ӽ

ҳ
һ

The Zeroun's Meeting Initiative

Ŀ

Upcoming Seminar Reports
Ŀ

No. 2017-01 (Totally No. 71) Research On Social-Sensed Multimedia Computing (Mar 3rd, 2th Week, Spring, 2017, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Zhiyong Zhang)

Ŀ

No. 2017-02 (Totally No. 72) Seminar Title (Mar 17th, 4th Week, Spring, 2017, Kaiyuan Campus, Gongke 2#-521, Speaker: Kuoyuan Qiao)

Ŀ

Seminar Requirements & Appreciation Certificate
Ŀ

Every speaker does need to carefully prepare a slide of the academic report that is generally limited within 15-30 minutes, and then submit a tentative title and brief introduction of the report  to SIGDRM Chair Prof. Zhang, xidianzzy@126.com, 2-3 working days prior to the meeting.  The submitted introduction has at most 200 words,  and it is encouraged that the report sketch could be written in English.

Ŀ

The meeting Chairperson is responsible to arrange the meeting time schedule ASAP when receiving the speaker's application, at least 3 working days in advance, and then send a formal reply. Especially, Chairperson would directly invite a potential speaker when needed.

Ŀ

Each of speakers has capability of answering the audience's questions after finishing to present his/her report.

Ŀ

The audience has academic enthusiasm to give comments, questions and suggestions on some issues related the report, in order to launch a heat discussion. 

Ŀ

All speakers would be awarded as a reward with the certificate of appreciation as follows, specially designed by SIGDRM Chair. 

Ŀ

Academic Calendars Available Now

Ŀ

Past Seminar Reports
Ŀ

No.2016-32 (Totally No.70) An Alternating Direction Method with Continuation for Nonconvex Low Rank Minimization (Jan 5th, 18th Week, Spring, 2017, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Zhengfen Jin)

Ŀ

No.2016-31 (Totally No.69) Attributes-Based Encryption and Applications (Jan 5th, 18th Week, Spring, 2017, Kaiyuan Campus, Gongke 2#-521, Speaker: Jing Li)

Ŀ

No.2016-30 (Totally No.68) Chaos Theory and Its Applications on Cryptography (Dec 23th, 16th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Jing Li)

Ŀ

No.2016-29 (Totally No.67) Overall Introduction to CyVOD App Development (Dec 23th, 16th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Peining Shi)

Ŀ

No.2016-28 (Totally No.66) Methods for Parallel Algorithm Designing (Dec 8th, 14th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Fangyun Liu)

Ŀ

No.2016-27 (Totally No.65) Access Control Policy Verification (Dec 8th, 14th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Linqian Han)

Ŀ

No.2016-26 (Totally No.64) Searching for Connection Keywords of Encrypted Electronic Medical Records (Nov 25th, 12th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Lili Zhang)

Ŀ

No.2016-25 (Totally No.63)  Digital Rights Management Technology for Animation Pictures (Nov 11th, 10th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Ling Peng)

Ŀ

No.2016-24 (Totally No.62)  Recommendation System Evaluation (Nov 11th, 10th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Changwei Zhao)

Ŀ

No.2016-23 (Totally No.61) Online Social Networks-Oriented Crowd Computing Key Technologies Research and Application (Oct 28th, 8th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Xiaoxue Wang)

Ŀ

No.2016-22 (Totally No.60) Research and Application on Distributed Parallel Crawler Technology Based on Crowd Collaboration (Oct 28th, 8th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Fangyun Liu)

Ŀ

No.2016-21 (Totally No.59) Trust Computing for Mobile Social Networks (Oct 14th, 6th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Kuoyuan Qiao)

Ŀ

No.2016-20 (Totally No.58) Attributes-Based Cryptographic Technology and Application (Oct 14th, 6th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Cheng Li)

Ŀ

No.2016-19 (Totally No.57) Discuss on Machine Learning Methods (Sep 30th, 4th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Junyi Du)

Ŀ

No.2016-18 (Totally No.56) Attribute-based Access Control for Multimedia Social Networks (Sep 30th, 4the Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Linqian Han)

Ŀ

No.2016-17 (Totally No.55) Situational Analytics for Social Media Networks (Sep 14th, 2th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Ranran Sun)

Ŀ

No.2016-16 (Totally No.54) Social Media Platform Security and Trustworthiness Evaluation Method (Sep 14th, 2th Week, Fall, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Jing Wen)

Ŀ

No.2016-15 (Totally No.53) Cyber-Physical Systems based on Chaos Cryptography (Jul 7th, 19th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Jian Wang)

Ŀ

No.2016-14 (Totally No.52) Something about Trust in OSNs (Jul 7th, 19th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Fei Xiang)

Ŀ

No.2016-13 (Totally No.51) Affective Analytics Model for Text ((Jun 23th, 17th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Junyi Du)

Ŀ

No.2016-12 (Totally No.50) Contour Extraction Algorithm based on Color and Line (Jun 23th, 17th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Ling Peng)

Ŀ

No.2016-11 (Totally No.49) Affective Analysis and Deep Learning (Jun 3rd 14th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Cheng Li)

Ŀ

No.2016-10 (Totally No.48) A recommendation algorithm based on mixed factor matrix decomposition (Jun 3rd, 14th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Changwei Zhao)

Ŀ

No.2016-09 (Totally No.47) Research on Differential Privacy Protection Technology for Big Data Publication (May 20, extended to 12th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Kui Sun)

Ŀ

No.2016-08 (Totally No.46) Research and Application of Delegation Authorization in Multimedia Social Networks (May 20, extended to 12th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Weining Feng)

Ŀ

No.2016-07 (Totally No.45) Advance on CyVOD R&D (Apr 22th, 8th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Fangyun Liu)

Ŀ

No.2016-06 (Totally No.44) Security and Trust Signaling Theory (Apr 22th, 8th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Jing Wen)

Ŀ

No.2016-05 (Totally No.43) A Literature Survey on Crowd Computing  (Apr 6, 6th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Xiaoxue Wang)

Ŀ

No.2016-04 (Totally No.42) D-S Credential Theory (Apr 6, 6th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Kuoyuan Qiao)

Ŀ

No.2016-03 (Totally No.41) Hidden Markov Model (Mar 25, 4th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Ranran Sun)

Ŀ

No.2016-02 (Totally No.40) Attribute-Based Access Control for Online Multimedia Social Network (Mar 25, 4th Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Linqian Han)

Ŀ

No.2016-01 (Totally No.39) Potential New Direction of Social Network Security and Trustworthiness (Mar 11 2016, 2nd Week, Spring, 2016, Kaiyuan Campus, Gongke 2#-521, Speaker: Prof. Zhiyong Zhang @SEL, ISU, America)

Ŀ

No.2015-33 (Totally No.38) Sentimental Analysis based on Movies Reviews (Jan 7 2016, 18th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Junyi Du)

Ŀ

No.2015-32 (Totally No.37) Machine Learning for Big Data (Jan 7 2016, 18th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Fangyun Liu )

Ŀ

No.2015-31 (Totally No.36)  Online Social Networks and Worm (Dec 25th, 16th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Kuoyuan Qiao)

Ŀ

No.2015-30 (Totally No.35)  Hash Construction based on Cascaded Chaos (Dec 25th, 16th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Fei Xiang)

Ŀ

No.2015-29 (Totally No.34) Discussions on Image Proceeding (Dec 11th, 14th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Ling Peng)

Ŀ

No.2015-28 (Totally No.33) The Delegation Subsystem Design of CyVOD (Dec 11th, 14th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Cheng Li)

Ŀ

No.2015-27 (Totally No.32) Discussions on Access Control (Nov 25th, 12th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Jian Wang)

Ŀ

No.2015-26 (Totally No.31) How to apply for patent? (Nov 25th, 12th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Tao Huang)

Ŀ

No.2015-25 (Totally No.30) CyVOD Design (Nov 13th, 10th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Xiaoxue Wang)

Ŀ

No.2015-24 (Totally No.29) Matrix Decomposition Algorithms and Applications (Nov 13th,, 10th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Changwei Zhao)

Ŀ

No.2015-23 (Totally No.28)  Trust Enhancement Theory and Methods for Online Social Networks (Oct 30, 8th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Jing Wen)

Ŀ

No.2015-22 (Totally No.27) Attribute-Based Access Control for Multimedia Social Networks (Oct 16th, 6th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Linqian Han)

Ŀ

No.2015-21 (Totally No.26) Decision Tree Classification Algorithms (Oct 16th, 6th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Kui Sun)

Ŀ

No.2015-20 (Totally No.25) Improved Collaborative Filtering Algorithm for Multimedia Social Networks (Sep 30th, 4th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Jie Wang)

Ŀ

No.2015-19 (Totally No.24) Situation Aware Services Update By Using Situ Theory (Sep 30th, 4th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Ranran Sun)

Ŀ

No.2015-18 (Totally No.23) Delegation Model for Multimedia Social Networks (Sep 30th, 4th Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Weining Feng)

Ŀ

No.2015-17 (Totally No.22) Security, Trust and Risk: from Digital Rights Management to Multimedia Social Networks (Sep 15, 2nd Week, Fall, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Prof. Zhiyong Zhang @SEL, ISU, America)

Ŀ

No.2015-16 (Totally No.21) The Application of Chaos Theory  on Images Cryptography (Jul 10, 18th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Ling Peng)

Ŀ

No.2015-15 (Totally No.20) A Secure Blind Signature Based on Quantum Cryptography  (Jul 10, 18th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Junyi Du)

Ŀ

No.2015-14  (Totally No.19) The First Experience of ISU (Jun 26,16th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Prof. Zhiyong Zhang)

Ŀ

No.2015-13  (Totally No.18) A Quantitative Model and Analysis of Information Confusion in Social Networks (Jun 26, 16th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Fangyun Liu)

Ŀ

No.2015-12  (Totally No.17) Personalized Recommendation Algorithm for Multimedia Social Networks (Jun 11, 14th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Jie Wang)

Ŀ

No.2015-11  (Totally No.16) Multimedia Social Networks-VOD Designing and Deployment (Jun 11, 14th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Ranran Sun)

Ŀ

No.2015-10  (Totally No.15) Study on Differential Privacy Protection (Jun 1, 13th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Kui Sun, Postponed)

Ŀ

No.2015-09  (Totally No.14) Efficient and flexible multi-field conjunctive keyword search over encrypted electronic medical records (Jun 1, 13th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Invited Speaker: Lili Zhang, Postponed)

Ŀ

No.2015-08 (Totally No.13) A Novel Access Control Model for Online Social Networks (May 15th, 10th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Linqian Han)

Ŀ

No.2015-07 (Totally No.12) Privacy Protection and Machine Learning (Apr 30, 8th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Dr. Changwei Zhao)

Ŀ

No.2015-06 (Totally No.11) Social Networks Usage Control for Privacy Protection (Apr 30, 8th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Supervisor Jian Wang)

Ŀ

No.2015-05 (Totally No.10) Study on Temporal Logics (Apr 17, 6th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Weining Feng)

Ŀ

No.2015-04 (Totally No.9) Study on Chaotic Cryptography Issues (Apr 17, 6th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Supervisor Fei Xiang)

Ŀ

No.2015-03 (Totally No.8) Fundamental Signaling Theory (Apr 3, 4th Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Jing Wen)

Ŀ

No.2015-02 (Totally No.7) Related Issues on Information Propagation in Social Networks (Mar 22, 2nd Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Hanman Li)

Ŀ

No.2015-01 (Totally No.6) Trusted Connection Protocol for Cloud Security and Its Formalism (2nd Week, Spring, 2015, Kaiyuan Campus, Gongke 2#-521, Speaker: Yanan Chang)

Ŀ

No.2014-01 (Totally No.5) Information Security Technologies in Big Data Systems (Nov 7, 2014, AM 10:00~11:30, Kaiyuan Campus, Gongke Building 2#-610, Speaker: Prof. Jianfeng Ma)

Ŀ

No.2012-01 (Totally No.4) Cryptographic Security for Network Environment  (Mar 5, 2011, PM 3:00~5:30, Xiyuan Campus, South 9 Music Hall, Speaker: Prof. Zhenfu Cao)

Ŀ

No.2011-03 (Totally No.3) Research on XMLTechnologies (XrML & ODRL) for DRM (Mar 11, 2011, PM 3:00~5:30, Xiyuan Campus, 10#-509, Speaker: Danmei Niu)

Ŀ

No.2011-02 (Totally No.2) Research on Trust in Small-World Networks (Mar 5, 2011, PM 3:00~5:30, Xiyuan Campus, 10#-509, Speaker: Shuquan Chen)

Ŀ

No.2011-01 (Totally No.1)Research on Security and Privacy in Social Network Services (Feb 27,2011, PM 3:00~5:30, Xiyuan Campus, 10#-509, Speaker:  LijunYang)

Ŀ Photos @ A Glance

Ŀ Thank all speakers so much for your contributions! Looking forward to your "talk show" on The Zeroun's Meeting. SIGDRM Chair

ҳ | ŶӼ | ȫԱ | оŶ | Ŷ | з | ʾϵͳ | Эͬ | а | ӽ | CyVOD