69一区二三区好的精华液,中文字幕无码av波多野吉衣,亚洲精品久久久久久无码色欲四季,日本不卡高字幕在线2019

2016年暨南大學網絡空間安全國際暑期學校接受報名
來源: 翁健/
暨南大學
6750
2
0
2016-04-06

        為了讓我國網絡空間安全相關領域的青年科研工作者、青年高校教師及博士生更好地分享和學習國內外該領域的科研工作和學術動態,暨南大學將于2016年6月13日至7月8日在暨南大學廣州本部校內舉辦第一期 “ 網絡空間安全研究國際暑期學校 ”,該暑期學校將采取為期一個月時間的封閉式學習和交流方式,主要目的是分享國內外密碼學與網絡空間安全領域的科研工作經驗和學術論文發表經驗,重點訓練和提高我國該領域青年科研工作者、青年高校教師及博士生發表國 際高層次期刊和高水平會議學術論文的水平,屆時多位從事網絡空間安全領域科研工作的專家學者,尤其是在國際高層次期刊和高水平會議學術論文發表方面具有豐富經驗,論文發表成果豐碩的海外一線教授將就網絡空間安全領域中的多個重要課題進行集中式授課,并指導學員進行封閉式強化訓練和學習。
一、招收對象
       暨南大學網絡空間安全研究國際暑期學校面向全國信息安全相關專業的高等院校和科研機構的博士研究生、高校青年教師、青年科研工作者、有志于攻讀博士研究生的優秀碩士研究生。各高校和科研機構信息安全類專業的青年科研工作者、青年高校教師和博士(碩士)研究生,經所在單位或導師推薦,向暨南大學網絡空間安全學院提交申請。由于名額有限,我們將優先錄取在密碼學和網絡空間安全領域有研究成果(包含正式發表的高層次學術論文、發明專利、科研獎項等)的候選人。
二、時間安排
       報名:2016年4月1日-5月15日,采取電子郵件報名方式 
       報到:2016年6月12日下午15:00,地點:暨南大學曾憲梓科學館515室
       開班儀式:2016年6月13日上午10:00,地點:暨南大學校友樓四樓
       開課: 2016年6月13日-7月8日,地點:暨南大學廣州本部校內
三、擬邀授課老師
    組委會主席:
        翁  健                        ( 暨南大學、廣東省網絡安全檢測與防護工程技術研究開發中心 )
        任  奎                        ( 暨南大學、紐約州立大學布法羅分校 )
   特約指導教授 (排名不分先后按姓氏排序):
       Xinwen Fu                 ( 美國馬薩諸塞大學Lowell分校 )
       Xiaodong Lin             ( 加拿大安大略科技大學 )
       Yao Liu                      ( 美國南弗羅里達大學 )
       Rongxing Lu              ( 新加坡南洋理工大學 )
       Kun Sun                     ( 美國威廉與瑪莉大學 )
       Cong Wang               ( 香港城市大學 )
       Lingyu Wang             ( 加拿大Concordia 大學 )
       Bingsheng Zhang      ( 英國蘭卡斯特大學 )
四、學習認證
       修完全部課程將獲暨南大學網絡空間安全學院頒發結業證書,證書僅于課程結業的當日發放。
五、費用及食宿安排
       暑期學校收費為人民幣3000元/半個月(任選一或多門課程);人民幣5000元/一個月(八門課程任選),該費用僅用于學員的住宿費和培訓費。交通費及餐費自理。
六、報名與錄取
       請愿意參加暑期學校的老師、同學寫一份個人學術簡歷于2016年6月10日前發送至暑期學校專用信箱jnucrypt@126.com,郵件主題統一命名為“2016年暨南大學網絡空間安全研究國際暑期學校-單位-姓名”。國際暑期學校組織委員會將在2016年5月31日前使用上述專用郵箱直接回復個人郵件告知錄取結果,通過錄取的學員將發正式電子邀請函(正式紙質邀請函報道時發放),請學員密切關注。所有錄取學員,須按時到暑期學校報到,報到時需攜帶身份證原件及復印件、學生證(或工作證)原件及復印件、個人學術簡歷。在報到現場領取學員證及有關學習資料。
七、學員管理
      在暑期學校學習期間,學員參加每堂課程須佩戴學員證,無故不得遲到早退,如當天課程不能參加需提前一天請假。要求學員認真學習,積極參加暑期學校的學術活動和課外活動,遵守暨南大學以及暑期學校的紀律和規章制度。暑期學習期間學員應注意人身安全和財產安全。
八、聯系方式
       暨南大學網絡空間安全學院/信息科學技術學院網站http://xxxy.jnu.edu.cn/ 暑期學校專用郵箱jnucrypt@126.com;聯系電話:020-85225956
 
九、特約指導教授介紹(排名不分先后按姓氏排序)

Bio: Dr. Xinwen Fu is an associate professor in the Department of Computer Science,  University of Massachusetts Lowell.  He received B.S. (1995) and M.S. (1998) in Electrical Engineering from Xi'an Jiaotong University,  China and University of Science and Technology of China respectively.  He obtained Ph.D. (2005) in Computer Engineering from Texas A&M University. Dr. Fu's current research interests are in network security and privacy, network forensics,  computer forensics,  information assurance,  system reliability and networking QoS. Dr. Fu has been publishing papers in conferences such as IEEE Symposium on Security and Privacy (S&P), ACM Conference on Computer and Communications Security (CCS), ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), ACM Sensys (ACM Conference on Embedded Networked Sensor Systems), IEEE International Conference on Computer Communications (INFOCOM) and IEEE International Conference on Distributed Computing Systems (ICDCS), journals such as ACM/IEEE Transactions on Networking (ToN), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Computers (TC), IEEE Transaction on Mobile Computing (TMC) and IEEE Transactions on Vehicular Technology (TVT), book and book chapters. He spoke at various technical security conferences including Black Hat. His research is supported by NSF. Dr. Fu won the best paper award at International Conference on Communications (ICC) 2008, 2013 and International Conference on Wireless Algorithms, Systems, and Applications (WASA) 2013. His students won the silver medal at the ACM Student Research Competition at ACM MobiCom 2011. His paper was chosen as the spotlight paper for the February 2014 issue of the IEEE Transactions on Mobile Computing (TMC) and July 2010 Issue of IEEE Transactions on Parallel and Distributed Systems (TPDS). His research was reported by various Media including CNN, Wired, Huffington Post, Forbes, Yahoo, MIT Technology Review, PC Magazine and aired on CNN Domestic and International and the State Science and Education Channel of China (CCTV 10).

Research theme: IoT Security and Privacy

This short course introduces students to Internet of Things (IoT) concepts, systems, applications, security and privacy issues associated with IoT. The recited topics include introduction to IoT, introduction to basic security and privacy concepts and techniques needed to understand IoT, Amazon AWS IoT, Raspberry Pi and its programming with various sensors, interconnecting Rspberry Pi with AWS IoT, smart home with IoT, sensor networks with IoT, smart grid with IoT, smart city with IoT and other IoT application scenarios. Students are encouraged to preform creative research work. Cryptography background is desirable but not necessary to follow this course.

Bio: Xiaodong Lin received the PhD degree in Information Engineering from Beijing University of Posts and Telecommunications, China, and the PhD degree (with Outstanding Achievement in Graduate Studies Award) in Electrical and Computer Engineering from the University of Waterloo, Canada. He is currently an Associate Professor of Information Security with the Faculty of Business and Information Technology, University of Ontario Institute of Technology (UOIT), Canada. His research interests include wireless communications and network security, computer forensics, software security, and applied cryptography. Dr. Lin serves as an Associate Editor for many international journals. He has served or is serving as a guest editor for many special issues of IEEE, Elsevier and Springer journals and as a symposium chair or track chair for IEEE/ACM conferences. He also served on many program committees. He currently serves as Chair of Communications and Information Security Technical Committee (CISTC) – IEEE Communications Society. He is a senior member of the IEEE.

Research theme: Security and Privacy in Emerging Wireless Networks

This short course will focus on security and privacy in emerging wireless networks. In the first portion of this short course, learners will be exposed to various cryptographic and privacy enhancing techniques, and most importantly, their applications are also discussed. In other words, leaners will also learn how these techniques are applied to solve some classic research issues that have been well studied in the past.
In the rest of the course, the course covers how to use these cryptographic and privacy enhancing techniques to achieve security and privacy in emerging wireless networks. The second part is mainly focusing on emerging research issues on security and privacy in various emerging wireless networks, for example, Vehicular ad hoc network (VANET), mobile social network, mobile crowdsensing network and fog networking. Also, learners are expected to become engaged in case studies (or specific security and privacy issues) in emerging wireless networking paradigms and discuss how to incorporate the techniques we learned in the course to solve these problems. We will also discuss many other important considerations when designing secure and privacy-preserving schemes, for example, efficiency in terms of communication overhead and computational cost.

Bio:  Dr. Yao Liu is an Assistant Professor in the Department of Computer Science and Engineering, University of South Florida. She received her Ph.D in Computer Science from North Carolina State University in 2012. Dr. Liu's research is related to computer and network security, with an emphasis on designing and implementing defense approaches that protect emerging wireless technologies from being undermined by adversaries. Her research interest also lies in the security of cyber-physical systems, especially in smart grid security. Dr. Liu's research work has appeared in premier journals and conferences including TDSC, TISSEC, IEEE S&P, CCS, MobiCom, and INFOCOM. Dr. Liu is a recipient of NSF CAREER award 2016.

Research theme: Advanced Computing and Network Security

This course covers advanced cryptography and authentication techniques to be applied in modern distributed and networked systems. By the end of this course, students will be able to list the common threats and vulnerabilities of networked systems, describe emerging network security tools, and understand cryptographic and non-cryptographic techniques towards security. Student will also learn recent advances in smartphone, wireless, and cyber-physical security.

Bio: Rongxing Lu has been an assistant professor at the School of Electrical and Electronic Engineering, Nanyang Technological University (NTU), Singapore, since May 2013. Before that, he worked as a Postdoctoral Fellow at the University of Waterloo from May 2012 to April 2013. Rongxing Lu was awarded the most prestigious “Governor General’s Gold Medal”, when he received his PhD degree from the Department of Electrical & Computer Engineering, University of Waterloo, Canada, in 2012; and won the 8th IEEE Communications Society (ComSoc) Asia Pacific (AP) Outstanding Young Researcher Award, in 2013. He is presently a senior member of IEEE Communications Society. His research interests include big data security and privacy, cloud and fog computing security, smart grid security, and applied cryptography. He has published extensively in his areas of expertise (with H-index 41 from Google Scholar currently), and was the recipient of the Student Best Paper Award, ITS Summit Singapore 2015, the IEEE IES Student Best Paper Award 2014, the Best Paper Awards of TSINGHUA Science and Technology Journal 2014, IEEE ICCC 2015, IEEE WCNC 2013, BodyNets 2010, and IEEE ICCCN 2009. He was/is on the editorial boards of several international referred journals, e.g., IEEE Networks, and currently serves the technical symposium co-chair of IEEE Globecom’16, and many technical program committees of IEEE and others international conferences, including IEEE INFOCOM and ICC. In addition, he is currently organizing a special issue on “security and privacy issues in fog computing” in Elsevier Journal “Future Generation Computer Systems” and a special issue on “big security challenges in big data era” in IEEE Internet of Things Journal. Dr. Lu currently serves as the Secretary of IEEE ComSoc CIS-TC (Communications and Information Security Technical Committee).

Research theme: Security and Privacy Techniques in Cyber Physical Systems

In this short course, we focus on discussing security and privacy techniques in Cyber Physical Systems(CPS). We first introduce the background of CPS security, including foundation of cryptography, privacy enhancing technique I and II. Then, we discuss security and privacy in various CPS scenarios including vehicular ad hoc network, mobile social network, eHealthcare, smart grid and big data. We will also discuss enterprise wireless network security and protection, and location privacy enhanced techniques.

Bio: Dr. Kun Sun is an assistant professor in the Department of Computer Science at College of William and Mary. He received his Ph.D. in Computer Science from North Carolina State University in 2006. His research focuses on systems and network security. Dr. Sun has more than 10 years working experience in both industry and academia. Before joining W&M, he was a Research Professor in George Mason University. He has published more than 50 peer-reviewed papers on conferences and journals including IEEE S&P, ACM CCS, NDSS, IEEE EuroS&P, IEEE DSN, ESORICS, ACSAC, ACM AsiaCCS, IEEE Infocom, IEEE TDSC, IEEE TIFS, etc.

Research theme: Systems and Network Security

This two-week short course introduces both basic principles and practices of cryptography and advanced security topics. In the first week, we will cover security policies, models, and mechanisms for secrecy, integrity, and availability; basic cryptography and number theory; secret key cryptography; hash functions; public key cryptography; trusted intermediaries; IPSec and SSL/TLS. In the second week, we will introduce several cutting-edge research topics including trusted execution environments on both X86 and ARM processors, moving target defence/adaptive cyber defence; and password security.

Bio: Dr. Cong Wang has been an Assistant Professor at the Department of Computer Science, City University of Hong Kong, since Fall 2012. His research interests are in the areas of cloud and network security, computer and mobile social networks, as well as secure and practical systems. He has published more than 40 peer-reviewed journal and conference papers, including those at IEEE JSAC, TC, TIFS, TMC, TPDS, IEEE Internet Computing, IEEE Network, IEEE INFOCOM, ICDCS, ACM Multimedia, ASIACCS, ESORICS, and 2 conference best paper awards. The total citations of his works are over 8,000 times according to Google Scholar, with H-index 19. His research has been supported by multiple funding agencies, including National Natural Science Foundation of China, Research Grants Concil of Hong Kong, Microsoft Azure, and Amazon.

Research theme: Building Secure and Practical Applications and Systems

In this short course, the students are expected to be exposed to various security challenges and related security designs in different system settings, including networks, cloud, web, smartphones, etc. The intensive syllabus will help students to get full exposure on the wide range of research topics that they can possibly follow up and continuously work on. It will also present to the students many interesting examples on how to identify and formulate good research problems on security.

Bio: Dr. Lingyu Wang is an Associate professor in the Concordia Institute for Information Systems Engineering at Concordia University, Montreal, Canada. He received his Ph.D. degree in Information Technology from George Mason University, USA. His research interests include security metrics, attack graph, cloud computing security, malware analysis, and data privacy. He has published over 100 research articles including papers at top-tier journals/conferences, such as TIFS, TDSC, TMC, JCS, IEEE S&P, ESORICS, etc.

Research theme: Threat Modeling and Cloud Security

In this short course, the students will be exposed to two related research areas: threat modeling and cloud security. In particular, we first review some traditional defense mechanisms, such as vulnerability analysis and IDS. We then introduce threat modeling using attack graphs and various applications, such as network hardening and alert correlation. After that, we will discuss security metrics, including those for measuring known vulnerabilities (e.g., CVSS) and those for dealing with 0day attacks. Later, the students will learn the basics of cloud and Google’s approach to cloud computing (e.g., GFS and MapReduce). Finally, we will discuss various attacks and defense mechanisms in cloud.

Bio: Dr. Bingsheng Zhang is a lecturer (a.k.a. assistant professor) in Security of Cyber-Physical Systems in the School of Computing and Communications at Lancaster University and member of Security Lancaster research centre since September 2015. Dr. Zhang specialises in cryptography and has extensive research experience in symmetric key cryptanalysis, two/multi-party computation, (non-interactive) zero knowledge proofs, privacy preserving data mining, and end-2-end verifiable e-voting systems. His research papers have been accepted in many top-tier security and cryptography journals/conferences, such as IEEE Transactions on Mobile Computing, TIFS, ACM CCS, EUROCRYPT, Financial Cryptography, etc.

Research theme: Cryptographic Protocols

In this short course, the students are expected to be confronted with a range of cryptographic primitives, different levels of security that can be achieved and some available cryptographic techniques that can be used. In particular, we first introduce modern cryptographic primitives such as encryption and signature schemes, hash functions etc. We then explain how the security of cryptographic schemes is defined and proven. After that, we will study zero-knowledge proofs and non-interactive zero-knowledge proofs. Later, the students will learn how to utilise learned knowledge to construct complex cryptographic protocols, such as private information retrieval, oblivious transfer, multi-party computation, privacy preserving data mining, and verifiable e-voting, etc.
Cryptography background is desirable but not necessary to follow this course.


      暨南大學網絡空間安全學院
     廣東省網絡安全檢測與防護工程技術研究開發中心
     廣州市勤思網絡科技有限公司 (協辦)
     二〇一六年三月十日



登錄用戶可以查看和發表評論, 請前往  登錄 或  注冊
SCHOLAT.com 學者網
免責聲明 | 關于我們 | 聯系我們
聯系我們:
主站蜘蛛池模板: 包头市| 宁安市| 昌图县| 驻马店市| 顺昌县| 常德市| 常宁市| 稷山县| 奉新县| 廉江市| 丰顺县| 咸宁市| 那曲县| 迁安市| 民和| 招远市| 邵阳市| 黄浦区| 扎鲁特旗| 澄江县| 隆安县| 会昌县| 盐城市| 阿拉善盟| 临江市| 怀仁县| 星座| 温泉县| 纳雍县| 仁化县| 南陵县| 临漳县| 赤水市| 山东省| 长泰县| 抚松县| 什邡市| 阜宁县| 平塘县| 金华市| 东城区|