<strike id="suw8k"></strike>
      <samp id="suw8k"></samp>
        <kbd id="suw8k"><pre id="suw8k"></pre></kbd>
      • <th id="suw8k"></th>
        • 首頁
        • 信息
        • 院校
        • 研招
        • 調劑
        • 資料
        • 分數線
        • 輔導班
        • 研究生院
        注冊 登錄

        北京交通大學

        2025/2026考研輔導網課
        • 2026考研英語全程班 寒假班2026考研英語全程班 寒假班
        • 2026考研政治全程班 寒假班2026考研政治全程班 寒假班
        • 2026考研數學全程班 5班2026考研數學全程班 5班
        • 2026考研英語直通車 寒假班2026考研英語直通車 寒假班
        • 2026考研政治直通車 寒假班2026考研政治直通車 寒假班
        • 2026考研數學直通車 寒假班2026考研數學直通車 寒假班
        • 2026考研英語直通車 5期2026考研英語直通車 5期
        • 學校首頁
        • 學校簡介
        • 院系設置
        • 考研調劑
        • 考研成績查詢
        • 考研分數線
        • 導師介紹
        • 歷年試題
        • 研究生招生信息網
        中國考研網 考研網 » 院校信息 » 北京交通大學 » 研究生導師介紹

        北京交通大學計算機與信息技術學院研究生導師:王偉

        分類:導師信息 來源:北京交通大學計算機與信息技術學院 2020-03-22 相關院校:北京交通大學

        2025考研數學全程班 早鳥3班
        26考研全科上岸規劃營「擇校▪規劃▪備考」
        北京交通大學2025考研專業課復習資料「真題▪筆記▪講義▪題庫」

        基本信息

        王偉,博士、教授、信息安全系主任

        辦公電話:010-51688637電子郵件: wangwei1@bjtu.edu.cn

        通訊地址:本網頁不經常更新。最新信息請訪問:http://infosec.bjtu.edu.cn/wangwei郵編:100044

        教育背景

        2005年畢業于西安交通大學獲博士學位(導師:管曉宏院士)。2006-2007在意大利Trento大學做博士后研究。2007-2008在法國Telecom Bretagne及法國國家計算機與自動化研究院(INRIA)做博士后研究。2009-2011作為歐洲ERCIM Fellow在挪威科技大學以及盧森堡大學SnT研究中心從事研究工作。2011年底加入北京交通大學計算機學院。2011年與2014年短期訪問紐約大學;2019年訪問阿卜杜拉國王科技大學。

        工作經歷

        個人中文簡歷(2019年10月更新)

        王偉,目前任北京交通大學計算機與信息技術學院教授,博導,信息安全系主任。2005年畢業于西安交通大學獲博士學位。2005-2011年先后在意大利、法國、挪威和盧森堡等國家從事博士后或Research Fellow研究工作。

        主要研究網絡、系統、數據及區塊鏈安全。目前主持國家重點研發計劃項目(任務)和國家自然科學基金項目等項目。在國內外重要學術期刊或國際會議上發表論文90余篇,論文被引1500多次。2009 和2010 年連續兩年獲歐洲ERCIM“Alain Bensoussan”研究學者獎 (ERCIM Fellowship)。2009年獲科技部和教育部聯合主辦的“春暉杯”創新創業大賽二等獎。2018年獲省部級科技進步二等獎。是中國計算機協會(CCF)高級會員,CCF 青年計算機科技論壇(YOCSEF)學術委員會委員;CCF出版工作委員會執行委員;CCF區塊鏈專業委員會發起委員;北京市網絡法學研究會常務理事。

        目前擔任信息安全領域權威SCI期刊Computers & Security的編委,擔任SCI 期刊Frontiers of Computer Science 的青年AE,擔任《網絡空間安全》期刊的編委;是期刊IEEE Network 的客座編輯(Guest Editor);是國際會議ICDIS 2018年技術委員會共同主席,是Globecom 2019, ICC 2018, ECML/PKDD 2018, SecureComm 2018, AsiaCCS 2016等60 余個國際會議的程序委員會委員。

        研究方向

        系統安全

        應用安全

        計算機技術(專業學位)

        軟件工程(專業學位)

        招生專業

        網絡空間安全碩士

        網絡空間安全博士

        電子信息碩士

        科研項目

        國家級課題,2019-2021,主持

        國家自然科學基金,2018-2020,主持

        國家重點研發計劃子課題,2017-2021,主持

        企業橫向課題1,2019-2020,主持

        企業橫向課題2,2019-2021,主持

        企業橫向課題3,2018-2020,主持

        企業橫向課題4,2018-2020,主持

        教育部留學回國人員基金,2014-01-07--2017-01-06,主持

        中央高校基本科研業務費,2013-01-01--2014-12-31,主持

        教育部博士點基金,2013-01-01--2015-12-31,主持

        北京交通大學人才基金,2012-01-01--2013-12-31,主持

        主要研究方向(基于課題以及長期興趣):

        1. 社交網絡隱私分析;

        2. 物聯網安全與工業控制安全;

        3. 區塊鏈安全與應用;

        4. 惡意軟件分析。

        研究小組近幾年課題經費充足,希望有志于科研的同學積極與我聯系,攻讀碩士或博士學位。有信必復!

        課題組將為各位同學提供良好的科研條件和經費支持,優秀的同學有機會出國深造一段時間(對方提供所有經費)。

        教學工作

        入侵與檢測技術(本科生課程,2011-至今,國家保密學院精品培育課程;中國大學MOOC(慕課)-國家精品課程在線學習平臺建設課程)

        惡意代碼與異常檢測(研究生課程,2018-至今)

        專業實習(本科生課程,2014-至今)

        算法設計與分析(研究生課程,2013-2017)

        專業研究方法論與創新教育(本科生課程,2011-2017)

        Information Security(留學生碩士課程,2015-2016)

        密碼學與安全協議(研究生課程,2012)

        論文/期刊

        本列表不經常更新,詳細信息請查看我的個人主頁:http://infosec.bjtu.edu.cn/wangwei

        Journal Papers

        Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Information Sciences, 511: 284-296 (2020) [DOI][PDF].

        Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang*, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem, IEEE Transactions on Mobile Computing, 2019 [DOI][PDF](to appear).

        Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen, Using Sparse Representation to Detect Anomalies in Complex WSNs, ACM Transactions on Intelligent Systems and Technology (TIST), 2019[DOI][PDF](to appear) .

        Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, and Wei Wang*: Sensing Users’ Emotional Intelligence in Social Networks, IEEE Transactions on Computational Social Systems, 2019 [DOI][PDF](to appear).

        Xiaoming Liu, Chao Shen, Wei Wang, Xiaohong Guan, CoEvil: A Co-Evolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection, IEEE Transactions on Fuzzy Systems, 2019 [DOI][PDF](to appear) .

        Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, and Wei Wang*: SCTSC: A Semi-centralized Traffic Signal Control Mode with Attribute-based Blockchain in IoVs, IEEE Transactions on Computational Social Systems, 2019 [DOI][PDF](to appear).

        Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang*, “Polynomial-based Modifiable Blockchain Structure for Removing Fraud Transactions”, Future Generation Computer Systems, 99(10):154-163(2019) [DOI][PDF].

        Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Yuanyuan Li, Hequn Xian, Xiangliang Zhang: Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions, IEEE Access, 7: 67602 – 67631, 2019 [DOI][PDF].

        Nannan Xie, Xing Wang, Wei Wang*, Jiqiang Liu, “Fingerprinting Android Malware Families”, Frontiers of Computer Science, 13(3): 637–646 (2019)[DOI][PDF].

        Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si, Wei Wang: Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality, IEEE Access, 7: 33380-33392 (2019) [PDF][PDF].

        Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang*, Dynamic privacy leakage analysis of Android third-party libraries, Journal of Information Security and Applications , 99 (10): 154-163 (2019) [DOI][PDF].

        Dan Su, Jiqiang Liu, Xiaoyang Wang, Wei Wang*, Detecting Android Locker-ransomware on Chinese Social Networks, IEEE Access, 7(1): 20381-20393, 2019 [DOI][PDF].

        Wei Wang, Mengxue Zhao, Jigang Wang, “Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”, Journal of Ambient Intelligence and Humanized Computing, 10(8): 3035-3043 (2019) [DOI][PDF].

        Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”, IEEE Transactions on Intelligent Transportation Systems, 19(7): 2204-2220 (2018) [DOI][PDF], one of the 50 most frequently accessed documents for this Transaction! (2800+ full text views since 2018).

        Xing Liu,Jiqiang Liu, Wei Wang*, Sencun Zhu, “Android single sign-on security: Issues, taxonomy and directions”, Future Generation Computer Systems, vol.89, pp. 402-420 (2018) [DOI][PDF].

        Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers”, Future Generation Computer Systems, vol.78, pp. 987–994 (2018) [DOI][PDF].

        Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li, “Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system”, Future Generation Computer Systems (to appear), 2018 [DOI][PDF].

        Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”, IEEE Transactions on Cloud Computing, 6(3):747-759 (2018) [DOI].

        Dan Su, Jiqiang Liu, Wei Wang*, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, “Discovering communities of malapps on Android-based mobile cyber-physical systems”, Ad Hoc Networks,80: 104-115 (2018) [DOI][PDF].

        Yongzhong He, Endalew Elsabeth Alem, Wei Wang*, “Hybritus: A Password Strength Checker by Ensemble Learning from the Query Feedbacks of Websites”, Frontiers of Computer Science (to appear), 2018 [DOI][PDF].

        Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018) [DOI][PDF].

        Xing Liu, Jiqiang Liu, Wei Wang*, Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”, World Wide Web, 21(1): 105-126 (2018)[DOI]

        Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, “Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks”, Information Sciences, 433–434(4): 417-430 (2018) [DOI].

        Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang, “DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications”, Cluster Computing (2018) 21: 265–275 [DOI][PDF].

        Ming Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android Piggybacked Apps Based on Sensitive-subgraph Analysis”, IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 8, pp. 1772-1785, 2017 [DOI].

        Xing Wang, Wei Wang*, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Characterizing Android Apps’ Behavior for Effective Detection of Malapps at Large Scale”, Future Generation Computer Systems, vol. 75, pp. 30-45 (2017) [DOI].

        Wei Huang, Chunwang Yan, Jinsong Wang, Wei Wang, “A time-delay neural network for solving time-dependent shortest path problem”, Neural Networks, vol. 90, pp. 21-28, 2017 [DOI].

        馬洪亮, 王偉*, 韓臻, “混淆惡意JavaScript代碼的檢測與反混淆方法研究”. 計算機學報, 40(7): 1799-1713, 2017.

        馬洪亮, 王偉*, 韓臻, “面向drive-by-download攻擊的檢測方法”.華中科技大學學報(自然科學版). 44卷, 3期, pp. 6-11, 2016 [PDF].

        Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”. IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.

        Georgios Pitsilis, Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”, Computers in Human Behavior (SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].

        Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”. IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882, 2014 (frequently downloaded paper)[PDF][DOI].

        Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang, “Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks”. Knowledge-Based Systems (IF(2012)=4.104, IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [PDF][DOI]

        Tong Wu, Zhen Han, Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”. Journal of Southeast University (English Edition). vol. 30, no. 3, pp. 289-295, 2014.

        馬洪亮,王偉*,韓臻, “基于Javascript的輕量級惡意網頁異常檢測方法”.華中科技大學學報(自然科學版). 42卷, 11期, pp. 34-38, 2014.

        Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Understanding and analyzing network traffic”. IEEE Network, vol. 26, no.1, pp. 4-5, Jan 2012

        Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Network traffic monitoring, analysis and anomaly detection”, IEEE Network, vol. 25, no. 3, pp. 6-7, May 2011

        Wei Wang, Xiangliang Zhang, Sylvain Gombault, “Constructing Attribute Weights from Audit Data for Effective Intrusion Detection”, Journal of Systems and Software, vol.82, no.12, pp.1974-1981, 2009

        Li Feng, Wei Wang, Lina Zhu, Yi Zhang, “Predicting Intrusion Goal Using Dynamic Bayesian Network with Transfer Probability Estimation”. Journal of Network and Computer Applications, vol. 32, no. 3, pp. 721-732, 2009

        Xiaohong Guan, Wei Wang (corresponding author), Xiangliang Zhang, “Fast Intrusion Detection Based on a Non-negative Matrix Factorization Model”. Journal of Network and Computer Applications, vol. 32, no.1, pp.31-44, 2009

        Wei Wang, Xiaohong Guan and Xiangliang Zhang, “Processing of Massive Audit Data Streams for Real-Time Anomaly Intrusion Detection”. Computer Communications, vol. 31, no. 1, pp.58-72, 2008

        Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang, “Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data”. Computers & Security, vol. 25, no 7, pp. 539-550, 2006

        張響亮,王偉,管曉宏;基于隱馬爾可夫模型的程序行為異常檢測[J];西安交通大學學報;2005年10期,Vol. 39, no.10, pp. 1056-1059

        王偉,陳秀真,管曉宏,張響亮;深度防衛的自適應入侵檢測系統[J];西安交通大學學報;2005年04期, vol 39, no. 4, pp. 339~342

        王偉,彭勤科.主機日志分析及其在入侵檢測中的應用.計算機工程與應用, 2002(13):35-37

        林暉,王偉,張優云;基于產品特征的信息檢索技術[J];計算機輔助設計與圖形學學報;2002年03期, pp. 261~265, 2002

        Conference Paper

        [1]. Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu and Rongxing Lu: Efficient and Secure Outsourcing of Differentially Private Data Publication, accepted by 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, September 3-7, 2018 (acceptance rate = 56/283 = 19.8%).

        [3]. Yan Chen, Wei Wang, Xiangliang Zhang: Randomizing SVM against Adversarial Attacks Under Uncertainty, accepted by 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2018), Melbourne, Australia, June 3rd - 6th, 2018 (regular paper with long presentation, acceptance rate = 59/590=10%).

        [4]. Longfei Wu, Xiaojiang Du, Wei Wang, Bin Lin, “An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology”. Accepted by 2018 International Conference on Computing, Networking and Communications (ICNC 2018), Maui, Hawaii, USA, March 5-8, 2018 (acceptance rate = 26%).

        [5]. Xing Liu, Sencun Zhu, Wei Wang*, Jiqiang Liu, “Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem”. Accepted by the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016 (acceptance rate=32/137=23.4%).

        [6]. Dan Su, Wei Wang*, Xing Wang, Jiqiang Liu, “Anomadroid: profiling Android application behaviors for identifying unknown malapps”, accepted by 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.

        [7]. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”. Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016

        [8]. Xing Liu, Jiqiang Liu, Wei Wang* “Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis”, Proceedings of the 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015), Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%).

        [9]. Xing Liu, Wei Wang, Jiqiang Liu, “POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy”, 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.

        [10]. Georgios Pitsilis, Xiangliang Zhang, Wei Wang, “Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information”, 5th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011), Springer, pp. 82-97, Copenhagen, Denmark, June 29- July 1, 2011

        [11]. Wei Wang, Xiangliang Zhang, “High-speed Web Attack Detection through Extracting Exemplars from HTTP Traffic”, 26th ACM Symposium on Applied Computing (ACM SAC 2011)(Security track), ACM Press, pp. 1538-1543, TaiChung, Taiwan, 21-25 March, 2011 (security track acceptance rate=9/41=22%). }

        [12]. Xiangliang Zhang, Wei Wang, Kjetil Norvag, Michele Sebag, “K-AP: Generating Specified K Clusters by Efficient Affinity Propagation”, 10th IEEE International Conference on Data Mining (ICDM 2010), pp. 1187-1192, Sydney, Australia, December 14-17, 2010 (acceptance rate=155/797=19.4%)

        [13]. Atef Abdelkefi, Yuming Jiang, Wei Wang, Arne Aslebo, Olav Kvittem, “Robust Traffic Anomaly Detection with Principal Component Pursuit”, Student Workshop, ACM CoNEXT 2010, Philadelphia, USA, November 2010

        [14]. Wei Wang, Xiangliang Zhang, Georgios Pitsilis, “Abstracting Audit Data for Efficient Anomaly Intrusion Detection”, Sixth International Conference on Information Systems Security (ICISS 2010), pp. 201-215, Gandhinagar, Gujarat, India, December 15-19, 2010 (acceptance rate 14/51=27.5%)

        [15]. Xiangliang Zhang, Wei Wang, “Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution”, 6th International Conference on Advanced Data Mining and Applications (ADMA 2010), pp. 334-345, Chongqing, China, Nov. 19-21, 2010 (oral full paper, acceptance rate = 17%)}

        [16]. Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog, “Attribute Normalization in Network Intrusion Detection”, 10th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2009), IEEE Press, pp. 448-453, Kaohxiung, Taiwan, China, Dec 14-16, 2009

        [17]. Wei Wang, Thomas Guyet and Svein J. Knapskog, “Autonomic Intrusion Detection System”. Proceedings of 12th International Symposium on Recent Advances in Intrusion Detection (RAID 2009), pp. 359-361, LNCS 5758, Sep 23-25, 2009 (Poster presentation)

        [18]. Wei Wang, Florent Masseglia, Thomas Guyet, Rene Quiniou and Marie-Odile Cordier, “A General Framework for Adaptive and Online Detection of Web attacks”. 18th international World Wide Web conference (WWW 2009), pp. 1141-1142, ACM press, Madrid, Spain, Apr 20-24, 2009 (Poster presentation)

        [19]. Thomas Guyet, Wei Wang, Rene Quiniou, Marie-Odile Cordier, “Diagnostic adaptatif distribue d’un flux de donnees. Application a la detection d’intrusion dans des serveurs Web”. Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009), pp. 325-336, Strasbourg, France, Jan 2009 (Nominated for best application paper award, in French)

        [20]. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, “Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams”, Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009)(Poster), pp. 457-458, Strasbourg, France, Jan 2009

        [21]. Wei Wang, Sylvain Gombault, “Efficient Detection of DDoS Attacks with Important Attributes”. Proceedings of 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008), pp. 61-67, IEEE Press, Tozeur, Tunisia, Oct 28-30, 2008.

        [22]. Wei Wang, Sylvain Gombault, Thomas Guyet, “Towards fast detecting intrusions: using key attributes of network traffic”. Proceedings of The Third International Conference on Internet Monitoring and Protection (ICIMP 2008), IEEE Computer society press, Bucharest, Romania, pp. 86-91, June 29 – July 5, 2008 (acceptance rate 23%) (Best paper award)

        [23]. Wei Wang, Sylvain Gombault, Amine Bsila, “Building multiple behavioral models for network intrusion detection”. 2nd IEEE Workshop on “Monitoring, Attack Detection and Mitigation” (MonAM 2007), Toulouse, pp. 31-36, France, Nov 2007

        [24]. Wei Wang, Sylvain Gombault, “Detecting masquerades with principal component analysis based on cross frequency weights”. Proceedings of 14th Anniversary HP-SUA Workshop, Munich, Germany, pp. 227-232, July 2007

        [25]. Wei Wang, Sylvain Gombault, “Distance measures for anomaly intrusion detection”. Proceedings of 2007 International Conference on Security and management, Las Vegas, NV, pp. 17-23, June 2007 (SAM 2007) (regular paper, acceptance rate 28%)

        [26]. Wei Wang, Roberto Battiti, “Identifying Intrusions in Computer Networks with Principal Component Analysis”. Proceedings of First IEEE International Conference on Availability, Reliability and Security (ARES 2006), IEEE press society, pp. 270-277, April, 20-22nd, Vienna, Austria, 2006

        [27]. Wei Wang, Xiaohong Guan, Xiangliang Zhang, “Profiling Program and User Behavior for Anomaly Intrusion Detection Based on Non-negative Matrix Factorization”. Proceedings of 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas, pp. 99-104, Dec 2004

        [28]. Wei Wang, Xiaohong Guan and Xiangliang Zhang. “A Novel Intrusion Detection Method Based on Principal Component Analysis in Computer Security”. Advances in Neural Networks-ISNN 2004. International IEEE Symposium on Neural Networks, Dalian, China. Lecture Notes in Computer Science (LNCS), No. 3174. pp. 657-662. Aug 2004

        [29]. Wei Wang, Xiaohong Guan and Xiangliang Zhang, “Modeling Program Behavior by Hidden Markov Models for Intrusion Detection”. The Third IEEE International Conference on Machine Learning and Cybernetics (ICMLC 2004), Shanghai, China, pp. 2830-2835.

        Ph.D. Thesis

        王偉, 多信息源的實時入侵檢測方法研究, 西安交通大學, 2005 [WangPhDThesis]

        Other Papers

        王偉, 何永忠, 以完整解決一個具體問題為中心的研究性教學, 計算機教育(錄用), 2014年

        何永忠, 王偉,黎琳, 基于云計算的信息安全實驗教學系統構建, 計算機教育(錄用), 2014年

        獲獎與榮譽

        2018年,省部級科技進步二等獎

        2010年,歐洲ERCIM學者獎(ERCIM “Alain Bensoussan” Fellowship Award (2010-2011) (http://fellowship.ercim.eu/))

        2009年,第四屆“春暉杯”留學人員創新創業大賽(教育部科技部聯合主辦)二等獎 (第一完成人)

        2009年,EGC最佳應用論文提名獎

        2008年,歐盟ERCIM學者獎(ERCIM “Alain Bensoussan" Fellowship Award (2009-2010))

        2008年,ICIMP 最佳論文獎

        社會兼職

        國際權威SCI期刊Computers & Security編委

        《網絡空間安全》期刊編委

        60余個國際學術會議的程序委員會委員-TPC Member

        SCI期刊Frontiers of Computer Science的青年AE (Associate Editor)

        242國家信息安全計劃項目會評專家

        中國計算機協會高級會員 (CCF)

        中國計算機協會青年科技論壇學術委員會委員(YOCSEF AC)

        CCF 區塊鏈專委會發起委員

        CCF出版工委執行委員

        北京市網絡法學研究會常務理事

        相關資訊

        • 北京交通大學2026年部分碩士研究生招生專業調整考試科目公告
        • 北京交通大學2025年擬錄取碩士研究生(含推免生)調檔政審、組織..
        • 北京交通大學2025年少干計劃及支援西部專項錄取名單公示
        • 北京交通大學2025年碩士研究生招生考試擬錄取名單公示
        • 2025年北京交通大學“少數民族高層次骨干人才計劃”考生復試情..

        熱門網課

        2026考研英語全程班 寒假班

        課時:363 限時優惠:¥1190

        免費試聽
        2026考研政治全程班 寒假班

        課時:236 限時優惠:¥1190

        免費試聽
        2026考研數學全程班 5班

        課時: 限時優惠:¥1109

        免費試聽
        2026考研英語直通車 寒假班

        課時:437 限時優惠:¥7690

        免費試聽

        最新資訊

        • 北方民族大學2025年碩士研究生招生考試參考范圍
        • 北京師范大學2026年全國碩士研究生招生考試初試科目調整公告
        • 北京師范大學物理與天文學院2026年考研初試科目調整公告
        • 北京師范大學水科學研究院2026年研考初試科目調整公告
        • 北京師范大學環境學院2026年研考初試科目調整公告

        信息目錄

        考研招生簡章 考研專業目錄 考研參考書目 考研考試大綱 考研真題下載 考研成績查詢 考研調劑信息 考研分數線 考研復試信息
        考研報考錄取 研招辦答疑 研究生學費 考研復習資料 研招辦電話 導師介紹

        網絡課程

        2025/2026考研全程班 最新網課

        政治、英語、數學、專業課都可試聽

        2025/2026考研公共課 免費領取

        免費領課,全年享不停

        • 2026考研英語全程班 5班
        • 2026考研政治全程班 5班
        • 2026考研數學全程班 5班
        • 2026考研英語直通車 5期
        • 2026考研政治直通車 5期
        • 2026考研數學直通車 5期
        • 2026考研英語全程班 寒假班
        • 2026考研政治全程班 寒假班

        考研資料

        考研網課

        省市考研網

        • 北京
        • 天津
        • 河北
        • 山西
        • 遼寧
        • 吉林
        • 上海
        • 江蘇
        • 浙江
        • 安徽
        • 福建
        • 江西
        • 山東
        • 河南
        • 湖北
        • 湖南
        • 廣東
        • 廣西
        • 海南
        • 重慶
        • 四川
        • 貴州
        • 云南
        • 西藏
        • 陜西
        • 甘肅
        • 青海
        • 寧夏
        • 新疆
        • 內蒙古
        • 黑龍江
        中國考研網

          研招網

        • 考研真題
        • 考研成績
        • 考研國家線
        • 招生簡章
        • 推薦免試
        • 高考網

          院校專業

        • 招生單位
        • 211大學名單
        • 985大學名單
        • 自劃線院校
        • 專業導航

          考研調劑

        • 調劑信息網
        • 發布調劑
        • 考研調劑流程

          考研論壇

        • 跨專業考研
        • 考研調劑
        • 考研復試
        • 廈門大學

          考研問答

        • 跨校跨專業
        • 考場應考
        • 考試科目
        • 考研分數線
        • 報錄比

          考研輔導班

        • 考研公共課
        • 統考專業課
        • 院校專業課
        • 專業碩士
        • 英語四六級
        • 出國留學

          試卷資料

        • 考研真題
        • 筆記資料
        查詢
        ×關閉

        掃碼關注
        考研信息一網打盡

        網站介紹 關于我們 聯系方式 廣告業務 幫助信息

        1998-2022 ChinaKaoyan.com Network Studio. All Rights Reserved. 滬ICP備12018245號

        課程 頂部

        感谢您访问我们的网站,您可能还对以下资源感兴趣:

        人妻无码精品久久亚瑟影视_蜜芽亚洲av无码精品色午夜_中文字幕无码播放免费_免费无码H肉动漫在线观看麻豆
        亚洲中文字幕无码一区| 中文字幕无码不卡免费视频| 最近免费字幕中文大全| 久久久久久久人妻无码中文字幕爆| 麻豆国产原创中文AV网站| 亚洲AV无码成人网站久久精品大| 亚洲一区二区三区无码中文字幕| 色综合久久无码中文字幕| 亚洲日韩VA无码中文字幕| 中文字幕无码不卡在线| 精品无码国产一区二区三区51安| 中文字幕视频免费| 无码人妻精品中文字幕免费东京热| 亚洲AV无码专区国产乱码电影| 暖暖日本中文视频| 中文字幕无码毛片免费看| 日韩人妻无码精品一专区| 精品人妻无码区在线视频| 中文在线天堂网WWW| 久久亚洲AV永久无码精品| 无码人妻精品一区二区三区99仓本 | 国产福利电影一区二区三区久久老子无码午夜伦不 | 亚洲日韩中文无码久久| 国产成人精品无码一区二区| 中文午夜乱理片无码| 亚洲美日韩Av中文字幕无码久久久妻妇 | 亚洲久本草在线中文字幕| 久久精品中文无码资源站| 人妻无码久久精品| 国产成人亚洲综合无码| 国产真人无码作爱视频免费 | 最新国产AV无码专区亚洲| 亚洲毛片网址在线观看中文字幕| 精品久久久久久无码中文字幕一区| 亚洲av无码一区二区三区人妖| 国产a v无码专区亚洲av| MM1313亚洲精品无码| 精品亚洲成α人无码成α在线观看| 超清纯白嫩大学生无码网站| AV无码人妻中文字幕| 国产午夜鲁丝无码拍拍|
        • <th id="cm2sy"></th>
        • <strike id="cm2sy"><s id="cm2sy"></s></strike>