Name:Jiachun LI
Introduction:
Associate Professor
2010-2011 Visiting Scholar Computer Science Department , University of California, Los Angeles
1998-2003 Ph.D in Computer Architecture School of Computer Science & Technology,
Huazhong University of Science and Technology
1987-1991 B.S. in Computer Science College of Computer Science,Sichuan University
Address:
School of Computer Science & Engineering,
South China University of Technology,
Guangzhou Higher Education Mega Centre, Panyu District,
Guangzhou, P.R.China 510006
Phone:(086)020-39380288-3514
E-mail: jclee@scut.edu.cn
Research Interests:
Computer Network and Security, Recommendation based on Social Network and LBS, Privacy and Security in (Mobile) Social Networks
Awards and Honors:
2008-2009 Best Class Tutor Award, South China University of Technology
2005-2006 Best Class Tutor Award, South China University of Technology
2005-2006 Best Teacher Award, South China University of Technology
2004-2005 Best Class Tutor Award, South China University of Technology.
06/2005 Under my supervision, production titled integrated attack tools software developed by graduates won in the Guangdong district in the 1st excellent graduation thesis competition of computer specialty between Hong Kong Macau and Guangdong.
Selected Publications:
[1]Jiachun LI, Luyao YE., “Recommender System for Mobile Places Based on Android (V1.0)”,Computer Software Copyright Registration Certificate, No. 2017SR029829,June 2016
[2] Jiachun LI, Ling ZHANG., “The Research on Applying Network Processor to Parallel Intrusion Detection System“, Journal on Communications, supplement, Oct. 2006.
[3] Jiachun LI, Qiyu CHEN, Ling ZHANG, Lan LIU, “Study on High-speed Network Intrusion Detection Based on Network Processor”, Acta Scientiarum Naturalium Universitatis Sunyatseni, supplement, May 2006.
[4] Xiaolong DOU, Jiachun LI, Ling ZHANG, Shoubin DONG, “The Research and Implement of Transplant the Iptables/Netfilter to an IXP2400 Based Firewall System”, In the 2nd International Conference on Embedded Software and Systems (ICESS’05), Dec 2005.
[5] Jiachun LI, Zhitang LI, “Correlation Analysis for Distributed Intrusion Alert”, Journal of Computer Research & Development, Vol.41, No.11, 2004.
[6] Jiachun LI, Zhitang LI, “The Study of Plan Recognition Model for Intrusion Detection”, Journal of Huazhong University of Science and Technology (Nature Science), Vol.32, No.3, 2004.
[7] Jiachun LI, Zhitang LI, “Novel Model for Intrusion Detection”, Wuhan University Journal of Natural Sciences, Vol.8, No.1A, 2003.
[8] Zhitang LI, Jiachun LI, “The Application of Fuzzy Neural Networks to Intrusion Detection”, Mini-Micro System, vol.23, No.10, 2002.
[9] Jiachun LI, Jiangling ZHANG, “A New Method of Interface Adapting in Disk Array”, Journal of Computer Research & Development, Vol.37 supplement, 2000.
Technical Reports:
[1]Research and Application on Mobile Context-Aware Recommender System. By Luyao Ye. Master’s thesis, South China University of Technology, April 2017
[2]Research on Location Privacy Protection Based on Semantic Diversity. By Weijie Zeng. Master’s thesis, South China University of Technology, June 2016
[3]Research and Implementation of Recommendation System Based on Mobile Environment. By Yuan Luo. Master’s thesis, South China University of Technology, April 2015
[4]Research and Implementation on the Surveillance Technology of Interest Flooding Attack based on Data Name. By Shuyuan Le. Master’s thesis, South China University of Technology, May 2014
[5]Research and Implement of Recommendation Algorithm based on Social Network Influence. By Huajie Huang. Master’s thesis, South China University of Technology, Dec 2013.
[6]Research of Collaborative Filtering Recommendation Algorithm based on Social Network. By Xiaowen Chen. Master’s thesis, South China University of Technology, Dec 2013.
[7]VoIP Traffic Identification Based on Symmetry and Segmentation Statistical Characteristic. By Hanke Yan.Master’s thesis, South China University of Technology, May 2010.
[8] Design and Realization of VoIP Traffic Identification System Based on Bayesian Algorithm. by Fanchao Zeng.Master’s thesis, South China University of Technology, June 2009.
[9] Haijun CHEN, Jiachun LI, Ling ZHANG, ”The Design of Virtual Firewall Based on VLAN Group Policy”, In the 2006 Graduate Symposium of South China University of Technology on Electronic and Information Engineering, Dec. 2006.