Plan the three milestone defenses across years two and three
Prepare a blind thesis copy and the named copy for the advisor
Track the seven preparation steps before the final defense day
Use the closing timetable and committee resolution template at submission time
Documentation only, written in Chinese for XJTU cybersecurity master's students.
This repository is not code. It is a Chinese language handbook for master's students at the School of Cyberspace Security at Xi'an Jiaotong University in China. The author spent three years in that program, found the administrative office slow and unhelpful, and wrote a step by step guide so future students do not get stuck on the same paperwork. The document was compiled in May 2026 and combines two source documents, one from the wider Electronic and Information department and one specific to the cybersecurity school. The guide walks through three milestones that every student has to clear. The first is the opening report at the end of year two semester one, where the student picks a thesis topic with their advisor and gives a short proposal defense. The README notes that this stage is easy to pass and the topic can still be changed later. The second is the mid term defense at the end of year two semester two, a 20 minute in person session at the Xingqing campus with three to five faculty asking questions. The bottom ten percent of mid term scores trigger a double blind review of the final thesis later. The third and longest section is the final thesis defense in year three semester two. Because the school posts the official notice very late each year, the author tells readers to keep watching the school website at eiegrad.xjtu.edu.cn and to grab the PPT template from vi.xjtu.edu.cn. The notice comes with numbered appendices, and the guide explains exactly what each one is for, including appendix 5 for the revision statement, appendices 8 and 9 for the reviewer comments, and appendix 11 for the defense secretary, which is needed because the cybersecurity school does not have an official defense secretary and each advisor has to find one. The defense workflow itself is broken into seven preparation steps. Students check their personal info on xuexin.com and the graduate management system gmis.xjtu.edu.cn, prepare a blind version of the thesis with names removed, submit one blind copy to the school secretary and one named copy to the advisor, revise the paper according to two sets of comments, file the degree application on gmis, print the review materials, and hand the packet to the class leader who then walks it to the graduate office. On the day of the defense the student brings five bound copies, the signed revision statements, the slides, and a spare copy. After the defense the paper has to be revised again and re checked for similarity below eight percent. The final submission is two paper copies to the school, one to the library, and an electronic copy to the secretary. The guide closes with a full timetable and a template for the defense committee resolution.
Generated 2026-05-22 · Model: sonnet-4-6 · Verify against the repo before relying on details.