Prof. Guang Gong

  • Email:
  • Phone: (519) 888-4567 x 35650
  • Fax: (519) 746-3077
  • Office: EIT 4158

Research Interest

  • Sequences, cryptography and network security

Teaching

  • Winter 2015

    • ECE 409 Cryptography and System Security [Syllabus]
      • Office hour: 9:00-10:00am, Wednesdays
    • ECE 628 Computer Network Security [Syllabus]
      • Office hour: 3:00-4:00pm, Thursdays
  • Other courses

    • ECE 316 Probability Theory and Random Processes: Winter 2001, Spring 2001, Winter 2002
    • ECE 318 Analog and Digital Communications: Winter 2013, Fall 2007, Fall 2005, Fall 2004
    • ECE 411 Digital Communications: Spring 2012, Spring 2009, Spring 2008, Spring 2006, Spring 2005, Spring 2003, Spring 2002
    • ECE 419 Communication System Security: Spring 2012
    • ECE 493 Topic 10 Communication Systems Security: Winter 2009
    • ECE 710 Topic 4 Sequence Design and Cryptography: Winter 2012, Spring 2009, Spring 2008, Fall 2005, Fall 2004, Fall 2003, Winter 2003, Spring 2002
    • ECE 710 Topic 21 Communication Security: Spring 2013
    • ECE 716: Spring 2001
    • EE 599 Signal Design with Good Correlation: Co-instructor with Professor Solomon Golomb at USC, Spring 2007
    • Short Course on Design of Pseudo-random Sequence Generators: at Ruhr-Universitaet Bochum, Germany. Lecture 1 (Dec. 10, 2002), Lecture 2 (Dec. 17, 2002)
    • C&O 739x Sequence Analysis, Winter 1999, Lecture Notes on Sequence Design (C&O 739x, 1999)
  • 4YDP Supervised
  • How to write research articles using LaTeX

    The first file is a LaTeX format for writing research papers. I have indicated how to change width of pages in the LaTeX file and attached two PDF files: one is a wide style and the other is narrow.

    The second file is to show how to insert figures, for which the two figures are drawn by xfig. You need to download the following files.

Research

Academic Activities

  • Research Team
  • Professional Services
    • Organizer of Technical Conferences

      • General Chair for First International Workshop on Security and Privacy in Machine-to-Machine Communications, October 29, 2014, San Francisco, CA, USA (in conjunction with IEEE Communication and Network Security (CNS) 2014)
      • General chair of International Conference on SEquences and Their Applications (SETA 2012), June 4-8, 2012, University of Waterloo, Waterloo, Canada
      • Program co-chair of the 11th International Conference on Cryptology in India (Indocrypt 2010), December 13-15, Hyderabad, India
      • Program co-chair of The Workshop on Selected Areas in Cryptography (SAC) 2010, August 12-13, 2010, University of Waterloo, Ontario, Canada
      • Co-organizers of the Workshop on Sequences, Subsequences and Consequences, May 31-June 2, 2007, University of Southern California, Los Angeles, California, USA
      • Program co-chair of the International Conference of Sequences and their Applications 2006 (SETA'06), September 24-28, 2006 Beijing, China
    • Technical Program Committee Member

      • IEEE Global Communications Conference, Exhibition and Industry Forum (GLOBECOM)- Communications and Information System Security Symposium (CISS) 2015, December 6-10, 2015, San Diego, USA
      • The eighth International Conference on Sequences and Their Applications (SETA 14), November 24-28, 2014, Melbourne, Australia
      • IEEE Conference on Communications and Network Security (CNS 2014), October 29-31, 2014, San Francisco, CA, USA
      • IEEE Conference on Communications and Network Security (CNS 2015), October 28-30, 2015, Florence, Italy
      • The 21st International Conference on Selected Areas in Cryptography (SAC 2014), August 14-15, 2014, Concordia University, Montreal, Quebec, Canada
      • The 2014 IEEE International Symposium on Information Theory (ISIT 2014), June 29-July 4, 2014, Honolulu
      • IEEE International Conference on Communications (ICC 2014), June 10-14, 2014, Sydney, Australia
      • The 8th International Workshop on Coding and Cryptography (WCC 2013), April 15-19, 2013, Bergen, Norway
      • The 20th International Conference on Selected Areas in Cryptography (SAC 2013), August 14-16, 2013, Simon Fraser University, Canada
      • The 19th International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2013), December 1-5, 2013, Bangalore, India
      • The Sixth International Workshop on Signal Design and its Applications in Communications (IWSDA 2013), October 27-November 1, 2013, Tokyo, Japan
      • The 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), June 25-28, 2013, Banff, Alberta, Canada
      • The 6th International Conference on Cryptology in Africa (Africacrypt 2013), June 22-24, 2013, Cairo, Egypt
      • The 13th Canadian Workshop on Information Theory (CWIT 2013), June 18-21, 2013, Toronto, Ontario, Canada
      • IEEE Global Communications Conference, Exhibition and Industry Forum (GLOBECOM)-Communications and Information System Security Symposium (CISS) 2013, December 9-13, Atlanta, GA, USA
      • IEEE International Conference on Communications (ICC) - Communication and Information Systems Security Symposium (CISS) 2013, June 9-13, 2013, Budapest, Hungary
      • The International Conference of SEquences and their Applications (SETA 2012), June 4-8, 2012, University of Waterloo, Waterloo, Canada
      • Conference on Selected Areas of Cryptography (SAC) 2012, August 16-17, 2012, Windsor, Ontario, Canada
      • Conference on Selected Areas of Cryptography (SAC) 2011, August 11-12, 2011, Ryerson University, Toronto, Ontario, Canada
      • The 7th International Workshop on Coding and Cryptography (WCC 2011), April 11-15, 2011, Paris, France
      • International Workshop on the Arithmetic of Finite Fields (WAIFI) 2012, July 16-19, 2012, Bochum, Germany
      • The 19th International Workshop on Fast Software Encryption (FSE 2012), March 19-21, 2012, Washington DC, USA
      • IEEE Global Communications Conference, Exhibition and Industry Forum (GLOBECOM 2012) - Communications and Information System Security Symposium (CISS), December 3-7, 2012, Anaheim, CA, USA
      • IEEE International Conference on Communications (ICC 2012) - Communication and Information Systems Security Symposium, June 10-15, 2012, Ottawa, Canada
      • IEEE International Symposium on Information Theory (ISIT) 2012, July 1-6, 2012, Cambridge, MA, USA
      • The 7th LCN Workshop on Security in Communications Networks (SICK), held in conjunction with IEEE LCN 2012, October 22-25, 2012, Clearwater, Florida, USA
      • The International Conference of SEquences and their Applications (SETA), SETA 2012 (June 4-8, 2012, University of Waterloo, Waterloo, Canada), SETA 2010 (Sept. 12-17, 2010, Telecom ParisTech, Paris, France), SETA 2008 (Sept. 14-18, 2008, Lexington, KY, USA), SETA 2006 (Sep. 24-28, 2006 Beijing, China), SETA 2004 (Oct. 25 - 29, 2004, Seoul, South Korea); SETA 2001 (May 13 - 17, 2001, Bergen, Norway)
      • Conference on Selected Areas of Cryptography (SAC), SAC 2012 (August 16-17, 2012, Windsor, Ontario, Canada), SAC 2011(August 11-12, 2011, Ryerson University, Toronto, Ontario, Canada), SAC 2010 (August 12-13, 2010, University of Waterloo, Ontario, Canada), SAC 2005 (August 11-12, 2005, Queen's University, Kingston, Ontario, Canada), SAC 2002 (August 15-16, 2002, St. John's, Newfoundland, Canada)
      • The 7th International Workshop on Coding and Cryptography (WCC), WCC 2011 (April 11-15, 2011, Paris, France), WCC 2009 (May 10 -15, 2009, Ullensvang, Norway), WCC 2007 (April 16-20, 2007, Versailles, France), WCC 2005 (March 14-18, 2005, Bergen, Norway), WCC 2003 (March 24-28, 2003, Versailles, France)
      • International Workshop on the Arithmetic of Finite Fields (WAIFI), WAIFI 2012 (July 16-19, 2012, Bochum, Germany), WAIFI 2010 (June 27-30, 2010, Istanbul, Turkey), WAIFI 2007 (June 21-22, 2007, Madrid, Spain)
      • The 19th International Workshop on Fast Software Encryption (FSE 2012), March 19-21, 2012, Washington DC, USA
      • IEEE Global Communications Conference, Exhibition and Industry Forum (GLOBECOM 2012) - Communications and Information System Security Symposium (CISS), GLOBECOM-CISS 2012 (Dec. 3-7, 2012, Anaheim, CA, USA), GLOBECOM-CISS 2010 (Dec. 6-10, 2010, Miami, USA)
      • IEEE International Conference on Communications (ICC 2012) - Communication and Information Systems Security Symposium, June 10-15, 2012, Ottawa, Canada
      • IEEE International Symposium on Information Theory (ISIT 2012), July 1-6, 2012, Cambridge, MA, USA
      • The 7th LCN Workshop on Security in Communications Networks(SICK), held in conjunction with IEEE LCN 2012, October 22-25, 2012, Clearwater, Florida, USA
      • Third International ICST Conference on Ad Hoc Networks (ADHOCNETS), ADHOCNETS 2011 (Sept. 21-23, 2011, Paris, France, ADHOCNETS 2010 (August 18-20, 2010, Victoria, British Columbia, Canada)
      • The 14th Information Security Conference (ISC 2011), October 26-28, Xi'an, China
      • The 10th International Conference on Cryptology in India (Indocrypt), Indocrypt 2009, December 13 - 16, 2009, New Delhi, India
      • IEEE Wireless Communications and Networking Conference (WCNC), WCNC 2009 (April 5-7, 2009, Budapest, Hungary), WCNC 2008 (March 31- April 3, 2008, Las Vegas, Nevada, USA)
      • The 18th Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes Symposium (AAECC), AAECC-18 (June 8 -12, 2009, Tarragona, Catalonia, Spain), AAECC-17 (Dec. 16-20, 2007, Indian Institute of Science, Bangalore, India)
      • The 5th Information Security Practice and Experience Conference (ISPEC), ISPEC 2009 (April 13-15, 2009, Xian, China), ISPEC 2008 (April 21-23, 2008, Sydney, Australia)
      • The 4th International Conference on Information Security and Cryptology (Inscrypt 2008), December 14 - 17, 2008, Beijing, China
      • The 11th Annual International Conference on Information Security and Cryptology, December 3-5, 2008, Seoul, Korea
      • Third International Workshop on Signal Design and Its Applications in Communications, September 23 -27, 2007, Chengdu, China
      • 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, July 1- 6, 2007, Bergen, Norway
      • The 2nd International Workshop on Security in Ubiquitous Computing Systems (SECUBIQ)'06, August 1-4, 2006, Seoul Korea
      • Asiacrypt'06, Shanghai, December 3-7, 2006, Shanghai, China
      • The 2nd Information Security Practice and Experience Conference (ISPEC 2006), April 11-14, 2006, Hangzhou, China
      • The 6th International Conference on Cryptology in India, December 10-12, 2005, Indian Institute of Science, Bangalore, India
      • SKLOIS Conference on Information Security and Cryptology (CICS 05), December 15-17, Beijing, China
      • The Annual International Workshop on Cryptology and Network Security (CNS): CNS 2001, September 26-28, 2001, Taipei, Taiwan; CNS 2002, September 26-28, 2002, San Francisco, California, USA; CNS 2003, September 24-26, 2003, Miami, Florida, USA
  • Editorship
    • Associate Editor for Sequences for IEEE Transactions on Information Theory (Dec. 2005 - Dec. 2008)
    • Associate Editor for for Journal of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences (2007-)
    • Area Editor for Information Security for for Journal of Computer Science and Technology (2007-2010)
    • Guest editor for Special Issue on Cryptography in Networks, International Journal of Security and Networks (IJSN), 2006.
    • Guest editor for for a special issue on Innovative Signal Transmission and Detection Techniques for Next Generation Cellular DS-CDMA System in EURASIP Journal on Wireless Communications and Networking, 2003.
  • A Brief Biography
    • Education

      • Ph.D., Electrical Engineering, September 1987 - July 1990, the Institute of Information Systems, University of Electronic Science and Technology of China (UESTC), Chengdu, China
      • M.S., Applied Mathematics, August 1982 - April 1985, the Institute of Information Security, Northwest Telecommunication Engineering Institute (renamed as Xi Dian University in 1989), Xian, China
      • B.S., Mathematics, May 1978 - January 1981, Department of Mathematics, Xichang Normal College, Xichang, China
    • Affiliations and Positions

      • Since July 2004, Professor, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada
      • September 2006 – August 2007: sabbatical leave, visiting the State Key Lab of Information Security at Chinese Academy of Sciences, UESTC, and Shanghai Jiao Tong University (China, Sep. - Dec. 2006), University of Southern California (hosted by Dr. S.W. Golomb, USA, Jan. - May 2007), INRIA (hosted by Dr. P. Charpin, France, June - July 2007)
      • September 2000 – June 2004: Associate Professor, Department of Electrical and Computer Engineering, cross appointed to the Department of Combinatorics and Optimization, the Center of Applied Cryptographic Research, University of Waterloo, Waterloo, Canada
      • November - December 2002: visiting Communication Security Lab, Dept. of Electrical Engineering and Information Sciences, Ruhr-Universitaet Bochum, 44780 Bochum, Germany (hosted by C. Paar and H. Dobbertin)
      • January 1999 - August 2000: Research Assistant Professor, the Center of Applied Cryptographic Research, Department of Combinatorics &Optimization, University of Waterloo, Waterloo, Canada
      • July 1998 - December 1998: Postdoc Visitor, the Center of Applied Cryptographic Research, Department of Combinatorics & Optimization, University of Waterloo, Waterloo, Canada
      • June 1996 - June 1998: Research Associate, the Communication Sciences Institute, Electrical Engineering Department, University of Southern California, Los Angeles, USA
      • May 1995 - June 1996: Visiting Associate Professor, Computer Networking Department, University of Missouri-Kansas City, Kansas City, USA
      • January 1993 - May 1995: Associate Professor, the Institute of Information Systems and the Department of Applied Mathematics, University of Electronic Science and Technology of China, Chengdu, China
      • October 1991 - October 1992: Postdoctoral Fellow, the Cryptography Research Group, Digital Communication Section, Fondazione Ugo Bordoni (FUB), Rome, Italy
      • May 1987 - January 1993 (except October 1991 - October 1992): Instructor, the Institute of Information Systems and the Department of Applied Mathematics, University of Electronic Science and Technology of China, Chengdu, China
      • May 1985 - May 1987: Teaching Assistant, the Department of Applied Mathematics, University of Electronic Science and Technology of China, Chengdu, China
    • Honors and Awards

      • The Premier's Research Excellence Awards, Ontario, Canada, 2001
      • Distinguished Professorship Award of the National Education Commission, China, 1994
      • Fondazione Ugo Bordoni Postdoctoral Fellowship, Italy, 1991
      • Outstanding Doctorate Faculty Award of Sichuan Province, China, 1991
      • Best Research Paper Award of the Chinese Institute of Electronics, China, 1984