Myself

Education

Computer Science, B.Sc. & Ph.D.

Nanjing University of Science and Technology, China
2006 — Now

In Nanjing University of Science and Technology, I got B.Sc in Computer Science in 2010. Now I'm pursuing Ph.D. in Computer Science, and doing the researches about the social computing.

Visiting Scholar

University of Washington, USA
2013

I visited UW at 2013, and learn courses about social computing and data mining. Also, I did some cooperative research projects.

Researchs

2012-01 to now: Online Social network data analysis and information diffusion research. Analyze the large amount of data from micro-blog (a china version twitter) based on Hadoop, Hama and Spark, major on relationship network and the information cascades dynamics. And also develop networks from the data and capture the critical network properties by distributed computing, to find how the structure of network affects the information dynamically spread on it. The research includes: (1)User influence measurement, (2)Event detection and prediction, (3)Information cascades modeling, (4)Information diffusion prediction.

2013-01 to 2013-10: Human mobility patterns and anomaly detection. Based on large scale anonymous Los Angeles city mobile phone users data set, which contains imprecise geographic information, analyzed the human mobility pattern under different scales, propose several anomaly detection measurements, and found out that the urban area people have regular weekly mobility pattern under stable circumstances, the pattern is highly predictable.

2011-10 to 2012-05: Wireless sensor network security Simulate the worm propagation and the immune control in the WSN, based on a Castalia WSN simulator. Purpose an emergency response mechanism which spreading anti-worm in the WSN to curb the spread of the worm/virus. The mechanism was simulated in a large WSN environment and function effectively.

2010-09 to 2011-04: Complex network invulnerability and key node research. Complex network invulnerability and measurement method research, a complex network experiment and visualization software programing with Java, and implanted with variety of measure algorithms and key node discovery algorithms.

2010-05 to 2010-08: Security information transmission services software. Security computer network IPv4 to IPv6 NAT windows sockets library program, with NDIS IPv4 and IPv6 packets capture and analysis software programing.

My Papers

Kechen Zhuang, Haibo Shen, Hong Zhang. User Spread Influence Measurement in Microblog. Multimedia Tools and Applications, 2017, 73(3): 3169–3185.

Kechen Zhuang, Fawang Han, Haibo Shen, Hong Zhang. A Time-Aware Information Cascade Model based on Survival Analysis. JIT, 2017, under review.

Kechen Zhuang, Kun Zhang, Hong Zhang. Event-related Burst Analysis and Time Prediction on Microblog Data. Journal of Computational and Theoretical Nanoscience, 2016, 13(1): 783-788.

Kechen Zhuang, Fawang Han, Haibo Shen, Kun Zhang, Hong Zhang. Information diffusion temporal dynamic prediction in microblog system based on user influence learning. International Journal of Hybrid Information Technology, 2016, 9(6): 327-336.

Shen Haibo, Kechen Zhuang, Hong Zhang. A grid trust evaluation method for wireless sensor networks based on similarity measure theory. Journal of Computational Information Systems, 2015, 11(8):2963-2970.

Kechen Zhuang, Kun Zhang, Hong Zhang. Large Scale Information Diffusion Analysis and Simulation with a Map-Reduce Solution. Journal of Computational Information Systems, 2015, 11(1): 277-284.

Haibo Shen, Haitao Jiang, Kechen Zhuang, Hong Zhang. Artificial Immunity-based Trust Detection Method for Wireless Sensor Networks. Journal of Nanjing University of Science and Technology (Chinese), 2014, 38(3): 318-324.

Kechen Zhuang, Hong Zhang, Kun Zhang, Haitao Jiang. Analysis of Spreading Dynamics of Virus in Wireless Sensor Networks. Computer Science (Chinese), 2013, 40(3): 187-191.

Kechen Zhuang, Hong Zhang, Kun Zhang. Simulation-Based Analysis of Worm Propagation in Wireless Sensor Network. The 4th International Conference on Multimedia Information Networking and Security (MINES 2012), 2012, 847-851.

Tao Guo, Kun Zhang, Wenjuan Guo, Kechen Zhuang, Dinglong He, Peipei Li. Improved Method of Weighted Complex Networks Clustering. Computer Science (Chinese), 2012, (S1): 99-102.

Kun Zhang, Gexin Tan, Kechen Zhuang, Rongsheng Zhao. Research Review on Invulnerability Measure of Complex Network. Computer Era (Chinese), 2010, (5): 4-7.

Kechen’s Hierarchy of skills

Python
C++, Java
My top skills. Hadoop, Spark, NoSQL

Linux, Shell, HTML, JavaScript
Some experience. Django, Web Design, R, Dart, Android

Open Source coding, Visualization, winsock, WSN
Familiarity & Hobbies. Table Tennis, Singing, Acoustic Guitar, Reading, Hiking