Faculty
 
 
 
 
Supervisors--Master Supervisors  
 
System Security and Information Security  
 
Conghua Zhou
 
Name Conghua Zhou
Title and Position Associate Professor
Research Interests Model Checking, Multi-agents, Secure Operating System, Modal Logic, Access Control
Office Phone 0511-88791299-536
E-mail chzhou@ujs.edu.cn
Curriculum Vitae

Zhou Conghua was born in 1978. He received the bachelor’s degree in 2001 and the Ph. D in 2006 in mathematics both from Nanjing University, China. He is currently an associate professor at school of computer science and telecommunication engineering, Jiangsu University. His current research areas are model checking, design and analysis of protocols, and access control.

Teaching and research achievements
Awards
1) Research on Search of Covert Channels. The Third Prize of Science and Technology Advancement, Issued by City Government of Zhenjiang, Jiangsu, China, 2008.
research Projects
1) Research on Algorithmic Verification of Information Flow Security Properties, Fund of the National Natural Science of China under Grant No. 61003288.
2) Research on Uniform Representation and Symbolic Verification of Information Flow Security Properties, Fund of the Fundamental Research Project of the Natural Science in Colleges of Jiangsu Province under Grant No. 08KJD520015, 2008-2010.
3) Research on SAT-based Bounded Model Checking, Fund of the People with Ability Foundation of Jiangsu University under Grant No. 07JDG014, 2007-2010..
Selected Journal Papers since 2005
1) Conghua Zhou, Zhifeng Liu, Hailing Wu, Song Chen, Symbolic algorithmic verification of intransitive generalized noninterference, Chinese Science F: Information Science. 2011,41(11):1310-1327. (in English)
2) Shiguang Ju, Conghua Zhou, Zhifeng Liu, Changda Wang, Xiangmei Song, Inference Channel Identification with Model Checking, Journal of computational information system, 2011,7(3): 1001-1012. (in English)
3) Conghua Zhou, Bo Sun, Zhifeng Liu, Abstraction for Model Checking Multi-agent Systems,Frontiers of Computer Science in China,2011,5(1):14-25. (in English)
4) Zhou Conghua, Liu Zhifeng, Wu Hailing, Chen Song, Nontransitive Security Policy Oriented Syntactic Information Flow Analysis, Journal of Frontiers of Computer Science and Technology, 2011,5(2). (in Chinese)
5) Zhou Conghua, SAT-based Compositional Verification Strategy for Concurrent Software with States, Events,JOURNAL OF SOFTWARE,2009,20(6):1414-1424.(in English)
6) Zhou Conghua, Chen Li, Ju Shiguang, Petri Nets based Noninterference Analysis, Journal of Computational Information Systems,2009, 5(4):1231-1240. (in English)
7) Conghua Zhou, Symbolic Algorithmic Verification of Generalized Noninterference, WSEAS TRANSACTIONS on COMPUTERS, 2009,8(6):976-987. (in English)
8) Wang Changda, Ju Shiguang, Zhou Conghua, Song Xiangmei, A Measurement of Covert Channels Threat, CHINESE JOURNAL OF COMPUTERS , 2009,32(4):751-762.(in Chinese)
9) Zhou Conghua, Chen Zhenyu, Ju Shiguang, SAT-Based Software Verification, Journal of Computer Research and Development, 2008,45(s1):124-130. (in Chinese)
10) Zhou Conghua, Liu Zhifeng, Reduction of Petri Net-based Workflow Model, COMPUTER SCIENCE, 2008,35(2):115-119. (in Chinese)
11) Chen Zhenyu, Xu Baowen, Zhou Conghua, A Resolution-Based Approach for Extracting Variable Minimal Unsatisfiable Sub-Formulas, Journal of Computer Research and Development, 2008,45(s1):43-47. (in Chinese)
12) Chen Li, Ju Shiguang, Zhou Conghua, Fang Fang, Zhang Yi, Covert channel capacity analysis based on information entropy, Application Research of Computers, 2009,26(8):3015-3018. (in English)
13) Zhou Conghua,SAT-based Bounded Model Checking for SE-CTL, WSEAS Transactions on Computers,2007,6(9):1057-1064. (in English)
14) Tao Zhihong, Zhou Conghua, Chen Zhong, Wang Lifu, Bounded model checking of CTL. Journal of Computer Science and Technology,2007,22(1):39-43. (in English)
15) Zhou Conghua, Liu Zhifeng, Model Checking of Computation Tree Logic with Past Temporal Operators, COMPUTER ENGINEERING , 2007,33(22):98-100. (in Chinese)
16) Zhou Conghua, Tao Zhihong, Chen Zhong, Wang lifu, Temporal Logic-based Workflow Analysis, COMPUTER SCIENCE, 2007,34(11):118-123. (in Chinese)
17) Zhou Conghua, Tao Zhihong, DingDecheng, Wang Lifu, Bounded model checking for branching-time temporal logic. Chinese Journal of Electronics, 2006, 15(4):675-678. (in English)
18) Zhou Conghua, Chen Zhenyu. Model Checking Workflow Net based on Petri Net. Wuhan University Journal of Natural sciences.2006,11(5):1297-1301. (in English)
19) Conghua Zhou, Bo Sun, Abstraction in Model Checking Real-Time Temporal Logic of Knowledge. Journal of Computers. 2012,7(2):362-370.
Selected refereed conference Papers since 2005
1) Song Chen, Conghua Zhou, Shiguang Ju, Analysis for the composition of information flow security properties on Petri net, The 2nd International Conference on Information Science and Engineering,2010: 1859-1863. (in English)
2) Conghua Zhou, Bo Sun, Zhifeng Liu,Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge, Lecture Notes in Artificial Intelligence,2010,6319:209-221. (in English)
3) Conghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu, State Space Reduction for Verifying Noninterference, The Third IEEE International Conference On Secure Software Integration and Reliability Improvement,2009, pages:132-140. (in English)
4) Hailing Wu, Qingjie Xie, Conghua Zhou, Establishing Fingerprint Pollution Source Identification System of the Accidental Water Pollution Emergency Based on MapInfo, Proceedings of the 2009 First IEEE International Conference on Information Science and Engineering table of contents Pages: 2051-2054. (in English)
5) Chen Li, Ju Shiguang, Zhou Conghua, Zhang Yi, Covert channel capacity analysis based on entropy, 2008 International Symposium on Information Science and Engineering, ISISE 2008, v 1, p 363-367. (in English)
6) Zhou Conghua, Chen Zhenyu, Tao Zhihong, QBF-Based Symbolic Model Checking for Knowledge and Time. In Proc. of International Conference on Theory and Applications of Models of Computation( TAMC07), LNCS, 4484, 386-397. (in English)
7) Zhou Conghua, Ju Shiguang,SAT-based Bounded Model Checking for SE-LTL,In Proc. Of the 8th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing,2007, pages:582-587. (in English)
8) Conghua Zhou, A compositional symbolic verification framework for concurrent software, Proceedings of the 2nd international conference on Scalable information systems, 2007. (in English)
9) Zhou Conghua, Ding Decheng, Improved SAT-based Bounded Model Checking.In Proc. of International Conference on Theory and Applications of Models of Computation( TAMC06), LNCS, 3959, 611-620. (in English)
10) Chen Zhenyu, Zhou Conghua, and Ding Decheng. Automatic abstraction refinement for petri nets verification. In Proc. of the 10th IEEE International High-Level Design Validation and Test Workshop, pages 168-174,2005. (in English)
Copyright © 2016 - 2023 School of Computer Science and Communication Engineering · All Rights Reserved
Address:School of Computer Science and Communication Engineering JiangSu University ,ZhenJiang,JiangSu Province Post Code:212013   Tel:0511-88780371 Email:jsj@ujs.edu.cn