Photo Gallery


You are now here Home > Academics > Professors >

CS:Mingyu Fan

published: 2015-12-09 20:57:00       hits: 

name : Mingyu Fan Sex: F phone:  
email: office-address: Main Building B1-102, QingShui Campus
PH.D  Supervisor: Y Master Supervisor: Y
major: Computer Science and Technology
research interst: Pattern Recognition,  Cryptography, Security Protocol, Network Application
Biography: Dr. M. Fan received her Ph.D. degree from the Southwest Jiaotong University in 1996, M.S. degree in 1985. She joined the State Key Laboratory of Microwave and Digital Communications, University of Tsinghua University, during 1999-2002 as a Post Doc. She has published more than fifty papers and edited 2 books. In 2002, She joined UESTC as a teacher
Education experience: Study Abroad: Computer Department, Queen's Univ.
Research Topic:  Cryptosystem Applied in Mobile
Date: Dec. 2004 – May. 2005
Ph. D. Degree: School of Computer Science, Southwest Jiaotong University
Research Topic: Study of Artificial Intelligence and its application in Cryptosystem
Date: Dec. 1993 (Jan. 1993 – Dec. 1996)
M. Sc. Degree: National Laboratory of Information Security,Beijing
Research Topic: Cryptography Thery
Date: Mar. 1985 (Sep. 1985 – Jul. 1987)
B.Sc. Department of Radio Engineering, Sichuan Universality
Research Topic: Electronics and Information Technology
Date: July 1982 (Sep. 1978 – July 1982)
Selected Publications: [1]***, Fan Mingyu, Integrity Measurement Model According to Needs Under Open Network Environment,JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT, 2011. 02
[2] ***, Jianping Li. A Subjective Trust Management Model Based on Certainty-Factor for MANETs. JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT, 2010. 03
[3] ***, Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks, OURNAL OF COMPUTER RESEARCH AND DEVELOPMENT,  No. 10, 2008
[4] ***, Fan Mingyu. Trust Model Based on Minimal Uncertainty Metric in Wireless Mesh Network. Journal of Software, 2008,19(1):116-124
[5] ***, Fan Mingyu. Resistant to Higher-order Side-channel Attack by Inserting Random Delay, Computer Engineering, 2008, Vol. 34

Books: Cryptography Theory and Technology,Tsinghua University Press,ISBN:9787302181958,2008
Network security protocol theory and technology,Tsinghua University Press,ISBN:9787302193005,2009