个人简介
招生专业
083900-网络空间安全
招生方向
移动互联网安全,网络安全评测
工作简历
2019-11~现在, 中国科学院信息工程研究所, 正高级工程师
2013-11~2019-10,中国科学院信息工程研究所, 高级工程师
2011-10~2013-10,中国科学院信息工程研究所, 工程师
2003-08~2011-09,国家保密科学技术研究所, 工程师
奖励信息
(1) 计算机核查取证系统研制, 二等奖, 部委级, 2017
(2) 保密检查系统研制, 二等奖, 部委级, 2016
(3) 基于互联网的渗透检测技术研究, 三等奖, 部委级, 2013
(4) 306工程项目, 二等奖, 部委级, 2009
(5) 综合强审计系统, 二等奖, 部委级, 2005
专利成果
( 1 ) 一种图像文字识别的方法及装置, 2018, 第 5 作者, 专利号: ZL 201410191249.5
( 2 ) 一种ShellCode检测方法和装置, 2017, 第 4 作者, 专利号: ZL 201410191246.1
( 3 ) 一种自动化样本行为采集方法及其装置、系统, 2016, 第 3 作者, 专利号: 201610173908.1
( 4 ) 一种恶意PDF文档检测方法, 2016, 第 1 作者, 专利号: 201610173705.2
( 5 ) 一种图像关键词检查方法及装置, 2015, 第 2 作者, 专利号: 201510816513.4
( 6 ) 一种恶意文档检测方法及装置, 2019, 第 2 作者, 专利号: ZL 201710081580.5
( 7 ) 适于多个中文敏感词句的识别处理方法及装置, 2017, 第 2 作者, 专利号: 2017100721615
( 8 ) 重打包恶意应用的静态检测方法, 2019, 第 1 作者, 专利号: ZL 201710069633.1
( 9 ) 基于API的安卓恶意程序检测方法、装置及存储介质, 2018, 第 1 作者, 专利号: 201810796873.6
( 10 ) 一种基于多权限分类的Android应用威胁度评估模型, 2018, 第 1 作者, 专利号: 201810457339.2
( 11 ) 基于细粒度特征的Android恶意应用检测方法及装置, 2018, 第 1 作者, 专利号: 201810289216.2
( 12 ) Android恶意应用家族分类方法、装置与电子设备, 2018, 第 1 作者, 专利号: 201811621919.7
( 13 ) 隐私保护方法和装置, 2019, 第 2 作者, 专利号: 201910709096.1
科研项目
( 1 ) 108**子系统, 主持, 国家级, 2012-10--2015-06
( 2 ) **检查专用系统, 主持, 国家级, 2012-01--2014-12
( 3 ) 863**技术研究, 参与, 国家级, 2012-10--2014-10
( 4 ) 手机木马检查, 主持, 部委级, 2016-01--2016-12
( 5 ) 计算机保密核查取证技术研究, 主持, 国家级, 2016-07--2018-12
( 6 ) 电子政务邮件****系统研制, 主持, 国家级, 2018-07--2019-06
( 7 ) 网站、OA系统****检查系统研制, 主持, 院级, 2018-04--2019-09
参与会议
(1)Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection 2019-09-17
(2)A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph 2017-10-10
近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
(1) A Two-Stage Model Based on BERT for Short Fake News, KSEM, 2019, 第 1 作者
(2) Android Malware Family Classification Based on Sensitive Opcode Sequence, ISCC, 2019, 第 5 作者
(3) Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection, ICANN, 2019, 第 4 作者
(4) Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection, MILCOM, 2019, 第 5 作者
(5) Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation, MILCOM, 2019, 第 5 作者
(6) A unified malicious documents detection model based on two layers of abstraction, HPCC, 2019, 第 6 作者
(7) Malicious documents detection for business process management based on multi-layer abstract model, FGCS, 2019, 第 6 作者
(8) WMUD: A Whitelist Method of USB Devices Redirection for Virtual Desktop, HPCC, 2019, 第 1 作者
(9) Machine Tools Fingerprinting for Distributed Numerical Control Systems, LCN, 2019, 第 4 作者
(10) URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls, IPCCC, 2018, 第 1 作者
(11) Prediction and Detection of Malicious Insiders’ Motivation based on Sentiment Profile on Webpages and Emails, MILCOM, 2018, 第 5 作者
(12) MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment, MASS, 2018, 第 5 作者
(13) AdvRefactor: A Resampling-Based Defense against Adversarial Attacks, PCM, 2018, 第 4 作者
(14) Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis, KSEM, 2018, 第 5 作者
(15) ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS, TrustCom, 2018, 第 7 作者
(16) MPP: A Join-dividing Method for Multi-table Privacy Preservation, ISCC, 2018, 第 4 作者
(17) FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection, Securecomm, 2018, 第 1 作者
(18) PSDEM: A Feasible De-Obfuscation Method for Malicious PowerShell Detection, ISCC, 2018, 第 1 作者
(19) FEPDF: A Robust Feature Extractor for Malicious PDF Detection, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), 2017, 第 6 作者
(20) Android malware detection combining feature correlation and Bayes classification model, 2017 9th IEEE International Conference on Communication Software and Networks (ICCSN 2017), 2017, 第 4 作者
(21) A Visualization Method Based on Graph Database in Security Logs Analysis, 2017 6th International Conference on Advanced Materials and Computer Science (ICAMCS 2017), 2017, 第 4 作者
(22) Mobile Social Network Forensic Analysis Based on Visualization Method, 2017 6th International Conference on Advanced Materials and Computer Science (ICAMCS 2017), 2017, 第 4 作者
(23) Detecting Malicious PDF Files Using Semi-Supervised Learning Method, 2017 5th International Conference on Advanced Computer Science Applications and Technologies (ACSAT 2017), 2017, 第 4 作者
(24) A Resource Management System Design for Malware Behavior Detection, 2016 International Conference on Computer Science, Technology and Application, 2016, 第 4 作者
(25) Combining Static and Dynamic Analysis for the Detection of Malicious JavaScript-bearing PDF Documents, 2016 International Conference on Computer Science, Technology and Application, 2016, 第 4 作者
(26) Modeling and Analysis of Information Theft Trojan Based on Stochastic Game Nets, 2015 International Conference on Information Science and Control Engineering, 2015, 通讯作者
(27) A Combined Malicious Document Detection Method Based on Emulator, International Conference on Precision Mechanical In, 2014, 第 3 作者
(28) Automatic Threat Assessment of Malware Based on Behavior Analysis, 2014 International Conference on Computer Applications and Applied Electronics, 2014, 第 4 作者
(29) Modelling and analysis of phishing attack using stochastic game nets, The International Conference on Cyberspace Technology, 2013, 通讯作者