2009-08-06 Wen-Jun Gao CV
- 格式:pdf
- 大小:35.60 KB
- 文档页数:6
歌手权志龙个人资料权志龙(G-Dragon),1988年08月18日出生于韩国首尔,韩国歌手、BIGBANG队长兼Rapper。
是YG Entertainment 公司主要制作人之一。
2001年因参与特别企划专辑《大韩民国Hip-Hop Flex》而正式出道,2009年发行第一张专辑《Heartbreaker》,之后陆续推出专辑《ONE OF A KIND》和《COUP D'ETAT》。
2011年与崔胜铉组成GD&TOP限定组合。
在2013年MAMA颁奖晚会上,获得“年度最佳歌手”、“最佳男歌手”、“最佳舞蹈表演男歌手”、“最佳音乐录影带”奖项。
下面是店铺给大家带来的歌手权志龙的个人资料,欢迎阅读!歌手权志龙个人资料:一、歌手权志龙早年经历2001年加入YG娱乐公司接受训练。
2001年,YG娱乐公司以歌曲《我的年龄13岁》被YG娱乐公司收入其中,进入公司进行严格的训练。
2006年以组合BigBang的队长兼制作人的身份出道。
2006年,权志龙以YG推出的新人组合BigBang的队长兼制作人而正式出道。
2009年推出首张个人专辑《Heartbreaker》。
2009年8月18日,权志龙发行了第一张个人专辑《Heartbreaker》,该专辑发行后至12月,获2009年韩国唱片销量第一,并获得2009年MAMA颁奖典礼年度专辑大赏。
2012年发行第二张专辑《One of a kind》。
2012年9月15日,权志龙发行了第二张专辑《One of a kind》,该专辑位居专辑销量排行榜第一位,而且收录曲《那XX》的下载次数高达112万445次同样位居榜首。
二、歌手权志龙的演艺经历1993年,权志龙参演了儿童综艺节目《BOBOBO》;同年;参演了电影《太白山下》。
1994年,权志龙以小孩组合ROORA出道,并且登上了蚕室演唱会的舞台。
1996年到2000年期间,权志龙在SM公司当练习生学习舞蹈。
姓名性别年级专业班级手机QQ张昭男大三能动C7215829392996462021950熊冬冬男大三电子7113636811763350793879车斌男大二电测控8115029610370506584258康丽霞女大三化工7115829301526459881184黄英斐女大二计算机8415829630518384578466魏广福男研一计算机93213468837026513921794郭丽丽女大三ACCA7213991307455414833821孙嘉女大二ACCA8113689251193310067001潘文佳女大二ACCA8215809237342123562483王文海男大二自动化8515191438677562693834薛景安女大二计算机8315109233896965540937栾语女研二电气硕81915191439179277474343钟华剑男大一计算机9115209252805292042853黄磊男大二电测控8113892845307649059901任垚宇男大一能动9215029186694284987991田振寰男大二电子8315191572338794883866张伯伦男151********李岚清女大一计算机9115289379236908910016李孜骁大一能动9115209234009791669804李彦松男大二电子8115829687722290429514靳悦女大二中文8115102958313415668444李芳沛女大一微电9213572258643393255026谢琼男研一航天(研)159********赵渊男大一信计9115202994282420650748庆志鑫男大一信息9515332336585568861731樊同帅男大二材料8115102976835153228452刘欢欢女大二软件8113891963675493215997李盺怡女大二计算机8313402956958870187348班培志男大二机自13519110129425724980王庆磊男研一计算机932134688107596972745唐甜女研一艺设134********刘洋男大三核工7413991878549942449046高端峰男大三电信硕7215902957546493159342彭韫女研一系统9401520298949714079108黄莉女研一系统94013572531761373384102贾礼威男研一软件95913991866250317535350李佳丰男大三能动C7113571850551491072091陈苏云女大二信息8313891841077981036522尹铎男大二软件8215091750680397175732孟庆欣女大三微电7115029286532461652173武万杰男大二计算机8315991943194734649400邮箱部门职位备注thinkb9tribeca@主席团主席##tclxdd@主席团副主席## benzisbenz@163com运营部副主席##klx2613952@主席团主席助理Rosabird60@主席团主席团助理## vguangfu@技术部副主席兼技术部顾问##guolili210@财务部副主席##sunjia1109@财务部资料库成员stefanwendy@财务部资料库成员562693834@运营部部长##shakira63@运营部副部长#luanyu.2008@运营部# 292042853@运营部sunnyboyhl@运营部284987991@运营部794883866@运营部运营部运营部li.zixiao@运营部290429514@会员部部长##moon.1221@会员部副部长# 393255026@会员部会员部会员部568861731@会员部fan-tongshuai@会员部lhh129@技术部部长## cindirella12@技术部副部长# 425724980@技术部副部长兼网站开发小组负责人# wangqinglei0116@技术部技术部技术部kev_gao@技术部yoyo_7430@技术部yangbao316@技术部154069@技术部li.jiaban@技术部bazhong7@技术部397175732@技术部meng.feiyang@技术部liunianshiguang@技术部标注为两个#的说明其大二也在百度俱乐部乐部。
年级编号班级编号班级名称学号民族代码姓名性别出生日期231230110650300151罗紫芯21998-04-07 231230111650300011梅少华11998-10-03 231230111650300031江文杰11999-06-28 231230111650300041卢慧娟21999-08-01 231230111650300051邓剑雄11999-07-18 231230111650300061曾紫彤21999-11-08 231230111650300071李茂康11998-07-21 231230111650300081张进华21999-08-12 231230111650300091徐文青11998-05-20 231230111650300101梅茹冰21999-02-19 231230111650300111付伟明11999-05-09 231230111650300121吴宗宇11999-04-08 231230111650300131张晓娟21998-11-21 231230111650300141官志聪11999-07-29 231230111650300151饶茹玉21999-07-01 231230111650300161何绍宇11998-12-05 231230111650300171黄艺荧21999-02-07 231230111650300181陈俊杰11999-01-01 231230111650300191陈辰12000-05-03 231230111650300201李兆斌11999-04-22 231230111650300211黄紫微21998-10-18 231230111650300221龚志成11998-04-23 231230111650300231侯静雅21998-11-02 231230111650300241熊志鹏11999-08-17 231230111650300251黄婧文21998-09-13 231230111650300261李伟成11999-10-14 231230111650300271罗闽芳21999-05-01 231230111650300281邓志沂11998-08-01 231230111650300291黄昕怡21999-06-05 231230111650300301官元杰11999-04-11 231230111650300311黄丹婷21999-08-21 231230111650300321王翼睿11999-05-23 231230111650300331陈锦雯21999-01-31 231230111650300341李飞扬11998-09-18 231230111650300351张林聪11998-05-24 231230111650300361官成敏11999-06-08 231230111650300371傅文莉21999-07-28 231230111650300381余世阳11999-12-06 231230111650300391何陈美21999-03-28 231230111650300411何加敏21998-12-15 231230111650300421赖文杰11999-04-06 231230111650300431高尔静21999-12-02 231230111650300441邱晓杰11999-02-23 231230111650300451周昕21998-10-22 2310231011650304051白美龄21999-02-13 2310231011650304061纪少然11999-07-24 2310231011650304081罗慧鑫11999-01-21 2310231011650304091李姝寒21999-01-04 2310231011650304101危志辉11998-11-10 2310231011650304111黄绮文21999-06-292310231011650304121曾宇杭11998-10-08 2310231011650304131周慧琳21999-05-04 2310231011650304141应康博11999-06-04 2310231011650304151饶艺星11999-02-28 2310231011650304161聂文敏21998-12-09 2310231011650304171叶思凡11998-10-23 2310231011650304181彭苏闽21999-05-26 2310231011650304191何江洪11998-06-27 2310231011650304201虞丽敏21999-10-09 2310231011650304211张志伟11998-06-05 2310231011650304221黄文艳21999-05-24 2310231011650304231揭诚超11999-03-24 2310231011650304241邱克俊11999-03-09 2310231011650304251尹圣尧11998-11-08 2310231011650304261席银海11999-07-29 2310231011650304271尧鑫萍21998-04-24 2310231011650304281吴晨成12000-01-23 2310231011650304291李梦云21998-12-18 2310231011650304301李志海11998-11-07 2310231011650304311彭来欢22000-03-10 2310231011650304321陈春淋11999-01-06 2310231011650304331袁心蕾21999-03-07 2310231011650304341毛思捷11998-07-19 2310231011650304351黄龙涛11998-11-29 2310231011650304361李增俊11998-12-06 2310231011650304371吴云辉11997-09-06 2310231011650304381危美华21998-10-19 2310231011650304391元航俊11998-12-18 2310231011650304401邱雨晴21999-12-07 2310231011650304411伊能杰11999-02-01 2310231011650304421熊敏21999-05-01 2310231011650304431付永强11999-07-15 2310231011650304441周梦莹21998-12-07 2310231011650304451何典男11998-10-22 2310231011650304461杨攀祺11999-06-11 2310231011650304471刘鑫捷11999-08-11 2310231011650500451周素云21999-01-02 232230211650300461官馥馨21999-06-17 232230211650300471陈鹏辉11999-06-09 232230211650300481何锐钦11999-11-30 232230211650300491李颖凡21999-07-10 232230211650300501邹文斌11998-12-09 232230211650300511何攀凌11999-08-29 232230211650300521饶珺媛21999-06-02 232230211650300531饶嘉琪21999-02-22 232230211650300541周丹21999-04-17 232230211650300551周晓钰21998-11-14 232230211650300561邱皓南11998-09-26 232230211650300571阚子健11998-11-01 232230211650300581邱晋明11999-01-30 232230211650300591林荣珍22000-02-18232230211650300601罗亨俊11999-08-14 232230211650300611龚谋赟11998-11-12 232230211650300621陈俊炜11998-10-04 232230211650300631汪世庆11999-09-06 232230211650300641章静雯21999-01-20 232230211650300651裘安琦21999-05-13 232230211650300671官德军11999-05-12 232230211650300681何子悦21999-07-10 232230211650300691高小云21998-08-12 232230211650300701顾世豪11999-06-19 232230211650300711李良志11998-10-20 232230211650300721彭绍敏21999-05-24 232230211650300731聂历凡11999-08-03 232230211650300741戴小艺21999-02-13 232230211650300751何苇涵21999-03-28 232230211650300761魏营田11999-03-22 232230211650300771焦智斌11999-04-18 232230211650300781李紫薇21999-06-14 232230211650300801刘文清21998-08-08 232230211650300811卢贵臣11999-03-08 232230211650300821蔡鑫怡21998-11-24 232230211650300831吴金涛12000-02-22 232230211650300841陈晓海11999-06-01 232230211650300851元泽欣11999-08-01 232230211650300861陈紫悦21999-10-15 232230211650300871芮科进11999-05-21 232230211650300881李燕21999-02-23 232230211650300891贾辉11999-01-23 233230311640600381黄承奔11999-11-15 233230311650300901吴宣岑11999-06-03 233230311650300911邱君杰11999-11-23 233230311650300921林哲浩11999-06-16 233230311650300931江炳瑞11999-12-31 233230311650300941李篪21998-10-16 233230311650300951张雨晴21999-02-26 233230311650300961陈智健11999-05-12 233230311650300971赖欣怡21999-05-20 233230311650300981晏露鼎11998-11-09 233230311650300991黄悦21999-08-06 233230311650301001谢宇晨11999-08-23 233230311650301011翁燕华21999-12-06 2332303116503010222聂逸喆11999-06-12 233230311650301031陈自牧11999-09-20 233230311650301041肖祉烨21999-05-01 233230311650301051邓颖熠11998-10-20 233230311650301061黄周昱11999-10-15 233230311650301071张文杰11999-01-22 233230311650301081李欣悦21999-08-05 233230311650301091邱晨芯21999-10-09 233230311650301101张信玮21998-12-26 233230311650301111龚艳艳21999-08-16233230311650301121毛佳震11999-05-05 233230311650301131林宇轩11998-11-25 233230311650301141李祥11998-11-13 233230311650301151李丹琪21999-01-22 233230311650301161饶显炜11999-08-24 233230311650301171黄博宇11999-02-01 233230311650301181郭雅欣21999-08-06 233230311650301191陈思敏21999-01-04 233230311650301201刘文琪21999-10-05 233230311650301211官雅丽21998-10-11 233230311650301221吴 昊11999-08-05 233230311650301231吴思凡21998-09-25 233230311650301241李加旗21998-10-01 233230311650301251戴志琦11999-04-14 233230311650301261杨志伟11998-12-08 233230311650301271李邵杰11998-12-03 233230311650301281何俊楠11999-07-10 233230311650301301邓必成11999-09-17 233230311650301311蔡诗琪21999-07-12 233230311650301321陈窈瑶21998-10-07 233230311650301331李城志11998-09-10 233230311650301341罗星财11998-10-01 233230311650301361龚怡萍21998-12-30 234230411650301371邓起东11999-04-01 234230411650301381苏若宾12000-03-10 234230411650301391黄斯哲11999-08-28 234230411650301401周宇寒11998-10-15 234230411650301411严俊11999-07-15 234230411650301421廖科颖21999-10-02 234230411650301431邹欣凯11999-05-27 234230411650301441潘照曦21999-08-21 234230411650301451何邵颖21998-11-27 234230411650301461徐诗雨21999-09-13 234230411650301471官苏玲21999-06-16 234230411650301481张佳蕾21999-09-24 234230411650301491周夕怡22000-02-04 234230411650301511张驰斌11999-07-02 234230411650301521刘诗航11998-01-27 234230411650301531刘治鑫11999-02-10 234230411650301541刘振华11999-04-10 234230411650301551龚粲仪21999-07-02 234230411650301561顾博宇11999-10-15 234230411650301571陈旭阳11999-01-22 234230411650301581上官博11999-02-27 234230411650301591何家佳21999-08-12 234230411650301601胡梦云21999-11-15 234230411650301611郭喆晨21999-06-05 234230411650301621吴珍瑶21999-08-26 234230411650301631曾偲怡21999-05-15 234230411650301641邓亚婕21999-07-07 234230411650301651高宇馨21999-01-07234230411650301661吴汉成11998-08-29 234230411650301671黄福诚11998-09-14 234230411650301681方昉11999-04-13 234230411650301691曾紫珊21999-02-03 234230411650301701吴周明11999-08-12 234230411650301711冯力学11998-09-15 234230411650301721江浩然11999-02-22 234230411650301731谢懿鹏11999-05-11 234230411650301741罗晨蕾21999-01-14 234230411650301751官招航11998-09-17 234230411650301761林昌豪11999-03-09 234230411650301771高杨馥馨21999-06-15 234230411650301781华道南11999-08-12 234230411650301791邓南鎣11999-11-28 234230411650301801黄文杰11998-07-18 234230411650301821钟海军11996-11-22 234230411651000301梁芦丽21999-11-28 235230510650303911陶艺峰11998-07-11 235230511650301831周文琴21999-01-11 235230511650301841郑秀程11999-03-17 235230511650301851上官文青11999-12-15 235230511650301871王灵鑫21999-04-21 235230511650301881黄俊伟11999-07-28 235230511650301891张静怡21999-07-03 235230511650301901黄祖贤11998-11-21 235230511650301911陈艳珊21999-02-16 235230511650301921李逸强11999-11-20 235230511650301931刘美君21999-02-03 235230511650301941吴佳伟11999-04-21 235230511650301951高小芳21998-11-12 235230511650301961郑聪聪11999-03-19 235230511650301971汤思雨21999-02-06 235230511650301981黄贵华11999-06-25 235230511650301991游志威11998-12-21 235230511650302001吕文杰11998-09-25 235230511650302011何雪婷21999-02-03 235230511650302021章斯豪11998-08-01 235230511650302031揭心怡21998-11-26 235230511650302041吴熙祥11999-05-05 235230511650302051高琳21999-05-10 235230511650302061聂志毅11998-10-20 235230511650302071胡诗琪21999-06-07 235230511650302091叶芷晴21998-10-01 235230511650302101蔡惺凯11998-04-24 235230511650302121邹杰超11999-07-01 235230511650302131官道伊11999-12-07 235230511650302141曾绍聪11999-06-28 235230511650302151李萌21999-03-26 235230511650302161何博洋11999-04-12 235230511650302171李文秀21998-11-10 235230511650302181何家伟11999-02-04235230511650302191刘心如21999-06-02 235230511650302201王少华11998-09-06 235230511650302211官丽敏21998-09-20 235230511650302221官岩松11999-05-23 235230511650302231肖雨晴21999-03-09 235230511650302241陈贯磊11999-04-11 235230511650302251傅泽豪11999-04-10 235230511650304521陈思怡21999-10-03 235230511650500381叶晨阳11999-10-09 236230611650302261吴慧琳21999-01-16 236230611650302271巫立鹏11999-01-19 236230611650302281官成飞11999-07-23 236230611650302291饶震轩11999-08-23 236230611650302301王凯11999-05-01 236230611650302311饶春晖11999-02-01 236230611650302321官璐缘11999-06-23 236230611650302331陶紫微21999-02-15 236230611650302341陈利云21999-12-05 236230611650302351翁雪瑶21998-01-15 236230611650302361陈未雄11999-07-17 236230611650302371虞涛涛11999-03-14 236230611650302381丁芷若21998-10-01 236230611650302391姚宇逍11999-03-14 236230611650302401冯浩凌11999-10-23 236230611650302411邓文杰11999-03-25 236230611650302421付梓川11999-06-14 236230611650302431胡伟健11999-08-30 236230611650302441邓镕钦11998-01-05 236230611650302451陈昭婧21999-03-29 236230611650302461冯诗蕊21999-02-20 236230611650302471罗秀文21999-05-08 236230611650302481徐思婕21998-12-19 236230611650302491邹瑞璇11999-10-05 236230611650302511熊云诗21999-10-10 236230611650302521尹晓梦21998-03-24 236230611650302531黄志成11997-12-09 236230611650302541杨敏21999-09-14 2362306116503025522雷子怡21999-09-05 236230611650302561何芮思21998-11-10 236230611650302571李雨婷21999-01-27 236230611650302581叶俊辉11998-12-21 236230611650302591朱玉婷21997-04-17 236230611650302611邱开伟11999-02-25 236230611650302621黄家杰11998-03-24 236230611650302631张东平11998-11-30 236230611650302641邓玉茹21999-06-14 236230611650302651吴俊达11999-05-13 236230611650302661黄美岿11999-07-15 236230611650302681曾媛21998-07-03 236230611650304511戴晨杰11998-11-19 237230710650303351黄道锡11998-02-20237230711650302691易雅青21998-11-26 237230711650302701刘静怡21999-07-18 237230711650302711陈海峰11999-06-23 237230711650302721洪诗韵21999-07-17 237230711650302731黄宇轩11999-07-27 237230711650302741黄宏伟11998-09-20 237230711650302751林志强11998-11-07 237230711650302761练艺玲21998-12-02 237230711650302771卢立聪11999-02-16 237230711650302781江璐瑶21999-01-16 237230711650302791邓厚聪11999-08-08 237230711650302801曹雯欣21999-05-07 237230711650302811徐浩东11998-10-07 237230711650302821李振海11998-09-28 237230711650302831高福昇11998-08-08 237230711650302841邓天羽21999-06-06 237230711650302851江伟豪11999-01-01 237230711650302861揭雯雪21998-03-25 237230711650302871席梓俊11998-10-26 237230711650302881陈凯文11999-04-30 237230711650302891傅智欣12000-01-19 237230711650302901龚心怡21999-04-09 237230711650302911李嘉豪11999-04-15 237230711650302921纪芷淇21998-11-20 237230711650302931吴兆维11999-05-22 237230711650302941刘禹11998-02-05 237230711650302951曾升鹏11998-12-20 237230711650302961潘阳烨21998-09-27 237230711650302971罗旋11998-12-09 237230711650302981叶紫薇21999-02-20 237230711650302991黄旭鹏11999-04-08 237230711650303001官永杰11999-07-04 237230711650303011赵圣祺11999-01-15 237230711650303021邱国艳21999-10-01 237230711650303031陈豪11999-02-18 237230711650303041王滟青21998-11-05 237230711650303051封武祥11999-04-26 237230711650303061黄谢菲21999-05-31 237230711650303071官成龙11999-05-29 237230711650303081龚庆玲21999-05-07 237230711650303091李智伟11999-06-21 237230711650303101叶琪磊11998-11-09 237230711650303111陈志萍21999-10-10 237230711650303121徐凯11999-02-10 237230711650303131林晨曦21999-12-11 238230810650301981曾炫宇11998-11-25 238230811650303141陈雨21999-09-01 238230811650303151张晨旭11999-02-19 238230811650303161陈军11999-03-06 238230811650303171饶行健11998-10-16 238230811650303181黄茜21998-07-01238230811650303191李泽金11998-10-04 238230811650303201刘靖慧21999-08-31 238230811650303211李晋东11999-08-09 238230811650303221毛也彧21999-06-05 238230811650303231陈代杰11998-03-11 238230811650303241周夏瑜11999-06-21 238230811650303251邱欣艳21999-02-13 238230811650303261沈云豪11999-06-20 238230811650303271孔子阳11999-07-24 238230811650303281张欣怡21999-10-06 238230811650303291张玉婷21999-05-11 238230811650303301黄艺成11998-10-08 238230811650303311方桂花21998-12-15 238230811650303321陈磊11998-10-02 238230811650303341温志祥11999-08-31 238230811650303351元涵春21999-03-01 238230811650303361池同翰11998-10-08 238230811650303371戴巽海11999-09-13 238230811650303381章岑鑫21999-01-10 238230811650303391李鑫伟11998-10-19 238230811650303401黄可佳21998-11-01 238230811650303411徐志新11999-01-09 238230811650303421危嘉诚11999-05-28 238230811650303431裘梓良11999-08-19 238230811650303441吴思雪21999-04-20 238230811650303451何晨颖21998-10-23 238230811650303461雷帆21999-03-01 238230811650303471蔡浩冬11999-06-02 238230811650303481危一帆11999-06-20 238230811650303491袁毓婉21999-07-17 238230811650303501江骏秋11999-09-19 238230811650303511何家毅11998-05-26 238230811650303521颜艺炜21999-08-27 238230811650303531陈茜21999-02-07 238230811650303541邱慧斐21998-11-12 238230811650303551胡婉婷21998-12-25 238230811650303561严政洪11999-06-09 238230811650303571许良超11999-10-04 238230811650303581陈小祥11999-06-18 239230910650302031邓云梅21997-05-23 239230911650303591沈羽格21999-07-13 239230911650303601李俊杰11999-04-21 239230911650303611毛玲莉21998-12-16 239230911650303621李炜祥11999-01-03 239230911650303631元代斌12000-04-28 239230911650303641张紫薇21998-07-24 239230911650303651罗嗣豪11999-08-15 239230911650303661黄庆悦21999-04-24 239230911650303671何艳稣21999-08-03 239230911650303681元杰11999-04-15 239230911650303691黄俊杰11999-05-11239230911650303701林欣雨21999-06-22 239230911650303711罗仕华11999-06-18 239230911650303721陈张琦21999-04-07 239230911650303731沈扬雯11998-11-12 239230911650303741席鸿宇11998-09-14 239230911650303751李国政11999-01-04 239230911650303761刘文慧21999-10-10 239230911650303771廖素珍21997-08-25 239230911650303781张志强11998-11-12 239230911650303791何庆莹21999-11-27 239230911650303801叶瑞桦11999-07-20 239230911650303811黄宇欣21998-12-27 239230911650303821林文督11999-08-29 239230911650303831张一鼎11998-03-16 239230911650303841高俊杰11998-11-02 239230911650303851龚苏建11998-06-10 239230911650303861熊明珠21999-09-20 239230911650303871黄洪涛11999-02-14 239230911650303881李思雨21998-12-14 239230911650303901魏霖欣21999-07-13 239230911650303911温志奇11999-02-13 239230911650303921李增豪11998-11-18 239230911650303931黄文清21999-10-20 2392309116503039522雷彦晴21999-08-01 239230911650303961曾颖21999-05-06 239230911650303971冯文俊12000-02-06 239230911650303981高美娟21998-07-03 239230911650303991郭玉轩11997-04-08 239230911650304001刘仪21998-11-11 239230911650304011杨竹琳11998-09-29 239230911650304021陈正娥21997-07-14 239230911650304031林星晨11998-11-13家庭住址身高体重肺活量50米跑立定跳远坐位体前屈光泽县武林路1584829869.7 1.745光泽县华桥乡增坊村1554531268.2 2.1511光泽县李坊乡上观村熊下60号1553923068.5 1.98 5.5光泽县鸾凤乡黄溪村1544534289.1 1.812光泽县李坊乡百岭村百上1666440109.1 2.1613.2光泽县茶市街119号1604430219.1 1.8314.2光泽县华山街13号1666638789.5 2.192光泽县鸾凤乡大陂村38号16242272310.3 1.7815.5光泽县李坊乡石城村石城4号155********.3 1.9810光泽县水泥厂3栋1单元301室16370221611 1.3 1.8光泽县鸾凤乡油溪村120号1737036107.8 1.810.9光泽县杭川镇龙船巷43号1524227588.6 2.1311.1贵州省纳雍县老凹坝乡唐家坝村十组150********.3 1.5511.4光泽县杭川镇二一七路173号601室1605023108.2 1.892光泽县杭川镇茶市街103号1574434949.1 1.8916.5光泽县闽源锦绣7栋103室1594832278.1 2.074光泽县杭川镇二一七路万发大楼403室1575623098.9 1.918.7光泽县鸾凤乡黄溪村牛岭39号1696048918.4 2.3510.3光泽县司前乡长庭村余林7号1734837338.3 1.917.3光泽县止马镇杉关村路古桥2号1706830448.7 2.112光泽县龙厦铭都11栋508室1584638509.1 1.620.8光泽县杭川镇金斗街85号1708543167.6 2.315.9光泽县文昌路152号203室1664837628.9 1.8720光泽县阳光花园7栋101室1635037057.4 2.3410.7光泽县杭川镇中南街30号1464324409.3 1.7512.3光泽县老干所B1楼1656142637.6 2.420光泽县杭川镇金斗街11-1号1634026249.9 1.8718光泽县凤凰花园2栋103室1726646899 2.317.5光泽县杭川镇文南街100号1574324889.4 1.8320光泽县华桥乡官屯村108号1694738118.1 2.16 6.6光泽县杭川镇二一七路146号1幢101室1614734969.1 1.610.5光泽县香料厂77-6号1738741848.8 1.95 5.4光泽县杭川镇二一七路165号402室166******** 1.7810.2光泽县李坊乡管密村吴家20号1726136077.5 2.557.1光泽县司前乡新甸村新兴72号1826353798 2.216.3光泽县鸾凤乡黄溪村上小源1624635208.6 2.1811.1光泽县寨里镇山坊村付家1-3号1533931979.3 1.823光泽县仙华路9-1号401室1686442578.1 2.311.6光泽县武林路邻头街4号1544831219 1.816.9光泽县凤凰花园2#204室1544129269.1 1.7512光泽县龙厦铭都8栋302室1775640177 2.3520.4光泽县龙厦铭都19栋205室15463228510.4 1.5310.3光泽县文昌64号2栋110室1774833358.8 2.38.4光泽县中洲小区2栋2单元5041675322789.1 1.8715武林路岭头街40号15537.5寺前街56号160469.5闽源锦秀6栋第二单元503室16245月山巷160号16540武林路75号6栋108号168548.6217路46栋A座202室17058217路中洲小区建委2号楼502室170477.2止马镇止马村17655武林路39号110室172578.3彭家巷27号15742.57.4217路205号16室15948217路17号406室160428.6彭家巷15号16545茶市街125号160438.75武林路电机厂75号3栋103室16348武林路7号商品房165478.4官家巷61号16547鸾凤乡大羊村179608217路27幢402室168507.2杭川镇217路185号203室175707.9大陂村23号160387.9武林路75号8栋106号15539武林路桃源小区第三单元607室155459.2官家巷52号16449217路中洲市场1栋304室160458.5武林路松林巷50-403室16756闽源锦秀3栋第一单元202室160518鸾凤乡大羊村黄家1号16642217路城防巷19号203室176609.3武林路118号胶合板厂宿舍170587.2217路274栋204室178557.9金斗街155408.1鸾凤乡大羊村虎跳53号16445王家际27号165457.5司前乡岱坪源头组7号16042乌君街8号6栋12室168508.5南巷9号16250鸾凤乡崇瑞村严家册168508廖家湾5号16152文昌路28号第一单元505室167608城防巷29号170608.3大陂路88号45室164469.2福建省南平市光泽县大洋坪上周光泽县217路172号1幢2屋201室16043173310.1 1.68.4光泽县鸾凤乡黄溪村牛岭组1624237068.12 3.4光泽县华桥乡何洲坪村下窠1605029158.4 2.120.5光泽县217路205号1635534629.7 1.7512.5光泽县217路183号1655534098.7 2.153光泽县武林路230号1768038799.229.6光泽县皇庭丹郡2栋406室1564524729.6 1.536光泽县武林路108号1706829539.4 1.418光泽县闽源锦秀9栋503室1585433989.8 1.588.9光泽县龙厦名都2幢2单元305室1704631629.2 1.918光泽县中山路16号1725840787.3 2.712.5光泽县217路122号2栋105室1667843447.5 2.359.3光泽县中山路34号1636018088.4 2.111.3光泽县新兴街1号307室16554244110.1 1.7212光泽县217路万福小区1644040728.227.6光泽县岭头街1595129578.8 2.17.5光泽县岭头街1605431887.5 2.4218光泽县鸾凤乡高源村徐源17号1564635988.3 2.1515.1光泽县桃源小区1605922869.9 1.6910.3光泽县茶市街110号1685122789.9 1.6 3.6光泽县彭家巷七树龙1685033078 2.483光泽县武林路76-45号16852364711 1.8 4.5光泽县李坊乡长源村异树岭14号156********.1 1.5 5.7光泽县武林路100号16255142110.5 1.59.7光泽县武林路23号205室边1706743088.5 1.98 4.9光泽县鸾凤乡黄溪村上小源10号180******** 1.650.8光泽县火车站宏光楼A栋302室1704835028.9 1.910.2光泽县皇庭丹郡6幢309室1725623889.6 1.8 6.9光泽县中山路9号108室1554825559.1 1.7213.5光泽县武林路干坑新村16850光泽县李坊乡贯庄村红星农场13号1756035598.9 2.0511光泽县司前乡清溪村1615139988.7 1.9512.6光泽县鸾凤乡大洋村13号16151292410.4 1.81光泽县鸾凤乡十里铺村上大洲6号1636031588.3 2.18 2.5光泽县武林路招待所16750263210.5 1.6 4.6光泽县华桥乡大禾山村32-2号1685249288.5 2.25光泽县中洲菜市场1513543628.72-6.2光泽县217路19号505室1604334628.1 1.9-9.2光泽县武林路242号4栋304室1624238069.9 1.711.5光泽县龙船巷44号160504355 2.08-2.4光泽县217路16355259410.2 1.5 6.7光泽县文南街12-9号1655533898.1 2.510.3光泽县新天地巴黎春天A4栋502室1768029158.3 2.03-0.3光泽县南巷12号1564548517.6 2.512.2光泽县崇仁1706834718.9 2.0411.6光泽县杭川镇文昌路51号1585443887.8215.1光泽县职教中心1704646138 2.210光泽县杭川镇南巷12号5幢703室1725835139.8 1.588.3光泽县鸾凤乡茶果厂1667825719.2 1.7217.3光泽县杭川镇镇岭路20号308室1636040588.3 2.16 5.4光泽县217路71号1655426418.4 1.6816光泽县杭川镇武林路242号5幢402室1644036498.4 1.99 1.6光泽县217路119号404室1595124379.2 1.73 5.7光泽县杭川镇中洲2号604室1605443238.122杭川镇武林路机床电器厂38号104室1564627909.4 1.7816.1光泽县杭川镇南巷12号5幢403室1605951997.7 2.2816.4光泽县司前乡1685138867.7 2.058.6光泽县三中1685031019 1.923.3光泽县杭川镇下镇岭路9号102室168524569 6.5 2.614光泽县217路122号3幢5011563740318 2.0714.3光泽县文昌路凤凰花园5号楼第一单元902室1625543237.4 2.4510光泽县杭川镇武林路75号13幢106室17067332110 1.4712.9光泽县杭川镇闽源景秀13幢105室1806522679.3 1.6719.7光泽县217路63号301室1704822319.7 1.5916光泽县217路桥南商品房B幢601室1725628019.1 1.7420.5光泽县司前台山村1554839058.6 1.918.3光泽县217路众志1号503室1685042908.229.8光泽县司前云际1756039918 2.214.5光泽县杭川镇中南街20号1幢304室1615128679.5 1.6910光泽县217路50号1615138098.4 2.03 1.7光泽县华侨1636029377.9 2.050.5光泽县鸾凤乡16750305010.2 1.6722.5光泽县龚家巷12号1685228679.5 1.9210光泽县止马镇1513528598.9 1.8620.1光泽县鸾凤乡1564525769.3 2.2424光泽县杭川镇南巷12号4幢101室1706855497.3 1.59 6.3光泽县杭川镇27号401室158********.4 2.4611.6光泽县岭头街7号1704620279.5 1.96光泽县李坊乡1725836178.2 2.120光泽县坪山路甘溪街38号1667832989.3 2.111.1光泽县城建1636035648.5 1.9512.8光泽县月山卷277号16554350010.8 1.5710.8光泽县月山卷12号1644044728.3213.1光泽县寨里桃林1595125169 1.5913.6光泽县司前庭燎村1605427528.9218.4光泽县武林路231号1644044727.9 2.36光泽县华桥1595144297.5 2.25 2.8光泽县杭川镇武林路龙船巷37号1605426079.6 1.4512.5光泽县鸾凤乡双门村小源队33号15444299611.1 1.8613.7光泽县武林路74号1625228718.9 1.9814光泽县文南街50号1806546867.6 2.090光泽县止马仁厚1606032289.3 2.18 2.6光泽县万福小区1606436048.1 2.168光泽县中南街1栋403室1584425159 1.7514.5光泽县217路一建巷44号1584425159 1.7514.5光泽县217路46号1555430169.7 1.99.2光泽县武林路38号1604378110.6 1.711.2光泽县坪山路198号16242257411.4 1.5-0.3光泽县电器厂9栋103室1605027679.9 1.7416.5光泽县建行宿舍706室1635530739.8 1.6117.1光泽县文昌路24号1655531249.4 1.7911光泽县闽源景秀18栋一单元5021768036828.5 2.26-2光泽县老干所102号店面156********.4 1.8711光泽县217路33号302室1706842489.1 2.5611光泽县霞洋电站1585437598.8 1.9 3.1光泽县光一中1栋301室17046128710.3 1.5413光泽县闽源景秀3栋4011725839739.7 1.8910光泽县文昌路9号五栋2021667843068.7 1.8918.4光泽县止林大厦1636047257.8 2.169.7光泽县217路18号1655426299.6 1.611.3光泽县龙船巷37号16440419110.8 1.4712.4光泽县闽源锦绣19栋305室159********.3 1.8211.9光泽县建南街30号1605431459.5 1.7512.3光泽县217路103号1栋503室156******** 1.219.3光泽县217路75号704室16059205910.6 1.617.5光泽县217路214栋224号1685130149.4 1.658.6光泽县镇岭路17号502室1685039498.1 2.210光泽县武林路公路局宿舍1685239498.2 2.39光泽县万福小区7栋201室1563728919.6 1.89 6.1光泽县中南街21号1625531569.2 1.68.6光泽县文昌路营辉商住楼A-3栋602室1706736039.6 1.5 3.4光泽县文昌路8-28号1806529097.3 2.4510.1光泽县中山台供销新宿舍1号2栋302室1704831119.2 2.179光泽县217路10栋306室1725632627.9 2.414.6光泽县司前村外何28号1554811389.6 1.6815.9光泽县司前乡新甸村1685036328.9 2.199.29光泽县嘉福花园3栋102室1756038858.4 2.1215光泽县二一七路49栋201室16151269010.2 1.6720.4光泽县司前乡新龙街1615138588.1 2.088光泽县华侨古林村1636032259.2 1.9517.4光泽县武林西路290号1675032738.4 2.2713光泽县武林东路1685244017.7 2.515.3福建省光泽县李坊乡贯庄村贯庄25号1513524589.9 1.713.7福建光泽第三中学怡园404室福建省光泽县册下茶果场14535 1.810福建光泽镇岭路28幢503室15328 2.2512福建光泽鸾凤黄溪上小源17号15944 1.75福建光泽岭头街40号15940 1.613福建光泽217路248号 1.98福建光泽217路191号501室157 1.812.5福建光泽鸾凤乡大羊村黄家组3号15136 2.17福建光泽文南路50号2栋401室15750 1.7515福建光泽武林路96号16050210福建光泽闽源锦绣1栋3单元16247 1.7512福建光泽止马排下17050 2.1513.5福建光泽鸾凤乡黄溪村16044 1.659福建光泽龙船巷48号福建光泽鸾凤乡黄溪村下朱溪15036 1.6516福建光泽金斗街29号16045 2.123福建光泽新兴路3号2栋110室15744 2.214福建光泽城南新村1栋602室16544 2.0512福建光泽武林路244号2幢50616061 1.613福建光泽闽源锦绣9栋206室17060 2.057福建光泽皇庭丹郡1幢1102室16439 1.68福建光泽李坊福建光泽鸾凤乡双门村15040福建光泽李坊贯庄埠头村2号15543 1.76福建光泽寨里茶富村王家洲 1.615福建光泽司前岱坪村16245 1.711福建光泽金斗街46号福建光泽武林路满福楼0福建光泽闽源锦绣303室16050218.5福建光泽万福桃源小区601室16345 2.420福建光泽鸾凤双门村册下36号17福建光泽闽源锦绣7栋602室17370 1.81福建光泽217路城防巷31号162 1.76福建光泽武林路15641 2.0514福建光泽217路6号401室16244 1.510福建光泽217路止林大厦15845 2.118福建光泽月山巷150号15540 1.912福建光泽文南街3号16348214福建光泽217路254号301室16243 1.621福建光泽寨里桃林村福建光泽文昌路中南街14-1号1755911浙江青田山口镇石雕城7幢301室福建省南平市光泽县崇仁乡洋塘村水东16049 1.815福建省光泽县寨里镇百石村王家5号福建省光泽县鸾凤乡黄溪村坳背20号福建省光泽县止马镇虎塘村程家山10号福建省光泽县杭川镇彭家巷7号福建省光泽县杭川镇仙华洲农场大垅5号福建省光泽县杭川镇彭家巷16号福建省光泽县止马镇水口村董家9-3号福建省光泽县止马镇水口村雷公滩10号光泽县鸾凤乡茶果场五里亭8号福建省光泽县司前乡举安村富坪17号光泽县鸾凤乡黄溪村牛岭38号光泽县鸾凤乡大陂村大陂62号光泽县鸾凤乡茶果场十里亭13号福建省光泽县杭川镇二一七路19号206室福建省光泽县杭川镇二一七路39号407室福建省光泽县李坊乡百岭村百上20号光泽县217路11栋402室福建省光泽县杭川镇九星巷5号福建省光泽县李坊乡百岭村百岭7号光泽县杭川镇前巷10号403室福建省光泽县杭川镇二一七路141号1栋306室福建省光泽县寨里镇小寺州村小寺州12号福建省光泽县杭川镇二一七路26号福建省光泽县杭川镇文昌路81号光泽县武林北路阳光花园5栋703室福建省光泽县杭川镇二一七路236号401室福建省光泽县崇仁乡良种场下王文光泽县李坊乡上观村熊下12号光泽县司前乡干坑村崩山10号干坑新村光泽县龙厦名都7幢3单元206室光泽县杭川镇南巷6号402室福建省光泽县杭川镇岭头街9号福建省光泽县杭川镇仙华路52号福建省光泽县司前乡新甸村外溪13号光泽县李坊乡石城村石城13号福建省光泽县鸾凤乡高源村王家边12号福建省光泽县李坊乡上观村排中45号福建省光泽县李坊乡杨里村李高上2号福建省光泽镇岭汽车站十栋十号光泽县李坊乡长源6号月山巷230号光泽县中山街9号1705028618 2.22光泽县中医院1554024508.6 1.858光泽文昌路122号1554125408.5 1.910光泽二一七路163号1684532168.2 1.9512光泽县中南街2号1544030009.23 1.710光泽水泥厂2幢202室1634634568.3 1.750光泽县止马乡仁后村1564023408.09 2.0510光泽县万福桃源小区光泽县鸾凤乡大陂水角12号1664821009.32 1.816光泽县鸾凤乡大陂上王家17号1685225808.49 2.154光泽县寨里乡1564726439.55 1.69光泽月山巷6号1737234209.2 1.7光泽县万福小区1625246208.92 1.725光泽县农工商光泽县闽源锦绣3幢4031736540327.9 2.316光泽县鸾凤乡中坊村1654337827.84 2.14光泽县委宿舍1604742369.17 1.659光泽防疫站1624532407.42 2.25光泽县鸾凤乡双门村1566018439.921659光泽县鸾凤乡大陂村60号1634532008.42 1.9511光泽县二一七路众志2号楼3041745023407.5 1.714光泽县崇仁乡汉溪村30号1667237208.126光泽中南街24号1604433878 1.77光泽县十里铺村1705536609.3 1.90 217路金榜楼B幢1604827317.88 1.6510光泽县二一七路3幢204室1716236518.19 2.20光泽县止马虎塘1735452007.8 2.150光泽县李坊乡管密村 2.10光泽县杭川镇中南街2号1696134219.29 1.717光泽司前新甸村1604436427.84 2.112光泽县坪山路乌君街8号1604719829.38 2.213光泽县地税局宿舍1674842387.66 2.116光泽县二一七路32—402室1674752368 2.14光泽坪山东路25号1745432008.94215光泽廖家湾3号1604532418.94 1.755光泽县岭头街10号1625542517.91 1.810光泽县二一七路72号706室1604536418.75 1.720光泽县华桥乡古林村1604530517.9 1.712光泽仙华路52号34室1685434009 1.720光泽县华桥乡1655242107.66 2.114光泽县金斗街52号1635824309.48 1.8517光泽县鸾凤乡高源村3号1725846517.18 2.451光泽县武林路龙厦名都10#1011765233648.39 2.18光泽县水利局1585324319.3 1.616福建省光泽县杭川镇1765734598.39 2.1521光泽县电力公司1594720517.9 1.75光泽县杭川镇二一七路232号605室武林路茶市街66号光泽大陂路52号光泽217路46幢205室光泽县217路31号光泽县坪山路17幢306室光泽县杭川镇龙船巷94号光泽县武林路100号光泽县217路桂庭苑光泽县司前乡司前街58号光泽县寨里镇桥湾村紫竹1号光泽县文昌路东关小区光泽县中南街20号邮政宿舍光泽县217路商业综合楼55号光泽新兴路3号4幢105室光泽县文南街46号光泽县杭川镇大陂村下王家光泽县茶叶局1号光泽县鸾凤乡大陂村大陂22号光泽西关寺前街6号光泽鸾凤乡茶果场石岐村光泽武林路31号光泽县杭川镇217路74号204室光泽县止马镇亲睦村代家4-1号光泽鸾凤乡双高村高田2号光泽镇岭农贸市场光泽县镇岭路21号光泽县乌军街8号2幢302光泽县建南街15号光泽县鸾凤乡大陂新坊小组2号光泽杭川镇乌君街8号2幢12室光泽县茶市街光泽县武林路干坑新村259号光泽县武林路公路局光泽火车站搬运公司光泽县鸾凤乡茶果场光泽县武林路龙厦名都12幢5层503室光泽县华桥乡园岱村光泽县杭川镇217路55号302室光泽县司前乡光泽县司前乡司前街光泽圣农光泽县李坊乡上观村光泽县武林西路万福桃源小区6号307光泽干坑新村光泽县回龙潭沙石料厂217路金城楼B座201室15533中南街7号5幢103室16445寨里镇官桥28-2号15451文南街18号17560止马镇岛石村16955建南街47号16055嘉福花园1栋603室17667文昌路8号4幢202室15337双门村高田4号15340 217路止林大厦A栋604室16340鸾凤乡大陂村上王家16947217路17栋601室15652.5武林路燃料公司17241 217路止林大厦602室17251.5 217路前巷10号17057鸾凤乡大陂村23号17561凤凰花园1栋305室17463武林路296号15565镇岭路23号15050万福桃园小区2幢106室16938茶市街55号16051中南街7号5幢405室16939新兴街3号1幢104室16554武林路130号17557 217路建委宿舍202室17855 217路北巷102号17285大陂鸿建山庄17070官家巷6号15550止马镇虎塘村企山16944鸾凤乡大陂村易家15745闽源锦绣6栋306室16544石岐村叶家排19号16855建南街27号17242文昌路155号16150司前乡积谷村23号15340李坊乡管密村160止马镇排下村耽溪160李坊乡管密村155干坑新村165水电局宿舍158武林路11-81号169武林路干坑新村162文昌路月山巷37号162800米跑1000米跑一分钟仰卧起引体向上左眼视力右眼视力4'17"3855 4'22"5 4.854'31''4 4.85 4'08''43 4.8 4.8 6'13''9055 3'45''36 5.2 5.2 6'12''0 4.4 4.4 4'21''29 4.7 4.7 4'22''29 4.7 4.7 5'148 4.3 4.4 6'58"1 4.2 4.55'05"3 5.1 5.1 4'18''30 4.3 4.4 6'06"055 3'42"39 4.2 4.3 6'58"9 4.8 4.8 4'33"41 4.8 4.8 4'17"5555'04"13 4.3 4.37'01"15 4.8 3'59''32 4.5 4.5 6'59"5 4.3 4.3 4'33"32 4.7 4.8 4'14"14 4.7 4.7 3'47"32 4.4 4.7 4'48"155 4.4 4'18"30 4.55 5'46"2 5.2 4.7 4'05"43 4.8 5.2 4'48"105 4.9 4'30"40 5.15 6'05"0 5.1 5.1 4'05"30 4.8 4.8 4'47"15 4.8 4.84'44"5554'46"13 4.3 4.3 4'36"345 4.8 4'44"11 4.5 4.5 3'44"38 4.3 4.3 4'11"28 4.7 4.8 4'45"5 4.7 4.7 4'27"35 4.4 4.7 5'47"105 4.4 5'11"37 4.554.7 4.755554.5 4.54.5 4.54.4 4.44.4 4.44.8 4.8555.1 5.14.9 4.95.1 5.15555554.3 4.34.8 4.855554.8 4.94.9 4.54.5 4.54.3 4.34.9 4.94.3 4.35.2 5.24.9 4.94.6 4.655554.9 4.74.7 4.7554.5 4.555554.5 4.5554.6 4.74.7 4.6555.1 5.1 4'08"32 4.8 4.8 5'04''8 4.8 4.97'50''3 4.9 4.9 3'52"35 4.95 4'17''3557'15''055 4'12''2155 4'03''60 4.6 5.1 4'36''36 4.2 4.5 3'47''39 4.6 4.8 3'49''6555'03''6 4.2 4.54'41''2 4.7 4.8 3'46''39 4.5 4.54'33''0 4.8 4.83'50''7554'03''4 4.8 4.83'48''755 4'19''38 5.2 5.2 4'33''39 4.4 4.4 4'22''8 4.7 4.7 4'12''40 4.7 4.7 4'00''27 4.3 4.4 8'00''0 4.2 4.54'26''3 5.1 5.1 4'17''38 4.3 4.4 4'50''655 4'33''37 4.2 4.3 3'40''45 4.8 4.84.8 4.84'21''955 4'32''47 4.3 4.3 3'56''325 4.8 4'10''6 4.5 4.54'06 4.3 4.35'19''4 4.7 4.84'19''0 4.7 4.75'50''4 4.4 4.7 4'25305 4.4 5'25''9 4.55 4'24''48 5.2 4.74 4.8 5.25'03''65 4.94'25''7 5.153'58''2 5.1 5.14'18''3 4.8 4.84'18''1 4.8 4.8 3'44''3555 4'14''31 4.3 4.3 3'55''05 4.8 3'44''33 4.5 4.5 4'53''2 4.3 4.3 3'59''25 4.7 4.8 4'21''0 4.7 4.7 3'56''31 4.4 4.7 3'35''105 4.43'59''8 4.55 3'40''35 5.2 4.7 4'23''6 4.8 5.24'05''35 4.94'00''10 5.15 5'19''29 5.1 5.1 4'31''28 4.8 4.8 4'04''25 4.8 4.9 4'14''30 4.9 4.9。
2009年6月山东大学网络教育文化产业管理专业专升本考场安排表第一考场(公教楼103)专升本第二考场(公教楼105)第三考场(公教楼106)第四考场(公教楼108)专升本第五考场(公教楼204)专升本第六考场(公教楼205)第七考场(公教楼206)第八考场(公教楼207)第九考场(公教楼208)第十考场(公教楼304)2009年6月山东大学网络教育文化产业管理专业高起专考场安排表第一考场(公教楼305)第二考场(公教楼306)第三考场(公教楼307)第四考场(公教楼308)2009年6月补考考场安排文化产业专业本科公教楼1036月28日10:00-11:30英语3:陈金涛郝鹏赵恺张兆雨崔荣国仵海燕孙学凤马丽丽纪华宇许亚男常科华高庆波李岩张媛媛计算机基础:王琛6月28日13:30-15:00动漫产业:段磊许伟陈金涛郝鹏赵恺张兆雨崔荣国仵海燕孙学凤马丽丽王翯霏纪华宇许亚男常科华高庆波李岩张媛媛6月28日15:30-17:00传媒经营管理:安小燕李彬彬陈金涛吴燕李岩郝鹏张兆雨高世娟刘丽瑛范晓玲祁朝霞王鹏崔荣国王翯霏仵海燕孙学凤王爱国刁丽丽纪华宇常科华高庆波李岩张媛媛文化产业专业高起专公教楼1056月28日10:00-11:30英语1:李振龙徐丽动漫产业:吕洋陈燕张德鑫许艳丽胡德强李猛曹帅李乐张龙杰林娜李婷婷6月28日13:30-15:00计算机基础:李振龙徐丽英语3:吕洋陈燕张德鑫许艳丽张强6月28日15:30-17:00英语2:吕洋李振龙陈燕传媒经营管理:张德鑫许艳丽6月29日所有科目补考地点:文史楼201。
精心整理
延宇振个人资料,名人故事
延宇振个人资料
中文名:延宇振
韩文名:???
英文名:Woo-jinYeon
别名:金峰会、徐智厚
图为延宇振现场签名
延宇振简介
延宇振984年7月5日出生于韩国江原道江陵市,韩国男演员,所属经济公司JUMPEntertainment。
毕业于世宗大学土木环境工程系。
服兵役期间任职于韩国陆军
仪仗队。
曾担任模特拍摄过多支平面及电视广告,并参加过首尔时装周走秀。
2009年通过短篇电影《朋友关系》出道。
之后参与了多部影视剧的拍摄,包括《灰姑娘的姐姐》,《鹊桥兄弟们》,《阿娘使道传》,《当男人恋爱时》等。
延宇振电视剧剧照
真。
20
204年参演SBS水木剧《来自星星的你》,饰演李载京和李辉京的大哥李汉京。
2009and2010Papers:Big-4Security ConferencespvoOctober13,2010NDSS20091.Document Structure Integrity:A Robust Basis for Cross-site Scripting Defense.Y.Nadji,P.Saxena,D.Song2.An Efficient Black-box Technique for Defeating Web Application Attacks.R.Sekar3.Noncespaces:Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.M.Van Gundy,H.Chen4.The Blind Stone Tablet:Outsourcing Durability to Untrusted Parties.P.Williams,R.Sion,D.Shasha5.Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.S.S.M.Chow,J.-H.Lee,L.Subramanian6.SybilInfer:Detecting Sybil Nodes using Social Networks.G.Danezis,P.Mittal7.Spectrogram:A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic.Yingbo Song,Angelos D.Keromytis,Salvatore J.Stolfo8.Detecting Forged TCP Reset Packets.Nicholas Weaver,Robin Sommer,Vern Paxson9.Coordinated Scan Detection.Carrie Gates10.RB-Seeker:Auto-detection of Redirection Botnets.Xin Hu,Matthew Knysz,Kang G.Shin11.Scalable,Behavior-Based Malware Clustering.Ulrich Bayer,Paolo Milani Comparetti,Clemens Hlauschek,Christopher Kruegel,Engin Kirda12.K-Tracer:A System for Extracting Kernel Malware Behavior.Andrea Lanzi,Monirul I.Sharif,Wenke Lee13.RAINBOW:A Robust And Invisible Non-Blind Watermark for Network Flows.Amir Houmansadr,Negar Kiyavash,Nikita Borisov14.Traffic Morphing:An Efficient Defense Against Statistical Traffic Analysis.Charles V.Wright,Scott E.Coull,Fabian Monrose15.Recursive DNS Architectures and Vulnerability Implications.David Dagon,Manos Antonakakis,Kevin Day,Xiapu Luo,Christopher P.Lee,Wenke Lee16.Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.Hong Chen,Ninghui Li,Ziqing Mao17.IntScope:Automatically Detecting Integer Overflow Vulnerability in X86Binary Using Symbolic Execution.Tielei Wang,Tao Wei,Zhiqiang Lin,Wei Zou18.Safe Passage for Passwords and Other Sensitive Data.Jonathan M.McCune,Adrian Perrig,Michael K.Reiter19.Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.Chris Karlof,J.Doug Tygar,David Wagner20.CSAR:A Practical and Provable Technique to Make Randomized Systems Accountable.Michael Backes,Peter Druschel,Andreas Haeberlen,Dominique UnruhOakland20091.Wirelessly Pickpocketing a Mifare Classic Card.(Best Practical Paper Award)Flavio D.Garcia,Peter van Rossum,Roel Verdult,Ronny Wichers Schreur2.Plaintext Recovery Attacks Against SSH.Martin R.Albrecht,Kenneth G.Paterson,Gaven J.Watson3.Exploiting Unix File-System Races via Algorithmic Complexity Attacks.Xiang Cai,Yuwei Gui,Rob Johnson4.Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86Processors.Bart Coppens,Ingrid Verbauwhede,Bjorn De Sutter,Koen De Bosschere5.Non-Interference for a Practical DIFC-Based Operating System.Maxwell Krohn,Eran Tromer6.Native Client:A Sandbox for Portable,Untrusted x86Native Code.(Best Paper Award)B.Yee,D.Sehr,G.Dardyk,B.Chen,R.Muth,T.Ormandy,S.Okasaka,N.Narula,N.Fullagar7.Automatic Reverse Engineering of Malware Emulators.(Best Student Paper Award)Monirul Sharif,Andrea Lanzi,Jonathon Giffin,Wenke Lee8.Prospex:Protocol Specification Extraction.Paolo Milani Comparetti,Gilbert Wondracek,Christopher Kruegel,Engin Kirda9.Quantifying Information Leaks in Outbound Web Traffic.Kevin Borders,Atul Prakash10.Automatic Discovery and Quantification of Information Leaks.Michael Backes,Boris Kopf,Andrey Rybalchenko11.CLAMP:Practical Prevention of Large-Scale Data Leaks.Bryan Parno,Jonathan M.McCune,Dan Wendlandt,David G.Andersen,Adrian Perrig12.De-anonymizing Social Networks.Arvind Narayanan,Vitaly Shmatikov13.Privacy Weaknesses in Biometric Sketches.Koen Simoens,Pim Tuyls,Bart Preneel14.The Mastermind Attack on Genomic Data.Michael T.Goodrich15.A Logic of Secure Systems and its Application to Trusted Computing.Anupam Datta,Jason Franklin,Deepak Garg,Dilsun Kaynar16.Formally Certifying the Security of Digital Signature Schemes.Santiago Zanella-Beguelin,Gilles Barthe,Benjamin Gregoire,Federico Olmedo17.An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols.Ralf Kuesters,Tomasz Truderung18.Sphinx:A Compact and Provably Secure Mix Format.George Danezis,Ian Goldberg19.DSybil:Optimal Sybil-Resistance for Recommendation Systems.Haifeng Yu,Chenwei Shi,Michael Kaminsky,Phillip B.Gibbons,Feng Xiao20.Fingerprinting Blank Paper Using Commodity Scanners.William Clarkson,Tim Weyrich,Adam Finkelstein,Nadia Heninger,Alex Halderman,Ed Felten 21.Tempest in a Teapot:Compromising Reflections Revisited.Michael Backes,Tongbo Chen,Markus Duermuth,Hendrik P.A.Lensch,Martin Welk22.Blueprint:Robust Prevention of Cross-site Scripting Attacks for Existing Browsers.Mike Ter Louw,V.N.Venkatakrishnan23.Pretty-Bad-Proxy:An Overlooked Adversary in Browsers’HTTPS Deployments.Shuo Chen,Ziqing Mao,Yi-Min Wang,Ming Zhang24.Secure Content Sniffing for Web Browsers,or How to Stop Papers from Reviewing Themselves.Adam Barth,Juan Caballero,Dawn Song25.It’s No Secret:Measuring the Security and Reliability of Authentication via’Secret’Questions.Stuart Schechter,A.J.Bernheim Brush,Serge Egelman26.Password Cracking Using Probabilistic Context-Free Grammars.Matt Weir,Sudhir Aggarwal,Bill Glodek,Breno de MedeirosUSENIX Security2009promising Electromagnetic Emanations of Wired and Wireless Keyboards.(Outstanding Student Paper)Martin Vuagnoux,Sylvain Pasini2.Peeping Tom in the Neighborhood:Keystroke Eavesdropping on Multi-User Systems.Kehuan Zhang,XiaoFeng Wang3.A Practical Congestion Attack on Tor Using Long Paths,Nathan S.Evans,Roger Dingledine,Christian Grothoff4.Baggy Bounds Checking:An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.Periklis Akritidis,Manuel Costa,Miguel Castro,Steven Hand5.Dynamic Test Generation to Find Integer Bugs in x86Binary Linux Programs.David Molnar,Xue Cong Li,David A.Wagner6.NOZZLE:A Defense Against Heap-spraying Code Injection Attacks.Paruj Ratanaworabhan,Benjamin Livshits,Benjamin Zorn7.Detecting Spammers with SNARE:Spatio-temporal Network-level Automatic Reputation Engine.Shuang Hao,Nadeem Ahmed Syed,Nick Feamster,Alexander G.Gray,Sven Krasser8.Improving Tor using a TCP-over-DTLS Tunnel.Joel Reardon,Ian Goldberg9.Locating Prefix Hijackers using LOCK.Tongqing Qiu,Lusheng Ji,Dan Pei,Jia Wang,Jun(Jim)Xu,Hitesh Ballani10.GATEKEEPER:Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.Salvatore Guarnieri,Benjamin Livshits11.Cross-Origin JavaScript Capability Leaks:Detection,Exploitation,and Defense.Adam Barth,Joel Weinberger,Dawn Song12.Memory Safety for Low-Level Software/Hardware Interactions.John Criswell,Nicolas Geoffray,Vikram Adve13.Physical-layer Identification of RFID Devices.Boris Danev,Thomas S.Heydt-Benjamin,Srdjan CapkunCP:Secure Remote Storage for Computational RFIDs.Mastooreh Salajegheh,Shane Clark,Benjamin Ransford,Kevin Fu,Ari Juels15.Jamming-resistant Broadcast Communication without Shared Keys.Christina Popper,Mario Strasser,Srdjan Capkun16.xBook:Redesigning Privacy Control in Social Networking Platforms.Kapil Singh,Sumeer Bhola,Wenke Lee17.Nemesis:Preventing Authentication and Access Control Vulnerabilities in Web Applications.Michael Dalton,Christos Kozyrakis,Nickolai Zeldovich18.Static Enforcement of Web Application Integrity Through Strong Typing.William Robertson,Giovanni Vigna19.Vanish:Increasing Data Privacy with Self-Destructing Data.(Outstanding Student Paper)Roxana Geambasu,Tadayoshi Kohno,Amit A.Levy,Henry M.Levy20.Efficient Data Structures for Tamper-Evident Logging.Scott A.Crosby,Dan S.Wallach21.VPriv:Protecting Privacy in Location-Based Vehicular Services.Raluca Ada Popa,Hari Balakrishnan,Andrew J.Blumberg22.Effective and Efficient Malware Detection at the End Host.Clemens Kolbitsch,Paolo Milani Comparetti,Christopher Kruegel,Engin Kirda,Xiaoyong Zhou,XiaoFeng Wang 23.Protecting Confidential Data on Personal Computers with Storage Capsules.Kevin Borders,Eric Vander Weele,Billy Lau,Atul Prakash24.Return-Oriented Rootkits:Bypassing Kernel Code Integrity Protection Mechanisms.Ralf Hund,Thorsten Holz,Felix C.Freiling25.Crying Wolf:An Empirical Study of SSL Warning Effectiveness.Joshua Sunshine,Serge Egelman,Hazim Almuhimedi,Neha Atri,Lorrie Faith Cranor26.The Multi-Principal OS Construction of the Gazelle Web Browser.Helen J.Wang,Chris Grier,Alex Moshchuk,Samuel T.King,Piali Choudhury,Herman VenterACM CCS20091.Attacking cryptographic schemes based on”perturbation polynomials”.Martin Albrecht,Craig Gentry,Shai Halevi,Jonathan Katz2.Filter-resistant code injection on ARM.Yves Younan,Pieter Philippaerts,Frank Piessens,Wouter Joosen,Sven Lachmund,Thomas Walter3.False data injection attacks against state estimation in electric power grids.Yao Liu,Michael K.Reiter,Peng Ning4.EPC RFID tag security weaknesses and defenses:passport cards,enhanced drivers licenses,and beyond.Karl Koscher,Ari Juels,Vjekoslav Brajkovic,Tadayoshi Kohno5.An efficient forward private RFID protocol.Come Berbain,Olivier Billet,Jonathan Etrog,Henri Gilbert6.RFID privacy:relation between two notions,minimal condition,and efficient construction.Changshe Ma,Yingjiu Li,Robert H.Deng,Tieyan Li7.CoSP:a general framework for computational soundness proofs.Michael Backes,Dennis Hofheinz,Dominique Unruh8.Reactive noninterference.Aaron Bohannon,Benjamin C.Pierce,Vilhelm Sjoberg,Stephanie Weirich,Steve Zdancewicputational soundness for key exchange protocols with symmetric encryption.Ralf Kusters,Max Tuengerthal10.A probabilistic approach to hybrid role mining.Mario Frank,Andreas P.Streich,David A.Basin,Joachim M.Buhmann11.Efficient pseudorandom functions from the decisional linear assumption and weaker variants.Allison B.Lewko,Brent Waters12.Improving privacy and security in multi-authority attribute-based encryption.Melissa Chase,Sherman S.M.Chow13.Oblivious transfer with access control.Jan Camenisch,Maria Dubovitskaya,Gregory Neven14.NISAN:network information service for anonymization networks.Andriy Panchenko,Stefan Richter,Arne Rache15.Certificateless onion routing.Dario Catalano,Dario Fiore,Rosario Gennaro16.ShadowWalker:peer-to-peer anonymous communication using redundant structured topologies.Prateek Mittal,Nikita Borisov17.Ripley:automatically securing web2.0applications through replicated execution.K.Vikram,Abhishek Prateek,V.Benjamin Livshits18.HAIL:a high-availability and integrity layer for cloud storage.Kevin D.Bowers,Ari Juels,Alina Oprea19.Hey,you,get offof my cloud:exploring information leakage in third-party compute clouds.Thomas Ristenpart,Eran Tromer,Hovav Shacham,Stefan Savage20.Dynamic provable data possession.C.Christopher Erway,Alptekin Kupcu,Charalampos Papamanthou,Roberto Tamassia21.On cellular botnets:measuring the impact of malicious devices on a cellular network core.Patrick Traynor,Michael Lin,Machigar Ongtang,Vikhyath Rao,Trent Jaeger,Patrick Drew McDaniel,Thomas Porta 22.On lightweight mobile phone application certification.William Enck,Machigar Ongtang,Patrick Drew McDaniel23.SMILE:encounter-based trust for mobile social services.Justin Manweiler,Ryan Scudellari,Landon P.Cox24.Battle of Botcraft:fighting bots in online games with human observational proofs.Steven Gianvecchio,Zhenyu Wu,Mengjun Xie,Haining Wang25.Fides:remote anomaly-based cheat detection using client emulation.Edward C.Kaiser,Wu-chang Feng,Travis Schluessler26.Behavior based software theft detection.Xinran Wang,Yoon-chan Jhi,Sencun Zhu,Peng Liu27.The fable of the bees:incentivizing robust revocation decision making in ad hoc networks.Steffen Reidt,Mudhakar Srivatsa,Shane Balfe28.Effective implementation of the cell broadband engineTM isolation loader.Masana Murase,Kanna Shimizu,Wilfred Plouffe,Masaharu Sakamoto29.On achieving good operating points on an ROC plane using stochastic anomaly score prediction.Muhammad Qasim Ali,Hassan Khan,Ali Sajjad,Syed Ali Khayam30.On non-cooperative location privacy:a game-theoretic analysis.Julien Freudiger,Mohammad Hossein Manshaei,Jean-Pierre Hubaux,David C.Parkes31.Privacy-preserving genomic computation through program specialization.Rui Wang,XiaoFeng Wang,Zhou Li,Haixu Tang,Michael K.Reiter,Zheng Dong32.Feeling-based location privacy protection for location-based services.Toby Xu,Ying Cai33.Multi-party off-the-record messaging.Ian Goldberg,Berkant Ustaoglu,Matthew Van Gundy,Hao Chen34.The bayesian traffic analysis of mix networks.Carmela Troncoso,George Danezis35.As-awareness in Tor path selection.Matthew Edman,Paul F.Syverson36.Membership-concealing overlay networks.Eugene Y.Vasserman,Rob Jansen,James Tyra,Nicholas Hopper,Yongdae Kim37.On the difficulty of software-based attestation of embedded devices.Claude Castelluccia,Aurelien Francillon,Daniele Perito,Claudio Soriente38.Proximity-based access control for implantable medical devices.Kasper Bonne Rasmussen,Claude Castelluccia,Thomas S.Heydt-Benjamin,Srdjan Capkun39.XCS:cross channel scripting and its impact on web applications.Hristo Bojinov,Elie Bursztein,Dan Boneh40.A security-preserving compiler for distributed programs:from information-flow policies to cryptographic mechanisms.Cedric Fournet,Gurvan Le Guernic,Tamara Rezk41.Finding bugs in exceptional situations of JNI programs.Siliang Li,Gang Tan42.Secure open source collaboration:an empirical study of Linus’law.Andrew Meneely,Laurie A.Williams43.On voting machine design for verification and testability.Cynthia Sturton,Susmit Jha,Sanjit A.Seshia,David Wagner44.Secure in-VM monitoring using hardware virtualization.Monirul I.Sharif,Wenke Lee,Weidong Cui,Andrea Lanzi45.A metadata calculus for secure information sharing.Mudhakar Srivatsa,Dakshi Agrawal,Steffen Reidt46.Multiple password interference in text passwords and click-based graphical passwords.Sonia Chiasson,Alain Forget,Elizabeth Stobert,Paul C.van Oorschot,Robert Biddle47.Can they hear me now?:a security analysis of law enforcement wiretaps.Micah Sherr,Gaurav Shah,Eric Cronin,Sandy Clark,Matt Blaze48.English shellcode.Joshua Mason,Sam Small,Fabian Monrose,Greg MacManus49.Learning your identity and disease from research papers:information leaks in genome wide association study.Rui Wang,Yong Fuga Li,XiaoFeng Wang,Haixu Tang,Xiao-yong Zhou50.Countering kernel rootkits with lightweight hook protection.Zhi Wang,Xuxian Jiang,Weidong Cui,Peng Ning51.Mapping kernel objects to enable systematic integrity checking.Martim Carbone,Weidong Cui,Long Lu,Wenke Lee,Marcus Peinado,Xuxian Jiang52.Robust signatures for kernel data structures.Brendan Dolan-Gavitt,Abhinav Srivastava,Patrick Traynor,Jonathon T.Giffin53.A new cell counter based attack against tor.Zhen Ling,Junzhou Luo,Wei Yu,Xinwen Fu,Dong Xuan,Weijia Jia54.Scalable onion routing with torsk.Jon McLachlan,Andrew Tran,Nicholas Hopper,Yongdae Kim55.Anonymous credentials on a standard java card.Patrik Bichsel,Jan Camenisch,Thomas Gros,Victor Shouprge-scale malware indexing using function-call graphs.Xin Hu,Tzi-cker Chiueh,Kang G.Shin57.Dispatcher:enabling active botnet infiltration using automatic protocol reverse-engineering.Juan Caballero,Pongsin Poosankam,Christian Kreibich,Dawn Xiaodong Song58.Your botnet is my botnet:analysis of a botnet takeover.Brett Stone-Gross,Marco Cova,Lorenzo Cavallaro,Bob Gilbert,MartinSzydlowski,Richard A.Kemmerer,Christopher Kruegel,Giovanni VignaNDSS20101.Server-side Verification of Client Behavior in Online Games.Darrell Bethea,Robert Cochran and Michael Reiter2.Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.S.Wolchok,O.S.Hofmann,N.Heninger,E.W.Felten,J.A.Halderman,C.J.Rossbach,B.Waters,E.Witchel3.Stealth DoS Attacks on Secure Channels.Amir Herzberg and Haya Shulman4.Protecting Browsers from Extension Vulnerabilities.Adam Barth,Adrienne Porter Felt,Prateek Saxena,and Aaron Boodman5.Adnostic:Privacy Preserving Targeted Advertising.Vincent Toubiana,Arvind Narayanan,Dan Boneh,Helen Nissenbaum and Solon Barocas6.FLAX:Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.Prateek Saxena,Steve Hanna,Pongsin Poosankam and Dawn Song7.Effective Anomaly Detection with Scarce Training Data.William Robertson,Federico Maggi,Christopher Kruegel and Giovanni Vignarge-Scale Automatic Classification of Phishing Pages.Colin Whittaker,Brian Ryner and Marria Nazif9.A Systematic Characterization of IM Threats using Honeypots.Iasonas Polakis,Thanasis Petsas,Evangelos P.Markatos and Spiros Antonatos10.On Network-level Clusters for Spam Detection.Zhiyun Qian,Zhuoqing Mao,Yinglian Xie and Fang Yu11.Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.Sushant Sinha,Michael Bailey and Farnam Jahanian12.Botnet Judo:Fighting Spam with Itself.A.Pitsillidis,K.Levchenko,C.Kreibich,C.Kanich,G.M.Voelker,V.Paxson,N.Weaver,S.Savage13.Contractual Anonymity.Edward J.Schwartz,David Brumley and Jonathan M.McCune14.A3:An Extensible Platform for Application-Aware Anonymity.Micah Sherr,Andrew Mao,William R.Marczak,Wenchao Zhou,Boon Thau Loo,and Matt Blaze15.When Good Randomness Goes Bad:Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.Thomas Ristenpart and Scott Yilek16.InvisiType:Object-Oriented Security Policies.Jiwon Seo and Monica m17.A Security Evaluation of DNSSEC with NSEC3.Jason Bau and John Mitchell18.On the Safety of Enterprise Policy Deployment.Yudong Gao,Ni Pan,Xu Chen and Z.Morley Mao19.Where Do You Want to Go Today?Escalating Privileges by Pathname Manipulation.Suresh Chari,Shai Halevi and Wietse Venema20.Joe-E:A Security-Oriented Subset of Java.Adrian Mettler,David Wagner and Tyler Close21.Preventing Capability Leaks in Secure JavaScript Subsets.Matthew Finifter,Joel Weinberger and Adam Barth22.Binary Code Extraction and Interface Identification for Security Applications.Juan Caballero,Noah M.Johnson,Stephen McCamant,and Dawn Song23.Automatic Reverse Engineering of Data Structures from Binary Execution.Zhiqiang Lin,Xiangyu Zhang and Dongyan Xu24.Efficient Detection of Split Personalities in Malware.Davide Balzarotti,Marco Cova,Christoph Karlberger,Engin Kirda,Christopher Kruegel and Giovanni VignaOakland20101.Inspector Gadget:Automated Extraction of Proprietary Gadgets from Malware Binaries.Clemens Kolbitsch Thorsten Holz,Christopher Kruegel,Engin Kirda2.Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.Matt Fredrikson,Mihai Christodorescu,Somesh Jha,Reiner Sailer,Xifeng Yan3.Identifying Dormant Functionality in Malware Programs.Paolo Milani Comparetti,Guido Salvaneschi,Clemens Kolbitsch,Engin Kirda,Christopher Kruegel,Stefano Zanero4.Reconciling Belief and Vulnerability in Information Flow.Sardaouna Hamadou,Vladimiro Sassone,Palamidessi5.Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.Bruno P.S.Rocha,Sruthi Bandhakavi,Jerry I.den Hartog,William H.Winsborough,Sandro Etalle6.Non-Interference Through Secure Multi-Execution.Dominique Devriese,Frank Piessens7.Object Capabilities and Isolation of Untrusted Web Applications.Sergio Maffeis,John C.Mitchell,Ankur Taly8.TrustVisor:Efficient TCB Reduction and Attestation.Jonathan McCune,Yanlin Li,Ning Qu,Zongwei Zhou,Anupam Datta,Virgil Gligor,Adrian Perrig9.Overcoming an Untrusted Computing Base:Detecting and Removing Malicious Hardware Automatically.Matthew Hicks,Murph Finnicum,Samuel T.King,Milo M.K.Martin,Jonathan M.Smith10.Tamper Evident Microprocessors.Adam Waksman,Simha Sethumadhavan11.Side-Channel Leaks in Web Applications:a Reality Today,a Challenge Tomorrow.Shuo Chen,Rui Wang,XiaoFeng Wang Kehuan Zhang12.Investigation of Triangular Spamming:a Stealthy and Efficient Spamming Technique.Zhiyun Qian,Z.Morley Mao,Yinglian Xie,Fang Yu13.A Practical Attack to De-Anonymize Social Network Users.Gilbert Wondracek,Thorsten Holz,Engin Kirda,Christopher Kruegel14.SCiFI-A System for Secure Face Identification.(Best Paper)Margarita Osadchy,Benny Pinkas,Ayman Jarrous,Boaz Moskovich15.Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes.Haowen Chan,Adrian Perrig16.Revocation Systems with Very Small Private Keys.Allison Lewko,Amit Sahai,Brent Waters17.Authenticating Primary Users’Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.Yao Liu,Peng Ning,Huaiyu Dai18.Outside the Closed World:On Using Machine Learning For Network Intrusion Detection.Robin Sommer,Vern Paxson19.All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution(but might have been afraid to ask).Thanassis Avgerinos,Edward Schwartz,David Brumley20.State of the Art:Automated Black-Box Web Application Vulnerability Testing.Jason Bau,Elie Bursztein,Divij Gupta,John Mitchell21.A Proof-Carrying File System.Deepak Garg,Frank Pfenning22.Scalable Parametric Verification of Secure Systems:How to Verify Ref.Monitors without Worrying about Data Structure Size.Jason Franklin,Sagar Chaki,Anupam Datta,Arvind Seshadri23.HyperSafe:A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.Zhi Wang,Xuxian Jiang24.How Good are Humans at Solving CAPTCHAs?A Large Scale Evaluation.Elie Bursztein,Steven Bethard,John C.Mitchell,Dan Jurafsky,Celine Fabry25.Bootstrapping Trust in Commodity Computers.Bryan Parno,Jonathan M.McCune,Adrian Perrig26.Chip and PIN is Broken.(Best Practical Paper)Steven J.Murdoch,Saar Drimer,Ross Anderson,Mike Bond27.Experimental Security Analysis of a Modern Automobile.K.Koscher,A.Czeskis,F.Roesner,S.Patel,T.Kohno,S.Checkoway,D.McCoy,B.Kantor,D.Anderson,H.Shacham,S.Savage 28.On the Incoherencies in Web Browser Access Control Policies.Kapil Singh,Alexander Moshchuk,Helen J.Wang,Wenke Lee29.ConScript:Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.Leo Meyerovich,Benjamin Livshits30.TaintScope:A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.(Best Student Paper)Tielei Wang,Tao Wei,Guofei Gu,Wei Zou31.A Symbolic Execution Framework for JavaScript.Prateek Saxena,Devdatta Akhawe,Steve Hanna,Stephen McCamant,Dawn Song,Feng MaoUSENIX Security20101.Adapting Software Fault Isolation to Contemporary CPU Architectures.David Sehr,Robert Muth,CliffBiffle,Victor Khimenko,Egor Pasko,Karl Schimpf,Bennet Yee,Brad Chen2.Making Linux Protection Mechanisms Egalitarian with UserFS.Taesoo Kim and Nickolai Zeldovich3.Capsicum:Practical Capabilities for UNIX.(Best Student Paper)Robert N.M.Watson,Jonathan Anderson,Ben Laurie,Kris Kennaway4.Structuring Protocol Implementations to Protect Sensitive Data.Petr Marchenko,Brad Karp5.PrETP:Privacy-Preserving Electronic Toll Pricing.Josep Balasch,Alfredo Rial,Carmela Troncoso,Bart Preneel,Ingrid Verbauwhede,Christophe Geuens6.An Analysis of Private Browsing Modes in Modern Browsers.Gaurav Aggarwal,Elie Bursztein,Collin Jackson,Dan Boneh7.BotGrep:Finding P2P Bots with Structured Graph Analysis.Shishir Nagaraja,Prateek Mittal,Chi-Yao Hong,Matthew Caesar,Nikita Borisov8.Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems.Chad R.Meiners,Jignesh Patel,Eric Norige,Eric Torng,Alex X.Liu9.Searching the Searchers with SearchAudit.John P.John,Fang Yu,Yinglian Xie,Martin Abadi,Arvind Krishnamurthy10.Toward Automated Detection of Logic Vulnerabilities in Web Applications.Viktoria Felmetsger,Ludovico Cavedon,Christopher Kruegel,Giovanni Vigna11.Baaz:A System for Detecting Access Control Misconfigurations.Tathagata Das,Ranjita Bhagwan,Prasad Naldurg12.Cling:A Memory Allocator to Mitigate Dangling Pointers.Periklis Akritidis13.ZKPDL:A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.Sarah Meiklejohn,C.Chris Erway,Alptekin Kupcu,Theodora Hinkle,Anna Lysyanskaya14.P4P:Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users.Yitao Duan,John Canny,Justin Zhan,15.SEPIA:Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics.Martin Burkhart,Mario Strasser,Dilip Many,Xenofontas Dimitropoulos16.Dude,Where’s That IP?Circumventing Measurement-based IP Geolocation.Phillipa Gill,Yashar Ganjali,Bernard Wong,David Lie17.Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.Roya Ensafi,Jong Chun Park,Deepak Kapur,Jedidiah R.Crandall18.Building a Dynamic Reputation System for DNS.Manos Antonakakis,Roberto Perdisci,David Dagon,Wenke Lee,Nick Feamster19.Scantegrity II Municipal Election at Takoma Park:The First E2E Binding Governmental Election with Ballot Privacy.R.Carback,D.Chaum,J.Clark,J.Conway,A.Essex,P.S.Herrnson,T.Mayberry,S.Popoveniuc,R.L.Rivest,E.Shen,A.T.Sherman,P.L.Vora20.Acoustic Side-Channel Attacks on Printers.Michael Backes,Markus Durmuth,Sebastian Gerling,Manfred Pinkal,Caroline Sporleder21.Security and Privacy Vulnerabilities of In-Car Wireless Networks:A Tire Pressure Monitoring System Case Study.Ishtiaq Rouf,Rob Miller,Hossen Mustafa,Travis Taylor,Sangho Oh,Wenyuan Xu,Marco Gruteser,Wade Trappe,Ivan Seskar 22.VEX:Vetting Browser Extensions for Security Vulnerabilities.(Best Paper)Sruthi Bandhakavi,Samuel T.King,P.Madhusudan,Marianne Winslett23.Securing Script-Based Extensibility in Web Browsers.Vladan Djeric,Ashvin Goel24.AdJail:Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements.Mike Ter Louw,Karthik Thotta Ganesh,V.N.Venkatakrishnan25.Realization of RF Distance Bounding.Kasper Bonne Rasmussen,Srdjan Capkun26.The Case for Ubiquitous Transport-Level Encryption.Andrea Bittau,Michael Hamburg,Mark Handley,David Mazieres,Dan Boneh27.Automatic Generation of Remediation Procedures for Malware Infections.Roberto Paleari,Lorenzo Martignoni,Emanuele Passerini,Drew Davidson,Matt Fredrikson,Jon Giffin,Somesh Jha28.Re:CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context.Marti Motoyama,Kirill Levchenko,Chris Kanich,Damon McCoy,Geoffrey M.Voelker,Stefan Savage29.Chipping Away at Censorship Firewalls with User-Generated Content.Sam Burnett,Nick Feamster,Santosh Vempala30.Fighting Coercion Attacks in Key Generation using Skin Conductance.Payas Gupta,Debin GaoACM CCS20101.Security Analysis of India’s Electronic Voting Machines.Scott Wolchok,Erik Wustrow,J.Alex Halderman,Hari Prasad,Rop Gonggrijp2.Dissecting One Click Frauds.Nicolas Christin,Sally S.Yanagihara,Keisuke Kamataki3.@spam:The Underground on140Characters or Less.Chris Grier,Kurt Thomas,Vern Paxson,Michael Zhang4.HyperSentry:Enabling Stealthy In-context Measurement of Hypervisor Integrity.Ahmed M.Azab,Peng Ning,Zhi Wang,Xuxian Jiang,Xiaolan Zhang,Nathan C.Skalsky5.Trail of Bytes:Efficient Support for Forensic Analysis.Srinivas Krishnan,Kevin Z.Snow,Fabian Monrose6.Survivable Key Compromise in Software Update Systems.Justin Samuel,Nick Mathewson,Justin Cappos,Roger Dingledine7.A Methodology for Empirical Analysis of the Permission-Based Security Models and its Application to Android.David Barrera,H.Gunes Kayacik,Paul C.van Oorschot,Anil Somayaji8.Mobile Location Tracking in Metropolitan Areas:malnets and others.Nathanial Husted,Steve Myers9.On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels:The Case of Acoustic Eavesdropping.Tzipora Halevi,Nitesh Saxena10.PinDr0p:Using Single-Ended Audio Features to Determine Call Provenance.Vijay A.Balasubramaniyan,Aamir Poonawalla,Mustaque Ahamad,Michael T.Hunter,Patrick Traynor11.Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes.Sanjam Garg,Abishek Kumarasubramanian,Amit Sahai,Brent Waters12.Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade.Dan Boneh,Hart Montgomery,Ananth Raghunathan13.Practical Leakage-Resilient Pseudorandom Generators.Yu Yu,Francois-Xavier Standaert,Olivier Pereira,Moti Yung14.Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions.Sherman S.M.Chow,Yevgeniy Dodis,Yannis Rouselakis,Brent Waters15.Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords.Matt Weir,Sudhir Aggarwal,Michael Collins,Henry Stern16.The Security of Modern Password Expiration:An Algorithmic Framework and Empirical Analysis.Yinqian Zhang,Fabian Monrose,Michael K.Reiter17.Attacks and Design of Image Recognition CAPTCHAs.Bin Zhu,JeffYan,Chao Yang,Qiujie Li,Jiu Liu,Ning Xu,Meng Yi18.Robusta:Taming the Native Beast of the JVM.Joseph Siefers,Gang Tan,Greg Morrisett19.Retaining Sandbox Containment Despite Bugs in Privileged Memory-Safe Code.Justin Cappos,Armon Dadgar,JeffRasley,Justin Samuel,Ivan Beschastnikh,Cosmin Barsan,Arvind Krishnamurthy,Thomas Anderson20.A Control Point for Reducing Root Abuse of File-System Privileges.Glenn Wurster,Paul C.van Oorschot21.Modeling Attacks on Physical Unclonable Functions.Ulrich Ruehrmair,Frank Sehnke,Jan Soelter,Gideon Dror,Srinivas Devadas,Juergen Schmidhuber22.Dismantling SecureMemory,CryptoMemory and CryptoRF.Flavio D.Garcia,Peter van Rossum,Roel Verdult,Ronny Wichers Schreur23.Attacking and Fixing PKCS#11Security Tokens.Matteo Bortolozzo,Matteo Centenaro,Riccardo Focardi,Graham Steel24.An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications.Dongseok Jang,Ranjit Jhala,Sorin Lerner,Hovav Shacham25.DIFC Programs by Automatic Instrumentation.William Harris,Somesh Jha,Thomas Reps26.Predictive Black-box Mitigation of Timing Channels.Aslan Askarov,Danfeng Zhang,Andrew Myers27.In Search of an Anonymous and Secure Lookup:Attacks on Structured Peer-to-peer Anonymous Communication Systems.Qiyan Wang,Prateek Mittal,Nikita Borisov28.Recruiting New Tor Relays with BRAIDS.Rob Jansen,Nicholas Hopper,Yongdae Kim29.An Improved Algorithm for Tor Circuit Scheduling.Can Tang,Ian Goldberg30.Dissent:Accountable Anonymous Group Messaging.Henry Corrigan-Gibbs,Bryan Ford31.Abstraction by Set-Membership—Verifying Security Protocols and Web Services with Databases.Sebastian Moedersheim。
姓名:付华锋英文名:Victor性别:男出生年月:1987年10月居住:北京星座: 天秤座身高:183cm体重:72kg肩宽:48cm裤长:107cm三围:96cm78cm98cm鞋码:44#特长:表演、唱歌、舞蹈、武术、吉他、笛子、主持、配音、驾驶、T台、骑马、篮球、网球、游泳、各项体育运动等语言:普通话、英语、上海话、河南话、山东话等微博:/victorhua毕业院校:上海电影学院详细简介:请登陆网上搜索:华峰03年获首届中国青少年演艺推新人大赛的“最佳演员奖”!05年考入电影学院后就多次参加舞台剧、影视剧拍摄。
电影:2012年《父亲的脚步父亲的脚》——陈明文(男主角)导演:高聿延2012年《为梦想跑》—饰演苏狗子(男二号)导演:赵振华段训杰2011年《危险关系》—饰演杜芬玉的男友(杜芬玉章子怡饰演)导演:许秦豪2011年《喜剧王》—饰演小刚导演:唐煜2008年《八十一格》—饰演袁翔(配角)导演:张瑜电视剧:2012年《金玉满堂》—饰演胡康(配角)导演:苏沅峰2012年《女人的眼泪》—饰演周雅立导演:邓鉴泉2011年《曹操》—饰演曹植(配角)导演:胡玫2011年《兄弟海》—饰演唐志礼、马义(主配角)导演:阚卫平2011年《乱世佳人》—饰演阿彪(配角)导演:吴锦源2011年《开天辟地》—饰演张太雷导演:胡玫2011年《法兰西岁月》—饰演毛遇顺导演:康洪雷2011年《辛亥革命》—饰演陈勤宜导演:唐国强2010年《回家》—饰演启民导演:梦继2010年《海魂》—饰演关大福(配角)导演:包福明主演的数字电影:2010年《海漂》—饰演阿飞(主演)2009年《上羊街市的主人》—饰演菜普头(主演)导演丁晓嵘主演的DV短片:2009年《酒精中毒急救》—饰演房鹏(外表坚强,内心十分脆弱的痴情男子)2008年《噎食急救》—饰演陈小明(朴实善良、有责任心且孝敬父母的青年人)2006年《学费》—饰演周强(身患绝症的贫困大学生)舞台剧:2011年《超时空电梯》—饰演阿福2009年《白雪公主和七个小矮人》—饰演王子2008年《魔椅》—饰演部长2007年《疯人院飞了》—饰演阿呆2004年《如此无情》—饰演艾博老人广告:2008年格力高 PotepoTVC(主角)2008年痘清%(百分百)TVC(主角)2008年英普雷(Inplay)GPS(主角)2008年喜力啤酒(Heineken)2010年固特异轮胎(Goodyear)TVC2011年张江品牌(A Brsve Hesrt)MV2012年美汁源果粒橙TVC(主角)2012瑞科手持式轮胎充气机(主角)以上是部分作品资料与经历,仅供参考,真诚期待合作!。
歌星光良个人资料光良(Michael Wong,1970年8月30日-),本名王光良,出生于马来西亚怡保,毕业于怡保三德国中,为马来西亚籍华裔创作型流行歌手。
下面是店铺给大家带来的歌星光良的个人资料,欢迎阅读!歌星光良个人资料:一、歌星光良的早年经历1993年签订第一份唱片合约。
1993年,光良个人演唱创作生涯签订第一份唱片合约。
第二年,光良制作天主教首张本地华语圣歌集,并在马来西亚与黄品冠合作发行《掌心》专辑,这也是两人的第一次合作。
1995年签约台湾滚石唱片。
1995年光良加盟滚石唱片,与黄品冠组成无印良品组合。
无印良品在台湾及马来西亚等地深受歌迷们的爱戴,发行了许多脍炙人口的歌曲。
但该组合在双方同意下已于2000年解散。
2001年发行光良个人第一次创作辑。
2001年光良发行《第1次个人创作专辑》。
清新依旧、真挚依旧,告别无印良品,光良单独面对事业上新的挑战,独立制作《第一次》,让人惊喜依旧。
同年光良在马来西亚开办的“ENCOREMUSIC”音乐学院正式开幕。
2006年举办首场个人全创作演唱会。
2006年,光良的歌曲《童话》在香港大热。
同年,光良在“华语音乐世界圣地”——红馆香港体育馆举行了《光良FirstTimeFairyTale 第一次童话演唱会》,这也是光良首场个人全创作演唱会。
而此时光良正式进军香港乐坛才半年。
二、歌星光良的演艺经历1990年前● 四年级学钢琴,中二开始创作,担任教堂华语歌咏教练。
● 1990年/参加30次大小各类型歌唱比赛,得过冠军、亚军、季军等奖项。
1993年-1994年● 1993年/个人演唱创作生涯签订第一份唱片合约。
● 1994年/制作天主教首张本地华语圣歌集。
● 1994年/于马来西亚与黄品冠合作发行『掌心』专辑。
1995年-1999年● 1995年/加盟滚石唱片,光良与品冠组成无印良品。
● 1996年/于台湾发行『掌心』专辑。
● 1997年/无印良品于台湾发行『无印良品X2』专辑。
CURRICULUM VITAE Wen-Jun Gao, M.D., Ph.D. Assistant Professor Department of Neurobiology and Anatomy Drexel University College of Medicine 2900 Queen Lane, Room 243 Philadelphia, PA 19129 Tel. 215-991-8907 Fax 215-843-9082 Email: wen-jun.gao@drexelmed.edu
EDUCATION 1979-1984 M.D., Pediatrics, Chongqing University of Medical Sciences, Chongqing, China 1984-1987 M.S., Neuroanatomy, Chongqing University of Medical Sciences, Chongqing, China 1994-1997 Ph.D., Neurobiology, Chinese Academy of Sciences, Shanghai Brain Res. Inst., China
POSTGRADUATE TRAINING 1983-1984 Resident, Children’s Hospital, affiliated with Chongqing University of Medical Sciences, Chongqing, China 1984-1987 Graduate Student and Teaching Assistant, Department of Anatomy, Chongqing University of Medical Sciences, Chongqing, China 1997-1999 Postdoctoral Associate, Dr. Sarah L. Pallas’s lab, Department of Biology, Georgia State University, Atlanta, USA 5/99-4/02 Postdoctoral Associate, Dr. Patricia S. Goldman-Rakic’s lab, Department of Neurobiology, Yale University School of Medicine, New Haven, USA
EMPLOYMENT 1987-1989 Instructor, Department of Anatomy, Chongqing University of Medical Sciences, Chongqing, China 1989-1994 Assistant Professor, Department of Anatomy, Chongqing University of Medical Sciences, Chongqing, China 1997-1999 Postdoctoral associate, Dept of Biology, Georgia State University, Atlanta, USA 1999-2002 Postdoctoral Associate, Dept of neurobiology, Yale University School of Medicine, New Haven, USA 2002-2005 Associate Research Scientist, Department of Neurobiology, Yale University School of Medicine, New Haven, USA 4/05-present Assistant Professor, Department of Neurobiology and Anatomy, Drexel University College of Medicine, Philadelphia, USA
SELECTED HONORS AND AWARDS 1. The Outstanding Young Teacher Award given by Sichuan Provincial Government in 1992 2. The D-Ao Scholarship Award of Chinese Academy of Sciences in 1996 3. The President’s Scholarship for Outstanding Graduate Student of Chinese Academy of Sciences in 1996 4. Young Investigator Award of International Congress on Schizophrenia Research 2001 (Vancouver, Canada) 5. NARSAD Young Investigator Award 2003 6. NARSAD Young Investigator Award 2005
PROFESSIONAL MEMBERSHIPS 1. Chinese Society for Anatomy, since 1987 2. Chinese Society for Neuroscience, since 1995 3. IBRO (International Brain Research Organization), since 1995 4. Society for Neuroscience (USA), since 1998
TEACHING EXPERIENCE 1984-1990 Human Anatomy, Chongqing University of Medical Sciences, China 1992-1994 Neurobiology, Chongqing University of Medical Sciences, China 1987-1994 Neuroanatomy, Chongqing University of Medical Sciences 2005 fall Introduction of Module I: Prefrontal cortex, Monoaminergic Systems, Addiction, and Psychotherapy. Topics in Neurobiology 2005-present Co-coordinator of departmental seminar 2006-2007 1. Advanced Neuroscience Course for graduate students. Topic: 1) Anatomy of learning and memory; 2) Neurochemistry and neurophysiology of brain reward circuit. 2. IFM Med Neurosci: limbic system lecture, laboratory, and review 2007- Co-director of Module II, Advanced Neuroscience Course (lectures and experimental design); PIL Neuroscience course: Limbic system (lecture and review); IFM Medical Neuroscience course (lecture and lab)
SUPPORT NARSAD 2003 Young Investigator Award. Mechanisms of antipsychotic drug action in prefrontal cortex. Funding periods: 7/1/03-6/30/05 NARSAD 2005 Young Investigator Award. Interactions of dopamine and NMDA receptors in prefrontal cortex. Funding periods: 7/1/05-6/30/07 Drexel Interdisciplinary Program Initiative/Pennsylvania Department of Health (Co-PI, Barry Waterhouse, PI) Pharmacology, physiology and behavioral testing of drugs used to treat cognitive and attentional disorders Funding periods: 7/1/07-6/30/08 NIH (PI, R21 MH232307) 2007 Role of NMDA receptors in schizophrenia pathological processes. Funding periods: 7/1/07-6/30/09 NIH(PI, NIH R01) 2009 Antipsychotic Mechanisms of mGluR Agonists in the MK-801 Model of Schizophrenia Funding periods: 7/1/09-6/30/2014
COMMITTEE SERVICES Departmental seminar coordinator (system neuroscience) Committee of Graduate Prelim Exam Chair, Graduate Qualifying Exam for the Neuroscience Program of Drexel University, 2007-present Committee of Student Appeal, Drexel University The Steering Committee for the Neuroscience Program of Drexel University