沙灜

姓名

沙灜

性别




职称

教授

学位

博士

电话


邮箱

shaying@mail.hzau.edu.cn

政治面貌

中共党员

工作单位

bat365官网登录入口bat365官网登录入口

研究方向

人工智能、自然语言处理、机器学习等

教育经历

2015.06 - 2016.8  美国伦斯勒理工学院(Rensselaer Polytechnic Institute,RPI)        访问学者

1998.09–2002.07  中国科学院计算技术研究所  计算机软件与理论 博士

1995.09–1998.07  大连海事大学 通信与电子系统  硕士

1991.09–1995.07  大连海事大学 通信工程  学士

主要职历

2019.08 – 至今     bat365官网登录入口bat365官网登录入口 教授,博士生导师

2012.01– 2019.08  中国科学院信息工程研究所  副研究员,博士生导师

2002.08 - 2011.12  中国科学院计算技术研究所  助理研究员

科研成果

人工智能系主任,中国计算机学会数字农业执行委员,中文信息学会社会媒体专委会委员。以课题负责人身份承担了国家科技支撑计划项目、国家自然科学基金面上项目、863子课题、国家信息安全计划、内蒙古重大科技专项等30余项课题。申请专利13项,其中授权9项,二十余项软著。在SIGIR、AAAI、CIKM、ICDM、ISWC、TWEB等国际会议上和期刊上以第一作者或通讯作者共发表学术论文40余篇。获2017年保密科学技术奖励二等奖(省部级)。出版4部译著。开设研究生课程《社会计算与社交网络分析》、《数据科学导论》、《互联网大数据获取与分析》、《基于深度学习的自然语言处理》,本科生课程《人工智能》。培养及协助培养博士生、硕士生几十名,优秀学士论文指导教师。

(1).以课题负责人承担的科研项目:

1.2023.1-2026.12.国家自然科学基金面上项目,社会媒体委婉语释义自动生成关键技术研究.53万

2.2022.7-2023.6.深圳数影科技有限公司,横向合作,仔猪智能转运机器人.50万

3.2021.7-2024.7.内蒙古自治区科技重大专项,“玉米智慧生产模式创新与无人农场示范”子课题“玉米种植全生育期信息化知识图谱构建”.153.7万

4.2020.12-2022.03.中国人民解放军军事科学院防化研究院,探测数据加工与模型测试.18万

5.2017.4-2018.3.国家信息安全计划,社交网络分析.80万

6.2012.10-2015.10.国家科技支撑计划,社交网络人物、群体发现分析及示范应用平台.548万

7.2014.1-2015.3.国家信息安全计划,社交网络数据获取与分析.80万

8.2011.1-2013.12.国家自然科学基金面上项目,主动测量技术对非结构对等网络的影响及其校准技术的研究.30万

(2).学术论文

1. Changjian Wang, Xiaofei Zhou, Shirui Pan, Linhua Dong, Zeliang Song, Ying Sha, Exploring Relational Semantics for Inductive Knowledge Graph Completion, Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI 2022.) (CCF-A)

2.Linyun Ye, Zhi Zeng, Ruigang Liu, Ziwen Cui, Minghao Wu and Ying Sha, Fake News Detection by Using Common Latent Semantics Matching Method, The 33rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI2021).

3. Huan Wang, Chunming Qiao, Xuan Guo, Lei Fang, Ying Sha, Zhiguo Gong, Identifying and Evaluating Anomalous Structural Change-based Nodes in Generalized Dynamic Social Networks, ACM Transactions on the Web (TWEB), 2021(CCF-B)

4.Yu Junshuai, Huang Qi, Zhou Xiaofei and Ying Sha*, ARNet: An Information Aggregating and Reasoning Network over Heterogeneous Graph for Fake News Detection, IJCNN 2020. (CCF-C)

5.Changjian Wang and Ying Sha*,Neighborhood Aggregation Embedding Model for Link Prediction in Knowledge Graphs,The International Conference on Web Engineering (ICWE) 2020.(CCF C).

6. Changjian Wang, Minghui Yan, Chuanrun Yi and Ying Sha,Capturing Semantic and Syntactic Information for Link Prediction in Knowledge Graphs, The 18th International Semantic Web Conference ISWC 2019.(CCF B)

7.Minghui Yan*, Changjian Wang, ying sha*,Capturing User and Product Information for Sentiment Classification via Hierarchical Separated Attention and Neural Collaborative Filtering, 28th International Conference on Artificial Neural Networks, ICANN2019(CCF C).

8. chuanrun yi*, Dong Wang, chunyu he, ying sha*,Learning to Explain Chinese Slang Words, 28th International Conference on Artificial Neural Networks, ICANN2019. (CCF C).

9. Chengfang Ma, Ying Sha, Jianlong Tan, et al. Chinese Social Media Entity Linking Based on Effective Context with Topic Semantics. International Computer Software and Applications Conference (COMPSAC), 2019.(CCF C)

10. Jianjun Wu, Ying Sha, Bo Jiang, and Jianlong Tan. DSINE: Deep Structural Influence Learning via Network Embedding. In AAAI-2019, poster. (CCF A)

11. Jianjun Wu, Ying Sha, Rui Li, Jianlong Tan and Bin Wang. Leveraging Uncertainty Analysis of Data to Evaluate User Influence Algorithms of Social Networks. In ICCS 2018

12. Jianjun Wu, Ying Sha, and Jianlong Tan. Structural Representations Learning of Social Influence in heterogeneous social networks. In ITQM 2018.

13. Jirong You, Ying Sha, Qi Liang and Bin Wang,Morph Resolution Based on Autoencoders Combined with Effective Context Information,International Conference on Computational Science (ICCS), 2018.

14.Jianjun Wu, Ying Sha, Rui Li, Qi Liang, Bo Jiang, Jianlong Tan and Bin Wang. Identification of Influential Users based on Topic-Behavior Influence Tree in Social Networks. In NLPCC 2017. ( Distinguished paper)(CCF C)

15. Ying Sha, Zhenhui shi, Rui li, Qi Liang, Bin Wang,  Resolving Entity Morphs based on Character-Word Embedding, International Conference on Computational Science (ICCS), 2017.

16. Ying Sha, Qi Liang, and Kaijian Zheng, Matching User Accounts across Social Networks based on Users Message, International Conference on Computational Science(ICCS) , 2016.

17. Bo Jiang, Jiguang Liang, Ying Sha, Rui Li, Lihong Wang. Domain Dictionary-based Topic Modeling for Social Text. In Web Information Systems Engineering(WISE) 2016. (CCF C)

18. Bo Jiang, Jiguang Liang, Ying Sha, Rui Li, Wei Liu, Hongyuan Ma, Lihong Wang. Retweeting Behavior Prediction Based on One-Class Collaborative Filtering in Social Networks. In SIGIR 2016 (CCF A)

19. Bo Jiang, Jiguang Liang, Ying Sha, Lihong Wang, Zhixin Kuang,Unifying User and Message Clustering Information for Retweeting Behavior Prediction,The 17th International Conference on Web-Age Information Management( WAIM), 2016.(CCF C)

20. Bo Jiang, Jiguang Liang, Ying Sha, Lihong Wang. Message Clustering based Matrix Factorization Model for Retweeting Behavior Prediction.  In CIKM 2015 (CCF B)

21. Bo Jiang, Ying Sha, Lihong Wang. A Multi-view Retweeting Behavior Prediction in Social Networks. In APWeb 2015. (CCF C)

22. Bo Jiang, Ying Sha, Lihong Wang. Predicting User Mention Behavior in Social Networks. In NLPCC 2015. (CCF C)

23. Bo Jiang and Ying Sha, Modeling Temporal Dynamics of User Interests in Online Social Networks. International Conference on Computational Science(ICCS), 2015.

24. Li Yang, Sha Ying, Shan Jixi, Jiang Bo, Wu Jianjun. Preventing the Diffusion of Negative Information Based on Local Influence Tree. The 29th ACM Symposium on Applied Computing, SAC2014.

25. Jiguang Liang, Xiaofei Zhou, Ying Sha, Ping Liu, Li Guo, Unsupervised Clustering Strategy Based on Label Propagation, IEEE International Conference on Data Mining (ICDM), 2013. (CCF B)

26. Yang Li, Ying Sha, Jixi Shan, Bo Jiang, Finding High Influence Vertices based on Candidate Set, The International Conference on Parallel and Distributed Computing, Applications and Technologies(PDCAT),2013.

27. Yang Li, Ying Sha, Jixi Shan, Bo Jiang, Jianjun Wu, Finding High-Influence Leader based on Local Metrics, The 13th IEEE International Conference on Computer and Information Technology (CIT), 2013.

28. Yang Li, Ying Sha, Jixi Shan, Kai Xu, The research of weighted community partition based on simhash, First International Conference on Information Technology and quantitative management (ITQM), 2013.

29. Jixi Shan, Ying Sha, Yang Li, Kai Xu, Li Guo, Distributed OSN Crawl System Based on Ajax Simulation. First International Conference on information Technology and Quantitative Management (ITQM), 2013.

30. Yang Li,Xiaoyan Wang,Ying Sha,Jianlong Tan,Research of Security Relationship Based on Social Networks, International Standard Conference on  Trustworthy Computing and Services (ISCTCS) 2012.

31. Kun Wang, Ying Sha, JianLong Tan,  Yang Li ,Finding delta-closure Property of BitTorrent System and Applications Based on This Property,  International Standard Conference on  Trustworthy Computing and Services (ISCTCS), 2012.

32. Xiaoyan Wang, Kai Xu, Kun Wang, Ying Sha, Research of New Words Identification in Social  Network for Monitoring Public Opinion, International Standard Conference on  Trustworthy Computing and Services (ISCTCS), 2012.

33. Ying Sha, Zhibin Zhang, Jianlong Tan, the Influence of Active Measurement on Unstructured Peer-to-Peer Network, International Conference on Communications, Circuits and Systems (ICCCAS),2010

34. Ying Sha, Zhibin Zhang, Jianlong Tan, Measuring the Influence of Active Measurement on Unstructured Peer-to-Peer Network, P2PNVE2009, the 15th International Conference on Parallel and Distributed Systems (ICPADS), 2009. (CCF C)

35. Ying SHA,Jianlong TAN, An Efficient Algorithm to Compute Max/Min Values in Sliding Window for Data Streams. 2nd International Conference on Software and Data Technologies. (ICSOFT2007)

36. Ying Sha, AVS-REL---A New Right Expression Language, First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems. (DRMTICS2005).Lecture Notes in Computer Science, 2006. Volume 3919/2006, 90-101 (3)

中文论文:

1. 沙灜、曹浩、王欢、吴明民、葛星, HQ-GAN:一种幽默格言类型文本生成方法的研究,中文信息学报,2022年

2. 刘程、沙灜、姜波、郭莉,新浪微博隐式组织发现,中文信息学报,2017年第31卷第2期

3. 沙灜、梁棋、王斌,中文变体词的识别与规范化综述[j].信息安全学报,2016,1(3)

4.李阳,王晓岩,王昆,沙瀛.基于社交网络的安全关系研究[J].计算机研究与发展 . 2012 (S2)

5.王昆、沙灜、谭建龙,基于Cookie劫持的Deep-Web用户数据安全性分析,计算机研究与发展,49:17-22,2012

(3).授权专利

1. 一种同时支持分布式加密文件下载和使用的系统,CN200610112548.0;

2. 一种实现数字内容使用权利的安全保护系统,CN200610112550.8;

3. 计算滑动窗口下数据流最大值和最小值的方法和系统,CN200610075648.0;

4. 一种能够抵御垃圾邮件的分布式邮件系统,CN200610171517.2;

5. 一种XXX方法和系统, ZL 201318001411.9;

6. 一种XXX方法和系统,ZL 201418005082.X;

7. 一种微信数据获取方法和系统,ZL 201510363826.9;

8. 基于浏览器测试组件的QQ群数据获取方法与系统, ZL 201510363954.3;

9. 面向特定主题的隐蔽社区核心交接圈检测发现方法和系统, ZL 201510160958.1。

10. 一种XXX方法和系统,ZL 201418005083.4。

(4).获奖

1. 2017年保密科学技术奖二等奖。

(5). 译著

1.《Python机器学习-预测分析核心算法》,人民邮电出版社,2017-01-01,沙灜、李鹏;

2.《深度学习实际指南-基于R语言》,人民邮电出版社,2018-06-01,沙灜;

3.《机器学习提升法-基础理论与算法》,人民邮电出版社,2020-10-1,沙灜;

4.《Spark和Python机器学习实战:预测分析核心方法(第二版)》,沙灜,胡玉雪,人民邮电出版社,2022-03.

备注

欢迎博士后、博士研究生、硕士研究生和本科生加入本课题组。有意者可与我邮件联系。

Baidu
sogou