models of Computation( TAMC07), LNCS, 4484, 386-397.
[8]Conghua Zhou, Shiguang Ju,SAT-based Bounded Model Checking for SE-LTL,In Proc. Of the 8th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing,2007, pages:582-587.
[9]Conghua Zhou, A compositional symbolic verification framework for concurrent software, Proceedings of the 2nd international conference on Scalable information systems, 2007.
[10]Conghua Zhou, Decheng Ding, Improved SAT-based Bounded Model Checking.In Proc. of International Conference on Theory and Applications of Models of Computation( TAMC06), LNCS, 3959, 611-620.
[11]Zhenyu Chen, Conghua Zhou, and Decheng Ding. Automatic abstraction refinement for petri nets verification. In Proc. of the 10th IEEE International High-Level Design Validation and Test Workshop, pages 168-174,2005.

其他成果
[1]发明专利:一种基于系统操作指南的隐通道搜索方法
[2]发明专利:一种基于航拍图的简易数字地图制作方法
[3]软件系统:扬中市民情E通(已上线)
[4] 软件系统:突发公共卫生事件现场调查处置系统(已产业化)

d3顶盛体育官网 版权所有
Copyright (C) 2018-2023.cs.ujs.edu.cn. All rights resterved
地址:江苏省镇江市京口区学府路301号d3顶盛体育官网计算机学院 邮编:212013   Tel:0511-88780371 Email:jsj@ujs.edu.cn