© Distribution of this video is restricted by its owner
Transcript ×
Auto highlight
Font-size
00:01 Hello everybody and welcome to my introduction violence, networking, signal processing and

00:08 lab. And my name is and can find my website and my life

00:13 at this location. And here is introduction overview about people in our

00:22 We currently have 11 PhD students and doc. And previously, since 2008

00:30 have 23 PhD students already graduated and master students. And also we have

00:37 former postdoc include one of them already actually final. And here is our

00:44 resources. We are mainly funded by National Science Foundation and also the military

00:51 discipline University of Research Initiative. And we were also supported by other resources

00:59 as called Qatar Gulf of Mexico Air and also by many kinds of industry

01:05 direct Energy center. Point several shell and advanced uh geophysics technology and for

01:17 . Missing from my point of Okay. The philosophy is that

01:21 This is the kind of buddha buddha , the biggest big buddha temple in

01:28 in Indonesia. And here this is buddha temple and we have the base

01:34 here which basically means teaching and in middle. Okay. They have this

01:39 in the middle. They have buddha then they are doing the meditation thinking

01:44 . And basically my job is to him And teach the students how to

01:49 the imagination so that they can achieve reason on the top. Okay.

01:54 reality. Okay, this is my PhD student and the Microsoft judge or

02:00 and I'm 29. And then my student is 46. I'm just

02:05 And we also do a lot of for this education And here is a

02:11 of my Cambridge University press textbook and also published many manuscript And here is

02:21 research concentration and uh for our lab uh my uh my identity is again

02:30 approach. So I try to keep of my research there and we have

02:35 lot of different type of game applying and beyond the game. We also

02:42 to catch up with a very hot for example, comparison thing and big

02:48 machine learning. We do the deep federal learning based in part non parametric

02:53 multi armed bandit problem. So for G 60 and beyond we do the

02:58 harvesting photo party to the millimeter wave cell back speaker IOT and also mobile

03:05 computing network virtualization and software defined Recently we also do the reconfigurable intelligence

03:12 and also okay this this is a this is the era access network Tv

03:19 satellite. And we recently we were working on the optimization, distribution,

03:27 um robust optimization. And also we recruiting a new student for quantum

03:33 And also we do some kind of and privacy. And here we have

03:39 device finger device identification with based non trust management, quickly detection, physical

03:47 security, prime user emulation attack. do the security and privacy application and

03:54 for smart grades. We have the data injection attack, ph D v

04:00 , distributed the micro control, renewable smart meter and demand side management basically

04:07 are smart smart grid power system And from my former student.

04:13 And after he graduated he posted on and he says theory is something we

04:19 why but it doesn't work and the practice is something work. But we

04:24 know why your research lab. We both. Nothing works and we don't

04:28 why. I'm just joking. And for our group. Okay.

04:33 we have many visitors and uh, we also taking any kind of adventure

04:40 after some deadline and for example, ball, dragon ball cutting,

04:46 voting, uh, artery and half marathon. So if you have

04:52 interest, please draw our group. you very

-
+