wuzh1

吴中海

  • 博士 教授
  • 北京大学软件与微电子学院
    常务副院长
  • Email: 该Email地址已收到反垃圾邮件插件保护。要显示它您需要在浏览器中启用JavaScript。
  • TEL: 010-61273696
 

      1990 年本科毕业于浙江大学计算机系,1997年获计算机专业工学博士学位。1997年至1999年在北京大学做博士后研究并留校任教,2005年晋升教授。现任北京大学软件与微电子学院常务副院长、大数据技术研究室主任,教育部软件工程专业教学指导委员会委员,中国计算机学会理事、嵌入式系统专业委员会主任,《电子学报》编委。主要研究领域为:大数据系统与分析技术、大数据与云安全、高可信嵌入式系统等。主持国家自然科学基金重点项目、国家863计划课题,以及20多个地方或企业合作研究项目。发表学术论文100余篇,申请或获得发明专利20项、登记软件著作权9项,主持研制多个大型软件系统并成功实现科技成果转化和应用推广。

 
  • 1986.09-1997.02

    浙江大学计算机系,学士、硕士、博士

  • 1997.04-2002.08

    北京大学计算机科学技术研究所,博士后、副教授

  • 2002.09-2006.04

    北京大学软件与微电子学院,副教授、教授

  • 2006.05-

    北京大学软件与微电子学院,副院长、常务副院长

 
  1. 《服务计算与大数据技术》
  2. 《学术规范和科研方法与训练》
  3. 《移动平台应用软件开发》
  4. 《大数据专题》
 
  1. 大数据系统与分析技术
  2. 大数据与云安全
  3. 高可信嵌入式系统
 

国家级课题:

  1. 国家自然科学基金重点(61232005),云存储的隐私保护与安全保障机制, 2013.1-2017.12
  2. 国家863计划主题(2015AA016009),云安全的可信服务及在教育云的示范验证,2015.1-2017.12
  3. 国家科技支撑计划(2012BAH06B01),移动互联网与宽带网融合的在线数据服务平台, 2012.1-2015.12
  4. 国家科技支撑计划(2012BAH18B04),新媒体资源编解码关键技术研究及原型系统, 2012.1-2014.12
  5. 国家科技支撑计划(2011BAH14B02),新型网络终端操作系统社区版本,2011.1-2013.12
  6. 国家科技重大专项,基于解释型语言的移动应用安全,2012.1-2013.12
  7. 丹麦科技创新部重点(2106-08-0046),Services in Context, 2010.1-2013.12
  8. 国家科技重大专项(2009ZX01036-002),国产操作系统参考实现之7,2009.1-2011.12
  9. 国家自然科学基金面上(60973001),基于互联网协同实时编辑软件的自动化测试技术, 2010.1-2012.12
  10. 国家科技支撑计划(2005BA115A03),国产基础软件平台体系之14,2005.1-2007.12
  11. 国家863计划(306-ZD06-02-9),电视台数字化系统,1999.1-2001.12
  12. 国家自然科学基金面上(69183303),高效智能推理新机制研究

省部级及产学研课题

  1. 腾讯科技合作,腾讯协同创新实验室,2017-2021
  2. 看准网合作,人力资源大数据实验室, 2015-2020
  3. 台达电子合作,Android移动终端安全加固技术,2015-2018
  4. 深圳市科技攻关计划重点,大数据平台信息安全关键技术研发,2014-2016
  5. 教育部博士点基金,基于自动机的情境感知服务主动提供方法研究,2013-2015
  6. 山东神思合作,Android智能警务终端安全加固技术研发,2014-2015
  7. 教育部信息化专项,学分银行系统研制,2009-2010
  8. 顺义区政府委托,大学生心理测评系统,2009-2010
  9. 北京市文化创意产业项目,对外汉语教学系列动画,2007-2009 
  10. 微软亚洲研究院合作,P2P流媒体服务,2008-2009
  11. 微软亚洲研究院合作,儿童绘画中的人机交互技术,2007-2008
  12. 英特尔公司合作,数字家庭及网关,2006-2008
  13. 联想技术研究院开放课题,数字家庭版权保护技术,2005-2006
 

1.  杨雅辉,高天辰,沈晴霓,吴中海,一种面向云服务的UCON多义务访问控制方法及系统,国家发明专利,授权专利号:ZL201410066781.4,授权日期:2017.2.15

2.  方跃坚,沈晴霓,杨雅辉,吴中海,一种自主授权的CP -ABE系统和方法,国家发明专利,授权专利号:ZL201410328154.3 ,授权日期:2017.5.17

3.  李影,贾统, 张齐勋,吴中海,基于多云存储的智能移动终端数据存储备份方法与系统,国家发明专利,授权专利号:ZL201410219412.4,授权日期:2017.3.15

4.  刘宏志,李浩,吴中海,张兴,针对Intel移动平台的实时AVS软编码方法,专利号:201410355678.1,授权日期:2017.05.04

5.  沈晴霓,万冕,吴中海,卿斯汉,一种适用于移动云的客户端动态认证方法,国家发明专利,授权专利号:ZL201310227082.9,授权日期:2016.2.10

6.  沈晴霓,张壮壮,吴中海,卿斯汉,一种适用于Xen虚拟化平台的隐蔽通道检测方法,国家发明专利,授权专利号:ZL201310195439.X,授权日期:2016.4.20

7.  沈晴霓,周志轩,吴中海,杨雅辉,一种云管理行为安全控制方法和系统,国家发明专利,授权专利号:ZL201310273098.3,授权日期:2016.4.27

8.  沈晴霓,刘龙,杨雅辉,吴中海,一种支持动态信任评估的MapReduce调度方法,国家发明专利,授权专利号:ZL201310206615.5,授权日期:2016.9.21

9.    Zhiqiang Yu, Yuejian Fang, Lei Zhai, Yun Wang, Zhonghai Wu, Event-Level Parallel Methods and Apparatus for XML Parsing, 美国发明专利,授权专利号:US008838626B2,授权日期:2014.9.16

10.杨雅辉,黄海珍,沈晴霓,吴中海。基于增量式GHSOM 神经网络模型的入侵检测方法.国家发明专利授权号:201210206778.9,授权日期:2014.11.1

11.杨雅辉,黄海珍,沈晴霓,吴中海,基于增量式GHSOM 神经网络模型的入侵检测方法,国家发明专利,授权专利号:ZL201210206778.9,授权日期:2014.11.26

12.沈晴霓, 张力哲,杨雅辉,吴中海,一种基于MapReduce机制的任务调度方法和系统,国家发明专利,授权专利号:ZL201210228031.3,授权日期:2014.11.26

13. 李影,贾统,袁小雍,唐红艳,张齐勋,吴中海,基于移动用户时空行为的云应用可用性预测方法与系统. 专利申请号:201410598622.9

14.杨雅辉,李晓晨,沈晴霓,吴中海,一种面向用户的云存储数据完整性保护方法。专利申请号: 201410350589.8

15.李影,唐红艳,贾统,吴中海,张齐勋,云计算系统中高频次连续失效任务的在线识别方法和系统,专利申请号:201510649451.2

16.李影,贾统,吴中海,基于互联网日志数据的软件缺陷故障识别方法和系统,专利申请号:201510977321.1

17. 罗杨,吴中海,沈晴霓。一种基于动态迁移的虚拟机调度算法安全性验证方法,专利申请号: 201510309318.2

18.刘宏志、蒋杰、王巨宏、管刚、吴中海、张兴,一套基于文本分析的信用风险评估方法及装置,专利申请号:201510695316.1

19.刘宏志、蒋杰、王巨宏、吴中海、张兴,数据离散化的方法和装置,专利申请号:201510271649.1

20.李影,贾统,岳阳,吴中海,基于问答网站知识的软件配置故障自动修复方法和系统,专利申请号:201610202074.2

21.李影, 岳阳,贾统,吴中海,电影上座率预测方法和系统,专利申请号:201610450944

22.沈晴霓,李聪,杨雅辉,吴中海。一种云环境下抗同驻的虚拟机部署方法,专利申请号:201610371375.8

23.沈晴霓,孙茜,李聪,吴中海。一种云环境中虚拟机负载均衡安全调度方法,专利申请号:201610407666.8

24.沈晴霓,李文婷,杨雅辉,吴中海。一种面向大数据平台的拒绝服务检测方法,专利申请号:201610075208.9

25.沈晴霓,钱文君,杨雅辉,吴中海。一种工作槽感知的Storm平台作业均分调度方法,专利申请号:201610404619.8

26.沈晴霓,董春涛,杨雅辉,吴中海。一种面向大数据平台的基于用户分级的安全调度方法,专利申请号:201610373850.5

27.刘宏志、姜正申、易晖、赵鹏、吴中海、张兴,一种基于主动学习和模型剪枝的集成学习方法及装置,专利申请号:201611060500.X 

28.刘宏志、江振滔、赵鹏、易晖、付彬、吴中海、张兴,一种基于人才流动迭代模型的公司等级排名方法及装置,专利申请号:201610769693.X

29.刘宏志、江振滔、赵鹏、易晖、付彬、吴中海、张兴,一种启发式的工作岗位分级方法及装置,专利申请号:201610773434.4

30.刘宏志、付彬、赵鹏、易晖、吴中海、张兴,一种基于互信息的数据离散化与特征选择集成方法及装置,专利申请号:201610772796.1

31.李影、巫思杏、岳阳、吴中海,基于可疑行为识别的通讯防欺诈实时检测方法和系统, 201710291247.7

32.濮阳天,沈晴霓,吴中海等,一种云计算平台管理员权限最小化的自动化划分方法及访问控制方法,201710304080.3

33.杨雅辉,张胜军,周航,吴中海等,一种基于布隆过滤器和交叉编码的数据完整性保护方法,2017104729207

34.杨雅辉,李立敏,吴中海等,一种云存储环境下的多备份数据持有性证明方法,201710472918X

35.刘宏志、江振滔、赵鹏、吴中海、张兴,一种基于人才流动的学校与公司共同排名方法及装置, 专利申请号:201710142777.5

36.刘宏志、江振滔、赵鹏、吴中海、张兴,一种基于人才流动分析的学校排名方法及装置,专利申请号:201710104626.0

 

2017年

  1. Zhengshen Jiang, Hongzhi Liu*, Bin Fu, Zhonghai Wu*. Generalized Ambiguity Decompositions for Classification with Applications in Active Learning and Unsupervised Ensemble Pruning, Thirty-First AAAI Conference on Artificial Intelligence (AAAI 2017), February 4-9, 2017, San Francisco, California, USA.
  2. Tong Jia, Pengfei Chen, Lin Yang, Ying Li*, et al, An approach for anomaly diagnosis based on hybrid graph model with logs for distributed services, 14th IEEE International Conference on Web Services (IEEE ICWS 2017) , June 26-July1,Hawaii,USA
  3. Yang Luo, Tian Puyang, Xiaoning Sun, Qingni Shen, Yahui Yang, Anbang Ruan, Zhonghai Wu*. RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful API[C]. The 24rd International Conference on Web Services (ICWS 2017), June 25 - June 30, 2017, Honolulu, Hawaii, USA.
  4. Tong Jia, Lin Yang, Pengfei Chen, Ying Li*, et al, LogSed: Anomaly diagnosis through mining time-weighted control flow graph in logs, IEEE International Conference on Cloud Computing (IEEE Cloud 2017), June 26-July1,Hawaii,USA
  5. Tang Hongyan, Li Ying*, Wang Long, Gu Jing, Wu Zhonghai, Predicting Misconfiguration-induced Unsuccessful Executions of Jobs in Big Data System,41st International Computer Software and Applications Conference (COMPSAC 2017), July 4-8, 2017, Politecnico di Torino, Turin, Italy.
  6. Bin Fu, Hongzhi Liu, Zhengshen Jiang, Zhonghai Wu, & D. Frank Hsu. A Feature Selection Framework Based on Supervised Data Clustering, I-SPAN 2017, Exeter, UK, June 21-23, 2017. (EI)
  7. Shuxia Wang, Bin Fu, Hongzhi Liu, Zhengshen Jiang, Zhonghai Wu, & D. Frank Hsu, Feature Engineering for Credit Risk Evaluation in Online P2P Lending, International Journal of Software Science and Computational Intelligence (IJSSCI), 2017, 9(2): 1-13.
  8. Tian Puyang, Qingni Shen, Yang Luo, Wu Luo, Zhonghai Wu. Making Least Privilege the Low-Hanging Fruit in Clouds[C], 53th IEEE International Conference on Communications (ICC 2017), Paris, France, 21-25 May, 2017.
  9. Yuqing Qiu, Qingni Shen, Yang Luo, Cong Li, Zhonghai Wu. A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud[C], The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Sydney, Australia, 1-4 August, 2017.

2016年

  1. Yang Luo, Hongbo Zhou, Qingni Shen, Anbang Ruan, Zhonghai Wu*. RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs[C], the 23rd International Conference on Web Services (ICWS 2016), June 27 - July 2, 2016, San Francisco, USA. IEEE, pp.666-671, 2016
  2. Zhengshen Jiang, Hongzhi Liu*, Bin Fu, Zhonghai Wu*. A Novel Bayesian Ensemble Pruning Method, the 16th IEEE International Conference on Data Mining (ICDM 2016), December 12-15, 2016, Barcelona, Spain.
  3. Tang Hongyan, Li Ying*, Jia Tong, Wu Zhonghai, Hunting Killer Tasks for Cloud System Through Behavior Pattern Learning[C], the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2016), Toulouse, FRANCE, June 28-July 1, 2016. IEEE, pp.83-88,2016.
  4. Yuan Xiaoyong, Tang Hongyan, Li Ying*, Jia Tong, Liu Tiancheng, Wu Zhonghai, A COMPETITIVE PENALTY MODEL FOR AVAILABILITY BASED CLOUD SLA, Services Transactions on Cloud Computing (ISSN 2326-7550) Vol. 4, No. 1, January-March 2016.
  5. Jia Tong, Li Ying, Tang Hongyan, Wu Zhonghai, Can We use programmer’s Knowledge? Fixing Parameter Configuration Errors in Hadoop through Analyzing Q&A sites, the IEEE International Congress on Big Data (BigData Congress 2016), San Francisco, USA, June 27-July 2, 2016.
  6. Jia Tong, Li Ying, Tang Hongyan, Wu Zhonghai, An Approach to Pinpointing Bug-induced Failure in Logs for Open Cloud Platforms,  IEEE International Conference on Cloud Computing (IEEE Cloud 2016), San Francisco, USA, June 26-July 2, 2016.
  7. Tang Hongyan, Li Ying, Jia Tong, Wu Zhonghai, Hunting Killer Tasks for Cloud System Through machine learning: A Google Cluster Case Study, the 2016 IEEE International Conference on Software Quality, Reliability & Security (QRS 2016), Vienna, Austria, August 1-3, 2016.
  8. Tang Hongyan, Li Ying, Jia Tong, Yuan Xiaoyong, Wu Zhonghai, Time Series Based Killer Task Online Recognition Service: A Google Cluster Case Study, the International Conference on Service-Oriented System Engineering (IEEE SOSE 2016), Oxford, UK, March 29–April 1, 2016.
  9. Hongzhi Liu, Zhonghai Wu, D. Frank Hsu, Bruce S. Kristal. Improved Combination of Multiple Retrieval Systems Using a Dynamic Combinatorial Fusion Algorithm, IEEE/WIC/ACM International Conference on Web Intelligence 2016 (WI 2016), Omaha, USA, October 13-16, 2016.
  10. Hongzhi Liu, Bin Fu, Zhengshen Jiang, Zhonghai Wu, D. Frank Hsu. A Feature Selection Framework Based on Supervised Data Clustering. 15th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC 2016), Palo Alto, USA, August 22-23, 2016.
  11. Yang Luo, Wu Luo, Tian Puyang, Qingni Shen, Anbang Ruan, Zhonghai Wu. OpenStack Security Modules: a Least-Invasive Access Control Framework for the Cloud, The 9th IEEE international Conference on Cloud Computing (IEEE CLOUD2016), San Francisco, USA, June 27-July 2, 2016.
  12. Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu. Whispers Between the Containers: High-capacity Covert Channel Attacks in Docker, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, August 23-26, 2016.
  13. Wu Luo, Wei Liu, Anbang Ruan, Qingni Shen, Zhonghai Wu. Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23-26 August, 2016.
  14. Cong Li, Yuejian Fang, Xing Zhang, Cancan Jin, Qingni Shen, Zhonghai Wu. A Practical Construction for Large Universe Hierarchical Attribute-Based Encryption, selected for possible publication in a special issue of Concurrency and Computation: Practice and Experience (CCPE) (SCI Indexed) for IEEE TrustCom/ISPA/BigDataSE 2016 conferences.
  15. Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu. Whisper in the Cloud:A Covert Channel Using the Result of Creating a Virtual Machine. 2016 International Conference on Information Systems Security and Privacy (ICISSP 2016), Roma, Italy, February 19-21, 2016: 380-387.
  16. Qian Sun, Qingni Shen, Cong Li, Zhonghai Wu. SeLance: Secure Load Balancing of Virtual Machines in Cloud, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, August 23-26, 2016.
  17. Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang and Zhonghai Wu. DDHCS: Distributed Denial-of-service Threat to YARN Clusters Based on Health Check Service. 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Roma, Italy, February 19-21, 2016: 146-156.
  18. Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu. Sift: An Efficient Method for Co-residency Detection on Amazon EC2. 2016 International Conference on Information Systems Security and Privacy (ICISSP 2016), Roma, Italy, February 19-21, 2016: 423-431.
  19. Jiatong, Li Ying*, Tang Hongyan, Wu Zhonghai, An Approach to Pinpointing Bug-induced Failure in Logs for Open Cloud Platforms, IEEE International Conference on Cloud Computing (IEEE Cloud 2016) ,June 26-July 2, San Francisco, USA (SCI:000399156200037)
  20. Chang Guo, Ying Li, Zhonghai Wu, SLA-DO: A SLA-Based Data Distribution Strategy on Multiple Cloud Storage Systems, The 22nd IEEE International Conference on Parallel and Distributed System (ICPADS 2016):599-612 (SCI:000393188800075
  21. 郭畅,沈晴霓,吴中海. 一种防止数据泄露的云存储优化模型,电子科技大学学报, 2016, 45(1): 118-122.

2015年

  1. Jia Tong, Li Ying,Yuan Xiaoyong, Tang Hongyan, Wu Zhonghai, Characterizing and Predicting Bug Assignment in OpenStack, International Conference on Trustworthy Systems and their Applications (IEEE TSA 2015), Hualien, Taiwan, July 8-9, 2015. (SCI: 000380455200002)
  2. Yuan Xiaoyong, Tang Hongyan, Li Ying, Liu Tiancheng, Wu Zhonghai, A Competitive Penalty Model for Availability Based Cloud SLA, IEEE International Conference on Cloud Computing (IEEE Cloud 2015) , New York, USA , June 27-July 2, 2015. (EI: 20161102082400)
  3. Yuan Xiaoyong, Li Ying, Wu Zhonghai, Liu Tiancheng, An Analysis on Availability Commitment and Penalty in Cloud SLA, The 39th Annual International Computers, Software & Applications Conference (COMPSAC 2015) , Tai chung, Tai wan, July 1-5, 2015. (EI: 20161502208033)
  4. Chang Guo, Qingni Shen, Zhonghai Wu. UserRank: A User Influence-based Data Distribution Optimization Method, 39th Annual International Computers, Software & Applications Conference Workshops(COMPSAC 2015) , Tai chung, Tai wan, July 1-5, 2015. (EI: 20161402203400)
  5. Hongzhi Liu, Zhonghai Wu, Xing Zhang. Feature Selection Based on Data Clustering, International Conference on Intelligent Computing (ICIC2015), Fuzhou, China, August 20-23, 2015, Springer LNCS 9225, 227-236. (EI: 20154201382028)
  6. Hongzhi Liu, Zhonghai Wu, Xing Zhang, D. Frank Hsu. An Information-Theoretic Feature Selection Method Based on Estimation of Markov Blanket, IEEE, International Conference on Cognitive Informatics & Cognitive Computing (IEEE ICCI*CC 2015), Beijing, China, July 6-8, 2015: 327-332.  (EI: 20161202119007)
  7. Zhang Xing, Jin Cancan, Li Cong, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai. Ciphertext-policy attribute-based encryption with user and authority accountability, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’15), Dallas, United states, October 26- 29, 2015, Springer International Publishing, 2015:500-518. (EI: 20160801960546)
  8. Zhang Xing, Jin Cancan, Wen Zilong, Shen Qingni, Fang Yuejian, Wu Zhonghai. Attribute-based encryption without key escrow. International Conference on Cloud Computing and Security (ICCCS’15), Nanjing, China, August 13-15, 2015, Springer International Publishing, 2015: 74-87. (EI: 20160501857258)
  9. Fang Yuejian, Wen Zilong, Shen Qingni, Yang Yahui, Wu Zhonghai. POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts, in Proc. of the 11th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2015), Dallas, United states, October 26- 29, 2015, Springer International Publishing, 2015: 585-589. (EI: 20160801960556)
  10. Fang Yuejian, Wen Zilong, Shen Qingni, Yang Yahui, Wu Zhonghai. SEDOSN: A secure decentralized online social networking framework. 13th National Embedded System Technology Conference (ESTC 2015), Beijing, China, October 10-11, 2015. (SCI: 000371387100007)
  11. Yang Luo, Qingni Shen, Cong Li, Kang Chen, Zhonghai Wu. Probing the Scheduling Algorithms in the Cloud Based on OpenStack. 2015 International Conference on Cloud Computing and Security (ICCCS 2015), Nanjing, China, August 13-15, 2015, Springer International Publishing, 2015: 510-520. (EI: 20160501857252)
  12. Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu. Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. The Seventeenth International Conference on Information and Communications Security (ICICS 2015), Singapore, December 2-4, 2015, Springer LNCS: 429-435. (EI: 20161202119625)
  13. Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. MB-DDIVR: A Map-based Dynamic Data Integrity Verification and Recovery scheme in Cloud Storage. The 17th International Conference on Information and Communications Security (ICICS 2015), Singapore, December 2-4, 2015, Springer LNCS: 312-318. (EI: 20161202119656)
  14. 张星, 文子龙, 沈晴霓, 方跃坚, 吴中海, 可追责并解决密钥托管问题的属性基加密方案. 计算机研究与发展, 2015, 52(10): 2293-2303. (EI: 20154601528833)
  15. 罗杨, 张齐勋, 沈晴霓, 刘宏志, 吴中海, 多层次的Android系统权限控制方法, 软件学报, 2015, 26(Suppl.2):263-271.
  16. 王洋, 刘宏志, 吴中海. 基于非线性滤波和纹理传输的图像风格化. 计算机辅助设计与图形学学报, 2015(7):1255-1262. (EI: 20153101095374)
  17. 李伟平, 王武生, 莫同, 张志超, 褚伟杰, 吴中海. 情境计算研究综述. 计算机研究与发展, 2015, 52(2):542-552. (EI: 20151400720673)
  18. 张齐勋, 刘宏志, 刘诗祥, 贾堂, 曹健. 基于行业专有词典的TF-IDF特征选择算法改进, 全国嵌入式系统学术会议(ESTC 2015), 北京, 中国, 10月10-11日, 2015.

2014年

  1. Wang Yang, Liu Hongzhi, Wu Zhonghai, Towards relative gradient and its applications, Proc. SPIE 9443, Sixth International Conference on Graphic and Image Processing (ICGIP 2014), Beijing, China, October 24-26, 2014:94432Z-94432Z-5. (EI: 20151300686807)
  2. 王洋, 刘宏志, 吴中海. 纸质草稿图的半自动线稿生成算法. 计算机辅助设计与图形学学报, 2014, 26(3):418-428. (EI: 20141417541441)
  3. 沈晴霓, 卿斯汉, 吴中海, 张力哲, 杨雅辉. 基于动态域划分的MapReduce安全冗余调度策略. 通信学报, 2014(1):34-46. (EI: 20141017419810)

2013年

  1. Liu Hongzhi, Wu Zhonghai, Zhang Xing, D. Frank Hsu, A Combinatorial Pruning Algorithm for Voronoi Skeletonization. Lecture Notes In Electrical Engineering, 2013, 212:325-333. (EI: 20124815709645)
  2. Liu Hongzhi, Wu Zhonghai, Zhang Xing, D. Frank Hsu, A skeleton pruning algorithm based on information fusion. Pattern Recognition Letters, 2013, 34(10):1138-1145. (SCI: 000320085700004 EI: 20131816288083)
  3. 刘宏志, 吴中海, 张兴. 一种基于特征选取的传感器选择方法. 计算机应用与软件, 2013(9):100-102.
  4. Wang Yang, Liu Hongzhi, Wu Zhonghai, Edge-Preserving Smoothing for Image Decomposition via a Hybrid Approach, Proc. SPIE vol.9069, International Conference on Graphic and Image Processing (ICGIP 2013), Hong Kong, China, October 26-27, 2013, 9069(2):235-246. (EI: 20140917364861)
  5. 莫同, 褚伟杰, 李伟平, 吴中海. 一种基于扩展FP-TREE的服务推荐方法. 华中科技大学学报, 2013, 41(S2):81-87. (EI: 20140817350469)
  6. Wang Wusheng, Li Weiping, Wu Zhonghai, A Process Calculus for Context-aware Systems,IEEE International Conference on Services Computing (SCC 2013), CA, USA, June 28-July 3, 2013:759-760. (EI: 20140317205830)
  7. Zhang Zhichao, Zheng Shaoqiu, Li Weiping, Tan Ying, Wu Zhonghai, Tan Wei, Genetic Algorithm for Context-Aware Service Composition Based on Context Space Model, IEEE International Conference on Web Services (ICWS 2013), CA, USA, June 27-July 2, 2013:605-606. (EI: 20140317193943)
  8. Deng Yong, Chao-Hsien Chu, Wu Zhonghai, Si Huayou, Combining Multiple Sensor Features for Stress Detection using Combinatorial Fusion, Journal of Interconnection Networks, 2013, 13(3n04). (EI: 20131816284529)
  9. Deng Yong, Chao-Hsien Chu, Wu Zhonghai, Si Huayou, An Investigation of Decision Analytic Methodologies for Stress Identification, The International Journal on Smart Sensing and Intelligent System, 2013, 6(4):1675-1699. (EI: 20134416921797)
  10. Shen Qingni, Yang Yahui, Wu Zhonghai, Wang Dandan, Long Min. Securing Data Services: A Security Architecture Design of Private Storage Cloud Based on HDFS, International Journal of Grid and Utility Computing, 2013, 4(4):242-254. (EI: 20134316902006)
  11. Shen Qingni, Wan Mian, Zhang Zhuangzhuang, Qing Sihan, Wu Zhonghai. A Covert Channel Using Event ChannelState on Xen Hypervisor. 15th International Conference on Information and Communication Security (ICICS 2013). Beijing, China, November 20-22, 2013:125-134. (EI: 20140817342643) 
  12. 方跃坚, 于枝强, 翟磊, 吴中海. 一种混合并行XML解析方法. 软件学报, 2013, 24(6):1196-1206. (EI: 20132716471436) 
  13. 方跃坚, 沈晴霓, 吴中海. 一种超椭圆曲线密码处理器并行结构设计. 计算机研究与发展, 2013, 50(11):2383-2388. (EI: 20134917057957)  

   2012年

  1. Liu Hongzhi, Wu Zhonghai, D. Frank Hsu, Bradley S. Peterson, Dongrong Xu, On the generation and pruning of skeletons using generalized Voronoi diagrams, Pattern Recognition Letters, 2012, 33(16):2113-2119. (SCI: 000311260000007 EI: 20124515637064)
  2. Liu Hongzhi, Wang Yang, Wu Zhonghai, (2012). A New 3D Bounding Box Estimation Approach for Object Reconstruction, Advanced Science Letters, 2012, 10(1):523-527.
  3. Liu Hongzhi, Wu Zhonghai, D. Frank Hsu, Combination of Multiple Retrieval Systems Using Rank-Score Function and Cognitive Diversity, In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA 2012), Fukuoka, Japan, March 26-29, 2012:167-174. (EI: 20122015017182)
  4. 吴中海, 周兴社, 林金龙, 刘宏志. 嵌入式系统的研究进展与趋势. 2011年度中国计算机科学技术年度报告A卷, 2012:173-193.
  5. 莫同, 褚伟杰, 李伟平, 吴中海. 一种基于超图的微博群落感知方法. 西安交通大学学报, 2012, 46(11). (EI: 20125115818610)
  6. Zhang Zhichao, Li Weiping, Wu Zhonghai, Tan Wei, Towards an Automata-based Semantic Web Services Composition Method in Context-aware Environment, IEEE Ninth International Conference on Services Computing (SCC 2012), Honolulu, HI, USA, June 24-29, 2012:320-327. (EI: 20124215576738)
  7. Deng Yong, Wu Zhonghai, C. Chu, T. Yang, Evaluating Feature Selection for Stress Identification, International Conference of Information Reuse and Integration (IRI 2012), 2012:584-591. (EI: 20124515649635)
  8. Deng Yong, Frank Hsu, Wu Zhonghai, C. Chao, Feature selection and combination for stress identification using correlation and diversity, Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks (I-SPAN 2012), 2012, 7363(1):37-43. (SCI: 000324246800006 EI: 20131116104635)
  9. John Paulin Hansen, Arne John Glenstrup, Wang Wusheng, Li Weiping, Wu Zhonghai, Collecting location-based voice messages on a TalkingBadge, Nordic Conference on Human-Computer Interaction: Making Sense Through Design (NordiCHI 2012), Copenhagen, Denmark, October 14-17, 2012:219-227. (EI: 20130115855139)
  10. Shen Qingni, Zhang Lizhe, Yang Xin, Yang Yahui, Wu Zhonghai, Zhang Ying, SecDM: Securing Data Migration Between Cloud Storage Systems, In Proceedings of 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing (CDAS2011), Sydney, Australia, December 12-14, 2011:636-641. (EI: 20120414716768)
  11. Shen Qingni, Yang Yahui, Wu Zhonghai, Yang Xin, Zhang Lizhe, Yu Xi, Lao Zhenmin, Wang Dandan, Long Min, SAPSC: Security Architecture of Private Storage Cloud Based on HDFS, In Proc. of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2012), Fukuoka, Japan, March 26-29, 2012:1292-1297. (EI: 20122015017120)

   2011年

  1. Liu Hongzhi, Wu Zhonghai, D. Frank Hsu, Combining Multiple Retrieval Systems Using Combinatorial Fusion Analysis and Rank-Score Characteristic Function, In Proc. of the 14th IEEE International Conference on Computational Science and Engineering (CSE 2011), Dalian, China, Aug 24-26, 2011:371-378. (EI: 20114714543761)
  2. 王洋, 吴中海. 数字图像的十字绣风格化. 全国第8届智能CAD与数字娱乐会议(CIDE 2011), 杭州, 中国, 11月5-8日, 2011.
  3. Mo Tong, Li Weiping, Chu Weijie, Wu Zhonghai, An Event Driven Model for Context-aware Service, IEEE International Conference on Web Services (ICWS 2011), Washington DC, USA, July 4-9, 2011:740-741. (EI: 20113914379415)
  4. Mo Tong, Li Weiping, Chu Weijie, Wu Zhonghai, CABS3: Context-awareness Based Smart Service System, In proceedings of The 6th International Conference on Wireless communications, Networking & Mobile Computing, Chengdu, China, September 23-25, 2010:1-4. (CPCI-S: 000305114900001 EI: 20104713416328)
  5. 莫同, 褚伟杰, 李伟平, 吴中海, 林慧苹. 基于情境感知事件的主动服务发现方法. 软件学报, 2011, 22(zk2):41-51. (EI: 20120814797913)
  6. 莫同, 褚伟杰, 李伟平, 吴中海. 采用超图的微博群落感知方法. 西安交通大学学报, 2012, 46(11):120-126. (EI: 20125115818610)
  7. Wang Wusheng, Li Weiping, Wu Zhonghai, Chu Weijie, Mo Tong, Research on Building a Common Ontology-based Context Model, Second International conference on Intelligent Systems, Modeling and Simulation, Kuala Lumpur, Malaysia, January 24, 2011.
  8. Chu Weijie, Li Weiping, Mo Tong, Wu Zhonghai, A Context-Source Abstraction Layer for Context-aware Middleware, 2011 Eighth International Conference on Information Technology: New Generations (ITNG 2011), Las Vegas, Nevada, USA, April 11-13, 2011:1064-1065. (EI: 20113314229422)
  9. Sun Pengfei, Shen Qingni, Chen Ying, Wu Zhonghai, Zhang Cong, Anbang Ruan, Gu Liang, POSTER: LBMS: Load Balancing based on Multilateral Security in the Cloud, In the Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011), Chicago, Illinois, USA, October 17-21, 2011:861-864.
  10. Shen Qingni, Yang Xin, Yu Xi, Yang Yahui, Wu Zhonghai, Towards Data Isolation and Collaboration in Storage Cloud, The 2011 IEEE Asia-Pacific Services Computing Conference (AP SCC 2011), Jeju, Korea, December 12-15, 2011:139-146. (EI: 20120614745737)
  11. Shen Qingni, Zhang Lizhe, Yang Xin, Yang Yahui, Wu Zhonghai, Zhang Ying, SecDM: Securing Data Migration Between Cloud Storage Systems, In Proceedings of 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing (CDAS2011), Sydney, Australia, December 12-14, 2011:636-641. (EI: 20120414716768)

      2010年

  1. 刘宏志, 吴中海, 李超, 王洋. 一种基于三维骨架化的人体姿势估计方法. 软件学报,2010, 21(zk):158-164. (EI: 20111013735682)
  2. 刘宏志, 吴中海. 一种基于OGRE的在线实时三维人体动画仿真方法. 第7届全国智能CAD与数字娱乐学术会议(CIDE2010), 无锡, 中国, 10月14-16日, 2010.
  3. 曹宁, 吴中海, 刘宏志, 张齐勋. HDFS下载效率的优化. 计算机应用, 2010, 30(8):2060-2065.
  4. Li Weiping, Chu Weijie, Frank Tung, Wu Zhonghai, A Uniform Device Information Access for Context-aware Middleware, 2010 IEEE 8th International Conference on Web Services (ICWS 2010), Miami, Florida, USA, July 5-10, 2010:654-657. (EI: 20104013271160)
  5. Li Weiping, Chu Weijie, Frank Tung, Wu Zhonghai, An integrated practice lab course for service engineering, International Conference on E-Business and E-Government (ICEE 2010), guangzhou, China, May 7-9, 2010:3680-3682. (EI: 20104913459160)
  6. Li Weiping, Zhang Zhichao, Wu Si, Wu Zhonghai, An implementation of the SaaS Level-3 maturity model for A Credit Bank Information System, International Conference on Service Sciences (ICSS 2010), Hangzhou, China, May 13-14, 2010:283-287. (EI: 20103013102006)
  7. Yu Lian, Wei-Tek Tsai, Zhao Wei, Wu Fang, Predicting Defect Priority based on Neural Networks, Advanced Data Mining and Applications, 2010:356-367. (SCI: 000319827000034 EI: 20105113502231)
  8. Mo Tong, Li Weiping, Chu Weijie, Wu Zhonghai, CABS3: Context-awareness Based Smart Service System, In proceedings of The 6th International Conference on Wireless communications, Neworking & Mobile Computing, Chengdu, China, September 23-25, 2010:1-4. (EI: 20104713416328)
  9. 莫同, 李伟平, 吴中海, 褚伟杰. 一种情境感知服务系统框架. 计算机学报, 2010, 33(11):2084-2092. (EI: 20105013489604)
  10. Deng Yong, Si Huayou, Xiong Hu, Wu Zhonghai, Chen Zhong, A Hybrid Approach to Making Recommendations Based on Ontology and Neural Networks in the Movie Domain, The 2010 International Conference on Information Security and Artificial Intelligence (ISAI 2010), Chengdu, China, December 17-19, 2010.
  11. Deng Yong, Wu Zhonghai, C. Tang, H. Si, H. Xiong, Z. Chen, A Hybrid Movie Recommender Based on Ontology and Neural Networks, Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications (GreenCom 2010) & Int'l Conference on Cyber, Physical and Social Computing (CPSCom 2010), Hangzhou, China, December 18-20, 2010:846-851. (EI: 20111313879875)
  12. Deng Yong, Wu Zhonghai, C. Tang, H. Si, H. Xiong, Z. Chen, A Collaborative Filtering Approach to Making Recommendations Based on Ontology, IEEE ISAI, 2010:243-247.
  13. Fang Yuejian, Wu Zhonghai, Duan Xiaohui, Yang Jianqiang, Liu Bei, Zhang Xing, Design and Implementation of Fiber Channel System in Avionics Environment, The 2nd International Symposium on Computer Network and Multimedia Technology (CNMT 2010), Wuhan, China, December 24-26, 2010:315-318. (CPCI-S: 000295921100074 EI: 20110813680168)

  2010年前

  1. Zhonghai Wu, Xinggong Zhang, , Chengqing Ye, Extracting 2D feature from 3D body data, In: Proceedings of the Fifth Int. Conf. of CAD & Graphics, 1997.12
  2. Chengqing Ye,Zhonghai Wu, Changsheng Yang, Study and design of scalable memory-shared multiprocessing system. In: Proc. of the Conf. on Advances in Parallel and Distributed Computing, IEEE Computer Society, 1997.4, p 220-225. (EI: 1997183565059)
  3. 吴中海,张行功,叶澄清,潘云鹤,一个适合于特征计算的多边形逼近算法,计算机学报,1997.12, 20(12): 1129-1132. (CSCD:3)
  4. 吴中海,叶澄清,潘云鹤,合一和回溯智能加速部件的设计与实现,计算机学报,1997.2, 20(2):111-117
  5. 吴中海,叶澄清,高效逻辑语言实现方法,计算机学报,19(9):649-655, 1996.9. (CSCD:1)
  6. 吴中海,谭孟恩,何志均,人体三围特征计算的研究与实现,计算机研究与发展,1997.12, 34(12): 921-925.
  7. 吴中海,叶澄清,潘云鹤,智能推理新机制的研究与实现,计算机研究与发展,1997.11.
  8. 吴中海,叶澄清,SPP并行I/O处理机的设计与实现,计算机研究与发展,33(12): 905-909, 1996.12.
  9. 吴中海,叶澄清,潘云鹤,一个改进的简单多边形凸包算法,计算机辅助设计与图形学学报,9(1):13-17, 1997.1. (CSCD:11)
  10. 吴中海,叶澄清,潘云鹤,超媒体数据库的一致化数据模型,计算机科学,23(3): 40-43. 1996.6
  11. 张晓龙,吴中海,卢云庚,刘宏志,以儿童为中心的情景式人机交互方法,计算机应用,2009.12. 29(12):3427-3430 (CSCD:1)
  12. 夏敏,吴中海,杨雅辉,王洪芹,基于Darwin的集群流媒体服务器系统的设计与实现,计算机与现代化,2009.5, 165(5):19-22
  13. 冯在文,梁鹏,刘影,吴中海,何克清,Web服务描述的互操作性测试研究,计算机应用研究,2006.11,191-195.
  14. 苏渭珍、吴中海。国际合作办学:软件学院跨越式发展的助推器,计算机教育,2004.10.
  15. 吴中海,数字化、信息化的电视台新闻系统,中国广播电视技术,2000.12.
  16. 吴中海,新闻直播背后的信息技术,中国传播论坛国际学术会议—新世纪广播电视变革,大会特邀报告,北京,2001.9.
  17. 吴中海,新闻生产管理系统,中国新闻科技,2001.5.
  18. 吴中海,叶澄清,SPP外围子系统的设计与实现,小型微型计算机系统,16(7): 15-20, 1995.7
  19. 张行功,吴中海,叶澄清,基于局域网的多媒体教学系统,计算机工程,国际计算机会议,上海,1996.10.
  20. 崔振乾,吴中海,叶澄清,基于工作站群机的并行虚拟机PVM分析,计算机工程, 21(1):232-237. 1995.5.
 
  1. 中国计算机学会理事
  2. 中国计算机学会嵌入式系统专委会主任
  3. 中国计算机学会计算机安全专委会委员
  4. 教育部软件工程专业教学指导委员会委员
  5. 北京大学信息与工程科学学部学术委员会委员