当前位置: X-MOL首页全球导师 国内导师 › 王莘

个人简介

王莘,博士,教授,博士生导师。2012年毕业于哈尔滨工业大学计算机科学与技术学院信息安全专业,师承牛夏牧教授。2013年就职于信息对抗技术研究所。自任职以来先后主持国家自然科学基金及国防类科研项目40余项,发表SCI论文50余篇。2021年提出的“×××对国家安全的影响分析”建言获中央办公厅批示。同年获得哈尔滨工业大学保密先进个人称号。2022年在计算学部一校三区教学基本功大赛中获得一等奖。 教育经历 2001-03 至 2003-09 德国德累斯顿工业大学 电气工程与信息技术 学士 2003-10 至 2007-01 德国德累斯顿工业大学 电气工程与信息技术 硕士 2007-09 至 2012-07 哈尔滨工业大学 信息安全 博士 工作经历 2013-03 至 2016-11 哈尔滨工业大学 计算机科学与技术学院 讲师 2015-03 至 2019-03 哈尔滨工业大学 计算机科学与技术专业 硕士生导师 2016-12 至 2022-12 哈尔滨工业大学 计算机科学与技术学院 副教授 2019-03 至今 哈尔滨工业大学 网络空间安全专业 博士生导师 2020-05 至今 哈尔滨工业大学 网络空间安全学院 副院长 2022-12 至今 哈尔滨工业大学 网络空间安全学院 教授

研究领域

工业控制系统安全,人工智能安全,多媒体安全

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Shen Wang , Zhaoyang Zhang, Guopu Zhu*, Xinpeng Zhang, Yicong Zhou, Jiwu Huang.Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. IEEE Transactions on Information Forensics and Security. vol. 18, pp. 351-364, 2023. Yihan Yan, Xiaojun Tong, Shen Wang*. Clustered federated learning in heterogeneous environment. IEEE Transactions on Neural Networks and Learning Systems. 10.1109/TNNLS.2023.3264740,2023. Yuxin Gong, Shen Wang*, Xunzhi Jiang, Liyao Yin, Fanghui Sun. Adversarial example detection using semantic graph matching. Applied Soft Computing, 141 (2023) 110317. Shen Wang*, Yuxin Gong. Adversarial Example Detection Based on Saliency Map Features. Applied Intelligence, 52, 6262–6275, 2022. Junfeng Zhao, Shen Wang*. A stable GAN for image steganography with multi-order feature fusion. Neural Computing and Applications.2022(34):16073-16088, 2022. Fanghui Sun, Shen Wang*, Chunrui Zhang. Hongli Zhang, Unsupervised field segmentation of unknown protocol messages. Computer Communications, 2019, 146:121-130. Fanghui Sun, Shen Wang*, Chunrui Zhang. Hongli Zhang, Clustering of unknown protocol messages based on format comparison. Computer Networks, 2020, 179:107296. Fanghui Sun, Shen Wang*, Hongli Zhang. A Progressive Learning Method on Unknown Protocol Behaviors, Journal of Network and Computer Applications,Volume 197, January 2022:103249. Shen Wang, Fanghui Sun, Jeng-Shyang Pan*, Hongli Zhang, A novel method for CCSDS-TC recognition, Journal of Internet Technology, 2020, 03:313-322. Tingyue Yu, Shen Wang*, Xiangzhan Yu. Global Wasserstein Margin Maximization for Boosting Generalization in Adversarial Training. Applied Intelligence, doi.org/10.1007/s10489-022-03480-w, 2022. Tingyue Yu, Shen Wang*, Chunrui Zhang, Zhenbang Wang, Yetian Li, Xiangzhan Yu. Targeted adversarial examples generating method based on cVAE in black box settings. Chinese Journal of Electronics,30(5), 2021: 866-875. Chunrui Zhang*, Shen Wang, Dechen Zhan, Yonghui Yang.Automatic determination of types number of mixed binary protocols.IET Commun., 2019, Vol 13 : 1769-1775. Chunrui Zhang*, Shen Wang, Dechen Zhan, Mingyong Yin,Fang Lou. Inferring Users’Social Roles with a Multi-Level Graph Neural Network Model[J]. Entropy, 2021, 23(11), 1453. Chunrui Zhang, Shen Wang, Dechen Zhan, Tingyue Yu, Tiangang Wang, Mingyong Yin. Detecting Insider threat from behavioral logs based on ensemble and selfsupervised learning [J]. Security and Communication Networks, 2021, 4148441:1-11. Chunrui Zhang, Gang Wang*, Shen Wang, Dechen Zhan, Mingyong Yin. Cross-Domain Network Attack Detection Enabled by Heterogeneous Transfer Learning. Computer Networks,Volume 227, May 2023, 109692. Xunzhi Jiang, Shen Wang*, Xiangzhan Yu, Yuxin Gong. Double-Layer Positional Encoding Embedding Method for Cross-Platform Binary Function Similarity Detection. Chinese Journal of Electronics, 2022, 31(4): 604-611. Shen Wang*, Chen Cui, Xiamu Niu. A Novel DIBR 3D Image Watermarking Algorithm Resist to Geometrical Attacks. Chinese Journal of Electronics, 2017, 26(6):1184-1193. Shen Wang, Xianhua Song*. Quantum Video Information Hiding Based on Improved LSQb and Motion Vector. Journal of Internet Technology, 2017, 18(6),1361-1368. Shen Wang* and Xiamu Niu. Hiding Traces of Double Compression in JPEG Images Based on Tabu Search. Neural Computing and Applications, May 2012, 22(1): 283~291. Shen Wang* and Xiamu Niu. Cover the Trace of Image Fogery by PSO. Journal of Internet Technology. 2013,14(1):161-168. Shen Wang and Xiamu Niu. A Countermeasure against Double Compression Based Image Forensic. IEICE Transaction on Information & System. 2012, D(10), 2577-2580. Shen Wang*, Chen Cui, Xiamu Niu. Watermarking for DIBR 3D Images Based on SIFT Feature Points. Measurement, 2014, 48(1), 54-62. Shen Wang*, Xuehu Yan, Jianzhi Sang, Xiamu Niu. Meaningful visual secret sharing based on error diffusion and random grids.Multimedia Tools and Applications, 75(6):3353-3373, 2015. Shen Wang*, Jianzhi Sang, Qi Han, Xiamu Niu. Least Significant Qubit (LSQb) information hiding Algorithm for Quantum Image. Measurement, 2015,73, p 352-359. Shen Wang*, Xianhua Song, Xiamu Niu. Quantum Cosine Transform Based Watermarking Scheme for Quantum Images. Chinese Journal of Electronics, 2015, 24(2):321-325. Shen Wang*, Xunzhi Jiang, Xiangzhan Yu, Xiaohui Su, Cross-Platform Binary Code Homology Analysis Based on GRU Graph Embedding, Security and Communication Networks, vol. 2021, Article ID 3095203, 8 pages, 2021. Xianhua Song, Shen Wang*, Shuai Liu, A. A. A. El-Latif, Xiamu Niu. A Dynamic Watermarking Scheme for Quantum Images Using Quantum Wavelet Transform. Quantum Information Processing, 2013, 12(12): 3689-3704. Xianhua Song, Shen Wang*, A. A. A. El-Latif, Xiamu Niu. Quantum Image Encryption Based on Restricted Geometric and Color Transformations. Quantum Information Processing, 2014, 13(8): 1765-1787. Xianhua Song, Shen Wang*, A. A. A. El-Latif, Xiamu Niu. Dynamic Watermarking Scheme for Quantum Images Based on Hadamard Transform. Multimedia Systems, 2014, 20(4): 379-388. Xianhua Song, Shen Wang*, Siuming Yiu, Lin Jiang, Xiamu Niu. Detection of Image Region Duplication Using Spin Image. IEICE Transaction on Information and Systems, 2013, E96(7): 1565-1568. Jianzhi Sang, Shen Wang*, Xiamu Niu. Quantum Realization of Nearest Neighbor Interpolation for FRQI and NEQR[J]. Quantum Information Processing, 2016, 15(1), 37-64. Jianzhi Sang, Shen Wang*, Xiamu Niu. Quantum Realization of Arnold Scrambling for IFRQI. International Journal of Theoretical Physics, 2016, 55(8), 3706-3721. Jianzhi Sang, Shen Wang, Qiong Li. Least Significant Qubit Algorithm for Quantum Images. Quantum Information Processing, 2016, vol. 15(11), 4441-4460. Xuehu Yan, Shen Wang*, and Xiamu Niu. Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Processing, Volume 105, December 2014: 389-398. Xuehu Yan*, Shen Wang*, Xiamu Niu and Ching-Nung Yang. Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Processing,109, 2015, 317-333. Xuehu Yan, Shen Wang*, Xiamu Niu and Ching-Nung Yang. Random gridbased visual secret sharing with multiple decryptions. Journal of Visual Communication and Image Representation, Volume 26, January 2015: 94–104. Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimedia Tools and Applications, 24 December 2013: 1-22. Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. Random gridsbased visual secret sharing with improved visual quality via error diffusion. Multimedia Tools and Applications, 13 June 2014: 1-18. Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. New approaches for efficient information hiding-based secret image sharing schemes. Signal, Image and Video Processing, 12 Apr 2013:1-12. Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. Threshold Visual Secret Sharing with Comprehensive Properties Based on Random Grids. Signal, Image and Video Processing. 06 Apr 2014: 1-10. Xuehu Yan, Shen Wang*, Ahmed A. Abd El-Latif, and Xiamu Niu. A novel perceptual secret sharing scheme. Transactions on Data Hiding and Multimedia Security IX Lecture Notes in Computer Science, 2014, Volume 8363: 68-90. Xuehu Yan, Shen Wang*, and Xiamu Niu. Threshold visual secret sharing based on Boolean operations and random grids. International Conference on Neural Information Processing 2014 Conference(ICONIP-2014). 3 - 6 November 2014, Kuching, Sarawak, Malaysia, Part III, Lecture Notes in Computer Science(LNCS) 8836:620–627. Xuehu Yan, Shen Wang*, Xiamu Niu and Ching-Nung Yang. Essential visual cryptographic scheme with different importance of shares. International Conference on Neural Information Processing 2014 Conference(ICONIP-2014). 3-6 November 2014, Kuching, Sarawak, Malaysia, Part III, Lecture Notes in Computer Science(LNCS) 8836:636–643. Xuehu Yan*, Shen Wang*, Xiamu Niu and Ching-Nung Yang. Halftone visual cryptography with minimum auxiliary black pixels and improved image quality. Digital Signal Processing, 38, 2015, 53-65. Chen Cui,Shen Wang*,Xiamu Niu. A novel watermarking for DIBR 3D images with geometric rectification based on feature points. Multimedia Tools and Applications volume 76, pages649–677 (2017). Xin Liu*, Shen Wang, Jianzhi Sang, Weizhe Zhang. A novel mapping-based lossless recovery algorithm for VSS. Journal of Real-Time Image Processing, 2016, 14(1):51-60. Xin Liu*, Shen Wang, Xuehu Yan, Weizhe Zhang. Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. Multimedia Tools and Applications, 2018, 77(16):20673-20696. Xin Liu*, Shen Wang*, Jianzhi Sang, Weizhe Zhang. A Novel Lossless Recovery Algorithm for Basic Matrix-based VSS. Multimedia Tools and Applications, 2018, 77(13):16461-16476.

推荐链接
down
wechat
bug