必威电竞|足球世界杯竞猜平台

王偉
來源:互聯(lián)網(wǎng)

王偉,男,博士,現(xiàn)任北京交通大學計算機與信息技術(shù)學院教授、博士生導師,信息安全系主任,智能交通數(shù)據(jù)安全與隱私保護技術(shù)北京市重點實驗室副主任。

個人經(jīng)歷

2005年獲西安交通大學工學博士學位(導師:管曉宏院士);

2005-2006年在意大利Trento大學做博士后研究;

2007-2008年在法國布列塔尼電信學院及INRIA做博士后研究;

2009-2011年在挪威科學技術(shù)大學盧森堡大學擔任ERCIM Fellow;

2011年底加入北京交通大學

研究領域

他的研究領域主要集中在網(wǎng)絡空間安全專業(yè),包括網(wǎng)絡、系統(tǒng)、移動互聯(lián)網(wǎng)安全、區(qū)塊鏈安全及工業(yè)控制安全。

科研貢獻

王偉教授在國內(nèi)外學術(shù)期刊或國際會議上發(fā)表論文50余篇,其中SCI檢索論文20余篇,英文論文總被引770余次。

主要論文

期刊論文

Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang, Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning, USENIX Security 2024, Accepted [PDF]. [聯(lián)邦學習安全]

Xiaoting Lyu, Yufei Han, Wei Wang*, Hangwei Qian, Ivor Tsang, Xiangliang Zhang, Cross-Context Backdoor Attacks against Graph Prompt Learning, KDD 2024, accepted [PDF]. [聯(lián)邦學習安全]

Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, Wei Wang*, Not One Less: Exploring Interplay娛樂 between User Profiles and Items in Untargeted Attacks against Federated Recommendation, ACM CCS 2024, accepted [PDF] [聯(lián)邦推薦安全]

Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin (Sherman)Shen, Artificial Intelligence for Web 3.0: A Comprehensive Survey, ACM Computing Surveys, 2024, accepted [PDF]. [Web3.0]

Xueshuo Xie, Haoxu Wang, Zhaolong Jian and Li Tao, Wei Wang, Zhiwei Xu, Guiling Wang, Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices, IEEE Conference on 計算機 Communications (IEEE INFOCOM 2024), 溫哥華, Canada, 20–23 May 2024 (acceptance rate=256/1307=19.6%). 中國計算機學會夏培肅獎 A

Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, Yanchun Zhang, Enhancing Transferability of Adversarial Examples through Mixed-頻率 Inputs, IEEE Transactions on Information Forensics and Security, 2024, accepted

Chao Li, Balaji Palanisamy*, Runhua Xu, Li Duan, Jiqiang Liu*, Wei Wang*, How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance, Proceedings of The 30th ACM Conference on Computer and Communications Security (CCS 2023), 26-30 NOV., Copenhagen, Denmark, 2023 [DOI][PDF], (acceptance rate=234/1222=19.1%) CCF A [區(qū)塊鏈治理][2023年度中國區(qū)塊鏈技術(shù)領域(英文)優(yōu)秀論文][CCS 2023 Distinguished Paper Award]

Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Bin Wang, Jiqiang Liu, Xiangliang Zhang. Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning. Proceedings of Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023). Feb 7-14, 2023 Washington DC (Acceptance rate 1721/8777 = 19.6%). [DOI]PDF][CODE], CCF A [聯(lián)邦學習中的后門攻擊]

Yaguan Qian, Shuke He, Chenyu Zhao, Jiaqiang Sha, Wei Wang, Bin Wang, LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions, International Conference on 計算機 Vision (ICCV 2023), Paris, October 2023, CCF A [人工智能安全]

Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang*, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz, FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-hoc Networks.IEEE Transactions on Information Forensics and Security, [DOI]PDF][CODE] 2023, CCF A (early access) [聯(lián)邦學習隱私增強]

Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker, Multi-misconfiguration Diagnosis via Identifying Correlated Configuration Parameters, IEEE Transactions on Software Engineering, [DOI][PDF] 2023, early access, CCF A [軟件安全與分析]

Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang*, Yunjia Zhang, Qiang Li, Aimin Yu, Automatically Identifying CVE Affected Versions with Patches and Developer Logs, IEEE Transactions on Dependable and Secure Computing (TDSC), [DOI]PDF][CODE] 2023, CCF A (early access) [軟件漏洞挖掘]

Xiangrui Xu, Pengrui Liu, Wei Wang*, Hong-Liang Ma, Bin Wang, Zhen Han, and Yufei Han, CGIR: Conditional Generative Instance Reconstruction Attacks against Federated Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023 [DOI] [PDF][CODE] (early access), CCF A [聯(lián)邦學習中的隱私推理攻擊]

Heng Ye, Qiang Zeng, Jiqiang Liu, Xiaojiang Du, Wei Wang* : Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022 [DOI], CCF A (early access).

Wei Wang, Xiangyu Wei, Xiaoyang Suo, Bin Wang, Hao Wang, Hong-Ning Dai, Xiangliang Zhang: HGATE: Heterogeneous Graph Attention Auto-Encoders, IEEE Transactions on Knowledge and 數(shù)據(jù) Engineering, early access, 2022 [DOI], CCF A. ESI高被引論文

Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publishing with Multiple Evaluators, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 19, Issue: 1, pp. 67-76, 2022.ESI高被引論文

Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, Chunhua Su: ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.IEEE Transactions on Network Science and Engineering 8(2): 1133-1144 (2021) [DOI] ESI高被引論文. [智能合約漏洞挖掘]

Dawei Wang, Kai Chen*, Wei Wang*: Demystifying the Vetting Process of Voice-controlled Skills on Markets, Proc. ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (UbiComp 2021), 5(3): 130:1-130:28 (2021) [DOI], CCF A [智能音箱中的應用安全]

Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang*, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem, IEEE Transactions on Mobile Computing, vol. 19, no. 5, pp. 1184-1199, 2020 [DOI] CCF A, ESI高被引論文

Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for 傳播學s of Smart Vehicles”, IEEE Transactions on Intelligent 搬運作用 Systems, 19(7): 2204-2220 (2018) [DOI], one of the most 10 frequently accessed documents for this Transaction! (6000+ full text views since 2018). ESI高被引論文, 2021年度北京市廣泛關(guān)注學術(shù)論文, 谷歌學術(shù)被引500+次

Journal Papers

Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, Yanchun Zhang, Enhancing Transferability of Adversarial Examples through Mixed-頻率 Inputs, IEEE Transactions on Information Forensics and Security, 2024, accepted

Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin (Sherman)Shen, Artificial Intelligence for Web 3.0: A Comprehensive Survey, ACM Computing Surveys, 2024, accepted [PDF].

Xiangrui Xu, Pengrui Liu, Wei Wang*, Hong-Liang Ma, Bin Wang, Zhen Han, and Yufei Han, CGIR: Conditional Generative Instance Reconstruction Attacks against Federated Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023 [DOI] [PDF][CODE](early access).

Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz, FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-hoc Networks. IEEE Transactions on Information Forensics and 證券, [DOI]PDF][CODE] 2023, CCF A (early access)

Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker, Multi-misconfiguration Diagnosis via Identifying Correlated Configuration Parameters, IEEE Transactions on 軟件 Engineering, [DOI][PDF] 2023, early access

Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang*, Yunjia Zhang, Qiang Li, Aimin Yu, Automatically Identifying CVE Affected Versions with Patches and Developer Logs, IEEE Transactions on Dependable and Secure Computing (TDSC), [DOI]PDF][CODE] 2023 (early access)

Bin Wang, Xiaohan Yuan, Li Duan, Hongliang Ma, Bin Wang, Chunhua Su, Wei Wang*, DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain, IEEE Transactions on Computational Social Systems, 2023 [DOI] (early access)

Li Duan, Liu Yang, Chunhong Liu, Wei Ni, Wei Wang, A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services, IEEE Transactions on Network Science and Engineering, 2023 [DOI] (early access)

Li Duan, Yangyang Sun, Wei Ni, Weiping Ding, Jiqiang Liu, Wei Wang, Attacks against Cross-chain Systems and Defense Approaches: A Contemporary Survey, IEEE/CAA Journal of Automatica Sinica, 2023 [DOI] (early access)

Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu, UAF-GUARD: Defending the Use-After-Free Exploits via Fine-grained Memory Permission Management. Computers & Security, Volume 125, February 2023, 103048. [DOI]

Euijin Choo, Mohamed Nabeel, Mashael Al Sabah, Issa Khalil, Ting Yu, Wei Wang: DeviceWatch: A 數(shù)據(jù)-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference”, ACM Transactions on Privacy and Security 2022 [DOI] (early access)

Heng Ye, Qiang Zeng, Jiqiang Liu, Xiaojiang Du, Wei Wang* : Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022 [DOI] (early access).

Zikai Zhang, Yidong Li, Wei Wang, Haifeng Song, Hairong Dong: Malware detection with dynamic evolving graph convolutional networks, International Journal of Intelligent Systems, 2022 [DOI] (early access)

Wei Wang, Xiangyu Wei, Xiaoyang Suo, Bin Wang, Hao Wang, Hong-Ning Dai, Xiangliang Zhang: HGATE: Heterogeneous Graph Attention Auto-Encoders, IEEE Transactions on Knowledge and 數(shù)據(jù) Engineering, early access, 2022 [DOI](to appear). ESI高被引論文.

Xudong He, Jian Wang, Jiqiang Liu, Weiping Ding, Zhen Han, Bin Wang, Jamel Nebhen, Wei Wang*, DNS Rebinding Threat Modelling and Security Analysis for Local 面積 Network of Maritime 搬運作用 Systems, IEEE Transactions on Intelligent Transportation Systems, 2022 [DOI][PDF](to appear).

Heng Ye, Jiqiang Liu, Hao Zhen, Wenbin Jiang, Bin Wang, Wei Wang, VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios, Journal of Network and 計算機 Applications, 2022 [DOI][PDF](to appear).

Zhuo Lv, Hongbo Cao, Feng Zhang, Yuange Ren, Bin Wang, Cen Chen, Nuannuan Li, Hao Chang, Wei Wang*, AWFC: Preventing Label Flipping Attacks towards Federated Learning for Intelligent IoT, The 計算機 Journal, 2022 [DOI](early access)

Xingze Wang, Guoxian Yu, Zhongmin Yan, Lin Wan, Wei Wang, Lizhen Cui, Lung Cancer Subtype Diagnosis by Fusing Image-genomics 數(shù)據(jù) and Hybrid Deep Networks, IEEE/ACM Transactions on Computational Biology and 生物信息學, 2022 [DOI][PDF](to appear).

Longyang Yi, Yangyang Sun, Bin Wang, Li Duan, Hongliang Ma, Zhen Han, Wei Wang*: CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance, International Journal of Intelligent Systems, 2022 [DOI](early access)

姚爽, 張大偉, 李勇, 王偉,區(qū)塊鏈交易內(nèi)容隱私保護技術(shù)研究綜述,密碼學報,2022, 9(4): 596-618 [DOI].

Bin Wang, Pengfei Guo, Xing Wang, Yongzhong He, Wei Wang*, Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19, ACM Journal of 數(shù)據(jù) and Information Quality, V奧林匹克里昂女子足球隊 14, Issue 2, No. 10, pp 1–24, June 2022 [DOI].

Chongsheng Zhang, Yuefeng Tao, Kai Du, Weiping Ding, Bin Wang, Ji Liu, Wei Wang, Character-level Street View Text Spotting Based on Deep Multi-Segmentation Network for Smarter Autonomous Driving, IEEE Transactions on Artificial Intelligence, vol. 3, no. 2, pp. 297-308, April 2022 [DOI].

Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publishing with Multiple Evaluators, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 19, Issue: 1, pp. 67-76, 2022.ESI高被引論文.

Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, Chunhua Su: ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.IEEE Transactions on Network Science and Engineering 8(2): 1133-1144 (2021) [DOI] ESI高被引論文.

Xiangliang Zhang*, Qiang Yang, Somayah Albaradei, Xiaoting Lyu, Hind Alamro, Adil Salhi, Changsheng Ma, Manal Alshehri, Inji Ibrahim Jaber, Faroug Tifratene, Wei Wang*, Takashi Gojobori, Carlos M. Duarte*, Xin Gao*. Rise and Fall of the Global Conversation and Shifting Sentiments During the COVID-19 Pandemic. Nature’s 人文科學概論 and Social Sciences Communications. 8, Article number: 120 (2021) [PDF].

Li Duan, Tieliang Gao, Wei Ni, Wei Wang*, A hybrid intelligent service recommendation by latent 語義學 and explicit ratings, International Journal of Intelligent Systems, 飛魚座 36, issue 12, pp. 7867-7894, December 2021.

Yidong Li, Li Zhang, Zhuo Lv, Wei Wang*, Detecting Anomalies in Intelligent Vehicle Charging and Station 功率 Supply Systems with Multi-head Attention Models, IEEE Transactions on Intelligent 搬運作用 Systems, 22(1): 555-564 (2021).

Lichen Cheng, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang, Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain, ACM Transactions on Internet Technology (TOIT), Volume 21, Issue 1, Article No.: 11, pp. 1–19, 2021 [DOI][PDF].

Chongsheng Zhang, Weiping Ding, Guowen Peng, Feifei Fu, Wei Wang: Street View Text Recognition With Deep Learning for Urban Scene Understanding in Intelligent 搬運作用 Systems. IEEE Transactions on Intelligent Transportation Systems, 22(7): 4727-4743 (2021)[DOI][PDF]

Zikai Zhang, Yidong Li, Hairong Dong, Honghao Gao, Yi Jin, Wei Wang: Spectral-Based Directed Graph Network for Malware Detection. IEEE Trans. Netw. Sci. Eng. , IEEE Transactions on Network Science and Engineering, 8(2): 957-970 (2021) [DOI][PDF].

李浥東,張俊,陶耀東,王偉,王飛躍: 平行安全:基于CPSS的生成式對抗安全智能系統(tǒng)。智能科學與技術(shù)學報,2020, 2(2): 194-202. 年度最佳論文

Yingjie Wang, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, Wei Wang*, Identifying Vulnerabilities of SSL/TLS Certificate Verification in Android Apps with Static and Dynamic Analysis, Journal of Systems and 軟件, 167: 110609 (2020) [DOI].

Xiaoming Liu, Chao Shen, Wei Wang, Xiaohong Guan, CoEvil: A Co-Evolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection, IEEE Transactions on Fuzzy Systems, 28(5): 806-817, 2020 [DOI][PDF](to appear) .

Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Information Sciences, 511: 284-296 (2020) [DOI][PDF].ESI高被引論文

Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li, “Secure and efficient outsourcing differential privacy 數(shù)據(jù) release scheme in Cyber-physical system”, Future Generation 計算機 Systems, 108: 1314-1323, 2020 [DOI][PDF].

Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang*, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem, IEEE Transactions on Mobile Computing, vol. 19, no. 5, pp. 1184-1199, 2020 [DOI][PDF].ESI高被引論文

Yongzhong He, Chao Wang, Guangquan Xu, Wenjuan Lian, Hequn Xian, Wei Wang, Privacy-Preserving Categorization of Mobile Applications Based on Large-scale Usage 數(shù)據(jù), Information Sciences, 514: 557-570 (2020) [DOI][PDF].

Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, and Wei Wang*: Sensing Users’ Emotional Intelligence in Social Networks, IEEE Transactions on Computational Social Systems, vol. 7, no. 1, pp. 103-112, 2020 [DOI][PDF].

Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, and Wei Wang*: SCTSC: A Semi-centralized Traffic Signal Control Mode with Attribute-based Blockchain in IoVs, IEEE Transactions on Computational Social Systems, 6(6):1373-1385 (2019) [DOI][PDF].

Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen, Using Sparse Representation to Detect Anomalies in Complex WSNs, ACM Transactions on Intelligent Systems and Technology (TIST), 10(6): 64:1-18(2019)[DOI][PDF] .

Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang*, “Polynomial-based Modifiable Blockchain Structure for Removing Fraud Transactions”, Future Generation 計算機 Systems, 99(10):154-163(2019) [DOI][PDF].

Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Yuanyuan Li, Hequn Xian, Xiangliang Zhang: Constructing Features for Detecting Android Malicious Applications: Issues, 鲾科 and Directions, IEEE Access, 7: 67602 – 67631, 2019 [DOI][PDF].

Nannan Xie, Xing Wang, Wei Wang*, Jiqiang Liu, “Fingerprinting Android Malware Families”, Frontiers of Computer Science, 13(3): 637–646 (2019)[DOI][PDF].

Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si, Wei Wang: Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality, IEEE Access, 7: 33380-33392 (2019) [PDF][PDF].

Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang*, Dynamic privacy leakage analysis of Android third-party libraries, Journal of Information Security and Applications , 99 (10): 154-163 (2019) [DOI][PDF].

Dan Su, Jiqiang Liu, Xiaoyang Wang, Wei Wang*, Detecting Android Locker-ransomware on Chinese Social Networks, IEEE Access, 7(1): 20381-20393, 2019 [DOI][PDF].

Wei Wang, Mengxue Zhao, Jigang Wang, “Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”, Journal of Ambient Intelligence and Humanized Computing, 10(8): 3035-3043 (2019) [DOI][PDF]. ESI高被引論文

Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”, IEEE Transactions on Intelligent Transportation Systems, 19(7): 2204-2220 (2018) [DOI][PDF], one of the 50 most frequently accessed documents for this Transaction! (5000+ full text views since 2018). ESI高被引論文, 2021年度北京市廣泛關(guān)注學術(shù)論文

Xing Liu,Jiqiang Liu, Wei Wang*, Sencun Zhu, “Android single sign-on security: Issues, taxonomy and directions”, Future Generation Computer Systems, vol.89, pp. 402-420 (2018) [DOI][PDF].

Wei Wang, yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers”, Future Generation 計算機 Systems, vol.78, pp. 987994 (2018) [DOI][PDF].ESI高被引論文

Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted 數(shù)據(jù)sets”, IEEE Transactions on Cloud Computing, 6(3):747-759 (2018) [DOI].

Dan Su, Jiqiang Liu, Wei Wang*, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, “Discovering communities of malapps on Android-based mobile cyber-physical systems”, Ad Hoc Networks,80: 104-115 (2018) [DOI][PDF].

Yongzhong He, Endalew Elsabeth Alem, Wei Wang*, “Hybritus: A Password strength Checker by Ensemble Learning from the Query Feedbacks of Websites”, Frontiers of 計算機 Science (to appear), 2018 [DOI][PDF].

Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018) [DOI][PDF].

Xing Liu, Jiqiang Liu, Wei Wang*, Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with 數(shù)據(jù) Flow Analysis”, World Wide Web, 21(1): 105-126 (2018)[DOI]

Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, “Abstracting Massive Data for Lightweight Intrusion Detection in 計算機 Networks”, Information Sciences, 433–434(4): 417-430 (2018) [DOI].

Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang, “DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications”, Cluster Computing (2018) 21: 265–275 [DOI][PDF].

Ming Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android Piggybacked Apps Based on Sensitive-subgraph Analysis”, IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 8, pp. 1772-1785, 2017 [DOI].

Xing Wang, Wei Wang*, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Characterizing Android Apps’ Behavior for Effective Detection of Malapps at Large Scale”, Future Generation 計算機 Systems, vol. 75, pp. 30-45 (2017) [DOI].

Wei Huang, Chunwang Yan, Jinsong Wang, Wei Wang, “A 時間delay neural network for solving time-dependent shortest path problem”, Neural Networks, vol. 90, pp. 21-28, 2017 [DOI].

馬洪亮, 王偉*, 韓臻, “混淆惡意ECMAScript代碼的檢測與反混淆方法研究”. 計算機學報, 40(7): 1799-1713, 2017.

馬洪亮, 王偉*, 韓臻, “面向drive-by-download攻擊的檢測方法”.華中科技大學學報(自然科學版). 44卷, 3期, pp. 6-11, 2016 [PDF].

Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”. IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.

Georgios Pitsilis, Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”, 計算機s in Human Behavior (SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].

Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”. IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882, 2014 (frequently downloaded paper)[PDF][DOI].

Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang, “Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit 數(shù)據(jù) Streams in 計算機 Networks”. Knowledge-Based Systems (IF(2012)=4.104, IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [PDF][DOI]

Tong Wu, Zhen Han, Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”. Journal of Southeast University (English Edition). vol. 30, no. 3, pp. 289-295, 2014.

馬洪亮,王偉*,韓臻, “基于ECMAScript的輕量級惡意網(wǎng)頁異常檢測方法”.華中科技大學學報(自然科學版). 42卷, 11期, pp. 34-38, 2014.

Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Understanding and analyzing network traffic”. IEEE Network, vol. 26, no.1, pp. 4-5, Jan 2012

Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Network traffic monitoring, analysis and anomaly detection”, IEEE Network, vol. 25, no. 3, pp. 6-7, May 2011

Wei Wang, Xiangliang Zhang, Sylvain Gombault, “Constructing Attribute Weights from Audit Data for Effective Intrusion Detection”, Journal of Systems and Software, vol.82, no.12, pp.1974-1981, 2009

Li Feng, Wei Wang, Lina Zhu, Yi Zhang, “Predicting Intrusion Goal Using Dynamic Bayesian Network with Transfer Probability Estimation”. Journal of Network and 計算機 Applications, vol. 32, no. 3, pp. 721-732, 2009

Xiaohong Guan, Wei Wang (corresponding author), Xiangliang Zhang, “Fast Intrusion Detection Based on a Non-negative Matrix Factorization Model”. Journal of Network and 計算機 Applications, vol. 32, no.1, pp.31-44, 2009

Wei Wang, Xiaohong Guan and Xiangliang Zhang, “Processing of Massive Audit Data Streams for Real-時間 Anomaly Intrusion Detection”. Computer Communications, vol. 31, no. 1, pp.58-72, 2008

Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang, “Profiling program behavior for anomaly intrusion detection based on the transition and 頻率 property of 計算機 audit 數(shù)據(jù)”. Computers & Security, vol. 25, no 7, pp. 539-550, 2006

張響亮,王偉,管曉宏;基于隱馬爾可夫模型的程序行為異常檢測[J];西安交通大學學報;2005年10期,Vol. 39, no.10, pp. 1056-1059

王偉,陳秀真,管曉宏,張響亮;深度防衛(wèi)的自適應入侵檢測系統(tǒng)[J];西安交通大學學報;2005年04期, vol 39, no. 4, pp. 339~342

王偉,彭勤科.主機日志分析及其在入侵檢測中的應用.計算機工程與應用, 2002(13):35-37

林暉,王偉,張優(yōu)云;基于產(chǎn)品特征的信息檢索技術(shù)[J];計算機輔助設計與圖形學學報;2002年03期, pp. 261~265, 2002

參考資料:

會議論文

Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang, Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning, USENIX Security 2024, Accepted [PDF].

Xiaoting Lyu, Yufei Han, Wei Wang*, Hangwei Qian, Ivor Tsang, Xiangliang Zhang, Cross-Context Backdoor Attacks against Graph Prompt Learning, KDD 2024, accepted [PDF].

Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, Wei Wang*, Not One Less: Exploring Interplay娛樂 between User Profiles and Items in Untargeted Attacks against Federated Recommendation, ACM CCS 2024, accepted [PDF]

Xueshuo Xie, Haoxu Wang, Zhaolong Jian and Li Tao, Wei Wang, Zhiwei Xu, Guiling Wang, Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices, IEEE Conference on Computer Communications (IEEE INFOCOM 2024), 溫哥華, Canada, 20–23 May 2024.

Chao Li, Balaji Palanisamy*, Runhua Xu, Li Duan, Jiqiang Liu*, Wei Wang*, How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance, Proceedings of The 30th ACM Conference on 計算機 and Communications Security (CCS 2023), 26-30 NOV., Copenhagen, Denmark, 2023 [DOI][PDF], CCF A [區(qū)塊鏈治理][CCS 2023 Distinguished Paper Award]

Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Bin Wang, Jiqiang Liu, Xiangliang Zhang. Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning. Proceedings of Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023). Feb 7-14, 2023 Washington DC (Acceptance rate 1721/8777 = 19.6%). [DOI]PDF][CODE], CCF A [聯(lián)邦學習中的后門攻擊]

Yaguan Qian, Shuke He, Chenyu Zhao, Jiaqiang Sha, Wei Wang, Bin Wang, LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions, International Conference on 計算機 Vision (ICCV 2023), Paris, October 2023.

Helene Orsini, Hongyan Bao, Yujun Zhou, Xiangrui Xu, Yufei Han, Longyang Yi, Wei Wang, Xin Gao, and Xiangliang Zhang. AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs. The 2022 IEEE International Conference on Big 數(shù)據(jù) (BigData 2022). Regular paper. December 17-20, 2022, Osaka, Japan(acceptance rate=122/633=19.2%)

Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang*: Alexa Skills: Security Vulnerabilities and Countermeasures, IEEE Conference on Communications and Network Security (IEEE CNS), Austin, TX, USA, 2022

Dawei Wang, Kai Chen*, Wei Wang*: Demystifying the Vetting Process of Voice-controlled Skills on Markets, ACM international joint conference on pervasive and ubiquitous computing (UbiComp 2021), Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)(May cycle), 2021

Xiaoting Lv, Zhe Chen, Di Wu, Wei Wang*: Sentiment Analysis on Chinese Weibo regarding COVID-19, accepted by 9th CCF International Conference on Natural Language Processing and Chinese Computing (NLPCC 2020), Zhengzhou, China, Oct 14-18, 2020 (oral presentation)[PDF][Bib].Y

Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu and Rongxing Lu: Efficient and Secure Outsourcing of Differentially Private Data Publication, accepted by 23rd European Symposium on Research in 計算機 Security (ESORICS 2018), pp. 187-206, Barcelona, Spain, September 3-7, 2018 (acceptance rate = 56/283 = 19.8%)[PDF][Bib].

Yan Chen, Wei Wang, Xiangliang Zhang: Randomizing SVM against Adversarial Attacks Under Uncertainty, accepted by 22nd Pacific-Asia Conference on Knowledge Discovery and 數(shù)據(jù) Mining (PAKDD 2018), Melbourne, Australia, June 3rd - 6th, 2018 (regular paper with long presentation, acceptance rate = 59/590=10%)[PDF][Bib].

Longfei Wu, Xiaojiang Du, Wei Wang, Bin Lin, "An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology". Accepted by 2018 International Conference on Computing, Networking and Communications (ICNC 2018), Maui, Hawaii, USA, March 5-8, 2018 (acceptance rate = 26%)[PDF].

Xing Liu, Sencun Zhu, Wei Wang*, Jiqiang Liu, "Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem". Accepted by the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016 (acceptance rate=32/137=23.4%) [PDF].

Dan Su, Wei Wang*, Xing Wang, Jiqiang Liu, "Anomadroid: profiling Android application behaviors for identifying unknown malapps", accepted by 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.

Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, "Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale 數(shù)據(jù)sets". Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi'an, China, May 30 - June 3, 2016

Xing Liu, Jiqiang Liu, Wei Wang* "Exploring Sensor Usage Behaviors of Android Applications Based on 數(shù)據(jù) Flow Analysis", Proceedings of the 34th IEEE International 表演 Computing and Communications Conference (IPCCC 2015), Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%) [PDF].

Xing Liu, Wei Wang, Jiqiang Liu, "POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy", 22nd ACM Conference on 計算機 and Communications Security (ACM CCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.

Georgios Pitsilis, Xiangliang Zhang, Wei Wang, "Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information'', 5th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011), Springer, pp. 82-97, Copenhagen, Denmark, June 29- July 1, 2011(full paper)}

Wei Wang, Xiangliang Zhang, "High-speed Web Attack Detection through Extracting Exemplars from HTTP Traffic'', 26th ACM Symposium on Applied Computing (ACM SAC 2011)(Security track), ACM Press, pp. 1538-1543, TaiChung, Taiwan, 21-25 March, 2011 (security track acceptance rate=9/41=22%). }

Xiangliang Zhang, Wei Wang, Kjetil Norvag, Michele Sebag, "K-AP: Generating Specified K Clusters by Efficient Affinity Propagation'', 10th IEEE International Conference on 數(shù)據(jù) Mining (ICDM 2010), pp. 1187-1192, Sydney, Australia, December 14-17, 2010 (acceptance rate=155/797=19.4%)}

Atef Abdelkefi, Yuming Jiang, Wei Wang, Arne Aslebo, Olav Kvittem, "Robust Traffic Anomaly Detection with Principal Component Pursuit'', Student Workshop, ACM CoNEXT 2010, 費城, USA, November 2010

Wei Wang, Xiangliang Zhang, Georgios Pitsilis, "Abstracting Audit 數(shù)據(jù) for Efficient Anomaly Intrusion Detection'', Sixth International Conference on Information Systems Security (ICISS 2010), pp. 201-215, Gandhinagar, Gujarat, India, December 15-19, 2010 (acceptance rate 14/51=27.5%)

Xiangliang Zhang, Wei Wang, "Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution'', 6th International Conference on Advanced Data Mining and Applications (ADMA 2010), pp. 334-345, Chongqing, China, Nov. 19-21, 2010 (oral full paper, acceptance rate = 17%)}

Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog, "Attribute Normalization in Network Intrusion Detection'', 10th International Symposium on PERVASIVE Systems, Algorithms and Networks (I-SPAN 2009), IEEE Press, pp. 448-453, Kaohxiung, Taiwan, China, Dec 14-16, 2009

Wei Wang, Thomas Guyet and Svein J. Knapskog, "Autonomic Intrusion Detection System". Proceedings of 12th International Symposium on Recent Advances in Intrusion Detection (RAID 2009), pp. 359-361, LNCS 5758, Sep 23-25, 2009 (Poster presentation)

Wei Wang, Florent Masseglia, Thomas Guyet, Rene Quiniou and Marie-Odile Cordier, "A General Framework for Adaptive and Online Detection of Web attacks". 18th international World Wide Web conference (WWW 2009), pp. 1141-1142, ACM press, Madrid, Spain, Apr 20-24, 2009 (Poster presentation)

Thomas Guyet, Wei Wang, Rene Quiniou, Marie-Odile Cordier, "Diagnostic adaptatif distribue d'un 熔劑 de donnees. Application a la detection d'intrusion dans des serveurs Web". Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009), pp. 325-336, Strasbourg, France, Jan 2009 (Nominated for best application paper award, in French)

Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, "Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit 數(shù)據(jù) streams", Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009)(Poster), pp. 457-458, Strasbourg, France, Jan 2009

Wei Wang, Sylvain Gombault, "Efficient Detection of DDoS Attacks with Important Attributes". Proceedings of 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008), pp. 61-67, IEEE Press, Tozeur, Tunisia, Oct 28-30, 2008.

Wei Wang, Sylvain Gombault, Thomas Guyet, "Towards fast detecting intrusions: using key attributes of network traffic". Proceedings of The Third International Conference on Internet Monitoring and Protection (ICIMP 2008), IEEE Computer society press, Bucharest, Romania, pp. 86-91, June 29 - July 5, 2008 (acceptance rate 23%) (Best paper award)

Wei Wang, Sylvain Gombault, Amine Bsila, "Building multiple behavioral models for network intrusion detection". 2nd IEEE Workshop on "Monitoring, Attack Detection and Mitigation'' (MonAM 2007), 圖盧茲足球俱樂部, pp. 31-36, France, Nov 2007

Wei Wang, Sylvain Gombault, "Detecting masquerades with principal component analysis based on cross frequency weights". Proceedings of 14th Anniversary HP-SUA Workshop, Munich, Germany, pp. 227-232, July 2007

Wei Wang, Sylvain Gombault, "Distance measures for anomaly intrusion detection". Proceedings of 2007 International Conference on Security and management, Las Vegas, NV, pp. 17-23, June 2007 (SAM 2007) (regular paper, acceptance rate 28%)

Wei Wang, Roberto Battiti, "Identifying Intrusions in 計算機 Networks with Principal Component Analysis". Proceedings of First IEEE International Conference on Availability, Reliability and Security (ARES 2006), IEEE press society, pp. 270-277, April, 20-22nd, Vienna, Austria, 2006

Wei Wang, Xiaohong Guan, Xiangliang Zhang, "Profiling Program and User Behavior for Anomaly Intrusion Detection Based on Non-negative Matrix Factorization". Proceedings of 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas, pp. 99-104, Dec 2004

Wei Wang, Xiaohong Guan and Xiangliang Zhang. "A Novel Intrusion Detection Method Based on Principal Component Analysis in Computer Security". Advances in Neural Networks-ISNN 2004. International IEEE Symposium on Neural Networks, Dalian, China. Lecture Notes in Computer Science (LNCS), No. 3174. pp. 657-662. Aug 2004

Wei Wang, Xiaohong Guan and Xiangliang Zhang, "Modeling Program Behavior by Hidden Markov Models for Intrusion Detection". The Third IEEE International Conference on Machine Learning and Cybernetics (ICMLC 2004), Shanghai, China, pp. 2830-2835. Aug 2004

參考資料:

博士論文

王偉, 多信息源的實時入侵檢測方法研究, 西安交通大學, 2005 [WangPhDThesis]

參考資料:

其他論文

王偉, 何永忠, 以完整解決一個具體問題為中心的研究性教學, 計算機教育(錄用), 2014年

何永忠, 王偉,黎琳, 基于云計算的信息安全實驗教學系統(tǒng)構(gòu)建, 計算機教育(錄用), 2014年

參考資料:

社會任職

王偉教授還擔任多個學術(shù)組織的成員和評審專家,包括中國計算機協(xié)會(CCF)高級會員、CCF青年計算機科技論壇(YOCSEF)會員、CCF計算機應用專委會通訊委員、中國保密協(xié)會會員、隱私保護專委會委員、ACM及IEEE會員等。此外,他還是多個國際會議的程序委員會委員,并為多種期刊審稿。

人才培養(yǎng)

主講課程

研究生課程《網(wǎng)絡空間安全前沿》自2022年起開設。

本科生課程《入侵與檢測技術(shù)》自2011年起開設,并在中國大學MOOC(慕課)-國家精品課程在線學習平臺上建設課程。

研究生課程《惡意代碼與異常檢測》自2018年起開設至今。

本科生課程《專業(yè)實習》自2014年起開設。

研究生課程《算法設計與分析》自2013年至2017年開設。

本科生課程《專業(yè)研究方法論與創(chuàng)新教育》自2011年至2017年開設。

留學生碩士課程《Information Security》自2015年至2016年開設。

研究生課程《密碼學與安全協(xié)議》在2012年開設。

參考文獻:

指導學生

在讀博士生

2023年:劉敬楷

2023年:翁淵

2023年:代嬌

2023年:錢進

2022年:胡福強

2022年:陳暢(聯(lián)合指導)

2022年:陳政

2021年:呂曉婷

2021年:王斌(聯(lián)合指導)

2021年:許向蕊(聯(lián)合指導)

2021年:原笑含(聯(lián)合指導)

2021年:郝玉蓉(聯(lián)合指導)

2020年:劉鵬睿

2020年:陳國榮(聯(lián)合指導)

2020年:振昊(聯(lián)合指導)

2019年:韓昫

2018年:衛(wèi)相宇(聯(lián)合指導)

在讀碩士生

2023年:王文奇、李河歡、嚴丹彤、劉芷辰、劉沖、周皓駿

2022年:李洋、劉天健、何億柯、高陽、李晗溪、孔文康、劉彥孜

2021年:李珊、王俊勇何甜甜

博士畢業(yè)生

2021年:蘇丹(聯(lián)合指導),2018年11月至2019年11月訪問賓夕法尼亞州立大學中國電子技術(shù)標準化研究院(工業(yè)和信息化部,北京)。

2019年:劉行(聯(lián)合指導),2015年10月至2016年10月訪問賓夕法尼亞州立大學;中國電子技術(shù)標準化研究院(工業(yè)和信息化部,北京)。

2018年:王星(聯(lián)合指導),2014年1月至4月在KAUST大學實習;海康威視數(shù)字技術(shù)有限公司(杭州)。

2018年:馬洪亮(聯(lián)合指導),石河子大學講師。

碩士畢業(yè)生

2023年:孫陽陽,就職于中國聯(lián)通數(shù)字科技有限公司,北京

2023年:劉文博,就職于中國農(nóng)業(yè)銀行,北京

2023年:劉煜昊,南開大學博士生,天津市

2023年:呂紅梅,就職于渤海銀行,天津

2023年:周英楠,南開大學博士生,天津

2023年:易龍楊,浙江大學博士生,杭州市

2023年:曹鴻博,北京交通大學博士生,北京

2023年:劉敬楷,北京交通大學博士生,北京

2023年:伍羽放,北京交通大學博士生,北京

2023年:張軍,就職于華為成都市

2022年:齊亞靈,就職于中信銀行,北京

2022年:武辰奚,就職于歐冶云商,上海市

2022年:朱子坤,就職于中國工商銀行,北京

2022年:陳奇,就職于360公司,北京

2022年:吳迪,就職于北森云計算,北京

2022年:張云肖,就職于上海華為技術(shù)有限公司,上海

2021年:王恩慧,就職于中國鐵路北京局集團有限公司,北京

2021年:任遠歌,就職于字節(jié)跳動,北京

2021年:張星娜,就職于中國鐵路西安局集團有限公司,西安

2021年:郭鵬飛,就職于渤海銀行天津市

2021年:李政,就職于字節(jié)跳動,北京

2021年:呂曉婷,北京交通大學碩博連讀博士生,北京

2020年:王英杰,就職于美團網(wǎng),北京

2020年:張黎,就職于中國農(nóng)業(yè)銀行總行數(shù)據(jù)中心,北京

2020年:宋晶晶,就職于中國移動通信集團研究院,北京

2020年:索曉陽,就職于中郵信息科技有限公司,北京

2020年:李元青,就職于京東,北京

2019年:劉禹辰,就職于中國農(nóng)業(yè)發(fā)展銀行,北京

2019年:高珍禎,就職于啟明星辰,北京

2019年:冀曉宇,就職于華為北研院,北京

2019年:尚瑤瑤,就職于國家電網(wǎng),北京

2019年:王洋,就職于字節(jié)跳動,北京

2019年:趙美晨,就職于順豐速運深圳市

2019年:彭豪輝,就職于知乎,北京

2018年:李媛媛,就職于中國建設銀行,北京

2018年:趙夢雪,就職于通信局,北京

2018年:衛(wèi)相宇,北京交通大學碩博連讀博士生,北京

2018年:曹咪,聯(lián)合指導,就職于中國聯(lián)通研究院,北京

2018年:吳芳,聯(lián)合指導,就職于北京交通大學,北京

2017年:魏宗濤,曾在2015年7月至10月在KAUST實習,就職于百度集團,北京

2016年:馬君麗,就職于同城旅行蘇州市

2016年:劉曉明,就職于恒豐銀行,北京

2016年:張瑞琴,就職于哈爾濱銀行,北京

2016年:裴蘊藝,就職于中國聯(lián)通廣東,廣州市

2016年:周芳林,聯(lián)合指導,就職于奇虎360,北京

2016年:胡越,聯(lián)合指導,就職于中移在線服務有限公司鄭州市

2015年:李淑民,就職于奇虎360公司,北京

2015年:劉陽,就職于中國航天信息股份有限公司,北京

2014年:李少輝,聯(lián)合指導,就職于中國銀行,北京

參考文獻:

獲得榮譽

他曾獲得多項榮譽和獎項,包括連續(xù)兩年獲得歐洲ERCIM“Alain Bensoussan”研究學者獎,以及教育部與科技部聯(lián)合主辦的第四屆“春暉杯”留學人員創(chuàng)新創(chuàng)業(yè)大賽二等獎

參考資料 >

王偉.北京交通大學.2024-10-07

生活家百科家居網(wǎng)