LI Jiachun
 
time: 2017-06-25

Name:Jiachun LI


Introduction:

Associate Professor

2010-2011 Visiting Scholar              Computer Science Department , University of California, Los Angeles

1998-2003 Ph.D in Computer Architecture  School of Computer Science & Technology, 

                                                               Huazhong University of Science and Technology

1987-1991 B.S. in Computer Science      College of Computer Science,Sichuan University


Address:

School of Computer Science & Engineering,

South China University of Technology,

Guangzhou Higher Education Mega Centre, Panyu District,

Guangzhou, P.R.China 510006

Phone:(086)020-39380288-3514

E-mail: jclee@scut.edu.cn

Research Interests

Computer Network and Security, Recommendation based on Social Network and LBS, Privacy and Security in (Mobile) Social Networks

Awards and Honors

2008-2009 Best Class Tutor Award, South China University of Technology

2005-2006 Best Class Tutor Award, South China University of Technology

2005-2006 Best Teacher Award, South China University of Technology

2004-2005 Best Class Tutor Award, South China University of Technology.

06/2005  Under my supervision, production titled integrated attack tools software developed by graduates won in the Guangdong district in the 1st excellent graduation thesis competition of computer specialty between Hong Kong Macau and Guangdong.


Selected Publications

[1]Jiachun LI, Luyao YE., “Recommender System for Mobile Places Based on Android (V1.0)”,Computer Software Copyright Registration Certificate, No. 2017SR029829,June 2016

[2] Jiachun LI, Ling ZHANG., “The Research on Applying Network Processor to Parallel Intrusion Detection System“, Journal on Communications, supplement, Oct. 2006.

[3] Jiachun LI, Qiyu CHEN, Ling ZHANG, Lan LIU, “Study on High-speed Network Intrusion Detection Based on Network Processor”, Acta Scientiarum Naturalium Universitatis Sunyatseni, supplement, May 2006.

[4] Xiaolong DOU, Jiachun LI, Ling ZHANG, Shoubin DONG, “The Research and Implement of Transplant the Iptables/Netfilter to an IXP2400 Based Firewall System”, In the 2nd International Conference on Embedded Software and Systems (ICESS’05), Dec 2005.

[5] Jiachun LI, Zhitang LI, “Correlation Analysis for Distributed Intrusion Alert”, Journal of Computer Research & Development, Vol.41, No.11, 2004.

[6] Jiachun LI, Zhitang LI, “The Study of Plan Recognition Model for Intrusion Detection”, Journal of Huazhong University of Science and Technology (Nature Science), Vol.32, No.3, 2004.

[7] Jiachun LI, Zhitang LI, “Novel Model for Intrusion Detection”, Wuhan University Journal of Natural Sciences, Vol.8, No.1A, 2003.

[8] Zhitang LI, Jiachun LI, “The Application of Fuzzy Neural Networks to Intrusion Detection”, Mini-Micro System, vol.23, No.10, 2002.

[9] Jiachun LI, Jiangling ZHANG, “A New Method of Interface Adapting in Disk Array”, Journal of Computer Research & Development, Vol.37 supplement, 2000.

Technical Reports:

[1]Research and Application on Mobile Context-Aware Recommender System. By Luyao Ye. Master’s thesis, South China University of Technology, April 2017

[2]Research on Location Privacy Protection Based on Semantic Diversity. By Weijie Zeng. Master’s thesis, South China University of Technology, June 2016

[3]Research and Implementation of Recommendation System Based on Mobile Environment. By Yuan Luo. Master’s thesis, South China University of Technology, April 2015

[4]Research and Implementation on the Surveillance Technology of Interest Flooding Attack based on Data Name. By Shuyuan Le. Master’s thesis, South China University of Technology, May 2014

[5]Research and Implement of Recommendation Algorithm based on Social Network Influence. By Huajie Huang. Master’s thesis, South China University of Technology, Dec 2013.

[6]Research of Collaborative Filtering Recommendation Algorithm based on Social Network. By Xiaowen Chen. Master’s thesis, South China University of Technology, Dec 2013.

[7]VoIP Traffic Identification Based on Symmetry and Segmentation Statistical Characteristic. By Hanke Yan.Master’s thesis, South China University of Technology, May 2010.

[8] Design and Realization of VoIP Traffic Identification System Based on Bayesian Algorithm. by Fanchao Zeng.Master’s thesis, South China University of Technology, June 2009.

[9] Haijun CHEN, Jiachun LI, Ling ZHANG, ”The Design of Virtual Firewall Based on VLAN Group Policy”, In the 2006 Graduate Symposium of South China University of Technology on Electronic and Information Engineering, Dec. 2006.