{"id":185,"date":"2022-07-13T11:15:44","date_gmt":"2022-07-13T03:15:44","guid":{"rendered":"http:\/\/www.gexin.link\/?page_id=185"},"modified":"2023-02-22T09:50:21","modified_gmt":"2023-02-22T01:50:21","slug":"%e4%b8%aa%e4%ba%ba%e7%ae%80%e4%bb%8b%e8%8d%89%e7%a8%bf","status":"publish","type":"page","link":"https:\/\/www.gexin.link\/index.php\/%e4%b8%aa%e4%ba%ba%e7%ae%80%e4%bb%8b%e8%8d%89%e7%a8%bf\/","title":{"rendered":"\u4e2a\u4eba\u7b80\u4ecb"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.gexin.link\/wp-content\/uploads\/2022\/07\/1-gexinLogo-192x300.png\" alt=\"\" \/><\/p>\n<p>\u845b\u65b0<br \/>\n\u5927\u8fde\u6d77\u4e8b\u5927\u5b66\uff0c\u4fe1\u606f\u79d1\u5b66\u6280\u672f\u5b66\u9662\uff0c\u526f\u6559\u6388\uff0c\u7855\u58eb\u7814\u7a76\u751f\u5bfc\u5e08<\/p>\n<h4>\u6559\u80b2\u7ecf\u5386<\/h4>\n<ul>\n<li>\u535a\u58eb\uff1a2011\uff0c\u4e1c\u5317\u5927\u5b66\uff0c\u4fe1\u606f\u79d1\u5b66\u4e0e\u5de5\u7a0b\u5b66\u9662\uff0c\u8ba1\u7b97\u673a\u7cfb\u7edf\u7ed3\u6784\uff0c\u535a\u58eb\u5b66\u4f4d\u3002\u5bfc\u5e08\uff1a<a href=\"http:\/\/faculty.neu.edu.cn\/zhaoh\/\" title=\"\u8d75\u6d77\">\u8d75\u6d77<\/a><\/li>\n<li>\u535a\u58eb\uff1a2009-2010\uff0c\u8377\u5170\u4ee3\u5c14\u592b\u7279\u7406\u5de5\u5927\u5b66\uff0cNetwork Architecture and Service \uff0c\u56fd\u5bb6\u516c\u6d3e\u8054\u5408\u57f9\u517b\u535a\u58eb\uff0c\u5bfc\u5e08\uff1a<a href=\"https:\/\/www.nas.ewi.tudelft.nl\/people\/Piet\/\" title=\"Piet Van Mieghem\">Piet Van Mieghem<\/a><\/li>\n<li>\u7855\u58eb\uff1a2007\uff0c\u4e1c\u5317\u5927\u5b66\uff0c\u4fe1\u606f\u79d1\u5b66\u4e0e\u5de5\u7a0b\u9662\uff0c\u8ba1\u7b97\u673a\u8f6f\u4ef6\u4e0e\u7406\u8bba\uff0c\u7855\u58eb\u5b66\u4f4d\uff0c\u5bfc\u5e08\uff1a\u8d75\u6d77<\/li>\n<li>\u672c\u79d1\uff1a2004\uff0c\u4e1c\u5317\u5927\u5b66\uff0c\u8f6f\u4ef6\u5b66\u9662\uff0c\u8f6f\u4ef6\u5de5\u7a0b\uff0c\u5b66\u58eb\u5b66\u4f4d<\/li>\n<\/ul>\n<h4>\u7814\u7a76\u65b9\u5411<\/h4>\n<p>\u590d\u6742\u7cfb\u7edf\u4e0e\u590d\u6742\u7f51\u7edc\uff08Complex System and Networks\uff09\uff0c\u590d\u6742\u7f51\u7edc\u4e0e\u7fa4\u4f53\u667a\u80fd\u3002<br \/>\n\u7814\u7a76\u5185\u5bb9\uff1a\u590d\u6742\u7cfb\u7edf\u7ed3\u6784\u7279\u5f81\u5206\u6790\u3001\u5efa\u6a21\u3001\u63a7\u5236\u3001\u52a8\u529b\u5b66\u7b49\uff1b\u590d\u6742\u7f51\u7edc\u4e0e\u7fa4\u4f53\u667a\u80fd\u5e94\u7528\uff0c\u5982\u7f51\u7edc\u4e2d\u7684\u7fa4\u4f53\u884c\u4e3a\u4eff\u771f\u3001\u7fa4\u4f53\u667a\u80fd\u5efa\u6a21\u3001\u7fa4\u4f53\u534f\u4f5c\u3001\u535a\u5f08\u4e0e\u5408\u4f5c\u3002<br \/>\n<a href=\"http:\/\/www.gexin.link\/index.php\/%e7%a0%94%e7%a9%b6%e6%96%b9%e5%90%91\/\">\u66f4\u591a\u5185\u5bb9<\/a><\/p>\n<h4>\u9879\u76ee<\/h4>\n<ul>\n<li>\u8fbd\u5b81\u7701\u81ea\u7136\u79d1\u5b66\u57fa\u91d1\u9879\u76ee\uff08\u4e3b\u6301\uff09\uff0c\u57fa\u4e8e\u7f51\u7edc\u91cd\u6784\u53ca\u793e\u56e2\u7279\u5f81\u7684\u52a8\u6001\u7f51\u7edc\u4f20\u64ad\u6e90\u5b9a\u4f4d\u7814\u7a76\uff0820170540097\uff09\uff0c2017\/05-2019\/04\uff0c10\u4e07\u5143\u3002<\/li>\n<li>CERNET\u4e0b\u4e00\u4ee3\u4e92\u8054\u7f51\u521b\u65b0\u9879\u76ee\uff08\u4e3b\u6301\uff09\uff0c \u57fa\u4e8eIPV6\u7684\u4f20\u64ad\u6e90\u5b9a\u4f4d\u7814\u7a76\uff08NGII20180128 \uff09, 2018\/12-2019\/12\uff0c10\u4e07\u5143\u3002<\/li>\n<li>\u4e2d\u592e\u9ad8\u6821\u57fa\u672c\u79d1\u7814\u4e1a\u52a1\u8d39\u8d44\u52a9\u9879\u76ee\uff08\u4e3b\u6301\uff09\uff0c\u57fa\u4e8e\u4f20\u64ad\u52a8\u529b\u5b66\u7684\u7f51\u7edc\u9c81\u68d2\u6027\u7814\u7a76\uff08017155\uff092013\/01\/-2014\/12\uff0c6\u4e07\u5143\u3002<\/li>\n<li>\u56fd\u5bb6\u81ea\u7136\u79d1\u5b66\u57fa\u91d1\u9762\u4e0a\u9879\u76ee\uff08\u53c2\u4e0e\uff09\uff0c\u8bed\u4e49\u7269\u8054\u7f51\u7684\u8bed\u4e49\u534f\u540c\u673a\u7406\u53ca\u5176\u5e94\u7528\u6a21\u5f0f\u7814\u7a76\uff0861371090\uff09\uff0c2014\/01-2017\/12\uff0c80\u4e07\u5143\u3002<\/li>\n<li>\u5927\u8fde\u6d77\u4e8b\u5927\u5b66\u4f18\u79c0\u79d1\u6280\u521b\u65b0\u56e2\u961f\u57f9\u80b2\u8ba1\u5212\u8d44\u52a9\u9879\u76ee\uff08\u53c2\u4e0e\uff09\uff0c\u4ea4\u901a\u611f\u77e5\u6570\u636e\u7684\u4fe1\u606f\u5904\u7406\u6280\u672f\u53ca\u5176\u8f6f\u4ef6\u7cfb\u7edf\u7814\u7a76\uff083132013335\uff09\uff0c2013\/01-2014\/01\uff0c20\u4e07\u5143\uff0c<\/li>\n<\/ul>\n<h4>\u8bba\u6587<\/h4>\n<p>\u7855\u58eb\u5b66\u4f4d\u8bba\u6587\uff0c\u57fa\u4e8e\u8868\u60c5\u7279\u5f81\u7684\u5361\u901a\u4eba\u8138\u751f\u6210\u5668\u8bbe\u8ba1\u4e0e\u5b9e\u73b0<\/p>\n<p>\u535a\u58eb\u5b66\u4f4d\u8bba\u6587\uff0c\u4e92\u8054\u7f51\u5b8f\u89c2\u62d3\u6251\u5ea6\u76f8\u5173\u53ca\u793e\u56e2\u7279\u5f81\u5206\u6790<br \/>\n1)\u00a0Xin Ge,Shengjie Zheng,\u00a0Jiahui Wang, Hui Li. High-dimensional Hybrid Data Reduction for Effective Bug Triage,.<br \/>\n2)\u00a0Xin Ge, Hui Li, Lili Li. Effects of Centrality and Heterogeneity on Evolutionary Games. The 12th International Conference on Genetic and Evolutionary ComputingDecember 14-17, 2018.<br \/>\n3)\u00a0Xin Ge,Hai Zhao, Jun Zhang, Degree Correlation and Its Features of Spreading on Net- works,Journal of Computer Research and Development,2013,50(4):741-749.<br \/>\n4)\u00a0Xin Ge, Lili Li, Hui Li. Epidemic Spreading and Immunization on Assortative Degree Mix- ing Networks, the 2014 10th International Conference on Natural Computation,Xiamen, China, 2014.<br \/>\n5)\u00a0Hui Li, Li-Ying Hao, Xin Ge, Jian Gao. A hybrid strategy for community detection of complex networks. IEEE International Conference on Information and Automation, Lijiang, China, 2015.<br \/>\n6)\u00a0Xin Ge, Wang H. Community overlays upon real-world complex networks. European Physical Journal B, 2012, 85(1):1-10.<br \/>\n7)\u00a0Xin Ge, Hai Zhao, Hui Li. Modelling community of Internet topology2011 3rd International Coference on Computer Design and Application,Shanghai, China, 2011.<br \/>\n8)\u00a0Van Mieghem P , Xin Ge\u00a0, Schumm P , et al. Spectral graph analysis of modularity and assortativity. Physical Review E, 2010, 82(5):056113.<br \/>\n9)\u00a0Mieghem P V , Wang H , Xin Ge. Influence of assortativity and degree-preserving rewiring on the spectra of networks. European Physical Journal B, 2010, 76(4):643-652.<br \/>\n10)\u00a0Xin Ge, Hai Zhao, Xin Zhang, One immunization strategy of complex networks, IEEE 2008 International Conference on Communications, Circuits and Systems ,Xiamen, China, 2009.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u845b\u65b0 \u5927\u8fde\u6d77\u4e8b\u5927\u5b66\uff0c\u4fe1\u606f\u79d1\u5b66\u6280\u672f\u5b66\u9662\uff0c\u526f\u6559\u6388\uff0c\u7855\u58eb\u7814\u7a76\u751f\u5bfc\u5e08 \u6559\u80b2\u7ecf&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.gexin.link\/index.php\/wp-json\/wp\/v2\/pages\/185"}],"collection":[{"href":"https:\/\/www.gexin.link\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gexin.link\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gexin.link\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gexin.link\/index.php\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":14,"href":"https:\/\/www.gexin.link\/index.php\/wp-json\/wp\/v2\/pages\/185\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/www.gexin.link\/index.php\/wp-json\/wp\/v2\/pages\/185\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/www.gexin.link\/index.php\/wp-json\/wp\/v2\/media?parent=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}