刘国华  (教授)



刘国华

男 教授 软件系

个人简介:

教授、博士研究生导师、复旦大学校友会IT同学会副会长、《计算机研究与发展》编委、《太阳集团tcy8722学报( 自然科学版)》编委、《燕山大学学报》编委、中国计算机学会高级会员、中国计算机学会数据库专业委员会委员、中国计算机学会理论计算机专业委员会委员、中国保密协会隐私保护专业委员会委员、中国大数据产业联盟产业互联网服务专业委员会委员、上海市机械工程学会第十四届理事会理事、上海市数据科学重点实验室数据科学家、上海产业技术研究院大数据标准化专家委员会委员、音锋机器人股份有限公司首席科学家。曾担任过燕山大学信息科学与工程学院副院长、院长,太阳集团tcy8722院长,上海计算机学会数据库专业委员会副主任。发表100余篇学术论文,出版专著3部,以主要参加人的身份参与过1项国家自然科学基金项目和多项省自然科学基金项目的研究工作,以主持人的身份承担过1项教育部科学技术研究重点项目、1项国家“十一五”科技支撑计划重点项目专题任务、2项国家自然科学基金项目,2项国家“十三五”重点研发计划项目子课题,1项上海市工业互联网创新发展专项项目,此外,承担过及多项横向课题,获多项省部级科技进步奖励。

研究方向: 

数据库理论 大数据与人工智能 工业互联网 数字孪生与元宇宙

讲授课程:

数据结构,计算理论与算法复杂性导引

主要研究成果:

[1]Jiawei Wu, Guohua Liu. Modeling the Uncertain Data in the K-anonymity Privacy Protection Model[C]. 2011 Seventh International Conference on Computational Intelligence and Security (CIS), 2011: 657-661. (EI)

[2]Jieyuan Li, Guohua Liu. On the Representation and Querying of Sets of Possible Worlds in the K-anonymity Privacy Protecting Model[C]. 2011 Seventh International Conference on Computational Intelligence and Security (CIS). 2011: 662-664. (EI)

[3]Bingchun Liu, Guohua Liu. The Classification of K-anonymity Data[C]. 2011 Seventh International Conference on Computational Intelligence and Security (CIS), 2011: 1374-1378. (EI)

[4]辛婷婷, 刘国华. K-匿名隐私保护模型下的Top-k查询[J]. 计算机科学与探索, 2011, 5(8): 751-759.

[5]严秋玲, 孙莉, 王梅, 乐嘉锦, 刘国华. 列存储数据仓库中启发式查询优化机制[J]. 计算机学报, 2011, 34(10): 2018-2026. (EI)

[6]张琦, 王梅, 乐嘉锦, 刘国华. 列存储数据仓库查询执行中重用缓冲区调度算法[J]. 计算机研究与发展, 2011, 48(10): 1942-1950. (EI)

[7]Yanfei Zuo, Guohua Liu, Xiaoli Yue, Wei Wang, Honghua Wu. Similarity Matching over Uncertain Time Series[C]. 2011 Seventh International Conference on Computational Intelligence and Security (CIS), 2011: 1357-1361. (EI)

[8]宋金玲, 刘国华, 黄立明, 李玉香, 贺礼智, 王丹丽. k-匿名隐私保护模型中 k 值的优化选择算法[J]. 小型微型计算机系统, 2011, 32(10): 1987-1993.

[9]吴佳伟, 刘国华, 王梅. K-匿名隐私保护模型中不确定性数据的建模问题研究[J]. 计算机工程与科学, 2011, 33(9): 7-12.

[10]万涛, 刘国华. k-匿名数据中的数据依赖问题研究[J]. 计算机工程, 2012, 38(20): 38-10.

[11]陈爱东, 刘国华, 肖瑞, 万小妹, 石丹妮. 均匀分布下不确定数据的关联规则变粒度查询[J]. 计算机工程与科学, 2013, 35(10): 79-88.

[12]林丙春, 刘国华, 王梅. 针对 k-匿名数据的判定树构造算法[J]. 武汉大学学报: 理学版, 2011, 57(6): 494-498.

[13]侯士江, 张玉江, 刘国华. 基于位置敏感哈希分割的空间K-匿名共匿算法[J]. 计算机科学, 2013, 40(8): 115-118.

[14]丁祥武, 余文兵, 刘国华. VPM: 列存储系统中基于带值路径的物化技术[J]. 计算机研究与发展, 2012, 49(10): 2086-2094. (EI)

[15]Haibin Liu, Guohua Liu, Ying Wang, Dingjia Liu. A Novel Behavioral Similarity Measure for Artifact-Oriented Business Processes[M].Technology for Education and Learning. Springer Berlin Heidelberg, 2012: 81-88. (EI)

[16]王颖, 刘国华, 刘海滨, 赵丹枫. Artifact的有效性问题研究[J]. 计算机集成制造系统, 2012, 18(8): 1726-1734. (EI)

[17]王颖, 刘国华, 高尚, 赵丹枫, 刘海滨. ArtiFlowArtifact 生命周期的可满足性问题[J]. 小型微型计算机系统, 2012, 33(006): 1176-1182.

[18]赵丹枫, 刘国华, 张大伟, 王颖, 刘海滨. A-Stein: 以数据为中心的业务流程管理原型系统[J]. 计算机研究与发展, 2011, 48 (suppl.2): 400-404.

[19]刘海滨, 刘国华, 黄立明, 宋金玲. 以业务单据为中心的业务流程模型聚类及相似性查询方法[J]. 计算机集成制造系统, 2013, 19(8): 1810-1821. (EI)

[20]Danfeng Zhao, Guohua Liu, Ying Wang, Feng Gao, Huifang Li, Dawei Zhang. A-Stein: A Prototype for Artifact-Centric Business Process Management Systems[C]. 2011 International Conference on Business Management and Electronic Information (BMEI), 2011, 1: 247-250. (EI)

[21]王颖, 刘国华, 黄震. XAr/T-net: 一种用于以业务单据为中心的业务流程建模方法[J]. 计算机集成制造系统, 2013, 19(8): 1935-1941.

[22]吴红花, 刘国华. 不确定时间序列的规约方法[J]. 计算机工程, 2012, 38(21): 33-35.

[23]宋金玲, 李芳玲, 刘国华, 黄立明, 张广斌, 王丹丽. 基于概率的动态视图安全发布方法[J]. 计算机科学, 2011, 38(9): 158-163.

[24]高尚, 金顺福, 刘国华, 王颖, 刘海滨. 基于时间Petri网的Artifact有效性的验证[J]. 燕山大学学报, 2012, 35(6): 556-560.

[25]王柠, 刘国华, 石丹妮. 基于指纹和推导模型的泄密信息检测方案[J]. 燕山大学学报, 2013, 36(6): 511-518.

[26]孙莉, 李静, 刘国华. 列存储数据查询中的连接策略优化方法[J]. 计算机研究与发展, 2013, 50(8): 1647-1656.

[27]刘海滨, 刘国华, 王颖, 赵丹枫. 面向Artifact的业务流程行为相似性度量方法[J]. 小型微型计算机系统, 2013, 34(003): 475-479.

[28]陈爱东, 刘国华, 费凡, 周宇, 万小妹, 貟慧. 满足均匀分布的不确定数据关联规则挖掘算法[J].计算机研究与发展, 2013, 50(Suppl): 186-195.

[29]Yilong Liu, Guohua Liu. Finding the Provenance of K-anonymous Data and Adding It to Association-Rule Mining[C]. 2012 Eighth International Conference on Computational Intelligence and Security (CIS), 2012: 117-122. (EI)

[30]Haibin Liu, Guohua Liu, Danfeng Zhao, Jinling Song. A Clustering Approach for Artifact-Centric Business Process Models[J]. Journal of Computational Information Systems. 2012, 8(16), 6601-6609. (EI)

[31]张君宝, 刘国华, 王碧颖, 王梅, 王羽婷, 石丹妮, 翟红敏. k-匿名数据上的聚集查询及其性质[J]. 计算机工程与科学, 2014, 36(1), 176-185.

近期主持或参与的科研项目:

1.源于k-匿名隐私保护模型的不确定性数据管理及可用性问题,国家自然科学基金项目

2.全流程印染过程数字化控制技术研究与应用示范 国家重点研发计划项目(子项目)

3. 网络空间沙盘关键技术研究与网络沙盘平台研发 国家重点研发计划项目(子项目)

4. 面向纺织服装的行业级工业互联网平台 上海市经济和信息化委员会

近几年的论著、专利:

1.《隐私保护数据发布中不确定数据的管理方法—数据发布篇》,专著, 科学出版社

2.《隐私保护数据发布中不确定数据的管理方法—数据管理篇》, 专著,科学出版

3.云存储环境下文本文档的篡改检测方法, 发明专利,ZL201410315438.9

联系方式:

电话:21-67792060

Email:ghliu@dhu.edu.cn


GUOHUA LIU

Bio: Professor, doctoral supervisor, vice president of Fudan University Alumni Association IT Homecoming Association, editorial board member of Computer Research and Development, editorial board member of Journal of Donghua University (Natural Science Edition), editorial board member of Journal of Yanshan University, senior member of Chinese Computer Society, member of Database Committee of Chinese Computer Society, member of Theoretical Computer Committee of Chinese Computer Society Member of Privacy Protection Professional Committee of China Association for Confidentiality, member of Industrial Internet Service Professional Committee of China Big Data Industry Alliance, member of the 14th Council of Shanghai Society of Mechanical Engineering, data scientist of Shanghai Key Laboratory of Data Science, member of Big Data Standardization Expert Committee of Shanghai Institute of Industrial Technology, and chief scientist of Yinfeng Robot Co., Ltd. He once served as the deputy dean and dean of the School of Information Science and Engineering of Yanshan University, the dean of the School of Computer Science and Technology of Donghua University, and the deputy director of the database professional committee of Shanghai Computer Society. He has published more than 100 academic papers, published 3 monographs, participated in the research work of one National Natural Science Foundation project and several provincial natural science foundation projects as the main participant, and undertaken one key science and technology research project of the Ministry of Education, one special task of key projects of the National "Eleventh Five Year" Science and Technology Support Plan, and two national natural science foundation projects as the host, Two subprojects of the national "13th Five Year Plan" key R&D projects, one special project for the innovative development of Shanghai's industrial Internet, in addition, he has undertaken and won many horizontal projects, and won some provincial and ministerial awards for scientific and technological progress.

Research Areas: Database Theory, Big Data and Artificial Intelligence, Industrial Internet, Digital Twin and Metauniverse

Main Courses Taught: Data Structure, Computing Theory and Algorithm Complexity

Publications:

[1]Jiawei Wu, Guohua Liu. Modeling the Uncertain Data in the K-anonymity Privacy Protection Model[C]. 2011 Seventh International Conference on Computational Intelligence and Security (CIS), 2011: 657-661. (EI)

[2]Jieyuan Li, Guohua Liu. On the Representation and Querying of Sets of Possible Worlds in the K-anonymity Privacy Protecting Model[C]. 2011 Seventh International Conference on Computational Intelligence and Security (CIS). 2011: 662-664. (EI)

[3]Bingchun Liu, Guohua Liu. The Classification of K-anonymity Data[C]. 2011 Seventh International Conference on Computational Intelligence and Security (CIS), 2011: 1374-1378. (EI)

[4]Haibin Liu, Guohua Liu, Ying Wang, Dingjia Liu. A Novel Behavioral Similarity Measure for Artifact-Oriented Business Processes[M].Technology for Education and Learning. Springer Berlin Heidelberg, 2012: 81-88. (EI)

[5]Danfeng Zhao, Guohua Liu, Ying Wang, Feng Gao, Huifang Li, Dawei Zhang. A-Stein: A Prototype for Artifact-Centric Business Process Management Systems[C]. 2011 International Conference on Business Management and Electronic Information (BMEI), 2011, 1: 247-250. (EI)

[6]Yilong Liu, Guohua Liu. Finding the Provenance of K-anonymous Data and Adding It to Association-Rule Mining[C]. 2012 Eighth International Conference on Computational Intelligence and Security (CIS), 2012: 117-122. (EI)

[7]Haibin Liu, Guohua Liu, Danfeng Zhao, Jinling Song. A Clustering Approach for Artifact-Centric Business Process Models[J]. Journal of Computational Information Systems. 2012, 8(16), 6601-6609. (EI)

Main Research Projects:

1. Uncertainty data management and availability from k-anonymity privacy protection model, NSFC project

2. National key R&D program (subproject) of research and application demonstration of digital control technology in the whole process printing and dyeing process

3. National key R&D plan project (sub project) of research on key technologies of cyberspace sand table and R&D of network sand table platform

4. Industrial Internet Platform for Textile and Garment Industry Shanghai Economic and Information Commission

Address:2999 North Renmin Road, Songjiang District, Shanghai,201620

Tel:0086-21-67792060

Mail:ghliu@dhu.edu.cn


Baidu
sogou