As a follow-up to last year’s post, a quick personal note on my scholar profile. At the end of January 2017, my publications reached 700 citations according to Google scholar (vs. 500 at this time last year). Google scholar currently lists 43 publications (vs 22 last year, most peer-reviewed), and one US patent. Our first GPS paper currently has 138 cites, and the Wi-Fi localization paper also crossed the 100 cite threshold with total of 110 cites. My h-index has gone down to 11 due to some removal of cites (I assume).
Semantic scholar lists my profile with 1008 cites. They seem to extrapolate yearly cites. They also indicate how many papers were strongly influenced by my work (7), which seems like a nice feature.
Other numbers for 2016: Github lists 807 commits to repositories. I received 16,623 mails on my university account (after removal of spam). Per working day, that would make around 64 mails. I sent 4,400 mails (18 per working day). Both numbers are quite close to my 2015 statistics, so at least it’s not getting worse.
I am in the TPC of ESORICS 2017, and the call for papers has been released. The conference will be held 11-15 September in Oslo.
ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development.
Paper submission deadline: April 19
I am involved in designing SUTD’s upcoming Masters’ in Security by Design (MSSD) Program. This will be ISTD’s first Masters’ program, the start is scheduled to be in September 2017. Applications can be submitted now on our website linked above. About the program:
The MSSD programme is one-of-a-kind in that it focuses on bringing cybersecurity at the design stage of critical infrastructure and enterprise networks. This focus enables the training of a special type of engineer who can not only contribute to the security of organizations that do online business, but also to the security of large scale public infrastructures such as power grid, water treatment and distribution, transportation, and oil and natural gas processing.
More information can be found here.