RESEARCH INTERESTS: Computer, Networking and Information Security; Digital topology and image processing
|
|
|
- Magnus O’Connor’
- 10 years ago
- Views:
Transcription
1 Jianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA (office) RESEARCH INTERESTS: Computer, Networking and Information Security; Digital topology and image processing EDUCATION Ph.D. in Computer Science, 2006, University of Houston, Houston, Texas, USA M.S. in Computer Engineering, 1990, Shandong University, Jinan, Shandong, China B.S. in Computer Engineering, 1987, Shandong University, Jinan, Shandong, China WORKING EXPERIENCE 1. 08/2015-Present Professor, TSYS School of Computer Science, Columbus State University, GA, USA 2. 08/ /2015 Tenured Associate Professor, TSYS School of Computer Science, Columbus State University, GA, USA 3. 08/ /2013 Tenure-Track Associate Professor, TSYS School of Computer Science, Columbus State University, GA, USA 4. 08/ /2009 Tenure-track Assistant Professor, Math & Computer Science Department, University of Maryland Eastern Shore, MD, USA 5. 08/ /2008 Tenure-track Assistant Professor, Math & Computer Science Department, Bennett College, NC, USA 6. 01/ /2006 System Administrator, Teaching Assistant, Research Assistant (Part time) of Computer Science Department, University of Houston, TX, USA 7. 09/ /2001 Assistant, Associate Professor, Computer Science, Beijing Institute of Petrochemical Technology, Beijing, China SERVICES 1. Serve as the member of Technical Program Committee of IEEE MWSN Reviewer for Journal of Telecommunication System 3. Reviewer for Journal of Universal Computer Science 4. Reviewer for the Journal of Computers & Security 5. Reviewer for IEEE Transactions on Signal Processing. 6. Reviewer for IEEE International Conference on Computer Networks and Mobile Computing, Reviewer for Journal of Systemics, Cybernetics and Informatics 8. Served as Network Security Session Co-Chair of International Conference on Computing, Communications and Control Technologies, Served as Privacy and Security Session Chair of 24 th IEEE Conference on Advanced Information Networking and Applications, Reviewer for Computer Journal, Oxford Journal. Courses Taught (Since 2006) Computer Application Introduction to Computer Science Computer Programming (C++) Organization of Program Languages Theory of Computing Computer Operating System Software Engineering Data Structure and Algorithm Computer Network Computer Architecture
2 Introduction to Computer Network Security Advanced System Security REFERENCES Stephen Huang, Ph.D. Professor, Dept. of Computer Science University of Houston 4800 Calhoun Rd. Houston, TX Telephone: (713) Fax: (713) Robert Y. Ling, Ph.D. Project manager: Flight Software Branch of the Avionic System Division (NASA) NASA JSC mail code EV3 Database Management Introduction to Discrete Structure 2101 NASA Parkway Houston, TX Telephone: (281) Yu Liang, Ph.D. Assistant Professor, Dept. of Math & Computer Science Central State University 1400 Brush Row Rd., Wilberforce, Ohio Telephone: Byong Lee, PhD Associate Professor, Math & Computer Science Department Bennett College for Women Greensboro, NC PUBLICATIONS since 2004 Refereed Journal Papers/Book Chapters 1. Jianhua Yang, Thomas Reddington, Enhance Learning through Developing Network Security Hands-on Lab for Online Students, Information Security Education Journal, Vol. 2, No. 1, pp 19-27, June Yongzhong Zhang, Yuanyi Qi, Lamei Wang, Jianhua Yang, The Study of Fluid Learning Styles under Open Education, International Journal of Education and Social Science, Vol.2, Issue 1, pp 82-91, January Jianhua Yang, Xiaozhu Lin, David Woolbright, Wayne Summers, A New Technique for Counting Objects in Binary Images, Journal of Computer Vision and Image Processing, Vol. 3, No. 4, pp 1-14, Xiaozhu Lin, Jianhua Yang, Wayne Summers, David Woolbright, Hold Holes Countable in Binary Images, Journal of Computer Vision and Image Processing, Vol. 3, No. 1, pp 44-55, Yongzhong Zhang, Yuanxi Qi, Jianhua Yang, Online Course Design in the Context of Cloud Computing, Advances in Intelligent and Soft Computing (book), 2012, Volume 108/2012, Springer, pp DOI: / _31 6. Jianhua Yang, David Woodbright, Correlating TCP/IP Packet Contexts to Detect Stepping-Stone Intrusion, Journal of Computers and Security, Elsevier Ltd., Vol. 30, No. 6-7, pp , August Lydia Ray, Jianhua Yang, Beyond the Security Track: Embed Security Education across Undergraduate Computing Curricula Using M-Thread Approach, International Journal of Computer Science and Network Security, Vol. 11, No. 8, pp , August Jianhua Yang, Guoqing Zhao, Stephen S. H. Huang, Analyzing and Correlating Interactive
3 Sessions with One-Dimensional Random Walk to Detect Stepping-Stone Intrusion, Transactions on Computers and Intelligent Systems, pp 78-85, Vol. 1 No , ISBN Yongzhong Zhang, Jianhua Yang, Chunming Ye, Modeling and Detecting Stepping-Stone Intrusion, International Journal of Computer Science and Network Security, Vol. 9, No. 7, pp , July Jianhua Yang, Stephen Huang, Mining TCP/IP Packets to Detect Stepping-Stone Intrusion, Journal of Computers and Security, Elsevier Ltd., pp , Vol. 26 (2007). 11. Jianhua Yang, Stephen Huang, Probabilistic Analysis of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection, Journal of Computers and Security, Elsevier Ltd., pp , Vol. 26 (2007). 12. Jianhua Yang, Stephen Huang, Matching TCP/IP Packets to Detect Stepping-Stone Intrusion, International Journal of Computer Science and Network Security, Vol. 6, No. 4,pp , October Jianhua Yang, Stephen Huang, Correlating Temporal Thumbprint for Tracing Intruders, International Journal of Systematics, Cybernetics, and Informatics, Vol. 4, No. 4, September, Refereed Conference Papers 1. Jianhua Yang, Yongzhong Zhang, RTT-based Random Walk Approach to Detect Stepping-Stone Intrusion, the Proceedings of 29 th IEEE International Conference on Advanced Information Networking and Applications, Gwangju, South Korea, to be published at IEEE proceedings and Digital Library, March, (Accepting rate 140/472= 28%) 2. Jianhua Yang, Thomas Reddington, Enhance Learning through Developing Network Security Hands-on Lab for Online Students, abstract to be published in ACM digital library, Kennesaw, GA, October, Yongzhong Zhang, Jianhua Yang, A Comprehensive Model in Online Course Design Under Ubiquitous Learning Environment, the Proceedings of 3 rd International Conference on Computer Science Education: Innovation and Technology, Singapore, Sep DOI: / _CSEIT Yingjie Sheng, Yongzhon Zhang, Jianhua Yang Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion, the Proceedings of 26 th IEEE International Conference on Advanced Information Networking and Applications, Fukuoka, Japan, IEEE proceedings and Digital Library, pp , March, (Accepting rate = 29%) 5. Lydia Ray, Jianhua Yang, Forensic Analysis on IPod Touch Generation II, 2011 Information Security Curriculum Development Conference, to be published in ACM digital library, Kennesaw, GA, October, Jianhua Yang, Lydia Ray, Guoqing Zhao, Detecting Stepping-stone Insider Attacks by Network Traffic Mining and Dynamic Programming, the Proceedings of 25 th IEEE International Conference on Advanced Information Networking and Applications (AINA 2011), Singapore, pp , March, Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang, Using Dynamic Programming Techniques to Detect Multi-Hop Stepping-Stone Pairs in a Connection Chain, the Proceedings of 24 th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, April Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S.-H. Huang, Resist Intruders Manipulation via Context-based TCP/IP Packet Matching, the Proceedings of 24 th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, April Jianhua Yang, Yongzhong Zhang, A New Model to Detect Stepping-stone Intrusion, 2 nd International Workshop of Computer Science and Engineering, published in IEEE digital library, Qingdao, China, October, (Accepting rate = 37%). 10. Jianhua Yang, Edward Bosworth, An Efficient TCP/IP Packet Matching Algorithm to Detect Stepping-Stone Intrusion, 2009 Information Security Curriculum Development Conference,
4 published in ACM digital library, Kennesaw, GA, September, Guoqing Zhao, Jianhua Yang, Long Ni, Gurdeep S. Hura, and Shou-Hsuan Stephen Huang, "Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion," the Proceedings of 23 nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2009), Bradford, UK, May Yongzhong Zhang, Chunming Ye, Jianhua Yang, Applying Signal Processing Technology to Stepping-stone Intrusion Detection, the Proceedings of IEEE International Symposium on Intelligent Information Technology Application, Shanghai, China, December, Jianhua Yang, Byong Lee, Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching, Lecture Notes in Computer Science (LNCS) by Spring-Verlag, 5 th IEEE International Conference on Automatic and Trusted Computing, Oslo, Norway, Vol. 5060, pp 2-12 June,2008.(Accepting rate=28/125) 14. Long Ni, Jianhua Yang, Ran Zhang, David Song, "Matching TCP/IP Packets to Resist Stepping- Stone Intruders Evasion," the Proceedings of IEEE 40 th Southeastern Symposium on System Theory(SSST08), New Orleans, LA, pp 64-68, March Jianhua Yang, Byong Lee, Shou-Hsuan Stephen Huang, "Monitoring Network Traffic to Detect Stepping-Stone Intrusion," the Proceedings of 22 nd IEEE International Conference on Advanced Information Networking and Applications (AINA 2008), Okinawa, Japan, pp March Stephen Huang, Robert Lychev, Jianhua Yang, Stepping-Stone Detection via Request-Response Traffic Analysis to be published in Lecture Notes in Computer Science (LNCS) by Spring-Verlag, 4 th IEEE International Conference on Automatic and Trusted Computing, Hong Kong, China, pp July, 2007.(Accepting rate=60/242) 17. Jianhua Yang, Byong Lee, Yongzhong Zhang, Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis, Lecture Notes in Computer Science (LNCS) by Spring-Verlag, 5 th International Conference on Cryptology and Network Security, Suzhou, China, Vol. 4301, pp , Dec (Accepting rate=26/148) 18. Yongzhong Zhang, Jianhua Yang, Chunming Ye, Resistance Analysis to Evasion of a Novel Algorithm of Detecting Stepping-Stone, Lecture Notes in Computer Science (LNCS) by Spring- Verlag, 3 rd IEEE International Conference on Automatic and Trusted Computing, Wuhan, China, Vol. 4158, pp , Sep (Accepting rate=60/208) 19. Jianhua Yang, Shou-Hsuan Stephen Huang, Yongzhong Zhang, Resistance Analysis to Intruders Evasion of Detecting Intrusion, Lecture Notes in Computer Science (LNCS) by Springer-Verlag, 9 th Information Security Conference, Samos, Greece, Vol. 4176, pp , Sep (Accepting rate=38/204) 20. Jianhua Yang, Yongzhong Zhang, Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection, Lecture Notes in Computer Science (LNCS) by Springer-Verlag,Vol.3989,pp 18-32,2006.(Accepting rate=32/208) 21. Jianhua Yang, Shou-Hsuan Stephen Huang, Ming D. Wan, "A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection," Proceedings of 20 th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), Vienna, Austria, April 2006, Vol. 1, pp (Accepting rate=30%) 22. Ming D. Wan, Shou-Hsuan Stephen Huang, Jianhua Yang, "Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection," Proceedings of 20 th IEEE International Conference on Advanced Information Networking and Applications (AINA 2006), Vienna, Austria, April 2006, Vol. 1, pp (Accepting rate=30%) 23. Jianhua Yang, Shou-Hsuan Stephen Huang, "A Way by Estimating the Variation of TCP Packet Round-Trip Time to Detect Stepping-Stone Intrusion (Extended Abstract)," published electronically at the web site of the 21 st Annual Computer Security Applications Conference (ACSAC 05), Tucson, Arizona, December (Accepting rate=26%) 24. Jianhua Yang, Shou-Hsuan Stephen Huang, "Charactering and Estimating Network Fluctuation for Detecting Interactive Stepping-Stone Intrusion," the Proceedings of International Conference on Communication, Network and Information Security, Phoenix, Arizona, November 2005, pp (Accepting rate=34%)
5 25. Jianhua Yang, Shou-Hsuan Stephen Huang, "Improved Thumbprint and Its Application for Intrusion Detection," Lecture Notes in Computer Science (LNCS) by Springer-Verlag, Vol. 3619, pp , (Accepting rate=22%) 26. Jianhua Yang, Shou-Hsuan Stephen Huang, "Correlating Temporal Thumbprint for Tracing Intruders," Proceedings of 3rd International Conference on Computing, Communications and Control Technologies, Austin, Texas, July 2005, pp (Accepting rate=38%) 27. Jianhua Yang, Shou-Hsuan Stephen Huang, "Matching TCP Packets and Its Application to the Detection of Long Connection Chains," Proceedings of 19th IEEE International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, China, March 2005, pp (Accepting rate=27%) 28. Jianhua Yang, Shou-Hsuan Stephen Huang, "A Real-Time Algorithm to Detect Long Connection Chains of Interactive Terminal Sessions," Proceedings of 3rd ACM International Conference on Information Security (Infosecu'04), Shanghai, China, November 2004, pp (Accepting rate=25%) SUMMER CONTRACTS 1. Summer Cyber-Security Research Project CSAW2013, Supported by NY-Poly and NSF, $ , July 8-August 16, Summer CRC Project Context-Based Packet Matching Stepping-Stone Intrusion Detection, Supported by NSF Project ACTION, 05/25/ /25/ Summer Project Computing Network Traffic to Detect Stepping-stone Intrusion, Supported by NSF Project HBCU-Up, 06/15/ /25/ Summer Project Correlating Incoming and Outgoing Connections to Detect Stepping-Stone Intrusion, Supported by NSF Project BPC-Alliance, 06/01/ /31/ Summer Project Curriculum Development-Parallel Computation, Supported by NSF Project HBCU-Up, 06/25/ /25/2007. AWARDED GRANTS NONE PENDING PROPOSALS NONE
RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics
FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center
Ming-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION
Ming-Hsing Chiu Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 Mandeville, LA 70471 e-mail: [email protected] EDUCATION Ph.D. in Computer Science, University of Central Florida, May 99. Dissertation
Kaiquan Xu, Associate Professor, Nanjing University. Kaiquan Xu
Kaiquan Xu Marketing & ebusiness Department, Business School, Nanjing University Email: [email protected] Tel: +86-25-83592129 Employment Associate Professor, Marketing & ebusiness Department, Nanjing
JINGQUAN LI, PH.D. Education
JINGQUAN LI, PH.D. Division of Business, Arts and Science Texas A&M University-San Antonio 1450 Gillette Blvd. San Antonio, Texas 78224. USA. Phone: (210) 932-6243 Email: [email protected] Education
DR. YUEXIAO DONG. Department of Statistics Fox School of Business Temple University 1810 N. 13th Street Philadelphia, PA 19122
Department of Statistics Fox School of Business Temple University 1810 N. 13th Street Philadelphia, PA 19122 Phone: (1-)215-204-0670 Email: [email protected] http://astro.temple.edu/ ydong/index.html Employment
Lihui Lin. 2011-present Tsinghua University, School of Economics and Management Associate Professor, Department of Management Science and Engineering
Lihui Lin School of Economics and Management, Weilun Building, Room 456H, Tsinghua University, Beijing, 100084, China Phone: +86 10 62794790 Fax: +86 10 62771647 Email: [email protected] EDUCATION
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
DEBZANI DEB Department of Computer Science Winston-Salem State University Winston-Salem, NC 27110
PROFESSIONAL PREPARATION DEBZANI DEB Department of Computer Science Winston-Salem State University Winston-Salem, NC 27110 Phone: (336) 750-2496 Fax: (336) 750-2499 E-mail: [email protected] Institution Major
FU, FANGJIAN. Singapore Management University Lee Kong Chian School of Business 50 Stamford Road Singapore 178899
FU, FANGJIAN Singapore Management University Lee Kong Chian School of Business 50 Stamford Road Singapore 178899 Tel: (+65) 6828-0244 Email: [email protected] Web: http://www.mysmu.edu/faculty/fjfu/ EMPLOYMENT
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: [email protected]
Prairie View A&M University Computer Science Department 招 生 简 介
Prairie View A&M University Computer Science Department 招 生 简 介 Prairie View A&M University A member of Texas A&M University Systems Founded in 1876, the 2 nd oldest state institution of Texas, located
Best Poster Award: International Congress on Child and Adolescent Psychiatry 2012
EDUCATION Ph.D. Computer Engineering University of Southern California 1999 MS Computer Engineering University of Southern California 1994 B.S. Electrical Engineering Tehran University 1988 AWARDS & FELLOWSHIPS
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS
XIAOBAI (BOB) LI Department of Operations & Information Systems Manning School of Business One University Ave., Lowell, MA 01854 Phone: 978-934-2707 Email: [email protected] ACADEMIC EXPERIENCE 2011-present
Kyung Joo Lee, Ph.D.
Kyung Joo Lee, Ph.D. Associate Professor School of Business and Technology University of Maryland Eastern Shore Princess Anne, MD 21853 Office Location: KH 2110, Kiah Hall Phone: (410) 621-3078 (Office);
Jiexun Li, Ph.D. College of Information Science and Technology, Drexel University, Philadelphia, PA
EDUCATION Jiexun Li, Ph.D. Assistant Professor College of Information Science and Technology Drexel University, Philadelphia, PA 19104 Phone: (215) 895-1459 Fax: (215) 895-2494 Email: [email protected]
Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
December 2013, 20(6): 88 95 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://jcupt.xsw.bupt.cn Secure and privacy-preserving DRM scheme
Research Interests: IT adoption and implementation; human-computer interaction; IT in small business; computer ethics.
Faculty Albert HA ( 夏 耀 祥 ) BSc Hong Kong; MBA Chinese Univ of Hong Kong; PhD Stanford Professor, and Head of Department Coordination of product and process development, stochastic models for production
C U R R I C U L U M V I T A E T R I V A N L E
C U R R I C U L U M V I T A E T R I V A N L E Department of Computer Science, 253 Love Building Florida State University, Tallahassee, Florida 32306-4530, USA. Phone: (850) 345-6468, Fax: (850) 644-0058.
WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model
WEI CHEN Rady School of Management University of California, San Diego 9500 Gilman Drive, MC 0553 La Jolla, CA 92093-0553 +1(858)337-5951 +1(858)534-0862 [email protected] www.mrweichen.info RESEARCH
Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis
, 22-24 October, 2014, San Francisco, USA Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis Teng Zhao, Kai Qian, Dan Lo, Minzhe Guo, Prabir Bhattacharya, Wei Chen, and Ying
Wen-Tai Hsu. School of Economics Office: +65-6808 5455. 90 Stamford Road [email protected]
Curriculum Vitae Personal Data/Contact Information Office Address Wen-Tai Hsu June 2015 Telephone Number, Email, etc School of Economics Office: +65-6808 5455 Singapore Management University E-mail: [email protected]
CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION
CURRICULUM VITAE OF NANCY L. MARTIN, PH.D. I. PROFESSIONAL AFFILIATION AND CONTACT INFORMATION A. Present University Department or Unit: Information Systems Technologies School of Information Systems and
CURRICULUM VITAE. Professor TsoYu Calvin LIN
CURRICULUM VITAE Professor TsoYu Calvin LIN Current Address: Aug. 1, 2010 July 31, 2011: 1110, Jackson St., Bldg. 134, #925, Albany, CA 94706, USA (Cell) (510)717-8962 Permanent Address: Department of
1999 2004 Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.
Curriculum Vitae Vassilis Zikas Postdoctoral Researcher, UCLA University of California, Los Angeles Los Angeles, CA 90095-1596 +1 (424) 781-7942 [email protected] www.cs.ucla.edu/~vzikas Education 2006
Donghang Zhang. Assistant Professor, Department of Finance, Moore School of Business, University of South Carolina, 08/02 05/2010
Donghang Zhang Associate Professor of Finance Moore School of Business, University of South Carolina Columbia, SC 29208 Phone: (803) 777-0242 E-mail: [email protected] Education Ph.D. University of Florida
Chia-Yen Lee ( 李 家 岩 )
Chia-Yen Lee ( 李 家 岩 ) Assistant Professor Institute of Manufacturing Information and Systems National Cheng Kung University, Taiwan No.1, University Road, Email: [email protected] Tainan City 701,
CURRICULUM VITAE. Dept. of Mechanical Engineering and Industrial Design Τ.Ε.Ι. of Western Macedonia 50100 KOZANI, GREECE
CURRICULUM VITAE PERSONAL DATA Name: Dimokritos Panagiotopoulos Date of birth: March 21, 1960 Family Status: Married, has two children Current Posistion: Work Address: Tel. No. (Work): Mobile No.: E-mail:
RESUME. PERSONAL Chen-chi Shing Box 6933, Radford University. Radford, VA 24142 Phone Office (540)831-5996 Fax (540)831-6706
RESUME PERSONAL Name Address Chen-chi Shing Box 6933, Radford University. Radford, VA 24142 Phone Office (540)831-5996 Fax (540)831-6706 OBJECTIVE Teaching, Research and Consulting EDUCATION Statistics:
Hailong Qian. Department of Economics John Cook School of Business Saint Louis University 3674 Lindell Blvd, St. Louis, MO 63108, USA qianh@slu.
Hailong Qian Department of Economics John Cook School of Business Saint Louis University 3674 Lindell Blvd, St. Louis, MO 63108, USA [email protected] FIELDS OF INTEREST Theoretical and Applied Econometrics,
Research on the Course of Network Performance Testing and Analysis
2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research on the Course of Network Performance Testing and Analysis Xiurong
A Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,[email protected] *2
CURRICULUM VITAE. Donghyun Shin EDUCATION: RESEARCH INTERESTS: PROFESSIONAL EXPERIENCE:
CURRICULUM VITAE EDUCATION: Donghyun Shin Department of Mechanical and Aerospace Engineering The University of Texas at Arlington, Arlington, TX 76019 Tel: (817) 272-9336; Email: [email protected]; Fax: (817)
Z. JANE GU EMPLOYMENT
Z. JANE GU Marketing Department University of Connecticut 2100 Hillside Road, UNIT 1041 Storrs, CT, 06269 [email protected] Office: (860) 486-0493 EMPLOYMENT Assistant Professor of Marketing,
MIN CHEN, PH.D. Associate Professor
MIN CHEN, PH.D. Associate Professor Department of Computer Science, University of Montana, Missoula, MT 59812 Telephone: (406) 243-2886 Fax: (406) 243-5139 Email: [email protected] PROFESSIONAL PREPARATION
AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT
AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT Hetal Jasani, Northern Kentucky University Dr. Hetal Jasani is an assistant professor in the Department of Computer Science at Northern Kentucky
CURRICULUM VITAE. Igor V. Maslov. 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304. Web: http://www.columbia.edu/~ivm3/
CURRICULUM VITAE 1 Igor V. Maslov Contact information 1-24-17-6 Sasazuka, Shibuya-ku Phone: +81 (80) 54863304 Tokyo 151-0073 E-mail: [email protected] Japan Web: http://www.columbia.edu/~ivm3/ Education
Curriculum Vitae July 2011 Shu Fan
Curriculum Vitae July 2011 Shu Fan General Information Current Position: Senior Research Fellow (Level C) Affiliation: Office: Telephone: +61 3 9905 5843 Fax: +61 3 9905 5474 Email: WWW: Research Interests
[email protected]
[email protected] Consumer Behavior Destination Marketing Service Marketing Service Mangement Associate Professor Tourism Department Fudan University, Shanghai, China Deputy Secretary General International
Curriculum Vitae. ChunI Chen
Curriculum Vitae ChunI Chen Title and Department Professor, Department of Industrial Management Director, Center of General Education Education Ph.D. in Mechanical Engineering, National Cheng Kung University,
CURRICULUM VITAE Herbert L. Dershem
CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue
SU Qiang Professor ---------------------------------------------------------------------------------------------------------------------------------
SU Qiang Professor PhD Advisor Department: Department of Management Science and Engineering Email: [email protected] Office Phone: +86-21-65981443 ---------------------------------------------------------------------------------------------------------------------------------
Mining and Detecting Connection-Chains in Network Traffic
Mining and Detecting Connection-Chains in Network Traffic Ahmad Almulhem and Issa Traore ISOT Research Lab, ECE Department, University of Victoria, Victoria, CANADA Summary. A connection-chain refers to
BEIBEI (BACY) DONG EDUCATION EMPLOYMENT EDITORIAL POSITIONS PUBLICATIONS. Updated 05/25/2015 Beibei (Bacy) Dong
BEIBEI (BACY) DONG Updated 05/25/2015 Lehigh University College of Business & Economics Department of Marketing Tel : (610) 758-3439 621 Taylor Street Bethlehem, PA 18015-3117 E-mail: [email protected]
OJIABO UKOHA, Ph.D. Department of Mathematics and Computer Science. Department of Mathematics. Graduate Teaching Assistant
OJIABO UKOHA, Ph.D. Lecturer University of Maryland Eastern Shore (UMES) Princess Anne, Maryland Office Location: KH 1115 Phone: (410) 651-6364 (Office); (410) 742-9696 (Home) Fax: (410) 651-7673 E-mail:
CHUNMING YUAN EDUCATION CURRICULUM VITAE
CURRICULUM VITAE CHUNMING YUAN Department of Economics University of Maryland, Baltimore County 1000 Hilltop Circle Baltimore, MD 21250 E-mail: [email protected] EDUCATION Ph.D. 2008 University of California,
Muhammad K. Ghanbari, Computer Science dept. [email protected]
Name: Email: Muhammad K. Ghanbari, Computer Science dept. [email protected] Dr. Ghanbari has more than 34 years of programming and teaching experiences in Computer Science. He has taught all courses
June Zhang (Zhong-Ju Zhang)
(Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: [email protected] http://users.ece.cmu.edu/~junez
YING ZHAO. EDUCATION Ph.D. in Marketing, 1997-2001 Haas School of Business University of California, Berkeley
YING ZHAO Department of Marketing Tel: (852) 2358-7701 Hong Kong University of Science and Technology Fax: (852) 2358-2429 Clear Water Bay, Kowloon, Hong Kong Email: [email protected] EDUCATION Ph.D. in Marketing,
Jerry Cha-Jan Chang, Ph.D.
Jerry Cha-Jan Chang, Ph.D. 323 Beam Hall E-mail: [email protected] Department of MET, Lee Business School Phone: (702) 895-3287 4505 Maryland Parkway, Box 456009 Fax: (702) 895-4370 Las Vegas, NV
Adina Crainiceanu. Ph.D. in Computer Science, Cornell University, Ithaca, NY May 2006 Thesis Title: Answering Complex Queries in Peer-to-Peer Systems
Adina Crainiceanu Associate Professor Department of Computer Science United States Naval Academy 572M Holloway Road, Stop 9F Annapolis, MD 21402 http://www.usna.edu/users/cs/adina Email: [email protected]
Curriculum Vitae JOON-YEOUL OH
Curriculum Vitae JOON-YEOUL OH Department of Mechanical and Industrial Engineering Texas A&M University - Kingsville Kingsville, Texas 78363-8203 (361) 593-3941, [email protected] EDUCATION Ph.D. Industrial
Master of Science in Business Analytics
Toward A Model Curriculum for the Master of Science in Business Analytics by Charles K. Davis, PhD and Charlene A. Dykman, PhD Proposed Degree Overview Master of Science in Business Analytics (MSBA) Five
Xudong Fu. Department of Economics and Finance Southern Illinois University Edwardsville
Xudong Fu Department of Economics and Finance Southern Illinois University Edwardsville Mailing address: E-mail: [email protected] Alumni Hall 3147 Cell: (205) 239-5671 Edwardsville, IL 62026 Office: (618)
SURENDRA SARNIKAR. 820 N Washington Ave, EH7 Email: [email protected] Madison, SD 57042 Phone: 605-256-7341
SURENDRA SARNIKAR 820 N Washington Ave, EH7 Email: [email protected] Madison, SD 57042 Phone: 605-256-7341 EDUCATION PhD in Management Information Systems May 2007 University of Arizona, Tucson, AZ MS in
Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis
Traffic Analysis Scott E. Coull RedJack, LLC. Silver Spring, MD USA Related Concepts and Keywords Side-channel attack, information theory, cryptanalysis, covert channel analysis Definition Traffic analysis
LINGLING WANG. ACADEMIC APPOINTMENT Assistant Professor of Finance, A. B. Freeman School of Business, Tulane University, 07/2009 - Present
LINGLING WANG 7 McAlister Drive A.B. Freeman of Business New Orleans, LA 70118-5669 Email: [email protected] Website: http://www.wanglingling.info Tel: 504-865-5044; Fax: 504-862-8327 Updated: Sep 21,
Deborah L. Dunn Faculty Vita (September 1, 2008 - August 31, 2013)
Deborah L. Dunn Faculty Vita (September 1, 2008 - August 31, 2013) Department: Computer Science Rank: Professor Qualification Status: AQ Tenure Status: Tenured EDUCATION PHD, 1995. Institution: Texas A&M
Machine Learning Department, School of Computer Science, Carnegie Mellon University, PA
Pengtao Xie Carnegie Mellon University Machine Learning Department School of Computer Science 5000 Forbes Ave Pittsburgh, PA 15213 Tel: (412) 916-9798 Email: [email protected] Web: http://www.cs.cmu.edu/
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
International Graduate Degree Program in EECS on Communications, Control, and Signal Processing
College of Electrical Engineering and Computer Science, National Taipei University of Technology (Academic Year 2009~2010) International Graduate Degree Program in EECS on Communications, Control, and
Huseyin Polat s Curriculum Vitae
Huseyin Polat s Curriculum Vitae Department of Computer Engineering, Anadolu University, Eskisehir 26555, TURKEY +90 222 321 3550-6554 [email protected] http://home.anadolu.edu.tr/~polath/ Research
Duke University, Fuqua School of Business Durham, North Carolina Associate Professor of Operations Management, Jul. 2013 Present
Robert P. Swinney Duke University Fuqua School of Business [email protected] people.duke.edu/~rps23 100 Fuqua Drive Box 90120 Durham, NC 27708 919-660- 7635 Academic Positions Duke University, Fuqua
B.S. Major: Biology, Minors: Psychology & Chemistry, December 2003. Prairie View A&M University. Generalist 4-8, Texas Educator Certificate
4226 Bayglen Ct. Houston, TX 77068 Phone: 281.744.3848 E-Mail: [email protected] EDUCATION & CERTIFICATIONS Ph.D. Health Psychology, Virginia State University. December 2013. Dissertation: Parental
George Theocharides. Cyprus International Institute of Management (CIIM) Phone: +357-22-462228 21 Akademias Avenue Fax: +357-22-331121
George Theocharides July 2012 Business Address Cyprus International Institute of Management (CIIM) Phone: +357-22-462228 21 Akademias Avenue Fax: +357-22-331121 P.O. Box 20378 Email: [email protected]
JUN YU School of Business Emporia State University Phone: (620) 341-5784 Email: [email protected]
JUN YU School of Business Emporia State University Phone: (620) 341-5784 Email: [email protected] Updated July, 2011 EDUCATION Ph.D. in Marketing 2002 University of Texas at Dallas, Richardson, Texas M.B.A.
CURRICULUM VITAE. Li Chen
CURRICULUM VITAE Li Chen Ph.D., Department of Management, School of Business and Economics, Fayetteville State University 1200 Murchison Road, Fayetteville, NC, 28301 Phone: (910)-672-1665 (office); (860)-942-0972
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Yuanjie He. 2011- Associate Professor, Technology and Operations Management Department, California State Polytechnic University, Pomona
Yuanjie He 3801 W. Temple Ave, Pomona, CA 91768 Office: (909) 869-2458 Technology and Operations Management Department College of Business Administration California State Polytechnic University, Pomona
Kun Huang. B.A. Huazhong University of Science and Technology, Wuhan, China, 1995 Major: English
Kun Huang Social Sciences Building 3002 School of Public Administration 1 University of New Mexico Albuquerque, NM 87131-0001 Phone: 1-505-277-7757 [email protected] Education Ph.D. University of Arizona,
High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
, pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College
G. Mark Simmons Faculty Vita (September 1, 2008 - August 31, 2013)
G. Mark Simmons Faculty Vita (September 1, 2008 - August 31, 2013) Department: Economics/Finance Rank: Associate Professor Qualification Status: AQ Tenure Status: Tenured EDUCATION PHD, 1987. Institution:
MATHEMATICAL LOGIC FOR COMPUTER SCIENCE
MATHEMATICAL LOGIC FOR COMPUTER SCIENCE Second Edition WORLD SCIENTIFIC SERIES IN COMPUTER SCIENCE 25: Computer Epistemology A Treatise on the Feasibility of the Unfeasible or Old Ideas Brewed New (T Vamos)
Gerald Roth. Department of Electrical Engineering and Computer Science School of Engineering Vanderbilt University Nashville, TN j.roth@vanderbilt.
Gerald Roth Department of Electrical Engineering and Computer Science School of Engineering Vanderbilt University Nashville, TN [email protected] Education Ph.D., Computer Science, Rice University,
DANIELA VALDEZ-JASSO RESEARCH INTEREST
DANIELA VALDEZ-JASSO 3314 Pollock Place Apt #3 Raleigh NC 27607 (919) 271 0508 [email protected] http://www4.ncsu.edu/~dvaldez RESEARCH INTEREST Mathematical modeling of physiological systems. Biomechanical
Curriculum Vitae CODY B. COX
1 Curriculum Vitae CODY B. COX Assistant Professor Department of Behavioral Science University of Texas at Brownsville/Texas Southmost College 80 Fort Brown Brownsville, TX 78526 956-882-7992 [email protected]
Department of Industrial and Information Management
Department of Industrial and Information Management Web site:http://www.iim.ncku.edu.tw/main.php Phone:886-6-2757575-53100 Fax:886-6-2362162 E-MAIL:[email protected] BRIEF HISTORY Department of
Z H O N G J U ( J O H N ) Z H A N G
EDUCATION Z H O N G J U ( J O H N ) Z H A N G Associate Professor of Operations and Information Management School of Business, University of Connecticut Phone: 860 486-0660 Fax: 860 486-4839 Email: [email protected]
Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927
Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927 Richardson, TX 75080 Email: [email protected] Education: The University of Texas, Austin, TX, USA Jun. 2003 May 2006 Ph.D.,
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
CURRICULUM VITA BYUNGCHAE JIN
CURRICULUM VITA BYUNGCHAE JIN University of Maryland 3330J Van Munching Hall College Park, 20742 USA Phone: 240-994-0216 E-mail: [email protected] EDUCATION 2006~2011 (expected) University of Maryland,
CURRICULUM VITAE. Associate Professor, University of Arizona South, July 2009 Present
CURRICULUM VITAE Chronology of Education Ph.D., Computer Science, Brigham Young University, August 2003. Dissertation: Source Discovery and Schema Mapping for Data Integration. Advisor: David W. Embley.
A Survey on Bilingual Teaching in Higher Education Institute in the Northeast of China
ISSN 1798-4769 Journal of Language Teaching and Research, Vol. 1, No. 4, pp. 353-357, July 2 2 ACADEMY PUBLISHER Manufactured in Finland. doi:.44/jltr.1.4.353-357 A Survey on Bilingual Teaching in Higher
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected]
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected] Education Ph.D. in Computer Science, University of New Orleans, 2009. Dissertation Topic: Advanced Techniques for Improving the
Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6
Dr Christos Anagnostopoulos 1. Education Ph.D. in Computer Science Department of Informatics & Telecommunications, National and Kapodistrian University of Athens, July 2008 Dissertation: Pervasive and
Ali Ebnenasir. Department of Computer Science, Michigan Technological University.
Ali Ebnenasir 221 Rekhi Hall E-Mail: [email protected] Department of Computer Science Phone: 906-487-4372 Michigan Technological University Fax: 906-487-2283 Houghton MI 49931 http://www.cs.mtu.edu/~aebnenas
