Introduction to the research direction of Shanghai Jiaotong University's cybersecurity research

I haven't updated the blog for a long time, because the official account is also to be operated. In addition, the school is now open. I have been writing NP learning things before. Now NP has little time to read it, so the blog is basically stopped. However, I feel that I should pick it up and continue to update. On the one hand, it is to communicate with friends in related majors, and on the other hand, it is to force myself to learn. School is almost a month away now. If there are no surprises, it should be updated frequently. However, today’s article is not a technical article. When I was organizing my phone photo album today, I found that I took a lot of introductions of some research directions at the tutor mutual election meeting when we started school. I will show them today. Sorting it out can help the friends who want to take the Internet Security of Jiaotong University in the future, and get to know the Internet Security College of Jiaotong University in advance. Of course, what I may not say is very complete. You can refer to it in conjunction with the official website of the School of Internet Security of Jiaotong University.

Overview of School of Cybersecurity, Jiaotong University

  • Established in 2000, it is the first college-organized cyber security talent training base in China
  • Renamed to Cyberspace Security Academy in 2016
  • Approved as the National "First-class Cybersecurity Academy" in 2019
  • The first-level discipline of cyberspace security is No. 1 in China (ranking of Shanghai Branch, October 2019)

figure 1

Research direction

  • Blockchain and financial security
  • Big data security
  • Software and system security
  • Artificial intelligence security
  • Cyber ​​security defense
  • Cryptography and Engineering

Laboratory introduction

  • Cryptography and Computer Security Laboratory (Professor Gu Dawu responsible)
    research directions include:
    • Cryptography
    • Software security
    • Hardware security
    • cyber security
  • The
    research directions of the Cryptanalysis and Big Data Security Laboratory (in charge of Professor Qiu Weidong) include:
    • Cryptanalysis/cryptographic engineering
    • Image video multimedia intelligent analysis/natural scene text processing technology
    • AI security and privacy protection
    • Financial big data analysis
    • Internet measurement technology
  • The
    research directions of the Network and System Security Laboratory (by Professor Xue Zhi) include:
    • Network penetration testing technology
    • Vulnerability mining and analysis
    • System security defense technology
    • Safety assessment and risk assessment
    • Internet content security technology
  • The
    research directions of the Mobile and Internet of Things Security Lab (researcher Wu Yue) include:
    • Post 5G mobile communication security
    • Internet of Vehicles Security
    • IoT security
    • Industrial control network security
    • Satellite network security
  • The
    research directions of the Information Security and Cognition Laboratory (in charge of Professor Jiang Xinghao) include:
    • Digital content intelligent analysis and recognition technology
    • Digital content forensics technology
    • Intelligent detection technology for image countermeasure data
    • Video steganography and steganalysis technology
    • Internet of Vehicles Information Security Detection Technology
  • The
    research directions of the Artificial Intelligence Security Research Laboratory (in charge of Professor Liu Gongshen) include:
    • The application of artificial intelligence in the security field: malicious code detection, etc.
    • The security of artificial intelligence itself: including deep learning framework security, data model security, learning algorithm security, etc.
  • The
    research directions of the Network and System Security Laboratory (in charge of Professor Li Xiaoyong) include:
    • Mass data storage system
    • Big data analysis of security incidents
    • Cloud computing and container technology
    • Threat Intelligence Analysis Technology

figure 2
image 3
Figure 4
Figure 5

Cyberspace Security Science and Technology Research Institute

Image 6
This research institute is a research institute that was separated from the original Net Security College in May 19th, he just said that, but when the exam enrollment is based on the Net Security College admissions, I didn't know that there was such a research when I applied for the exam. College, this has no effect on applying for the exam, and it has no effect on your choice of tutor. It is just a research institute in name. . .

Figure 7
Picture 8
This is a base of Jiaotong University Netan in Zhangjiang. It is said that it will be put into use by the end of this year. Maybe the students of Netan who will be enrolled next year may go to Zhangjiang to do scientific research. Maybe, just maybe. . . I don't know the specific situation. We are still on the main campus this year, which is here in Minhang. I personally feel that Minhang’s side is better, and the infrastructure is more comprehensive. Zhangjiang’s side may be more like the Institute of Chinese Academy of Sciences, not the environment I like too much. However, the accommodation conditions must be better. After all, the new building has a more spacious area, and the bedroom at the headquarters is really small. .

Guess you like

Origin blog.csdn.net/loveCC_orange/article/details/108894528