NOTES

Photo Gallery

VIDEOS

You are now here Home > Academics > Professors >

CS:CHEN, Aiguo

published: 2015-12-09 20:50:04       hits: 

name : CHEN, Aiguo Sex: Male phone: +8613688121185
email: agchend@gmail.com office-address: Main Building B1-205, Qingshuihe Campus
PH.D  Supervisor: No Master Supervisor: Yes
major: Computer Science and Technology
research interst: Cloud Computing, Computer and Network Security, Software Security 
Biography: Dr. Aiguo Chen received his Ph.D. degree from the Beijing University of Posts & Telecommunications (BUPT) in 2009, B.S. degree from the University Electronic Science and Technology of China (UESTC) in 2004. He joined the Advanced Secure Networking And Computing(SNAC) research group at Arizona State University in the US, during 2013-2014 as a visiting scholar. He has completed many projects from Province, Ministry and enterprises. More than 10 papers have been published home and abroad. In 2009, He joined UESTC as a teacher.
Education experience: Study Abroad: SNAC research group, Arizona State University in the US, Visiting Scholar
Research Topic: Virtualization and Cloud Computing
Date: Jan. 2013 – Jan. 2014

Ph. D. Degree: School of Computer Science, BUPT
Research Topic:  Electronic Transaction Security and Trusted Computing
Date: Jul. 2009 (Sep. 2004 – Jul. 2009)

B. Sc. Degree: School of Electronic Engineering, UESTC
Thesis: Analyses of Information Security Platform of Mobile Electronic Commerce
Date: Jul. 2004 (Sep. 2000 – Jul. 2004)
Selected Publications: [1] CHEN Aiguo. Research on Teaching System of Undergraduate Computer Experiment. Computer Education, 2010, vol 7, 117-119.
[2] CHEN Ai-guo, XU Guo-ai, and YANG Yi-xian. A Rating Dispersion Sensitive Trust Model for P2P Transactions. Journal of University of Electronic Science and Technology of China. 2010, 39(3):425-429.
[3] CHEN Aiguo, XU Guoai, YANG Yixian. A Cluster-Based Trust Model for Mobile Ad hoc Networks. WICOM 2008.
[4] Yang Gao, Fanfan Liu, Aiguo Chen, Miao Zhang. Statistical Analysis of Software Coupling Measurement Based on Complex Networks. FITME 2008.
[5] CHEN Aiguo, XU Guoai, YANG Yixian. Password Management Scheme Based on Trusted Computing.  Journal of Beijing University of Posts and Telecommunications. 2008, 31 (5): 85-88.
[6] Chen, H. and Luo, G. and Chen, A. and et al. A cyclic-translation-based grid-quadtree index for continuous range queries over moving objects. Communications in Computer and Information Science, 2011, vol 162 CCIS, 95-109.
Books: [1] XU Guoai and et al.. Network Security (Second Version). Press of Beijing University of
Posts and Telecommunications. 2007. Wrote the sixth chapter (Network
Communication security) and seventh chapter (Network Intruder Detecting).
[2] Cisco Systems, Next Generation Network Security. Press of Beijing University of Posts
and Telecommunications. 2007. Wrote the forth chapter (boundary security).