2016年暨南大学网络空间安全国际暑期学校接受报名
来源: 翁健/
暨南大学
6269
2
0
2016-04-06

        为了让我国网络空间安全相关领域的青年科研工作者、青年高校教师及博士生更好地分享和学习国内外该领域的科研工作和学术动态,暨南大学将于2016年6月13日至7月8日在暨南大学广州本部校内举办第一期 “ 网络空间安全研究国际暑期学校 ”,该暑期学校将采取为期一个月时间的封闭式学习和交流方式,主要目的是分享国内外密码学与网络空间安全领域的科研工作经验和学术论文发表经验,重点训练和提高我国该领域青年科研工作者、青年高校教师及博士生发表国 际高层次期刊和高水平会议学术论文的水平,届时多位从事网络空间安全领域科研工作的专家学者,尤其是在国际高层次期刊和高水平会议学术论文发表方面具有丰富经验,论文发表成果丰硕的海外一线教授将就网络空间安全领域中的多个重要课题进行集中式授课,并指导学员进行封闭式强化训练和学习。
一、招收对象
       暨南大学网络空间安全研究国际暑期学校面向全国信息安全相关专业的高等院校和科研机构的博士研究生、高校青年教师、青年科研工作者、有志于攻读博士研究生的优秀硕士研究生。各高校和科研机构信息安全类专业的青年科研工作者、青年高校教师和博士(硕士)研究生,经所在单位或导师推荐,向暨南大学网络空间安全学院提交申请。由于名额有限,我们将优先录取在密码学和网络空间安全领域有研究成果(包含正式发表的高层次学术论文、发明专利、科研奖项等)的候选人。
二、时间安排
       报名:2016年4月1日-5月15日,采取电子邮件报名方式 
       报到:2016年6月12日下午15:00,地点:暨南大学曾宪梓科学馆515室
       开班仪式:2016年6月13日上午10:00,地点:暨南大学校友楼四楼
       开课: 2016年6月13日-7月8日,地点:暨南大学广州本部校内
三、拟邀授课老师
    组委会主席:
        翁  健                        ( 暨南大学、广东省网络安全检测与防护工程技术研究开发中心 )
        任  奎                        ( 暨南大学、纽约州立大学布法罗分校 )
   特约指导教授 (排名不分先后按姓氏排序):
       Xinwen Fu                 ( 美国马萨诸塞大学Lowell分校 )
       Xiaodong Lin             ( 加拿大安大略科技大学 )
       Yao Liu                      ( 美国南弗罗里达大学 )
       Rongxing Lu              ( 新加坡南洋理工大学 )
       Kun Sun                     ( 美国威廉与玛莉大学 )
       Cong Wang               ( 香港城市大学 )
       Lingyu Wang             ( 加拿大Concordia 大学 )
       Bingsheng Zhang      ( 英国兰卡斯特大学 )
四、学习认证
       修完全部课程将获暨南大学网络空间安全学院颁发结业证书,证书仅于课程结业的当日发放。
五、费用及食宿安排
       暑期学校收费为人民币3000元/半个月(任选一或多门课程);人民币5000元/一个月(八门课程任选),该费用仅用于学员的住宿费和培训费。交通费及餐费自理。
六、报名与录取
       请愿意参加暑期学校的老师、同学写一份个人学术简历于2016年6月10日前发送至暑期学校专用信箱jnucrypt@126.com,邮件主题统一命名为“2016年暨南大学网络空间安全研究国际暑期学校-单位-姓名”。国际暑期学校组织委员会将在2016年5月31日前使用上述专用邮箱直接回复个人邮件告知录取结果,通过录取的学员将发正式电子邀请函(正式纸质邀请函报道时发放),请学员密切关注。所有录取学员,须按时到暑期学校报到,报到时需携带身份证原件及复印件、学生证(或工作证)原件及复印件、个人学术简历。在报到现场领取学员证及有关学习资料。
七、学员管理
      在暑期学校学习期间,学员参加每堂课程须佩戴学员证,无故不得迟到早退,如当天课程不能参加需提前一天请假。要求学员认真学习,积极参加暑期学校的学术活动和课外活动,遵守暨南大学以及暑期学校的纪律和规章制度。暑期学习期间学员应注意人身安全和财产安全。
八、联系方式
       暨南大学网络空间安全学院/信息科学技术学院网站http://xxxy.jnu.edu.cn/ 暑期学校专用邮箱jnucrypt@126.com;联系电话:020-85225956
 
九、特约指导教授介绍(排名不分先后按姓氏排序)

Bio: Dr. Xinwen Fu is an associate professor in the Department of Computer Science,  University of Massachusetts Lowell.  He received B.S. (1995) and M.S. (1998) in Electrical Engineering from Xi'an Jiaotong University,  China and University of Science and Technology of China respectively.  He obtained Ph.D. (2005) in Computer Engineering from Texas A&M University. Dr. Fu's current research interests are in network security and privacy, network forensics,  computer forensics,  information assurance,  system reliability and networking QoS. Dr. Fu has been publishing papers in conferences such as IEEE Symposium on Security and Privacy (S&P), ACM Conference on Computer and Communications Security (CCS), ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), ACM Sensys (ACM Conference on Embedded Networked Sensor Systems), IEEE International Conference on Computer Communications (INFOCOM) and IEEE International Conference on Distributed Computing Systems (ICDCS), journals such as ACM/IEEE Transactions on Networking (ToN), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Computers (TC), IEEE Transaction on Mobile Computing (TMC) and IEEE Transactions on Vehicular Technology (TVT), book and book chapters. He spoke at various technical security conferences including Black Hat. His research is supported by NSF. Dr. Fu won the best paper award at International Conference on Communications (ICC) 2008, 2013 and International Conference on Wireless Algorithms, Systems, and Applications (WASA) 2013. His students won the silver medal at the ACM Student Research Competition at ACM MobiCom 2011. His paper was chosen as the spotlight paper for the February 2014 issue of the IEEE Transactions on Mobile Computing (TMC) and July 2010 Issue of IEEE Transactions on Parallel and Distributed Systems (TPDS). His research was reported by various Media including CNN, Wired, Huffington Post, Forbes, Yahoo, MIT Technology Review, PC Magazine and aired on CNN Domestic and International and the State Science and Education Channel of China (CCTV 10).

Research theme: IoT Security and Privacy

This short course introduces students to Internet of Things (IoT) concepts, systems, applications, security and privacy issues associated with IoT. The recited topics include introduction to IoT, introduction to basic security and privacy concepts and techniques needed to understand IoT, Amazon AWS IoT, Raspberry Pi and its programming with various sensors, interconnecting Rspberry Pi with AWS IoT, smart home with IoT, sensor networks with IoT, smart grid with IoT, smart city with IoT and other IoT application scenarios. Students are encouraged to preform creative research work. Cryptography background is desirable but not necessary to follow this course.

Bio: Xiaodong Lin received the PhD degree in Information Engineering from Beijing University of Posts and Telecommunications, China, and the PhD degree (with Outstanding Achievement in Graduate Studies Award) in Electrical and Computer Engineering from the University of Waterloo, Canada. He is currently an Associate Professor of Information Security with the Faculty of Business and Information Technology, University of Ontario Institute of Technology (UOIT), Canada. His research interests include wireless communications and network security, computer forensics, software security, and applied cryptography. Dr. Lin serves as an Associate Editor for many international journals. He has served or is serving as a guest editor for many special issues of IEEE, Elsevier and Springer journals and as a symposium chair or track chair for IEEE/ACM conferences. He also served on many program committees. He currently serves as Chair of Communications and Information Security Technical Committee (CISTC) – IEEE Communications Society. He is a senior member of the IEEE.

Research theme: Security and Privacy in Emerging Wireless Networks

This short course will focus on security and privacy in emerging wireless networks. In the first portion of this short course, learners will be exposed to various cryptographic and privacy enhancing techniques, and most importantly, their applications are also discussed. In other words, leaners will also learn how these techniques are applied to solve some classic research issues that have been well studied in the past.
In the rest of the course, the course covers how to use these cryptographic and privacy enhancing techniques to achieve security and privacy in emerging wireless networks. The second part is mainly focusing on emerging research issues on security and privacy in various emerging wireless networks, for example, Vehicular ad hoc network (VANET), mobile social network, mobile crowdsensing network and fog networking. Also, learners are expected to become engaged in case studies (or specific security and privacy issues) in emerging wireless networking paradigms and discuss how to incorporate the techniques we learned in the course to solve these problems. We will also discuss many other important considerations when designing secure and privacy-preserving schemes, for example, efficiency in terms of communication overhead and computational cost.

Bio:  Dr. Yao Liu is an Assistant Professor in the Department of Computer Science and Engineering, University of South Florida. She received her Ph.D in Computer Science from North Carolina State University in 2012. Dr. Liu's research is related to computer and network security, with an emphasis on designing and implementing defense approaches that protect emerging wireless technologies from being undermined by adversaries. Her research interest also lies in the security of cyber-physical systems, especially in smart grid security. Dr. Liu's research work has appeared in premier journals and conferences including TDSC, TISSEC, IEEE S&P, CCS, MobiCom, and INFOCOM. Dr. Liu is a recipient of NSF CAREER award 2016.

Research theme: Advanced Computing and Network Security

This course covers advanced cryptography and authentication techniques to be applied in modern distributed and networked systems. By the end of this course, students will be able to list the common threats and vulnerabilities of networked systems, describe emerging network security tools, and understand cryptographic and non-cryptographic techniques towards security. Student will also learn recent advances in smartphone, wireless, and cyber-physical security.

Bio: Rongxing Lu has been an assistant professor at the School of Electrical and Electronic Engineering, Nanyang Technological University (NTU), Singapore, since May 2013. Before that, he worked as a Postdoctoral Fellow at the University of Waterloo from May 2012 to April 2013. Rongxing Lu was awarded the most prestigious “Governor General’s Gold Medal”, when he received his PhD degree from the Department of Electrical & Computer Engineering, University of Waterloo, Canada, in 2012; and won the 8th IEEE Communications Society (ComSoc) Asia Pacific (AP) Outstanding Young Researcher Award, in 2013. He is presently a senior member of IEEE Communications Society. His research interests include big data security and privacy, cloud and fog computing security, smart grid security, and applied cryptography. He has published extensively in his areas of expertise (with H-index 41 from Google Scholar currently), and was the recipient of the Student Best Paper Award, ITS Summit Singapore 2015, the IEEE IES Student Best Paper Award 2014, the Best Paper Awards of TSINGHUA Science and Technology Journal 2014, IEEE ICCC 2015, IEEE WCNC 2013, BodyNets 2010, and IEEE ICCCN 2009. He was/is on the editorial boards of several international referred journals, e.g., IEEE Networks, and currently serves the technical symposium co-chair of IEEE Globecom’16, and many technical program committees of IEEE and others international conferences, including IEEE INFOCOM and ICC. In addition, he is currently organizing a special issue on “security and privacy issues in fog computing” in Elsevier Journal “Future Generation Computer Systems” and a special issue on “big security challenges in big data era” in IEEE Internet of Things Journal. Dr. Lu currently serves as the Secretary of IEEE ComSoc CIS-TC (Communications and Information Security Technical Committee).

Research theme: Security and Privacy Techniques in Cyber Physical Systems

In this short course, we focus on discussing security and privacy techniques in Cyber Physical Systems(CPS). We first introduce the background of CPS security, including foundation of cryptography, privacy enhancing technique I and II. Then, we discuss security and privacy in various CPS scenarios including vehicular ad hoc network, mobile social network, eHealthcare, smart grid and big data. We will also discuss enterprise wireless network security and protection, and location privacy enhanced techniques.

Bio: Dr. Kun Sun is an assistant professor in the Department of Computer Science at College of William and Mary. He received his Ph.D. in Computer Science from North Carolina State University in 2006. His research focuses on systems and network security. Dr. Sun has more than 10 years working experience in both industry and academia. Before joining W&M, he was a Research Professor in George Mason University. He has published more than 50 peer-reviewed papers on conferences and journals including IEEE S&P, ACM CCS, NDSS, IEEE EuroS&P, IEEE DSN, ESORICS, ACSAC, ACM AsiaCCS, IEEE Infocom, IEEE TDSC, IEEE TIFS, etc.

Research theme: Systems and Network Security

This two-week short course introduces both basic principles and practices of cryptography and advanced security topics. In the first week, we will cover security policies, models, and mechanisms for secrecy, integrity, and availability; basic cryptography and number theory; secret key cryptography; hash functions; public key cryptography; trusted intermediaries; IPSec and SSL/TLS. In the second week, we will introduce several cutting-edge research topics including trusted execution environments on both X86 and ARM processors, moving target defence/adaptive cyber defence; and password security.

Bio: Dr. Cong Wang has been an Assistant Professor at the Department of Computer Science, City University of Hong Kong, since Fall 2012. His research interests are in the areas of cloud and network security, computer and mobile social networks, as well as secure and practical systems. He has published more than 40 peer-reviewed journal and conference papers, including those at IEEE JSAC, TC, TIFS, TMC, TPDS, IEEE Internet Computing, IEEE Network, IEEE INFOCOM, ICDCS, ACM Multimedia, ASIACCS, ESORICS, and 2 conference best paper awards. The total citations of his works are over 8,000 times according to Google Scholar, with H-index 19. His research has been supported by multiple funding agencies, including National Natural Science Foundation of China, Research Grants Concil of Hong Kong, Microsoft Azure, and Amazon.

Research theme: Building Secure and Practical Applications and Systems

In this short course, the students are expected to be exposed to various security challenges and related security designs in different system settings, including networks, cloud, web, smartphones, etc. The intensive syllabus will help students to get full exposure on the wide range of research topics that they can possibly follow up and continuously work on. It will also present to the students many interesting examples on how to identify and formulate good research problems on security.

Bio: Dr. Lingyu Wang is an Associate professor in the Concordia Institute for Information Systems Engineering at Concordia University, Montreal, Canada. He received his Ph.D. degree in Information Technology from George Mason University, USA. His research interests include security metrics, attack graph, cloud computing security, malware analysis, and data privacy. He has published over 100 research articles including papers at top-tier journals/conferences, such as TIFS, TDSC, TMC, JCS, IEEE S&P, ESORICS, etc.

Research theme: Threat Modeling and Cloud Security

In this short course, the students will be exposed to two related research areas: threat modeling and cloud security. In particular, we first review some traditional defense mechanisms, such as vulnerability analysis and IDS. We then introduce threat modeling using attack graphs and various applications, such as network hardening and alert correlation. After that, we will discuss security metrics, including those for measuring known vulnerabilities (e.g., CVSS) and those for dealing with 0day attacks. Later, the students will learn the basics of cloud and Google’s approach to cloud computing (e.g., GFS and MapReduce). Finally, we will discuss various attacks and defense mechanisms in cloud.

Bio: Dr. Bingsheng Zhang is a lecturer (a.k.a. assistant professor) in Security of Cyber-Physical Systems in the School of Computing and Communications at Lancaster University and member of Security Lancaster research centre since September 2015. Dr. Zhang specialises in cryptography and has extensive research experience in symmetric key cryptanalysis, two/multi-party computation, (non-interactive) zero knowledge proofs, privacy preserving data mining, and end-2-end verifiable e-voting systems. His research papers have been accepted in many top-tier security and cryptography journals/conferences, such as IEEE Transactions on Mobile Computing, TIFS, ACM CCS, EUROCRYPT, Financial Cryptography, etc.

Research theme: Cryptographic Protocols

In this short course, the students are expected to be confronted with a range of cryptographic primitives, different levels of security that can be achieved and some available cryptographic techniques that can be used. In particular, we first introduce modern cryptographic primitives such as encryption and signature schemes, hash functions etc. We then explain how the security of cryptographic schemes is defined and proven. After that, we will study zero-knowledge proofs and non-interactive zero-knowledge proofs. Later, the students will learn how to utilise learned knowledge to construct complex cryptographic protocols, such as private information retrieval, oblivious transfer, multi-party computation, privacy preserving data mining, and verifiable e-voting, etc.
Cryptography background is desirable but not necessary to follow this course.


      暨南大学网络空间安全学院
     广东省网络安全检测与防护工程技术研究开发中心
     广州市勤思网络科技有限公司 (协办)
     二〇一六年三月十日



登录用户可以查看和发表评论, 请前往  登录 或  注册
SCHOLAT.com 学者网
免责声明 | 关于我们 | 联系我们
联系我们: