
 Potential Theory and its Application to Rational and Harmonic Approximation


 Topological Invariants Associated with Quantum Field Theory
 Low dimensional topology
 Mathematical Physics
 Differential Geometry of Robotics

Bei Xiaohui 
 Algorithmic game theory
 Mechanism design
 Resource allocation
 Social network analysis


 Algebraic Design Theory
 Finite Geometry
 Algebraic Number Theory


 Applications of the MittagLeffler theorem to number theory
 Indefinite theta functions


 Lasserre’s new approximations of nonnegativity on closed sets and copositive programming


 Education and learning analytics
 Urban analytics
 Topological data analysis
 Algebraic topology
 Theory of knots and braids

Gary Royden Watson Greaves 
 Spectral graph theory
 Algebraic Combinatorics

Guo Jian 
 Cryptanalysis of SymmetricKey Cryptography, such as AES block cipher, SHA3 hash function
 Secure Implementation of SymmetricKey Cryptography standards
 Lightweight Cryptography
 Privacy Preserving Technolgies


 Bayesian inverse problems and data assimilation  blending statistics with applied mathematics
 Analysis of problems with multiple scales


 Computer methods in the discovery and proof of combinatorial identities
 Majority logic codes and combinatorial designs


 Fourier analysis on the Boolean cube with applications to computational complexity


 Complex Analysis (Function Theory) in Several Variables
 Applications in Theory of Representing Systems
 Functional Equations and Approximation of Functions

Lim Kay Jin 
 Representation theory of symmetric groups, Hecke algebras and related algebras


 Calibrating the exact axiomatic strength of mathematical statements
 Algorithmic information theory in real world applications
 Topological games and algorithms


 Coding theory and security


 Applications of Probability
 High dimensional hypothesis test

Pun Chi Seng 
 Financial/actuarial problems: derivatives pricing, investment, insurance/reinsurance
 Data analysis problems: statistical learning, highdimensional statistics, data mining


 Invariant transformations of Poisson point samples
 Noise detection by SURE shrinkage in continuous time


 Banach Stone Theorem
 Geometry of Banach Spaces
 Functions of Baire Class One


 Symmetric Key Cryptography
 Lightweight Cryptography
 Cryptanalysis

Tong Ping 
 Inverse problems
 Numerical methods for partial differential equations
 Mathematical tools for oil and gas exploration
 Earthquakes
 Subsurface imaging of the earth planet


 Combinatorial Cryptography
 Secure MultiParty Computation


 Simulation of Physical and Engineering problems by computer with high precision
 Image processing via partial differential equations and numerical means


 Effective combinatorics
 Computable algebra
 Automatic structures


 Cryptanalysis of symmetric key ciphers
 Security evaluation of cryptography in applications
 Software vulnerability detection and mitigation

Xiang Liming 
 Applications of survival analysis methods
 Statistical inference through simulations

Xia Kelin 
 Deep learning based drug design
 Topological data analysis (TDA)
 Biomolecular data analysis


 Design and Analysis of Clinical Trials
 Application of Linear Mixed Models
