赵培海
男 讲师 计算机应用技术系
个人简介:
于2011年毕业于同济大学,获得计算机科学与技术专业本科学位并直接攻读博士,于2017年毕业于同济大学,获得工学博士学位。2017至今在太阳集团tcy8722担任讲师。在读博士期间,进行了网络交易风控模型研究并进行了非参贝叶斯相关建模分析;现一直从事时序数据挖掘、概率图模型分析方面的研究工作,以及人工智能方面的教学与科研工作。
主要研究方向:
概率图模型分析
统计机器学习
时间序列数据挖掘
讲授课程:
人工智能
编译原理
主要论文研究成果:
[1] Peihai Zhao, Zhijun Ding, Mimi Wang and Rruihao Cao, Behavior Analysis for Electronic Commerce Trading Systems: A Survey, IEEE Access, vol. 7, pp. 108703-108728, 2019.
[2] Mimi Wang; Guanjun Liu; Peihai Zhao*; Chungang Yan; Changjun Jiang, Behavior consistency computation for workflow nets with unknown correspondence, IEEE/CAA Journal of Automatica Sinica, 5(1), pp 281-291, 2018.
[3] Mimi Wang; Zhijun Ding; Peihai Zhao; Wangyang Yu; Changjun Jiang, A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp 1-15, 2018.
[4] Mimi Wang; Zhijun Ding; Changjun Jiang; Peihai Zhao, A Process-Profile-Based Method to Measure Consistency of E-Commerce System, IEEE Access, vol. 6, pp 25100-25109, 2018.
[5] 赵培海; 王咪咪, 基于三维行为关系图的模型一致性检测方法, 计算机科学, 45(06), pp 156-160+165, 2018.
[6] Mimi Wang; Peihai Zhao*, Decomposition of Petri Nets based on the Behavior Relation Matrix, 2017 IEEE 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2017.7.29-2017.7.31, pp 508-514, Guilin, CHINA, 2017.
[7] Mengqing Ji; Peihai Zhao; Mimi Wang; Chungang Yan; Zhong Li; Changjun Jiang, A kind of authentication method based on user web browsing features, International Journal of Machine Learning and Computing, 7(2), pp 18-23, 2017.
[8] Peihai Zhao; Chungang Yan; Changjun Jiang, Authenticating Web User's Identity through Browsing Sequences Modeling, 16th IEEE International Conference on Data Mining Workshops (ICDMW), 2016.12.12-2016.12.15, pp 335-342, Barcelona, SPAIN, 2016.
[9] 赵培海; 王咪咪; 方贤文, 基于网进程的模型一致性分析方法, 计算机科学, 43(11), pp 242-245+251, 2016.
[10] Xiaoshuang Song; Peihai Zhao; Mimi Wang; Chungang Yan, A Continuous Identity Verification Method based on Free-Text Keystroke Dynamics, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 206-210, Budapest, HUNGARY, 2016.
[11] Hongbo Zhang; Chungang Yan; Peihai Zhao; Mimi Wang, Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 171-175, Budapest, HUNGARY, 2016.
[12] Lei Ma; Chungang Yan; Peihai Zhao; Mimi Wang, A Kind of Mouse Behavior Authentication Method on Dynamic Soft Keyboard, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 211-216, Budapest, HUNGARY, 2016.
[13]Qiang Liu; Mimi Wang; Peihai Zhao; Chungang Yan; Zhijun Ding, A Behavioral Authentication Method for Mobile Gesture Against Resilient User Posture, 2016 3rd International Conference on Systems and Informatics (ICSAI), 2016.11.19-2016.11.21, pp 324-331, Shanghai, CHINA, 2016.
[14]Xiaomeng Zhang; Peihai Zhao; Mimi Wang, Keystroke dynamics in password authentication for multi-user account, Journal of Computational Information Systems, 11(1), pp 321-331, 2015.
[15]Shaoping Jiang; Chungang Yan; Peihai Zhao; Mimi Wang, An immune approach for detecting the user's behavior of electronic transaction process, Journal of Computational Information Systems, 11(2), pp 683-692, 2015.
[16]王昱杰; 赵培海; 王咪咪, 基于键盘行为进行用户识别的方法与应用, 计算机科学, 42(11), pp 203-207+234, 2015.
[17]Junzhu Zhong; Chungang Yan; Peihai Zhao; Mimi Wang; Wangyang Yu, A Kind of Identity Authentication Method Based on Browsing Behaviors, 2014 the 7th International Symposium on Computational Intelligence and Design (ISCID), 2014.12.13-2014.12.14, Hangzhou, CHINA, 2014.
近期主持的科研项目:
[1] 上海市经济信息化委军民融合专项子课题,“无人机大数据管理系统”,2017/01-2019/12.
[2] 太阳集团tcy8722青年教师启动资助项目“基于深度学习的网络用户行为数据建模与可信认证研究”,2018/03 – 2019/03.
近几年的论著、专利:
[1] Changjun Jiang, Hongzhong Chen, Chungang Yan, Zhijun Ding, Mimi Wang, Peihai Zhao , METHOD AND SYSTEM FOR BRANCH PROCESS-BASED MODEL CONSISTENCY ANALYSIS, 2018.06.13, 澳大利亚, AU2018100679.
[2] Changjun Jiang, Hongzhong Chen, Chungang Yan, Zhijun Ding, Mimi Wang, Peihai Zhao, METHOD FOR MEASURING USER BEHAVIOR CONSISTENCY DEGREE BASED ON COMPLEX CORRESPONDENCE SYSTEM, 2017.1.19, 澳大利亚, AU2017100012
[3] 蒋昌俊; 闫春钢; 丁志军; 张亚英; 景晨; 赵培海, 一种基于用户行为模型的身份认证方法及系统, 2017.1.10 (公开), 中国, CN2017100168646
[4] 蒋昌俊; 闫春钢; 丁志军; 张亚英; 王咪咪; 赵培海, 一种基于数据切片一致性的系统检测方法及系统, 2017.5.3 (公开), 中国, CN2017103063241
[5] 蒋昌俊; 陈闳中; 闫春钢; 丁志军; 王咪咪; 赵培海, 一种基于分支进程的模型一致性分析方法及系统, 2018.03.02 (授权), 中国, ZL2015107287242
[6] 蒋昌俊; 陈闳中; 闫春钢; 丁志军; 王咪咪; 赵培海, 基于复杂对应系统的用户行为一致性度测量方法, 2017.6.13 (授权), 中国, ZL2014103277092
[7] 蒋昌俊; 陈闳中; 闫春钢; 丁志军; 于汪洋; 赵培海, 基于Web用户行为模式的身份认证方法, 2015.11.04 (授权), 中国, ZL2012104456813
联系方式:
电 话:(86)021-67792291
邮 箱:peihaizhao@dhu.edu.cn
办公室:1号学院楼245室
Peihai Zhao
Lecturer in the Department of Computer Application Technology
Profile:
In 2011, he graduated with a bachelor's degree in computer science and technology from Tongji University. He then pursued a Ph.D. in engineering straight away, earning his degree from Tongji University in 2017. Since 2017, he has served as an Lecturer at the School of Computer Science and Technology at Donghua University. For his PhD, he researched non-parametric Bayesian correlation modeling and network transaction risk control models; at the moment, he also teaches and conducts research on artificial intelligence while working on time-series data mining and probabilistic graph model analysis.
Research Interests:
Probabilistic Graphical Model Analysis
Statistical Machine Learning
Time Series Data Mining
Teaching:
Artificial Intelligence
Principle of compilation
Selected papers
[1] Peihai Zhao, Zhijun Ding, Mimi Wang and Rruihao Cao, Behavior Analysis for Electronic Commerce Trading Systems: A Survey, IEEE Access, vol. 7, pp. 108703-108728, 2019.
[2] Mimi Wang; Guanjun Liu; Peihai Zhao*; Chungang Yan; Changjun Jiang, Behavior consistency computation for workflow nets with unknown correspondence, IEEE/CAA Journal of Automatica Sinica, 5(1), pp 281-291, 2018.
[3] Mimi Wang; Zhijun Ding; Peihai Zhao; Wangyang Yu; Changjun Jiang, A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp 1-15, 2018.
[4] Mimi Wang; Zhijun Ding; Changjun Jiang; Peihai Zhao, A Process-Profile-Based Method to Measure Consistency of E-Commerce System, IEEE Access, vol. 6, pp 25100-25109, 2018.
[5] Mimi Wang; Peihai Zhao*, Decomposition of Petri Nets based on the Behavior Relation Matrix, 2017 IEEE 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 2017.7.29-2017.7.31, pp 508-514, Guilin, CHINA, 2017.
[6] Mengqing Ji; Peihai Zhao; Mimi Wang; Chungang Yan; Zhong Li; Changjun Jiang, A kind of authentication method based on user web browsing features, International Journal of Machine Learning and Computing, 7(2), pp 18-23, 2017.
[7] Peihai Zhao; Chungang Yan; Changjun Jiang, Authenticating Web User's Identity through Browsing Sequences Modeling, 16th IEEE International Conference on Data Mining Workshops (ICDMW), 2016.12.12-2016.12.15, pp 335-342, Barcelona, SPAIN, 2016.
[8] Xiaoshuang Song; Peihai Zhao; Mimi Wang; Chungang Yan, A Continuous Identity Verification Method based on Free-Text Keystroke Dynamics, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 206-210, Budapest, HUNGARY, 2016.
[9] Hongbo Zhang; Chungang Yan; Peihai Zhao; Mimi Wang, Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 171-175, Budapest, HUNGARY, 2016.
[10] Lei Ma; Chungang Yan; Peihai Zhao; Mimi Wang, A Kind of Mouse Behavior Authentication Method on Dynamic Soft Keyboard, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2016.10.9-2016.10.12, pp 211-216, Budapest, HUNGARY, 2016.
[11] Qiang Liu; Mimi Wang; Peihai Zhao; Chungang Yan; Zhijun Ding, A Behavioral Authentication Method for Mobile Gesture Against Resilient User Posture, 2016 3rd International Conference on Systems and Informatics (ICSAI), 2016.11.19-2016.11.21, pp 324-331, Shanghai, CHINA, 2016.
[12] Xiaomeng Zhang; Peihai Zhao; Mimi Wang, Keystroke dynamics in password authentication for multi-user account, Journal of Computational Information Systems, 11(1), pp 321-331, 2015.
[13] Shaoping Jiang; Chungang Yan; Peihai Zhao; Mimi Wang, An immune approach for detecting the user's behavior of electronic transaction process, Journal of Computational Information Systems, 11(2), pp 683-692, 2015.
[14] Junzhu Zhong; Chungang Yan; Peihai Zhao; Mimi Wang; Wangyang Yu, A Kind of Identity Authentication Method Based on Browsing Behaviors, 2014 the 7th International Symposium on Computational Intelligence and Design (ISCID), 2014.12.13-2014.12.14, Hangzhou, CHINA, 2014.
[1] Changjun Jiang, Hongzhong Chen, Chungang Yan, Zhijun Ding, Mimi Wang, Peihai Zhao , METHOD AND SYSTEM FOR BRANCH PROCESS-BASED MODEL CONSISTENCY ANALYSIS, 2018.06.13, AU2018100679.
[2] Changjun Jiang, Hongzhong Chen, Chungang Yan, Zhijun Ding, Mimi Wang, Peihai Zhao, METHOD FOR MEASURING USER BEHAVIOR CONSISTENCY DEGREE BASED ON COMPLEX CORRESPONDENCE SYSTEM, 2017.1.19, AU2017100012
Phone:(86)021-67792291
E-mail:peihaizhao@dhu.edu.cn
Office:Room 245, No.1 College Building