本週邀請到美國的吳士駿 教授 / Professor S. Felix Wu (加州大學戴維斯分校 工學院學術副院長/Professor of Computer Science and Associate Dean of Academic Personnel and Research, College of Engineering, at UC Davis.)，前來進行演講。
吳士駿教授為東海大學校友，1995年獲得美國哥倫比亞大學資訊工程博士。1995年任教於美國北卡州立大學資工系，2000年轉任教於加州大學戴維斯分校， 2007 為該校資工系教授，現為工學院學術副院長。
吳教授主要專長在資訊安全、社群網路與未來網際網路，在資訊科學與工程領域的傑出表現，發表超過200篇論文，榮獲許多國際重要獎項肯定IEEE/IFIP DSOM 與ACM SIGCOMM CCR最佳論文獎，並擔任ACM Transaction on Internet Technologies 、Computer Networks、Computers and Security國際頂尖期刊主編與副主編。吳教授並獲聘為RAID (Recent Advances in Intrusion Detection) 指導委員會委員、IEEE/IFIP DSOM、IEEE IPOM、IEEE ICDCSA 、ARO (US Army Research Office)議程主席、Blekinge Tekniska Högskola, Karlskrona瑞典大學客座教授。他主持多項大型研究計畫，包含DoD/US Army Cyber Security CRA(為期十年、經費達4,000萬美金)，NSF FIND (Future Internet Design)， GENI (Global Environment for Network Innovation), DSL (Davis Social Links)等計畫；並擔任產業界IntruVert 、 McAfee、 Intel、台灣工研院、台灣ISSC/ALinks (創傑科技)顧問。他指導碩博士學生眾多服務於美國著名大學或國際資訊大廠，如Google、Amazon、Facebook、LinkedIn、AirBnB、Cisco等。機會難得，敬請踴躍出席。
Bio:Prof. S. Felix Wu has been doing “experimental” system research, i.e., building prototype systems to justify and validate novel architectural concepts. Since 1995, he and his students/postdocs have built many experimental systems in the areas of fault tolerant network, IPSec/VPN security policy, attack source tracing, wireless network security, intrusion detection and response, visual information analytics, and, more recently, future Internet design. An article titled “Networking: Four ways to reinvent the Internet" published in Nature 463 (February 3rd, 2010, by Katharine Gammon) provided a brief but very nice cover about his primary thought on a Social-network-based future Internet architecture. As a computer scientist, he strongly believes that thoroughly considering the factor of human relationships and social community is necessary for any IT innovation. Therefore, his primary research objective, before he retires, is to help and contribute to the information technology advancement that would truly help our human society. As an initial step, he recently released the SINCERE (Social Interactive Networking and Conversation Entropy Ranking Engine) search engine under http://www.sincere.se, which is trying to help our Internet society to discover “interesting/unusual" discussions. Prof. Wu received his BS from Tunghai University, Taiwan, in 1985, both MS and PhD from Columbia University in 1989 and 1995, all in Computer Science. He has about 170+ academic publications, which means that he should probably focus much more on the depth and quality. He is currently Professor of Computer Science at UC Davis.
Title:Analyzing Online Social Interactions for Cyber Security, Framing, and Network Interference
The popularity of social media systems such as Facebook or Twitter provides us an opportunity for a global, large-scale data analytic study regarding both people and the content triggering their interactions. While this trend enables us to explore social sciences computationally, it has also inspired computer scientists to adopt ideas from social sciences into the fundamentals of information processing. In this talk, as a computer scientist myself, I like to articulate this linkage between social sciences and computer science by showing three sample applications, cyber security, framing, and network interference. First, for cyber attacks, I will present our latest results in analyzing the spread of malicious URLs on social media systems in the context of Facebook public pages. We are particularly interested in answering questions such as “why, at this time, did this group of attacker accounts, launch this malicious URL under this page or this post?" The second issue is to study framing in the context of Fake/incomplete information with the possibility of intentional manipulation under certain important events. Third, we will discuss is under the general theme of interference between the social interactions among Social Media system users and the system artifacts being introduced, intentionally or unintentionally, by the service providers. As an example, we will show a behavioral analysis of, possibly, a state-sponsored electronic army against domestic revolution forces.