{"id":61,"date":"2017-01-24T20:33:27","date_gmt":"2017-01-24T12:33:27","guid":{"rendered":"http:\/\/www.thinkmesh.net\/?p=61"},"modified":"2017-01-24T20:33:27","modified_gmt":"2017-01-24T12:33:27","slug":"%e7%9b%b8%e5%85%b3%e7%a0%94%e7%a9%b6%e9%a2%86%e5%9f%9f%e5%90%8c%e8%a1%8c","status":"publish","type":"post","link":"http:\/\/www.thinkmesh.net\/?p=61","title":{"rendered":"\u76f8\u5173\u7814\u7a76\u9886\u57df\u540c\u884c"},"content":{"rendered":"<p><strong>1.David Wagner<\/strong><\/p>\n<p style=\"text-align: justify;\">\u52a0\u5dde\u4f2f\u514b\u5229\u7684\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1aComputer security, especially security of large-scale systems andnetworks. Applications of static and dynamic program analysis to computersecurity.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.eecs.berkeley.edu\/~daw\/\">http:\/\/www.eecs.berkeley.edu\/~daw\/<\/a><\/p>\n<p><a name=\"OLE_LINK1\"><\/a><a name=\"OLE_LINK2\"><\/a>David\u6559\u6388\u7684\u5b66\u751f\u4e5f\u6709\u8bb8\u591a\u4e0d\u9519\u7684\u6210\u679c\uff0c\u53ef\u5728David\u6559\u6388\u7684\u4e3b\u9875\u4e2d\u627e\u5230\u5176\u5b66\u751f\u7684\u8d44\u6e90\u3002<\/p>\n<p><strong>2.YanLindsay Sun<\/strong><\/p>\n<p style=\"text-align: justify;\">\u9a6c\u91cc\u5170\u5927\u5b66\u7535\u5b50\u3001\u8ba1\u7b97\u673a\u548c\u751f\u7269\u533b\u836f\u5de5\u7a0b\u7cfb\u7684\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1aNetwork Security, Trustworthy Social Computing, Power Grid Security,Trust in Biomedical Systems.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.ele.uri.edu\/faculty\/yansun\/index.htm\">http:\/\/www.ele.uri.edu\/faculty\/yansun\/index.htm<\/a><\/p>\n<p><strong>3.Xiaowei Yang<\/strong><\/p>\n<p style=\"text-align: justify;\">\u675c\u514b\u5927\u5b66\u52a9\u7406\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1anetworks and distributed systems, with an emphasis on architecture design and security.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.cs.duke.edu\/~xwy\/\">http:\/\/www.cs.duke.edu\/~xwy\/<\/a><\/p>\n<p><strong>4.William Enck<\/strong><\/p>\n<p style=\"text-align: justify;\">\u5317\u5361\u5dde\u7acb\u5927\u5b66\u52a9\u7406\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: the design, optimization, and measurement of security for operating systems, specifically on mobile phones, and the complex environments in which they operate. Through the design and evaluation of practical enhancements to existing architectures, his research seeks to improve security guarantees in commodity computer systems.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.enck.org\/\">http:\/\/www.enck.org\/<\/a><\/p>\n<p><strong>5.Patrick P. C. Lee<\/strong><\/p>\n<p style=\"text-align: justify;\">\u9999\u6e2f\u4e2d\u6587\u5927\u5b66\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: various applied\/systems topics including cloud computing and storage, distributed systems and networks,operating systems, and security\/resilience.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.cse.cuhk.edu.hk\/~pclee\/www\/index.html\">http:\/\/www.cse.cuhk.edu.hk\/~pclee\/www\/index.html<\/a><\/p>\n<p><strong>6.Dawn Xiaodong Song<\/strong><\/p>\n<p style=\"text-align: justify;\">\u52a0\u5dde\u4f2f\u514b\u5229\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: Computer security, privacy, and applied cryptography, including security and privacy issues in systems, software, networking, and databases. Analysis of and defense against malicious code. Using program analysis,algorithms design, and machine learning for security and privacy.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.cs.berkeley.edu\/~dawnsong\/index.html\">http:\/\/www.cs.berkeley.edu\/~dawnsong\/index.html<\/a><\/p>\n<p><strong>7.Hao Chen<\/strong><\/p>\n<p style=\"text-align: justify;\">\u52a0\u5dde\u5927\u5b66\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: in a broad range of security problems, including mobile and wireless security, Web security,software security, and network security.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1ahttp:\/\/www.cs.ucdavis.edu\/~hchen\/<\/p>\n<p><strong>8.Xinming (Simon) Ou<\/strong><\/p>\n<p style=\"text-align: justify;\">\u582a\u8428\u65af\u5dde\u7acb\u5927\u5b66\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: enterprise network security defense, including automated security management, intrusion detection\/response, and security metrics.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/people.cis.ksu.edu\/~xou\/\">http:\/\/people.cis.ksu.edu\/~xou\/<\/a><\/p>\n<p><strong>9.Li Xiong<\/strong><\/p>\n<p style=\"text-align: justify;\">\u57c3\u9ed8\u91cc\u5927\u5b66\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: data privacy and security, distributed and spatio\uff0dtemporal data management, and health informatics.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.mathcs.emory.edu\/~lxiong\/\">http:\/\/www.mathcs.emory.edu\/~lxiong\/<\/a><\/p>\n<p><strong>10.Scott Shenker<\/strong><\/p>\n<p style=\"text-align: justify;\">\u52a0\u5dde\u4f2f\u514b\u5229\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: Internet Architecture, Software-Defined Networks, Datacenter Infrastructure, Large-Scale Distributed Systems, Game Theory and Economics, Operating Systems &amp; Networking (OSNT), Security (SEC).<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.eecs.berkeley.edu\/Faculty\/Homepages\/shenker.html\">http:\/\/www.eecs.berkeley.edu\/Faculty\/Homepages\/shenker.html<\/a><\/p>\n<p><strong>11.Xia Wang<\/strong><\/p>\n<p style=\"text-align: justify;\">\u4e9a\u5229\u6851\u90a3\u5dde\u7acb\u5927\u5b66\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: wireless (ad-hoc\/mesh) networking and security, intrusion detection, intrusion response, key management, and congestion control.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.cs.iastate.edu\/~jxiawang\/homepage.html\">http:\/\/www.cs.iastate.edu\/~jxiawang\/homepage.html<\/a><\/p>\n<p><strong>12.Adrian Perrig<\/strong><\/p>\n<p style=\"text-align: justify;\">\u5361\u5185\u57fa\u6885\u9686Adjunct(\u627e\u8d44\u6599\u53d1\u73b0\u662f\u975e\u7ec8\u8eab\u7684)\u6559\u6388\uff0c\u745e\u58eb\u82cf\u9ece\u4e16\u8054\u90a6\u9ad8\u7b49\u5de5\u5b66\u9662\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: networking and systems security, and specifically on the design of a secure next-generation Internet architecture.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/users.ece.cmu.edu\/~adrian\/\">http:\/\/users.ece.cmu.edu\/~adrian\/<\/a><\/p>\n<p><strong>13.Xiaofeng Wang<\/strong><\/p>\n<p style=\"text-align: justify;\">\u5370\u7b2c\u5b89\u7eb3\u5927\u5b66\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df: cloud and mobile security, data and health informatics security, software security, game-theoretic incentive engineering.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.informatics.indiana.edu\/xw7\/\">http:\/\/www.informatics.indiana.edu\/xw7\/<\/a><\/p>\n<p><strong>14.Guofei Gu<\/strong><\/p>\n<p style=\"text-align: justify;\">\u5fb7\u5dde\u519c\u5de5\u5927\u5b66\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1aInternet malware\/botnet detection, defense, and analysis\uff1bWeb and social networking security\uff1bSoftware-defined networking (SDN\/OpenFlow) security\uff1bMobile and Android security\uff1bIntrusion detection, anomaly detection.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/faculty.cs.tamu.edu\/guofei\/\">http:\/\/faculty.cs.tamu.edu\/guofei\/<\/a><\/p>\n<p><strong>15.Yih-Chun Hu<\/strong><\/p>\n<p style=\"text-align: justify;\">UIUC\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1asecurity and systems.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/users.crhc.illinois.edu\/yihchun\/index.html\">http:\/\/users.crhc.illinois.edu\/yihchun\/index.html<\/a><\/p>\n<p><strong>16.David B. Johnson<\/strong><\/p>\n<p style=\"text-align: justify;\">Rice\u5927\u5b66\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1aMobile IP and different types of multihop wireless networking such as mobile adhoc networking, sensor networking, and mesh networking, including in the areas of routing, security, and medium access control (MAC) protocols.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.cs.rice.edu\/~dbj\/bio.html\">http:\/\/www.cs.rice.edu\/~dbj\/bio.html<\/a><\/p>\n<p><strong>17. PietroMichiardi<\/strong><\/p>\n<p style=\"text-align: justify;\">EURECOM\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1alarge-scale distributed systems (including data processing and data storage),and scalable algorithm design to mine massive amounts of data. Additional research interests are on system, algorithmic, and performance evaluationaspects of computer networks and distributed systems.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.eurecom.fr\/~michiard\/\">http:\/\/www.eurecom.fr\/~michiard\/<\/a><\/p>\n<p><strong>18.Robin Hillary Kravets<\/strong><\/p>\n<p style=\"text-align: justify;\">UIUC\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1aMobile Computing and Communications , including wireless LANs, ad hoc networks, sensor network, delay and disruption tolerant networks,vehicular networks, mobile social networks and personal area networks.\u00a0enable effective power management, connectivity management, data transport, congestion management, location management, routing and security.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/mobius.cs.uiuc.edu\/people\/rhk\">http:\/\/mobius.cs.uiuc.edu\/people\/rhk<\/a><\/p>\n<p><strong>19.YaoLiu<\/strong><\/p>\n<p style=\"text-align: justify;\">\u5357\u4f5b\u7f57\u91cc\u8fbe\u5927\u5b66\u52a9\u7406\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1acomputer and network security, with an emphasis on designing and implementing defense approaches that protect emerging wireless technologies from being undermined by adversaries\uff1bsecurity of cyber-physical systems,especially in smart grid security.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/www.cse.usf.edu\/~yliu\/\">http:\/\/www.cse.usf.edu\/~yliu\/<\/a><\/p>\n<p><strong>20.ZygmuntJ. Haas<\/strong><\/p>\n<p style=\"text-align: justify;\">\u5eb7\u4e43\u5c14\u5927\u5b66\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1aWireless Communications and Mobile Systems, and Biologically-inspired Complex Systems and Networks.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/people.ece.cornell.edu\/haas\/\">http:\/\/people.ece.cornell.edu\/haas\/<\/a><\/p>\n<p><strong>21.KaiHwang<\/strong><\/p>\n<p style=\"text-align: justify;\">\u5357\u52a0\u5dde\u5927\u5b66\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1acomputer architecture, parallel processing, distributed systems,high-performance computing, cloud computing, networking and communications, P2P networks, pervasive computing, and network security etc.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/gridsec.usc.edu\/Hwang.html\">http:\/\/gridsec.usc.edu\/Hwang.html<\/a><\/p>\n<p><strong>22.Hulya Seferoglu<\/strong><\/p>\n<p style=\"text-align: justify;\">\u4f0a\u5229\u8bfa\u5927\u5b66\u829d\u52a0\u54e5\u5206\u6821\u52a9\u7406\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1adesign, analysis, and optimization of network protocols and algorithms. particularly interested in network optimization, network coding, and multimedia streaming.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/nrl.ece.uic.edu\/\">http:\/\/nrl.ece.uic.edu\/<\/a><\/p>\n<p style=\"text-align: justify;\"><strong>23.Philip Levis<\/strong><br \/>\n\u65af\u5766\u798f\u5927\u5b66\u526f\u6559\u6388\uff0cTinyOS\u7684\u4e3b\u8981\u5f00\u53d1\u8005\uff0c\u7814\u7a76\u9886\u57df\uff1aoperating systems, networks, and software design, especially wireless networks, sensor networks, and embedded systems.<\/p>\n<p>\u4e3b\u9875\u5730\u5740\uff1a<a href=\"http:\/\/csl.stanford.edu\/~pal\/\">http:\/\/csl.stanford.edu\/~pal\/<\/a><\/p>\n<p style=\"text-align: justify;\"><strong>23.Jie Gao<\/strong><br \/>\n\u77f3\u6eaa\u5927\u5b66\u526f\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1a applied computational geometry and distributed algorithm design with applications in wireless sensor networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.David Wagner \u52a0\u5dde\u4f2f\u514b\u5229\u7684\u6559\u6388\uff0c\u7814\u7a76\u9886\u57df\uff1aComputer security, especia [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[17],"_links":{"self":[{"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=\/wp\/v2\/posts\/61"}],"collection":[{"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=61"}],"version-history":[{"count":1,"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=\/wp\/v2\/posts\/61\/revisions"}],"predecessor-version":[{"id":62,"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=\/wp\/v2\/posts\/61\/revisions\/62"}],"wp:attachment":[{"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=61"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=61"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.thinkmesh.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=61"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}