Present Academic Rank and Position Education Background Certification Research Experience Teaching Experience Journal Reviewer Honors & Awards Professional & Society Memberships Research Grants Awarded Patents Presentations Given & Academic Visits Research Interests Publications Students Education Background
[ GO TOP ] Sun Certification Programmer for the JavaTM 2 Platform 1.2, January 16, 2003. [ GO TOP ] 1999.9–2003.12 2003.12–2006.3 2006.4–present 2006.7–2009.4 2011.1-present
[ GO TOP ]
[ GO TOP ] · Computer Communications · Journal of Communications · Computer Science · Journal of Nanjing University of Science and Technology(Nature Science) · Journal of University of Electronic Science and Technology of China · Journal of PLA University of Science and Technology (Natural Science Edition) [ GO TOP ] · The reform and innovation of the innovative model of weapons and innovative talents, the first prize of graduate education achievements, China Academic Degree and Graduate Education Society, 2018, 2/5 · Exploration and Practice of Software Basic Capability Progressive Training System, Special Award for Teaching Achievements, Nanjing University of Science and Technology, 2018, 2/9 · Process Control and Model Innovation Simultaneously, Promoting Postgraduate Training “Qualification” and “Enhanced Efficiency”——Exploration and Practice of Deepening the Connotational Development of Graduate Education in Nanjing University of Science and Technology, Second Prize of Jiangsu Province Graduate Training and Innovation Engineering Graduate Education Reform Achievement Award, JIANGSU EDUCATION DEPARTMENT, 2018, 4/5 · "Data Structures and Algorithms Analysis: C++Edition (First Edition)",Excellent Teaching Material First Prize,Nanjing University of Science and Technology,2017 · "Research-based Teaching Innovation Team in 2016", Ministry of Industry and Information Technology of the People’s Republic of China,2016 · "Data structure",Education Department Second Season Brand International Lessons Delivered in English in China,JIANGSU EDUCATION DEPARTMENT,2016 · The Innovation and Practice of the Training Mode of Application Oriented Graduate Students of National Defense Information Technology,"Second Prize of Teaching Production", Nanjing University of Science and Technology,2016 · "Excellent Teaching Team of Software Engineering ", Nanjing University of Science and Technology,2014 · Improvement and Practice of Engineering Practice Ability of Professional Graduate Students,Graduate Student Education Mode Reform Result Second Price, JIANGSU EDUCATION DEPARTMENT,2015 · "Data structure",Provincial All English Teaching Quality Courses ,JIANGSU EDUCATION DEPARTMENT,2014 · "Data structure",MOOC Course Construction,Nanjing University of Science and Technology,2014 · Research and Practice on The Training Mechanism of Innovation Talents in Software Engineering,Teaching Achievement First Prize ,Nanjing University of Science and Technology,2012 · Research on The Original Innovation Ability of University and Its Application in Software Engineering Course Teaching and Experiment,Teaching Achievement First Prize ,Nanjing University of Science and Technology,2011 · "The Six Top Talents" of Jiangsu Province, JIANGSU EDUCATION DEPARTMENT, 2011. · "Excellent faculty for the ZIJIN Project", Nanjing University of Science and Technology, 2010. · "Data structure", Award for Teaching Achievement,JIANGSU EDUCATION DEPARTMENT, 2010. · Award for Excellent graduate Teachers, Nanjing University of Science and Technology, 2010. · Prize for Excellent Young Teachers, Nanjing University of Science and Technology, 2010. · "Data structure", Award for Excellent Undergraduate Courses,JIANGSU EDUCATION DEPARTMENT, 2010. · "Formal Semantics Of Programming", Award for Excellent Graduate Courses, Nanjing University of Science and Technology, for “The Formal Semantics of Programs”, 2010. · Education Fund First Prize, Nanjing University of Science and Technology, 2009. · Ministry of National Defense Science and Technology Progress Second Prize, Commission of Science Technology and Industry for National Defense, 2006. · Outstanding Young Teacher of “Qing Lan” projects, JIANGSU EDUCATION DEPARTMENT, 2006. · Multi Platform Incremental Software Development Training Mechanism,Teaching Achievement First Prize,Nanjing University of Science and Technology,2006 · "Discrete Mathematics",Excellent Teaching Material Second Prize,Nanjing University of Science and Technology,2006 · Lecture Competition First Prize, Nanjing University of Science and Technology, 2005. · Outstanding Graduate Prize, Commission of Science Technology and Industry for National Defense, 2004. (only one person every year in the school of Computer Science and Technology). [ GO TOP ] Professional and Society Memberships · Advanced member of The National Computer Association · Member of Chinese Association for Cryptologic Research · Member of The Jiangsu Provincial Computer Association [ GO TOP ] Principle Director · Horizontal project, Emotion analysis System based on hot events, 2019.01-2020.12. · Science and Technology Program of the National Cyber Security Center, Research on foreign Cyber Information Security Policy, Jiangsu Branch of the National Cyber Security Center, 2019.06-2019.11. · Horizontal project, Research on malware Detection Technology, September, 2019.09- 2019.12. · Construction project of "Golden Course", Data structure, Nanjing University of Science and Technology, 2019 · Key teaching material project of Jiangsu higher education, data structure and algorithm analysis: C++ language edition (2nd edition), jiangsu education department, 2018. · School-level planning textbook project key project, data structure and algorithm analysis (2nd edition), revised, 2018 · Jiangsu Postgraduate Workstation, National Computer Network and Information Security Management Center, Jiangsu Branch, 2018 · Jiangsu Province Postgraduate Education Teaching Reform Project (provincial provincial key project), research and practice of postgraduate teaching quality monitoring based on educational big data, 2018-2019 · Corporate cooperation horizontal project, research and implementation of network attack tracking and traceability technology based on complex network theory, 2018.3-2019.3 · National Security Center special longitudinal research project, “Research on Software and Software Testing Based on Complex Network” , Jul 2017-Jul 2018 · Corporate cooperation horizontal project, “User Behavior Analysis System” , Jun 2017-Sep 2017 · Corporate cooperation horizontal project, “XX Management Mobile Application Development” , Feb 2016-Oct 2016 · Corporate cooperation horizontal project, “XX Mobile Terminal System” , Mar 2015-Dec 2016 · China Academic Degree and Graduate Education Institute Research Project, “Exploration and Practice on The Monitoring and Early Warning Mechanism of Graduate Cultivation Quality under The Background of Big Data” , Jan 2015-Jan 2016 · Corporate cooperation horizontal project, “XX Information Security Monitoring System” , Jul 2014-Jul 2015 · Corporate cooperation horizontal project, “XX Beidou XX Rescue System” , Feb 2014 –Mar 2015. · Ministry fund project, “XX Reliable Technology Research” , 2012 -2014. · National Natural Science Foundation of China (NSFC) Grant, “Research on Identification and Protection Mechanism of Central Nodes in Complex Networks Based on Autonomic Collaboration under Internet Environment” (No.61003210), June 2011 – June 2013. · Natural Science Foundation of Jiangsu Province Grant, “Research on Identification and Protection Mechanism of Network Essential Nodes Based on Autonomic Collaboration” (No.BK2010491), July 2010 –July 2012. · "The Six Top Talents" of Jiangsu Province Grant, “Security and Reliability Supported Technologies of Wireless Sensor Networks in the Internet of Things” (No.11-C-028), Jan. 2012 - Dec.2014. · “Top Talents” Research Foundation of Nanjing University of Science and Technology Grant, “Research on Dynamic Identification and Protection Mechanism of Essential Nodes in Complex Network”, Jan. 2010 – Dec.2012. · Independent Research Projects of Nanjing University of Science and Technology Grant, “Research on Identification and Protection Mechanism of Central Nodes in Complex Networks Based on Autonomic Collaboration”, Jan. 2010 – Dec.2011. · “Challenge Cup” of Nanjing University of Science and Technology Grant, Worm Virus spreading control and prevention systems in the Internet of Things, Sep. 2011- Sep. 2012. · National Innovation Experiment Program for University Students, “Evaluation Method for Node Importance in Weighted Complex Networks”, Oct. 2011 – Oct. 2012. · National Innovation Experiment Program for University Students, “Essential Nodes Identification in Complex Networks based on Grey Relational Analysis”, Oct. 2009 – Oct. 2010. · Innovation Experiment Program for University Students of Jiangsu Province Grant, ”Research and Implementation of a Novel Clustering Algorithm based on Weighted Complex Networks”, Oct. 2010 – Oct. 2011. · Innovation Experiment Program for University Students of Jiangsu Province Grant, “Study on Measure of Complex Communication Networks Invulnerability”, Oct. 2008 – Oct. 2009. · Research project, “Research on Service Integration and Information Dissemination”, Jan. 2008 – Dec. 2008. · Research project, “Implementation of Software Module Supporting IPv4/IPv6 Dual Stacks”, Jan. 2010 – Dec. 2010. · Scientific Research Foundation of Nanjing University of Science and Technology Grant, "Research on the Assurance Ability of Computing System on Software Reliability”, Jan. 2004 - Dec. 2005. · University undergraduate innovation project, AS Level Internet Topology and Evolution Analysis Based on Complex Network Theory, 2011-2012. · The university teaching reform project, Rankesearch and Practice of The Training Mode of Innovative Talents In Computer Science Education Based on The Concept of CDIO, 2011-2012 · The university teaching reform project, The Reform and Practice of Teaching Mode of Data Structure, Oct.2009-Sep.2010 Participant · National Natural Science Foundation of China (NSFC) Grant, “Coordinated Protection and Security Risk Prediction of Fusion of Ubiquitous Network”, Jan 2013 – Jan 2016. · Natural Science Foundation of Jiangsu Province Grant, “ Security Perception and Global Security Control of Wireless Sensor Network ”, July 2011 – July 2014. · National Natural Science Foundation of China (NSFC) Grant, “Trusted Software Risk Multi-Level Integrated Management Technology ”, Jan 2008 – Jan 2011. [ GO TOP ] · Zhang Kun, Liu Zhiming, Zhang Lilinqing, Sun Qi, Li Xun. News sentiment analysis method based on multi-model fusion. CN202011400913.4.Application Time:2020.12.03 · Zhang Kun, Wang Qi, Chen Xuan, Bian Xue-wen, Liu Yi. A method of software fault propagation based on cellular automata. Authorized, No. : ZL201310706727.7. Application date: 2013-12-19, authorization date: 2019-03-29-2022.12.31. · Wang Bo, Zhang Kun, Wu Qian, Lin Xing Chen, Zhang Jia Wang, Xu Jian, Cai Ying, Mou Jia Peng.A Software Test Case Automatic Generation Method. 201810190656.2. Application Time:2018.03.08 · Zhu Man Zhou, Zhang Kun, Cai Ying, Ma Meng Yue, Zhou Meng, Zhang Yun Chun.A Method for Determining the Associated Co-occurrence Pattern of a Moving Target. 201810029027.1. Application Time:2018.01.12 · Wang Bo, Zhang Kun, Wu Qian, Lin Xing Chen, Zhang Jia Wang, Xu Jian, Cai Ying, Mou Jia Peng. The Evaluation Method of Node Test Importance Based on Similarity and TrustRank Algorithm. 201711152346.3.Application Time:2017.11.19 · Zhang Kun, Xu Jian, Zhao Xue Long, Tian Chun Shan, Xu Jian, Zhang Hong. A Heuristic Routing Method Based on Avoid Key Node in Complex Network. Public No. CN1032200096A.Application Time:2013.03.13,Authorization time:2016.04 · Zhang Kun, Wang Qi, Zhang Hong, Chen Xuan, Xu Jian. A Combination of Agent Service Selection Method Based on Tabu Search. No. ZL201310164877X.Application Time:2013.05.07,Authorization time:2016.01.20 · Zhang Kun, Zhu Bao Ping, Zhong Yi, Li Qian Mu,Tian Chun Shan, Zhang Hong.Complex NetWork Protect Method of increased key node Link.No. ZL201310079323X.Application Time:2013.03.13,Authorization time:2015.12.09 · Zhang Kun, Wang Heng, Zhang Hong, Liu Feng Yu, Yan Han. A Dynamic Distributed Multicast Routing Method Based on Simulated Annealing. No. ZL200610086144.9.Application Time:2009.11.18,Authorization time:2013.01.02 · Zhang Kun, Xu Man-wu, Xu Jian, Zhang Hong, Liu Feng Yu. Agent Service Description Model and Matchmaking Method Based on Semantic and QoS . No. ZL20101674328.Application Time:2006.09.04,Authorization time:2008.11.05 · Zhang Kun, Gao Fei, Bian Xue Wen, Liu Jian, Feng Xin Qi. The Encryption and Decryption Algorithm of Cellular Automata Based on Coupling Auto Trigger. 2015103343440.Application Time:2015.06.16 · Zhang Kun.Network Topology Generation SoftwareV1.0. Computer Software Copyright,CAS RN:2014SR152143.Authorization time:2014.10.14 [ GO TOP ] Presentations Given and Academic Visits · Laishui Lv, Kun Zhang. Multi-Dimensional HITS based on random walks for multilayer temporal networks[J]. 2019 12th International Conference on Computer Science and Information Technology (ICCSIT 2019) . University of Barcelona, Barcelona, Spain.2019.12.18, oral report. · Zhao Yi, Zhang Kun, Zhang Hong, Yan Xia ,Cai Ying. Hot Topic Detection Based on Combined Content and Time Similarity. The 2017 IEEE International Conference on Progress in Informatics and Computing(PIC2017). 2017,399-403,read papers at the conference.EI:20182405301218. · Zhang Kun. Reform of Academic Graduate Cultivating Model Improve the Quality of Education—Nanjing University of Science and Technology Discussion on Practical Ability Training of Academic Graduate. The Twenty-Eighth National Graduate School of Engineering Graduate Education Seminar. 2016. · Xie B., Tang X., Tang F. Hybrid Recommendation Base on Learning to Rank . Proceedings - 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS.2015,53-57, included in EI. · Bian Xuewen, Zhang Kun. Modeling Network with Topic Model and Triangle Motif. 2015 IEEE International Conference on Cloud and Big Data Computing (CBDCom 2015). 2015,880-886,read papers at the conference. · Zhuang Ke Chen, Zhang Hong, Zhang Kun. Simulation-based Analysis of Worm Propagation in Wireless Sensor Network . 2012 Fourth International Conference on Multimedia Information Networking and Security(MINE2012). 2012,847-851,read papers at the conference. · Zhuang Kun, Zhang Hong, Wu Yong Dong, Bao Feng.Evaluating the Importance of Nodes in Complex Networks based on Principal Component Analysis and Grey Relational Analysis.The 17th IEEE International Conference on Networks (ICON2011). 2011,231-235,session chair and read papers at the conference. · Zhang Kun, Zhang Hong, Jiang Li Ming, Xujian. Composite Agent Service Selection Algorithm for Non-functional Attribute based on Simulated Annealing. 2010 Second WRI World Congress on Software Engineering(WCSE2010). 2010,101-106,read papers at the conference. · Academic Visit to America, “Detection and Estimation of Software Aging”, FIU(Florida International University), USA, 2006.4. · Zhang Kun, Liu Feng Yu, Wang Heng. Anomaly Detection by the Sequence of System Calls & Parameters using SVM. In: The Second International Conference on Computational Intelligence, Robotics and Autonomous Systems(CIRAS’03). Pan Pacific Hotel, Singapore, 2003, PS08-5-01,read papers at the conference. [ GO TOP ] I have broad interests in Complex Network, Information Security, Trusted Computing, Autonomic Computing. Currently, I am interested in the following network security topics and related application areas. · Network security: identification and protection of network essential nodes, network optimization, trusted network, intrusion detection network. · Application areas: structural vulnerability analysis of large scale dynamic networks and communication or transportation networks. [ GO TOP ] Books · Zhang Kun,Zhang Hong,Zhu Bao-ping. Data structure and algorithm analysis(C++ edition).ISBN:978-7-115-40927-0,Beijing: Posts and Telecommunications Press.2016.2 · Zhu Bao-ping, Ye You-pei,Jin Zhong,Zhang Kun. Discrete Mathematics(second edition).ISBN:978-7-564-08668-8,Beijing: Beijing Institute of Technology Press. 2014. 2 · Yan Han, Li Qian-mu, Zhang Kun. C++ Programming. ISBN:978-7-302-22721-2,Beijing: Tsinghua University Press.2010. 7 · Xu Man-wu, Yan Han, Zhang Kun, Li Qian-mu. Java Programming. ISBN:978-7-040-19645-0,Beijing: Higher Education Press. 2006. 5 · Zhu Bao-ping, Ye You-pei, Zhang Kun. Discrete Mathematics. ISBN:978-7-564-08668-8,Beijing Institute of Technology Press. 2006. 5 Articles (2005-present) · Qi Sun, Kun Zhang*, Kun Huang, Tiancheng Xu, Li Xun, Yaodi Liu. Document-level relation extraction with two-stage dynamic graph attention networks[J]. ISSN: 0950-7051, Knowledge-Based Systems, 2023: 110428. (Accept, SCI JCR Q1). · Qi Sun, Tiancheng Xu, Kun Zhang*, Kun Huang, Laishui Lv, Xun Li, Ting Zhang, Doris Dore-Natteh. Dual-Channel and Hierarchical Graph Convolutional Networks for document-level relation extraction[J]. ISSN: 0957-4174, Expert Systems with Applications, 2022, 205: 117678, WOS: 000832950900003. (SCI JCR Q1). · Qi Sun, Kun Zhang*, Kun Huang, Li Xun, Ting Zhang, Tiancheng Xu. Enhanced graph convolutional network based on node importance for document-level relation extraction[J]. ISSN: 0941-0643, Neural Computing and Applications, 2022, 34(18): 15429-15439, WOS:000785709000004. (SCI JCR Q2). · Qi Sun, Kun Zhang*, Laishui Lv, Xun Li, Kun Huang, Ting Zhang. Joint extraction of entities and overlapping relations by improved graph convolutional networks[J]. ISSN: 0924-669X, Applied Intelligence, 2022, 52(5): 5212-5224, WOS:000682464100002. (SCI JCR Q2). · Ting Zhang, Kun Zhang, Laishui Lv,Xun Li, Yue Fang, Tensor decomposition for link prediction in temporal directed networks[J].ISSN:1742-5468,Journal of Statistical Mechanics: Theory and Experiment.2021, 2021(1):013402.(SCI JCR 3).SCI:000621475000001. · Ting Zhang, Kun Zhang, Xun Li, Laishui Lv, Qi Sun, Semi-supervised Link Prediction based on Non-negative Matrix Factorization for Temporal Networks[J].ISSN:0960-0779, Chaos, Solitons & Fractals. 2021, 145: 110769.(SCI JCR 3). · Laishui Lv, Kun Zhang, Dalal Bardou, Xun Li,Ting Zhang. HITS centrality based on inter-layer similarity for multilayer temporal networks[J]. ISSN: 0925-2312, Neurocomputing . 2021, 423: 220-235, (SCI JCR 2). · Ting Zhang, Kun Zhang, Laishui Lv, Xun Li. Temporal link prediction using node centrality and time series[J]. ISSN: 2010-3751,International Journal of Future Computer and Communication . 2020,9(3): 62-65. · Ting Zhang, Kun Zhang, Laishui Lv, Dalal Bardou. Graph Regularized Non-negative Matrix Factorization for Temporal Link Prediction Based on Communicability[J]. ISSN: 0031-9015,Journal of the Physical Society of Japan . 2019, 88(7): 074002-074010.(SCI JCR 4).SCI: 000473520100005. · Ting Zhang, Kun Zhang,Laishui Lv, Dalal Bardou. Co-Ranking for nodes, layers and timestamps in multilayer temporal networks[J]. ISSN:0960-0779, Chaos, Solitons & Fractals. 2019, 125: 88-96.(SCI JCR 3).SCI: 000470833400011. · Laishui Lv, Kun Zhang, Ting Zhang, Xun Li, Jiahui Zhang. Eigenvector centrality measure based on node similarity for multilayer and temporal networks[J] ISSN:2169-3536,IEEE Access,2019,7,115725-115733. (SCI JCR 2).SCI:000484230200012. · Laishui Lv, Kun Zhang. Multi-Dimensional HITS based on random walks for multilayer temporal networks[C]. 2019 12th International Conference on Computer Science and Information Technology (ICCSIT 2019) . Accepted. · Laishui. Lv, Kun Zhang, Dalal Bardou, Ting Zhang, Ying Cai. A new centrality measure based on topologically biased random walks for multilayer networks[J]. ISSN:0031-9015,Journal of the Physical Society of Japan,2019,88(2):024010~1-024010-7.(SCI JCR 4).SCI:000457548900011.. · Laishui. Lv, Kun Zhang, Ting Zhang, Meng-Yue Ma. Nodes and layers PageRank centrality for multilayer networks[J]. ISSN:1674-1056,Chinese Physics B,2019:020501~1-020501-8.(SCI JCR4) , SCI:000458915200001. . . · Laishui. Lv, Kun Zhang, Dalal Bardou, Ting Zhang, Jiahui Zhang, Ying Cai, Tongtong Jiang. A new centrality measure based on random walks for multilayer networks under the framework of tensor computation[J]. ISSN:0378-4371, Physica A ,2019,526:121000~1-121000~13.(SCI JCR 3) .SCI:000474503800031. · Laishui. Lv, Kun Zhang, Ting Zhang, Dalal Bardou, Jiahui Zhang, Ying Cai. PageRank centrality for temporal networks[J]. ISSN:0375-9601,Physics Letters A,383(12):1215-1222.(SCI JCR 3).SCI:000464089200001. · Zhang Yunchun, ZHANG Kun, XU Jiming, YUAN Weiping, CAI Ying, Elegance. Multi-document Abstract Generation Algorithm based on graph Model [J]. Computer Engineering and Applications,202,56(16):124-131. · Ma Meng-yue, ZHANG Kun, YAN Xia, JING Hong-fei. Construction of an Emotional dictionary for Evaluation and Teaching Text based on tag Propagation [J]. Journal of Inner Mongolia university natural science edition.2019,50(03):324-330. · CAI Ying, ZHANG Kun, Yin Weixin, ZHANG Yunchun, Jiang Tongtong, FANG Yue. Research on random Forest Based IP Address City level location method [J]. Computer and Digital Engineering.2021(9). Employed. · Zhang Na, ZHANG Kun, ZHANG Xianguo, ZHANG Jiahui, JIANG Tongtong, FANG Yue. Text Zero-watermarking algorithm based on Subject Words and Information entropy Coding [J]. Computer and Digital Engineering.2020. Employed. · Chen Fei, ZHANG Kun, XU Jun, Ying Rui, Duan Qiufeng, Jiang Tongtong. Construction of management Module of international Academic Exchange Chain for Postgraduates [J]. North China Group, Information Management Committee, Chinese Society for Academic Degrees and Graduate Education, 2018. November, 2018. · Dalal Bardou, Kun Zhang,Sayed Mohammad Ahmad. Classification of Breast Cancer Based on Histology Images Using Convolutional Neural networks[J]. ISSN: 2169-3536 , IEEE Access, 2018, 6:24680-24693.(IEEE, IF=3.244- SCI).SCI收录号SCI: 000433459200001. · Dalal Bardou , Kun Zhang, Sayed Mohammad Ahmad. Lung Sounds Classification Using Convolutional Neural Networks[J]. ISSN: 0933-3657, Artificial Intelligence in Medicine, 2018, 88:58-69.(Elsevier, IF=2.009- SCI).SCI收录号SCI: 000437036500005. · Dalal Bardou, Kun Zhang , Sayed Mohammad Ahmad. Timely Identification of Disease by Parallel Real-time Automated Processing of Huge Medical Databases of Images Distributed Geographically, through Knowledge Sharing[J]. ISSN: 1574-8936 , Current Bioinformatics , 2018, 13(2): 170-175. (Bentham Science, IF=0.60- SCIE).SCI收录号SCIE: 000432570400007. · Yu Longhua, Zhang Kun, Cai Ying, Jiang Wei. Research on Detection Algorithm of Abnormal Behavior of Moving Objects[J]. Computer Engineering and Design .2019(12). Has been accepted. · Jing Yifei, Zhang Kun, Cai Bing, Yu Longhua. Application layer DDoS detection method based on BP neural network[J]. Computer Engineering and Applications. 2020(1). Has been accepted. · Wang Yue-ming, ZHANG Kun, ZHANG Jiahui, CAI Ying, MA Meng-yue. Design and Implementation of Complex Network Visual Simulation Platform VPCN based on Web [J]. Computer and Digital Engineering.2019(1),2019,47(07):1728-1733. · Yan Xia, ZHANG Kun. Application of Emotion Analysis Technology in postgraduate Evaluation of Teaching Texts [J]. Computer Age.2019(01):51-54+58. · Xie Bin, Zhang Kun, Zhang Yunchun, Cai Ying, Jiang Wei. Moving Target Trajectory Prediction Algorithm Based on Trajectory Similarity[J]. Computer Engineering.2018,44(9):177-183. · Md. Fazla Elahe, Kun Zhang .Mining High-Utility Itemsets Based on Multiple Minimum Support and Multiple Minimum Utility Thresholds. International Journal of Database Theory and Application.2017:10(3):31-44. · Zhao Yi, Zhang Kun, Zhang Hong, Yan Xia ,Cai Ying. Hot Topic Detection Based on Combined Content and Time Similarity. The 2017 IEEE International Conference on Progress in Informatics and Computing(PIC2017). 2017,399-403,read papers at the conference.EI:20182405301218. · Dalal Bardou,Kun Zhang,Sayed Mohammad Ahmad. Timely Identification of Disease by Parallel Real-time Automated Processing of Huge Medical Databases of Images Distributed Geographically, through Knowledge Sharing, ISSN: 2212-392X, Current Bioinformatics. 2016, 11(5). Indexed in SCI expanded. · Md. Fazla Elahe,Kun Zhang. Mining frequent itemsets along with rare itemsets based on categorical multiple minimum support, ISSN:2278-0661, IOSR Journal of Computer Engineering. 2016.18(6):109-144. · Kechen Zhuang,Kun Zhang,Hong Zhang. Event-related Burst Analysis and Time Prediction on Microblog Data[J], ISSN:1546-1955,Journal of Computational and Theoretical Nanoscience. 2016, 13(1): 783-788. included in EI. · Kechen Zhuang,Fawang Han,Haibo Shen,Kun Zhang,Hong Zhang. Information Diffusion Temporal Dynamic Prediction in Microblog System Based on User Influence Learning[J], ISSN:1738-9968,International Journal of Hybrid Information Technology.2016,9(6):327-336.included in EI. · Zhuang Kechen,Zhang Kun,Zhang Hong. Large Scale Information Diffusion Analysis and Simulation with a Mapreduce Solution[J]. ISSN:1553-9105,Journal of Computational Information Systems, 2015, 11(1):277-284. included in EI. · Jiang Li Ming,Liu Zhi Ming,Zhang Kun,Xu Jian,Zhang Hong. Research on Trust Measure And Management for Open Distributed Systems Based on Dynamic Grouping . ISSN:1000-436X,CN:11-2102/TN,Journal of communication(In Chinese). 2015,36(1):2015012-1-11 . included in EI. · Zhang Kun,Chen Li Hui,Liu Jian,Wang Yu,Chen Xuan. Design and Implementation of Directed Weighted Complex Network Simulation Platform. ISSN:1005-3751,CN:61-1450/TP,Computer Technology and Development(In Chinese). 2014, 24(10):202-205+210 . · Wang Yu,Zhang Kun,Liu Jian,Chen Xuan. Research of Wormhole Attacks in Ad Hoc Networks and the Detection Method. ISSN:1006-8228,CN:33-1094/TP,Computer Era (In Chinese). 2014,02:20-24 . · Bao Tong Tong,Zhang Kun,Chen Xuan,Gao Fei. Survey of Privacy Protection Techniques Based on Android. Computer Era (In Chinese). ISSN:1006-8228,CN:33-1094/TP,2013,12:7-11 . · Jiang Li Ming,Zhang Kun,Xu Jian,Zhang Hong. A NEW Evidential Trust Model Based on Graph Theory for Open Computing Systems. ISSN:1000-1239,CN:11-1777/TP,Journal of Computer Research and Development (In Chinese). 2013,05:921-931.included in EI. . · Zhuang Ke Chen, Zhang Hong, Zhang Kun, Jiang Hai Tao. The Spread of the Virus Dynamics Research of Wireless Sensor Network . ISSN:1002-137X,CN:50-1075/TP,Journal of Computing Science(In Chinese). 2013,40(3):187-191. · Zhang Kun, Li Pei Pei, Zhu Bao Ping, Hu Man Yu. Node Importance Evaluation Method of Directed and Weighted Complex Network based on PageRank . ISSN:1005-2615,CN:32-1429/V, Journal of Nanjing University of Aeronautics and Astronautics(In Chinese). 2013,45(3) ,429-434. · Tang Hao Feng, Zhang Kun, Yu Nan, Mao Xing. Anti-Destroying Ability Measure Research of Directed Weighted Complex Network . ISSN:1000-3428,CN:31-1289/TP,Journal of Computing Engeering(In Chinese). 2013, 39 (1): 23-28. · Zhuang Kechen, Zhang Hong, Zhang Kun. Simulation-Based Analysis of Worm Propagation in Wireless Sensor Network. The 4th International Conference on Multimedia Information Networking and Security, 2012, 847-851.included in EI. · Guo Tao, Zhang Kun, Guo Wen Juan, Zhuang Ke Chen, He Ding Long, Li Pei Pei. An Improved Weighted Complex Network Clustering Method . ISSN:1002-137X,CN:50-1075/TP,Journal of computing science(In Chinese). 2012,39(Z6):99-102. · Liu Fang Bin, Zhang Kun, Li Hai , Zhang Hong. No Threshold Track in The Center of the AD Hoc Network Anonymous Authentication . ISSN:1000-436X,CN:11-2102/TN,Journal of Communication(In Chinese). 2012,33(8):208~213. · Zhang Kun, YANG Hui-ju, SONG Ji-hong, ZHAO Xue-long. Design and Realization of Auto-Generating Test Paper based on Genetic Algorithm. ISSN:1000-3428,CN:31-1289/TP, Computer Engineering and Science (In Chinese). 2012, 34(5) 178-183. · Zhang Kun, Shen Hai-bo, Zhang Hong, JIANG Li-ming, Zhong Yi. Synthesis Evaluation Method for Node Importance in Complex Networks Based on Grey Relational Analysis. ISSN:1005-9830,CN:32-1397/N, Journal of Nanjing University of Science and Technology (Natural Science Edition) (In Chinese). 2012,36(4):579-586.included in EI. · He Jia Lang, Zhang Kun, Meng Jin, Zhang Hong. Evolutionary Module Redundancy Software Fault-Tolerant Model. ISSN:1005-9830,CN:32-1397/N, Journal of Nanjing University of Science and Technology (Natural Science Edition) (In Chinese). 2012, 36(2):272-277+284.included in EI. · Zhang Kun, Hong Zhang, Yong dong Wu, Feng Bao. Evaluating the Importance of Nodes in Complex Networks based on Principal Component Analysis and Grey Relational Analysis. The 17th IEEE International Conference on Networks (ICON2011). Dec.14-16 2011.ISBN:978-1-4577-1826-7, 231-235.included in EI. · Mao Xing, Zhang Kun, Wang Chao, Tang Haofeng. The Efficient Routing Strategy on Complex Networks Based on Clustering Algorithm. The 18th Information Theory Symposium, 2011, 10, pp:445-448. · Liu Fang-bin, Zhang Kun, Zhang Hong. Low Conputational Load Anonymous Routing Protocol for Ad-hoc Networks. ISSN:1002-137X,CN:50-1075/TP,Computer Science(In Chinese), 2011, 38(11):48-53. · JiangLi-ming, Zhang Kun, Xu Jian, Zhang Hong. Analysis and Elimination of the Dependent Relationships in Trust Networks. ISSN:1002-137X,CN:50-1075/TP,Computer Science(In Chinese), 2011, 38(6):70-73. · Tang yang, Zhang Hong, Zhang Kun, Li qian-mu. Construction of Odd-variable Boolean Function with Qptimum Algebraic Immunity. ISSN:1002-137X,CN:50-1075/TP,Computer Science(In Chinese), 2011, 38(3):83-86. · He Jia-lang, Zhang Kun, Zhang Hong. Application of Evolutionary Computing in Software Intelligent Repair. ISSN:1000-3428,CN:31-1289/TP,Computer Engineering(In Chinese), 2011, 37(16): 8-13. · He Jia-lang, Meng Jin, Zhang Kun, Zhang Hong. A Fault Propagation-aware Program Fault Location Method. ISSN:1009-5896,CN:11-4494/TN,Journal of Electronics & Information Technology(In Chinese), 2011,33(9): 2192-2198. · Jiang Li-ming, Zhang Hong, Zhang Kun , Xu Jian. An Evidential Trust Model with Fuzzy Adjustment Method for Open Systems. ISSN:1009-5896,CN:11-4494/TN,Journal of Electronics & Information Technology(In Chinese), 2011, 33(8): 1930-1936. · JiangLi-ming, Zhang Kun, Xu Jian, Liao Jun, Zhang Hong. Research on Trust Transitivity and Aggregation In Evidential Trust Model.ISSN:1000-436X,CN:11-2102/TN,Journal on Communications(In Chinese), 2011, 32(8):91-100. · Liu Fang-bin, He Jia-lang, Zhang Kun, Zhang Hong. Self-Organized Key Management Based on Zero Knowledge Proofs For Ad Hoc Networks. ISSN:1001-3695,CN:51-1196/TP,Application Research of Computers(In Chinese), 2011, 28(7):2700-2702. · He Jia-lang, Zhang Kun, Meng Jin, Zhang Hong. Relative Similarity Evaluation Model for Software Repair. ISSN:1001-3695,CN:51-1196/TP,Application Research of Computers(In Chinese), 2011, 28(4):1410-1412. · Jiang Li-ming, Zhang Kun, Xu Jian, Zhang Hong. New Local Trust Degree Computation Method for Open Distributed Systems. ISSN:1001-3695,CN:51-1196/TP,Application Research of Computers(In Chinese), 2011, 28(1):290-292. · Zhang Yu, Zhang Kun. The Invulnerability of Complex Network Optimization Research.ISSN:1003-9767,CN:11-2697/TP, Information and Computer (Theory)(In Chinese), 2011,6:126-129. · Zhang Kun, Zhang Hong, Jiang Li-ming, Xu Jian. Composite Agent Service Selection Algorithm for Non-functional Attributes Based on Simulated Annealing. 2010 Second World Congress on Software Engineering (WCSE 2010). 2010, 12.19-12.20.vol. 2, pp.101-106.included in EI. · Tang Yang, Zhang Hong, Zhang Kun. One-error Linear Complexity of Hall’s Sequence. ISSN:1005-9830,CN:32-1397/N,Journal of Nanjing University of Science and Techno logy (Natural Science)(In Chinese), 2010, 34(6):749-752.included in EI. · He Jia-lang, Zhang Kun, Meng Jin, Zhang Hong. Invariants Based Program Repair Evolutionary Extended Model. ISSN:1001-3695,CN:51-1196/TP,Application Research of Computers(In Chinese), 2010, 27(12):4533-4535,4540. · Zhang Kun, Tan Ge-xin, Zhuang Ke-chen, Zhao Rong-sheng. ISSN:1006-8228,CN:33-1094/TP,A Research Review on Invulnerability Measure of Complex Networks. Computer Era (In Chinese). 2010, 5, 4-7. · Feng Yan, Zhang Kun, Huang Feng-xiao, Zou Yong-xin. Design and Implementation of an Algorithm for Improving Invulnerability of Complex Networks. The 6th Chinese Conference on Complex Networks (In Chinese). 2010, 10.15-18 , pp44-47. · Liu Yueqi, Shi Jin, Hu Baolin, Zhang Kun. Three Quantum Secret Sharing Scheme Based on GHZ State. ISSN:1007-5461,CN:34-1163/TN, Quantum Electronics(In Chinese).2010. · Zhang Kun, Xu Man-wu, Zhang Hong, Xu Jian. Agent Service Matchmaking Algorithm with Semantic and QoS Constraints. ISSN:0950-7051,Knowledge-Based Systems. 2010, 23(2):132-143. · Zhang Kun, Xu Man-wu, Zhang Hong. Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity Factors in Agent-based Autonomic Computing Systems. ISSN:1945-3116, Journal of Software Engineering Application(In Chinese). 2009, 2(2):103-110. · Zhang Kun, Xu Man-wu, Zhang Hong, Liu Feng-yu. Semantic Service Matchmaking for Autonomic Unit with QoS Constraints. ISSN:1002-137X,CN:50-1075/TP, Computer Science (In Chinese) , 2009,36(3), 123-125,192. · Zhang Kun, Cao Hong-xin, Zhong Yi, Liu Feng-yu. New SVM Weighted Feature Classification Method in Network Intrusion Detection. ISSN:1005-9830,CN:32-1397/N, Journal of Nanjing University of Science and Technology (Natural Science Edition) (In Chinese) , 2008, 32(2):231-236. · Zhang Kun, Xu Man-wu, Liu Feng-yu. Agent Service Matchmaking for Autonomic Computing: A Survey. ISSN:1002-137X,CN:50-1075/TP, Computer Science (In Chinese) , 2008, 35(12):1-4+18. · Liu Yue-qi,Zhang Kun. Quantm Authentication Protocols Based on Entanglement Swapping in Distributed Network. ISSN:1002-8331,CN:11-2117/TP, Computer Science (In Chinese) , 2008, 44(32):90-92. · Xu Hui, Wang Jie-hua, Zhang Kun, Liu Feng-yu .Expression and Recognition of Intrusion Signature Based on Varieties of Antigen & Antibody. ISSN:1002-8331,CN:11-2117/TP, Computer Engineering and Applications(In Chinese) , 2008, 44(25): 92- 95. · Xu Jian,Zhang Kun,Liu Feng-yu. Workload Model Based Method for Decision of Software Rejuvenation. ISSN:1005-9830,CN:32-1397/N, Journal of Nanjing University of Science and Technology (Natural Science Edition) (In Chinese) , 2008, 32(4):434-437. · Liu Yueqi,Zhang Kun. Quantum Identity Authentication System Based on Entanglement Swapping. ISSN:1671-6876,CN:32-1657/N, Journal of Huaiyin Normal University(Natural Science Edition)(In Chinese), 2008, 7(1):69-71. · Xu Jian, Zhang Kun, Liu Feng-yu. An Immune Agent-based Performance Rejuvenation for Grid. ISSN:1009-1742,CN:11-4421/N, Engineering Sciences (In Chinese), 2007, 9(11):87-91. · Xu Jian, Zhang Kun, Liu Feng-yu, Xu Man-wu. An Approach to Immunity-Based Performance Monitoring and Evaluation for Computing Systems. ISSN:1000-1239,CN:11-1777/TP, Journal of Computer Research and Development (In Chinese), 2007, 44(3):503-509. · Xu Jian, Zhang Kun, You Jing, Liu Feng-yu. Fractal-based Approach for Software Aging Prediction. ISSN:1004-731X,CN:11-3092/V, Journal of System Simulation (In Chinese), 2007, 19(3):549-551. · Xu Jian, Zhang Kun, Liu Feng-yu. Linux-based Performance Monitoring of Computing Systems. ISSN:1005-9830,CN:32-1397/N, Journal of Nanjing University of Science and Technology (Natural Science Edition) (In Chinese), 2007, 31(5):622-627. · Xu Jian, Zhang Kun, Liu Feng-yu. Research on Software Rejuvenation. ISSN:1000-1220,CN:21-1106/TP, Journal of Chinese Computer Systems (In Chinese), 2007, 28(11):1952-1958. · Yan Han, Zhang Kun, Li Qian-mu,Liu Feng-yu. Towards Visual Modeling of Annotation by Extending Java Metamodel. ISSN:1002-137X,CN:50-1075/TP, Journal of Chinese Computer Systems (In Chinese),2007, 34(7):257-259. · Yan Han, Zhang Kun, Li Qian-mu,Liu Feng-yu. An Adaptable Software Architecture for Artificial Immune System. ISSN:1002-137X,CN:50-1075/TP, Journal of Chinese Computer Systems (In Chinese),2006, 33(8):263-266. · Xu Jian, You Jing, Zhang Kun, Liu Feng-yu. Detection and Estimation of Software Aging Based on Wavelet and Statistical Analysis. ISSN:1000-3428,CN:31-1289/TP, Computer Engineering (In Chinese) , 2006, 32(12):24-26. · Kun Zhang, Yong Qi, Hong Zhang. Dynamic Multicast Routing Algorithm for Delay and Delay Variation-bounded Steiner Tree Problem. Knowledge-based System. 2006, 19(7):554-564. 31-236. · Zhang Kun, Cao Hong-xin, Yan Han, Liu Feng-yu. Application of Support Vector Machines on Network Abnormal Intrusion Detection. ISSN:1001-3695,CN:51-1196/TP, Application Research of Computers (In Chinese) , 2006, 32(5):98-100. · Zhang Kun, Wang Heng, Liu Feng-yu. Delay-constrained Multiple Shared Multicast Trees Construction Algorithm. ISSN:1005-9830,CN:32-1397/N, Journal of Nanjing University of Science and Technology (Natural Science Edition) (In Chinese) , 2006, 30(2):127-131,141. · Zhang Kun. Discussion on Multimedia Teaching of Computer Language Course. ISSN:1671-9719,CN:45-1312/G4, Higher Education Forum(In Chinese) , 2006,2:40-41. · Zhang Kun. Exploration on Bilingual Teaching of Java Programming Language. ISSN:1008-2646,CN:32-1397/N, Journal of Nanjing University of Science and Technology(Social Sciences Edition)(In Chinese) , 2006,19(6):234-236. · Zhang Kun, Qi Yong, Zhang Hong. Dynamic Multicast Routing Algorithm for Delay and Delay Variation-bounded Steiner Tree Problem.ISSN:0950-7051, Knowledge-based System, 2006, 19(7):554-564.included in SCI. · Xu Jian, Zhang Kun, You Jing, Liu Feng-yu. Wavelet and Neural Network Based Approach for Software Aging Prediction. ISSN:1004-731X,CN:11-3092/V, ISSN:1004-731X,CN:11-3092/V, Journal of System Simulation (In Chinese) , 2006, 18(9):2626-2629. · Yan Han, Zhang Kun, Li Qian-mu, Liu Feng-yu. GeGeM:General Gene Model for Artificial Immune System with Implementation. ISSN:1004-731X,CN:11-3092/V, Journal of System Simulation (In Chinese) , 2006, 18(3):747-751. · You Jing, Xu Jian, Zhang Kun, Liu Feng-yu. Research on Restart Technology for Software Rejuvenation of Computing System. ISSN:1002-0411,CN:21-1138/TP, Information and Control (In Chinese) , 2006, 35(3):355-361. · Zhang Kun, Wang Heng, Liu Feng-yu. Design and Implementation of QoS Routing Simulator. ISSN:1004-731X,CN:11-3092/V, Journal of System Simulation (In Chinese) , 2005, 17(7):1621-1625,1659. · Zhang Kun, Wang Heng, Liu Feng-yu, Cao Hong-xin. Multicast Routing Algorithm with Delay-constrained Based on Tabu Search. ISSN:1000-3428,CN:31-1289/TP, Computer Engineering (In Chinese) , 2005, 31(11):22-24,64. · Zhang Kun, Wang Heng, Liu Feng-yu. A Multi-Constrained QoS Multicast Routing Algorithm Based on Simulated Annealing. ISSN:1002-137X,CN:50-1075/TP, Computer Science (In Chinese), 2005, 32(5):41-45. · Zhang Kun, Wang Heng, Liu Feng-yu. A Delay-Constrained Many-to-Many Multicast Routing Heuristic Algorithm.ISSN:1002-137X,CN:50-1075/TP, Computer Science (In Chinese) , 2005, 32(4):107-109. · Zhang Kun, Wang Heng, Liu Feng-yu, Zhong Yi. An Algorithm for Finding Paths with Multiple QoS Constraints. ISSN:1001-3695,CN:51-1196/TP, Application Research of Computers (In Chinese) , 2005, 31(1):194-196. · Zhang Kun, Wang Heng, Liu Feng-Yu. An Efficient Algorithm Based on Simulated Annealing for Multicast Routing with Delay and Delay Variation Constraints. In: Proceedings of IEEE 19th International Conference on Advanced Information Networking and Applications (AINA'05), Taipei, Taiwan,Vol.1, 2005: 261-266. · Zhang Kun, Wang Heng, Liu Feng-Yu. Multicast Routing for Delay and Delay Variation bounded Steiner Tree using Simulated Annealing. In: Proceedings of 2005 IEEE International Conference on Networking, Sensing and Control (ICNSC'05), Tucson, Arizona, U.S.A, 2005:682-687. · Zhang Kun, Zhang Hong, Xu Jian. An Efficient Distributed Dynamic Multicast Routing with Delay and Delay Variation Constraints. In: Third International Conference, ICCNMC'05, Zhangjiajie, China, 2005, vol. LNCS 3619:198-207. · Zhang Kun, Wang Heng, Liu Feng-Yu. Distributed Multicast Routing for Delay and Delay Variation-bounded Steiner Tree using Simulated Annealing. ISSN:0140-3664, Computer Communications(In Chinese) , 2005, 28(11):1356-1370. [ GO TOP ] Post-graduates
[ GO TOP ] Last modified on 2023-06-17 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|