Fang Class and Information Security Masters Forum



On April 11, 2025, the "Fang Class and Information Security Masters Forum" was grandly inaugurated at the Ho Yin Conference Center HG02 of the City University of Macau. This forum gathered top experts in the field of information security from across the strait and the three regions, focusing on three core issues: data security, network defense, and intelligent cybersecurity. It explored the trends of cutting-edge technologies and industrial applications. The forum was opened with welcome speeches by President Lau Chun of the City University of Macau and Academician Fang Binxing of the Chinese Academy of Engineering. President Lau extended sincere welcome to the guests and presented souvenirs on behalf of the university.

 

Vice President Tian Zhihong of Guangzhou University shared the outstanding performance of "Shield Cube" in the cybersecurity assurance of the 9th Asian Winter Games. The system, with its advanced technology, accurately identified and defended against various cyber attacks, building a solid security line for the event's network systems. During the event, it operated efficiently, ensuring the security of event data and network stability, providing strong cybersecurity support for the successful hosting of the Asian Winter Games, with remarkable effectiveness.

 

Professor Zou Deqing from Huazhong University of Science and Technology focused on the research of intelligent detection of software vulnerabilities. He pointed out that software vulnerabilities are like "time bombs" hidden in the digital world, which may trigger serious security crises at any time. He introduced the innovative results of his team in this field, achieving efficient and accurate detection of software vulnerabilities through intelligent algorithms and advanced models. This research builds a solid defense for software security and is expected to promote the software industry to a new stage of safety and reliability.

 

Professor Chen Xiaofeng from Xidian University shared the cutting-edge research on verifiable computation of databases and data streams. He emphasized the importance of ensuring the reliability of computation results in database and stream data processing. He introduced the innovative results of his team in this field, achieving reliable verification of computation results of databases and stream data through designing efficient verification mechanisms. This research provides a new paradigm for building a trustworthy computing environment and offers strong guarantees for data security and privacy protection.

 

Professor Huang Xinyi from Jinan University focused on the authorization of explainable artificial intelligence models based on training logs. He pointed out that the authorization of artificial intelligence models currently faces many challenges. By studying training logs, the model generation process can be deeply analyzed, providing a strong basis for model authorization. This research helps to clarify the intellectual property ownership of models and promotes the healthy development of the artificial intelligence industry, with important practical significance.

 

Professor Shen Jian from Zhejiang Sci-Tech University delivered a speech on side-channel analysis based on deep learning. He emphasized that in the field of cybersecurity, side-channel attacks are like invisible "ghosts" that are difficult to prevent. He elaborated on the unique advantages and applications of deep learning in side-channel analysis, uncovering key information in side channels by constructing deep neural network models. This research provides a new perspective for security defense and helps us better cope with the increasingly complex network threats.

 

Professor Guan Zhenyu from Beihang University explained the key technologies and typical applications of confidential computing. He introduced the key technologies of confidential computing in the field of data security, such as secure hardware and encryption algorithms. At the same time, he shared typical application cases of confidential computing in industries such as finance and healthcare, showcasing its huge potential in ensuring data privacy and security and promoting data sharing and circulation, bringing new ideas to industrial development.

 

After the forum concluded successfully, a lively exchange session took place on site. The participating experts not only engaged in in-depth academic exchanges but also had extensive discussions on the latest developments and trends in the field of information security. Academician Fang Binxing proposed new thoughts on cybersecurity defense during the discussion, and Vice President Zhou Wanlei also emphasized the importance of defense in information security, especially hardware security. The successful hosting of this Information Security Masters Forum not only provided a platform for exchange and cooperation among experts and scholars but also made an important contribution to the development of the information security field.