水脹式錨杆的理論分析
來源:資安院
論壇時間:11月3號(星期二)上午10:00 - 11:30
論壇地點:中南大學校本部採礦樓三樓學術報告廳(採礦樓302)
論壇主持人:中南大學資源與安全工程學院曹平教授
報告人:李春林(Charlie Chunlin Li),男,1957年12月出生,瑞典籍華人,國際知名巖石力學與工程專家,挪威科學技術大學終身教授,博士生導師。現任挪威工程技術科學院院士,國際巖石力學學會歐洲區副主席,挪威科學技術大學巖石力學實驗室學術負責人。
報告人簡介:兼任《巖石力學與巖石工程- Rock Mechanics and RockEngineering》、《巖土工程學報(英文版)- Journal of Rock Mechanicsand Geotechnical Engineering》編委,《國際巖石力學與採礦科學-International Journal of Rock Mechanics and Mining Science》、《隧道與地下空間技術- Tunelling and Underground Space Technology》等多個國際巖土工程領域重要學術期刊審稿人。李春林教授一直從事巖石力學與工程領域的研究,先後在《國際巖石力學與採礦科學- International Journal of Rock Mechanics and Mining Science》等國際重要學術期刊和會議 上發表論文近百篇,國際專利4項,其專利技術已經推廣到瑞典、加拿大、美國、澳大利亞、智利、南非等國的礦山,獲得了用戶的廣泛好評。李教授的學術研究成果得到了國際巖土工程領域專家的高度肯定,先後獲挪威Innovator獎(由挪威創新基金會創立)、Northen LightTechnology Award(北極光科學技術獎,由RMG集團設立
日本環境會計的最新進展
來源:商學院
主講人:日本橫濱國立大學 八木裕之 教授
講座時間:2015年11月4日(星期三)下午15:00-17:00
講座地點: 管理樓2011(管階二)
主講嘉賓簡介:
八木裕之(YAGI Hiroyuki)先生畢業於日本中央大學,獲經濟學博士學位。現任橫濱國立大學經營學部會計信息學科教授、博士生導師以及成長戰略研究中心主任。研究領域主要包括環境會計、可持續發展會計、生態會計、環境影響評價等。代表性學術著作有《地方自治的深化》、《生態會計入門——為了人類社會的可持續發展》、《環境經營決策支持之會計系統》、《會計領域的擴展及會計概念框架》等。八木裕之教授曾任日本財務信息委員會環境報告準則委員會主任、日本企業環境信息公開委員會環境核算工作組主席、日本環境會計準則修訂研究委員會委員等。
軟體定義無線網絡:現狀及未來(Software Defined WirelessNetworks (SDWN): Current Work and Future Directions)
來源:信息院
論壇時間:11月16號(星期一)下午4:00 - 5:00
論壇地點:中南大學校本部民主樓一樓學術報告廳
論壇主持人:中南大學信息科學與工程學院副院長王建新教授
報告人:香港理工大學計算機系曹建農教授
報告簡介:Software defined network (SDN) is anemerging network paradigm and has been deployed to a wide range of networkingsystems. It can significantly simplify the network management and offer aprogrammable and flexible network architecture. Originally, SDN is designed forwired networks, such as data center network and campus LAN. Since thearchitecture is generic, it can be applied to wireless networks also. In thepast several years, SDN has now been investigated for the major forms ofwireless networks, e.g., cellular networks, WLANs, WSNs, etc. Similar to wiredimplementations, software defined wireless networks can also bring flexibility,programmability, efficiency, and evolvability to wireless networks. Meanwhile,it provides more opportunities and raises many new challenges have been due tothe unique features of wireless communication, such as limited spectrum, andunstable wireless channel. In this talk, I will introduce the recent advances insoftware defined wireless networks. I will highlight key issues and discuss theopportunities that SDN may bring and future research directions. Finally, Iwill briefly describe our recent work on software defined vehicle networks.
報告人簡介:Dr. Cao is currently a chairprofessor and head of the Department of Computing at Hong Kong PolytechnicUniversity, Hung Hom, Hong Kong. His research interests include parallel anddistributed computing, computer networks, mobile and pervasive computing, faulttolerance, and middleware. He has co-authored 3 books, co-edited 9 books, andpublished over 300 papers in major international journals and conferenceproceedings. He is a fellow of IEEE, a senior member of China ComputerFederation, and a member of ACM. He was the Chair of the Technical Committee onDistributed Computing of IEEE Computer Society from 2012 - 2014. Dr. Cao hasserved as an associate editor and a member of the editorial boards of manyinternational journals, including ACM Transactions on Sensor Networks, IEEETransacitons on Computers, IEEE Transactions on Parallel and DistributedSystems, IEEE Networks, Pervasive and Mobile Computing Journal, andPeer-to-Peer Networking and Applications. He has also served as a chair andmember of organizing / program committees for many international conferences,including PERCOM, INFOCOM, ICDCS, IPDPS, ICPP, RTSS, DSN, ICNP, SRDS, MASS,PRDC, ICC, GLOBECOM, and WCNC. Dr. Cao received the BSc degree in computerscience from Nanjing University, Nanjing, China, and the MSc and the Ph.Ddegrees in computer science from Washington State University, Pullman, WA, USA.
臺灣大學(National Taiwan University)Sy-Yen Kuo教授、IEEE Fellow學術報告
來源:信息院
報告時間:11月17號(星期二)上午8:30 - 9:30
報告地點:中南大學校本部計算機樓212會議室
報告:臺灣大學(National Taiwan University)Sy-Yen Kuo教授、IEEE Fellow—Selected Threatsand Challenges for Dependable Systems
報告簡介:With the advent of Internet of Things(IoT) technology, the networked devices pervade every aspect of our daily life.Therefore, we are facing more serious threats to the dependability of systemsand information due to problems caused by accidental events such as humanmistakes and physical malfunctions or by intentional behavior being eithermalicious or non-malicious. In this talk, we will discuss some example threatsand challenges for systems requiring high dependability. We then give views offuture directions in research on the dependability of networked systems.
報告人簡介:Sy-Yen Kuo is a DistinguishedProfessor at the Department of Electrical Engineering, National
大數據安全與隱私保護(Security and Privacy for BigData)
來源:信息院
論壇時間:11月22號(星期日)下午2:30 - 6:00
論壇地點:中南大學校本部民主樓一樓學術報告廳
論壇主持人:中南大學信息科學與工程學院王國軍教授、可信計算研究所所長
報告(1):澳大利亞迪肯大學(DeakinUniversity, Australia)Wanlei Zhou教授—Preserving Privacy in the Digital Age: Differential Privacy and itsApplications
報告簡介:Over the past two decades, digitalinformation collected by corporations, organisations and governments hascreated huge amount of datasets, and the speed of such data collection hasincreased exponentially over the last a few years. However, most of the collecteddatasets are personally related and contain private or sensitive information.Even though curators can apply several simple anonymization techniques, thereis still a high probability that the sensitive information of individuals willbe disclosed. Privacy-preserving has therefore become an urgent issue thatneeds to be addressed in the digital age. Differential privacy has become animportant research area since its publication in 2006. Since then, extensivework has been done to develop this new concept because it constitutes arigorous and provable privacy notion that can be implemented in variousresearch areas. In this presentation, we will start with privacy breaches andprivacy models, and introduce the basic concept of differential privacy. Wethen will focus on the applications of differential privacy in variousscenarios, including location privacy, recommender systems, tagging systems,and correlated datasets. We will then finalize the talk by outlining theprivacy challenges in the era of big data.
報告人簡介:Professor Wanlei Zhou received theB.Eng and M.Eng degrees from Harbin Institute of Technology, Harbin, China in1982 and 1984, respectively, and the PhD degree from The Australian NationalUniversity, Canberra, Australia, in 1991, all in Computer Science andEngineering. He also received a DSc degree from Deakin University in 2002. Heis currently the Alfred Deakin Professor and Chair of Information Technology,School of Information Technology, Deakin University. Professor Zhou has been theHead of School of Information Technology twice (Jan 2002-Apr 2006 and Jan2009-Jan 2015) and Associate Dean of Faculty of Science and Technology inDeakin University (May 2006-Dec 2008). Before joining Deakin University,Professor Zhou served as a lecturer in University of Electronic Science andTechnology of China, a system programmer in HP at Massachusetts, USA; alecturer in Monash University, Melbourne, Australia; and a lecturer in NationalUniversity of Singapore, Singapore. His research interests include distributedsystems, network security, bioinformatics, and e-learning. Professor Zhou haspublished more than 300 papers in refereed international journals and refereedinternational conferences proceedings. He has also chaired many international conferencesand has been invited to deliver keynote address in many internationalconferences. Prof Zhou is a Senior Member of the IEEE.
報告(2):華中科技大學(HuazhongUniversity of Science and Technology, China)金海教授、傑青、長江——CloudSecurity: Challenges and Practice
報告簡介:Cloud computing represents the trendof information technology. The development of cloud computing is facing severalchallenges. Security issues are at the top of the list. This talk deeplyanalyzes the security problems of cloud computing. Cloud security problems arefundamental rooted in the cloud characteristics- service outsourcing, sharingof computing infrastructure, dynamic complexity, superlarge system scale,multi-tendency, highly centralized resources and the open federated structure.The talk lists several key security challenges to cloud computing, such astrust relationships, access control, user behavior monitoring and privacyprotection.
報告人簡介:Hai Jin is a Cheung Kung ScholarsChair Professor of computer science and engineering at Huazhong University ofScience and Technology (HUST) in China. Jin received his PhD in computerengineering from HUST in 1994. In 1996, he was awarded a German AcademicExchange Service fellowship to visit the Technical University of Chemnitz inGermany. Jin worked at The University of Hong Kong between 1998 and 2000, andas a visiting scholar at the University of Southern California between 1999 and2000. He was awarded Excellent Youth Award from the National Science Foundationof China in 2001. Jin is the chief scientist of ChinaGrid, the largest gridcomputing project in China, and the chief scientists of National 973 BasicResearch Program Project of Virtualization Technology of Computing System, andCloud Security. Jin is a senior member of the IEEE and a member of the ACM. Hehas co-authored 22 books and published over 600 research papers. His researchinterests include computer architecture, virtualization technology, clustercomputing and cloud computing, peer-to-peer computing, network storage, andnetwork security.
報告(3):臺灣高雄師範大學Chung-HuangYang教授(The National Kaohsiung Normal University,Taiwan)——Perspectives on Mobile Device Security
報告簡介:As popularity of the mobile devices,such as iPhone and Android smartphone, continues to grow, more and morepersonal data inevitably stored inside these devices and it has become animportant issue to protect private data on the devices.Moreover, organizationshave adopted Bring Your Own Devices (BYOD), allowing employees to use theirpersonal mobile devices at work. But both personal-owned and corporate-ownedmobile devices came with security risks. In order to protect private data onthe mobile devices based on defense-in-depth strategy, we designed andimplemented software for iPhone/Android mobile security based on SCAP (SecurityContent Automation Protocol) and digital forensics. Automated configurationmanagement based on SCAP will reduce time effort for user to setup one’s mobiledevice with recommended configuration, while mobile forensics will let userknow what information could be recovered with forensic technique for thedevice.
報告人簡介:Chung-Huang Yang has a Ph.D. degreein computer engineering from the University of Louisiana at Lafayette in1990.He is currently Professor at the National Kaohsiung Normal University,Taiwan. Previously, he was a software engineer at the RSA Data Security, Inc.(Redwood City, USA) in 1991, a postdoctoral fellow at the NTT Network InformationSystems Laboratories (Yokosuka, Japan) in 1991-1993, and a project manager ofthe Information Security and Cryptology Project at the TelecommunicationLaboratories, Chunghwa Telecom (Taiwan) in 1995-1997.
報告(4):澳大利亞雪梨科技大學(Universityof Technology, Sydney (UTS), Australia)Xiangjian (Sean)He教授——Detection of Denial-of-Service Attacks Based onComputer Vision Techniques
報告簡介:Detection of Denial-of-Service (DoS)attacks has attracted researchers since 1990s. A variety of detection systemshas been proposed to achieve this task. Unlike the existing approaches based onmachine learning and statistical analysis, the proposed system treats trafficrecords as images and detection of DoS attacks as a computer vision problem. Amultivariate correlation analysis approach is introduced to accurately depictnetwork traffic records and to convert the records into the respective images.The images of network traffic records are used as the observed objects of ourproposed DoS attack detection system, which is developed based on a widely useddissimilarity measure, namely Earth Mover's Distance (EMD). EMD takes cross-binmatching into account and provides a more accurate evaluation on thedissimilarity between distributions than some other well-known dissimilaritymeasures. These unique merits facilitate our proposed system with effectivedetection capabilities. To evaluate the proposed EMD-based detection system,ten-fold cross-validations are conducted using KDD Cup 99 data set and ISCX2012 IDS Evaluation data set. The results presented in the system evaluationsection illustrate that our detection system can detect unknown DoS attacks andachieves 99.95% detection accuracy on KDD Cup 99 data set and 90.12% detectionaccuracy on ISCX 2012 IDS evaluation data set with processing capability ofapproximately 59,000 traffic records per second.
報告人簡介:Xiangjian (Sean) He, as a ChiefInvestigator has received various research grants including four nationalResearch Grants awarded by Australian Research Council (ARC). He is theDirector of Computer Vision and Recognition Laboratory at the Global Big DataTechnologies Centre (GBDTC) and a leader of Network Security research team atthe Centre for Research Information Networks (CRIN) at the University ofTechnology, Sydney (UTS). He is an IEEE Senior Member and an IEEE SignalProcessing Society Student Committee member. He has been awarded 'InternationallyRegistered Technology Specialist' by International Technology Institute (ITI).He has been carrying out research mainly in the areas of image processing,network security, pattern recognition and computer vision in the last twodecades. In recent years, he has many high quality publications in IEEETransactions journals such as IEEE Transactions on Computers, IEEE Transactionson Parallel and Distributed Systems, IEEE Transactions on Circuits and Systemsfor Video Technology, IEEE Transactions on Reliability, and IEEE Transactionson Consumer Electronics.
澳大利亞迪肯大學(Deakin University)Jemal H. Abawajy教授學術報告
來源:信息院
報告時間:11月27號(星期五)下午2:00 - 3:40
報告地點:中南大學校本部科北107
報告:澳大利亞迪肯大學(Deakin University)Jemal H. Abawajy教授—Knowledge-Free ResourceProvisioning on Failure-Prone Hybrid Cloud Systems
報告簡介:With the increased functionality andcomplexity of Cloud computing environments, resource failures are inevitable.This is especially so with multiple Cloud providers with various quality ofservice levels. The question we address in this talk is how to provisionresources to workflow-based applications where resource failures in hybridCloud computing systems can and do arise. We also discuss our latest work thattakes into account the workload models and failure correlations to scheduleworkflow applications to appropriate Cloud providers. Using failure traces andworkload models, we evaluated the performance and monetary cost of the proposedpolicies.
報告人簡介:Dr. Jemal H. Abawajy is a fullprofessor at School of Information Technology, Faculty of Scienc