|
|
Visitor's name |
Institution
|
Research Field |
Period of visit |
Lectures |
1 |
Shen Bin, Lecturer |
Southeast University |
Differential Geometry |
2019.1.7-1.13 |
|
2 |
Xia Jian Kang, Assistant Professor |
Northwestern Polytechnical University |
Nonlinear Analysis and Differential Equations |
2019.1.12-1.25 |
|
3 |
Chen Hao, Professor |
Jinan University |
Geometry |
2019.1.13-1.19 |
|
4 |
Feng Ke Qin, Professor |
Tsinghua University |
Number theory, coding theory |
2019.1.13-1.17 |
|
5 |
Dong Chang Guang, PostDoc |
University of Maryland |
Power system |
2019.1.14-1.16 |
|
6 |
Li Ji You, Associate Professor |
Shanghai Jiao Tong University |
Combination and number theory |
2019.3.1-3.7 |
|
7 |
Cao Yong Lin, Professor |
Shandong University of Technology |
Coding theory and application |
2019.3.12-3.15 |
|
8 |
Gao Suo Gang, Professor |
Hebei Normal University |
Algebra and combination |
2019.3.15-3.21 |
|
9 |
Hou Bo, Associate Professor |
Hebei Normal University |
Algebra and combination |
2019.3.15-3.21 |
|
10 |
Lin Hui Qiu, Associate Professor |
East China University of Science and Technology |
Graph theory and its application |
2019.3.15-4.15 |
|
11 |
Zheng Da Bin, Professor |
Hubei University |
Coding |
2019.3.25-28 |
|
12 |
Gao Jian, Lecturer |
Shandong University of Technology |
Probability Theory and Mathematical Statistics |
2019.3.29-3.31 |
|
13 |
Zhang Zuo Bo, Associate Professor |
Hebei Normal University |
Graph theory and its application |
2019.4.7-4.21 |
|
14 |
Luo Jin Quan, Professor |
Huazhong Normal University |
Algebraic coding |
2019.4.8-4.13 |
|
15 |
Liu Hui Li, Professor |
Northeastern University |
Differential Geometry |
2019.4.8-6.30 |
|
16 |
Zhuang Jin Cheng , Associate researcher |
Institute of Information Engineering, Chinese Academy of Sciences |
Theoretical computer, algorithm number theory, cryptography |
2019.4.15-4.19 |
|
17 |
Feng Rong Quan, Professor |
Peking University |
Cryptography and information security |
2019.4.15-4.18 |
|
18 |
Ge Gen Nian, Professor |
Capital Normal University |
Combinatorial mathematics, coding cryptography |
2019.4.18-4.23 |
|
19 |
Zhang Jun, Lecturer |
Capital Normal University |
Probability Theory and Mathematical Statistics |
2019.4.23-4.30 |
|
20 |
Cao Yuan, Lecturer |
Shandong University of Technology |
Coding and information security |
2019.4.24-4.26 |
|
21 |
Zeng Xiang Yong, Professor |
Hubei University |
Cryptography |
2019.4.25-4.28 |
|
22 |
Wang Li Ping , Researcher |
Institute of Information Engineering, Chinese Academy of Sciences |
Password and encoding |
2019.5.9-5.15 |
|
23 |
Yuan Ping Zhi, Professor |
South China Normal University |
Number theory and its application |
2019.5.10-5.16 |
|
24 |
Gao You, Professor |
China Civil Aviation University |
Basic Mathematics |
2019.5.16-5.18 |
|
25 |
Yang Jian Bin, Associate Professor |
He Hai University |
Wavelet analysis and application, image processing |
2019.6.4-6.18 |
|
26 |
Liao Qun Ying, Professor |
Sichuan Normal University |
Coding and cryptography theory |
2019.6.10-6.15 |
|
27 |
Zhang Zhi Fang , Associate researcher |
Institute of Mathematics and Systems Science, Chinese Academy of Sciences |
Code, password |
2019.6.18 |
|
28 |
Shi Min Jia, Professor |
Anhui University |
Algebraic coding |
2019.6.21-6.28 |
|
29 |
Qu Long Jiang, Professor |
National Defense University |
Coded cryptography |
2019.6.24-6.29 |
|
30 |
Tang Xiao Hu, Professor |
Southwest Jiaotong University |
Coding theory, Information security |
2019.6.24-6.28 |
|
31 |
Cai Wen Rui, Professor |
University of Toronto |
Operator theory, Operator algebras, Matrix theory |
2019.7.28-8.4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|