周从华
教师姓名:   周从华
职务职称:   教授
所属系部:   物联网空间安全系、软件系统研究所
研究方向:   大数据分析与应用技术、数据与系统安全、物联网
联系电话:   0511-88791299-536
电子邮箱:   chzhou@ujs.edu.cn
个人简介
  周从华,男,1978年生,江苏盐城人,博士,副教授,硕士生导师,江苏省六大高峰人才项目资助人选,江苏大学软件系统研究所所长,江苏大学青年学术带头人,江苏大学信息安全专业负责人。2011.07-2011.12,德国锡根大学访问学者,2014.08-2015.07新加坡南洋理工大学计算机工程学院访问学者。主要研究领域包括:大数据分析技术、数据与系统安全、物联网、模型检测。主持完成国家自然科学基金中德合作交流项目一项,国家自然科学基金青年基金一项,江苏省自然科学基金一项。获批软件著作权两项,发明专利两项。已发表论文四十余篇,其中SCI和EI检索二十余篇,出版专著一本。
教研成果

期刊论文
[1]周从华,随机模型检测理论与应用,科学出版社,2014.
[2]周从华,邢支虎,刘志锋,王昌达, 马尔可夫决策过程的限界模型检测,计算机学报,2013,36(12):2587-2600.
[3]Shunrong Jiang, Jiapeng Zhang, JingJun Miao, and Conghua Zhou, A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks. International Journal of Distributed Sensor Networks. Volume 2013 (2013), Article ID 913782, 8 pages.
[4]Zhifeng Liu, Conghua Zhou, Yun Ge and Dong Zhang, Algorithmic Verification of Intransitive Noninterference for 3-domain Security Policies with a SAT Solver, Applied Mathematics & Information Sciences. 2013,7(5):1825-1835.
[5]刘志锋, 孙博, 周从华, 概率实时时态认知逻辑模型检测中抽象技术的研究, 电子学报,2013,41(7):1343-1351.
[6]ZHOU Conghua, CAO Meiling , Analysis of Fast and Secure Protocol Based on Continuous-Time Markov Chain, China communications, 2013,10(8):137-149.
[7]周从华,吴海玲,鞠时光.广义不可推断属性符号化算术验证的研究,计算机研究与发展.2012,49(12):2591-2602.
[8]周从华, 孙博, 刘志锋, 葛云. 概率时态认知逻辑模型检测中三值抽象技术的研究. 电子学报,2012,40(10):2052-2061.
[9]周从华, 叶 萌, 王昌达, 刘志锋, 多智体系统中约简状态空间的限界模型检测算法,软件学报, 2012,23(11):2835−2861.
[10]周从华,鞠时光,一种基于Petri网的隐蔽信息流分析方法,计算机学报,2012,35(8):1688-1699.
[11]周从华, 刘志锋,王昌达,概率计算树逻辑的限界模型检测,软件学报,2012,23(7):1656-1668.
[12]Conghua Zhou, Bo Sun, Abstraction in Model Checking Real-Time Temporal Logic of Knowledge. Journal of Computers. 2012,7(2):362-370.
[13]周从华,刘志锋,吴海玲,陈松,鞠时光,非传递广义无干扰属性符号化算术验证的研究,中国科学:信息科学, 2011,41(11):1310-1327.
[14]Conghua Zhou, Meiling Cao, Meng Ye, Zhihao Qian, SAT-based Algorithmic Verification of Noninterference, Journal of Computers. 2011,6(11):2310-2320.
[15]Conghua Zhou, Bo Sun, Zhifeng Liu, Abstraction for Model Checking Multi-agent Systems,Frontiers of Computer Science in China,2011,5(1):14-25.
[16]周从华,刘志锋,吴海玲,陈松,面向无传递性安全策略的语法信息流分析方法,计算机科学与探索, 2011,5(2):179-192.
[17]Shiguang Ju, Conghua Zhou, Zhifeng Liu, Changda Wang, Xiangmei Song, Inference Channel Identification with Model Checking, Journal of computational information system, 2011,7(3): 1001-1012.
[18]Conghua Zhou, Song Chen, Minchao Wang, Haiyang Li, Zhihao Qian, Structure Reduction for Verifying Noninterference properties, Journal of Information & Computational Science, 2011,8(3):446-454
[19]吴海玲, 周从华, 鞠时光, 前向可修正属性算术验证的研究, 计算机科学2011,38(3):97-102.
[20]陈松,周从华,鞠时光,王基,基于Petri网的信息流安全属性的分析与验证,计算机应用研究,2010,27(12):4638-4642.
[21]周从华, 一种基于满足性判定的并发软件验证策略,软件学报,2009,20(6):1414-1424.
[22]Conghua Zhou, Li Chen, Shiguang Ju, Petri Nets based Noninterference Analysis, Journal of Computational Information Systems,2009, 5(4):1231-1240.
[23]Conghua Zhou, Symbolic Algorithmic Verification of Generalized Noninterference, WSEAS Transactions on computers, 2009,8(6):976-987.
[24]王昌达,鞠时光,周从华,宋香梅,一种隐通道威胁审计的度量方法, 计算机学报,2009,32(4):751-762.
[25]陈立, 鞠时光, 周从华, 房芳, 张翼, 基于信息熵的隐通道能力分析, 计算机应用研究,2009,25(8):3015-3018.
[26]周从华,陈振宇,鞠时光,基于SAT的软件验证,计算机研究与发展,2008,45(s1):124-130.
[27]陈振宇,徐宝文,周从华,一种基于消解的变量极小不可满足子公式的提取方法,计算机研究与发展,2008,45(s1):43-47.
[28]周从华,刘志锋, 基于Petri网的工作流模型简化,计算机科学,2008,35(2):115-119.
[29]Conghua Zhou,SAT-based Bounded Model Checking for SE-CTL, WSEAS Transactions on Computers,2007,6(9):1057-1064.
[30]Zhihong Tao, Conghua Zhou, Zhong Chen, Lifu Wang, Bounded model checking of CTL. Journal of Computer Science and Technology,2007,22(1):39-43.
[31]周从华,刘志锋,具有过去时态算子的计算树逻辑模型检测, 计算机工程,2007,33(22):98-100.
[32]周从华,陶志红,陈钟,王立福,基于时态逻辑的工作流分析, 计算机科学,2007,34(11):118-123.
[33]Conghua Zhou, Zhihong Tao, Decheng Ding, Lifu Wang,Bounded model checking for branching-time temporal logic. Chinese Journal of Electronics, 2006, 15(4):675-678.
[34]Zhihong Tao, Conghua Zhou, Hans Kleine Buning, Lifu Wang, SAT-Based Verification of Bounded Petri Nets, Chinese Journal of Electronics,2006,15(4):567-572.
[35]Conghua Zhou, Zhenyu Chen. Model Checking Workflow Net based on Petri Net. Wuhan University Journal of Natural sciences.2006,11(5):
1297-1301.

会议论文
[1]Conghua Zhou, Yong Wang, Meiling Cao, Jianqi Shi, Yang Liu, Formal Analysis of MAC in IEEE 802.11p with Probabilistic Model Checking. 2015 International Symposium on Theoretical Aspects of Software Engineering (TASE), Pages:55-62.
[2]Conghua Zhou, Bo Sun, Zhifeng Liu,Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge, Lecture Notes in Artificial Intelligence,2010,6319:209-221.
[3]Song Chen, Conghua Zhou, Shiguang Ju, Analysis for the composition of information flow security properties on Petri net, The 2nd International Conference on Information Science and Engineering,2010: 1859-1863.
[4]Conghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu, State Space Reduction for Verifying Noninterference, The Third IEEE International Conference On Secure Software Integration and Reliability Improvement,2009, pages:132-140.
[5]Hailing Wu, Qingjie Xie, Conghua Zhou, Establishing Fingerprint Pollution Source Identification System of the Accidental Water Pollution Emergency Based on MapInfo, Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering table of contents Pages: 2051-2054.
[6]Li Chen, Shiguang Ju, Conghua Zhou, Yi Zhang, Covert channel capacity analysis based on entropy, 2008 International Symposium on Information Science and Engineering, ISISE 2008, v 1, p 363-367.
[7]Conghua Zhou, Zhenyu Chen, Zhihong Tao, QBF-Based Symbolic Model Checking for Knowledge and Time. In Proc. of International Conference on Theory and Applications of Models of Computation( TAMC07), LNCS, 4484, 386-397.
[8]Conghua Zhou, Shiguang Ju,SAT-based Bounded Model Checking for SE-LTL,In Proc. Of the 8th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing,2007, pages:582-587.
[9]Conghua Zhou, A compositional symbolic verification framework for concurrent software, Proceedings of the 2nd international conference on Scalable information systems, 2007.
[10]Conghua Zhou, Decheng Ding, Improved SAT-based Bounded Model Checking.In Proc. of International Conference on Theory and Applications of Models of Computation( TAMC06), LNCS, 3959, 611-620.
[11]Zhenyu Chen, Conghua Zhou, and Decheng Ding. Automatic abstraction refinement for petri nets verification. In Proc. of the 10th IEEE International High-Level Design Validation and Test Workshop, pages 168-174,2005.

其他成果
[1]发明专利:一种基于系统操作指南的隐通道搜索方法
[2]发明专利:一种基于航拍图的简易数字地图制作方法
[3]软件系统:扬中市民情E通(已上线)
[4] 软件系统:突发公共卫生事件现场调查处置系统(已产业化)