删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

北京交通大学导师教师师资介绍简介-王伟

本站小编 Free考研考试/2020-05-08

基本信息 办公电话: 电子邮件: wangwei1@bjtu.edu.cn
通讯地址:本网页不经常更新。最新信息请访问:http://infosec.bjtu.edu.cn/wangwei 邮编:100044

教育背景 2005年毕业于西安交通大学获博士学位(导师:管晓宏院士)。2006-2007在意大利Trento大学做博士后研究。2007-2008在法国Telecom Bretagne及法国国家计算机与自动化研究院(INRIA)做博士后研究。2009-2011作为欧洲ERCIM Fellow在挪威科技大学以及卢森堡大学SnT研究中心从事研究工作。2011年底加入北京交通大学计算机学院。2011年与2014年短期访问纽约大学;2019-2020年访问阿卜杜拉国王科技大学。
工作经历 个人中文简历(2019年10月更新)

王伟,目前任北京交通大学计算机与信息技术学院教授,博导,信息安全系主任。2005年毕业于西安交通大学获博士学位。2005-2011年先后在意大利、法国、挪威和卢森堡等国家从事博士后或Research Fellow研究工作。

主要研究网络、系统、数据及区块链安全。目前主持国家重点研发计划项目(任务)和国家自然科学基金项目等项目。在国内外重要学术期刊或国际会议上发表论文90余篇,论文被引2000余次。2009和2010年连续两年获欧洲ERCIM“Alain Bensoussan”研究奖(ERCIM Fellowship)。2009年获科技部和教育部联合主办的“春晖杯”创新创业大赛二等奖。2018年获省部级科技进步二等奖。是中国计算机协会(CCF)高级会员,CCF青年计算机科技论坛(YOCSEF)学术委员会委员;CCF出版工作委员会执行委员;CCF区块链专业委员会发起委员;北京市网络法学研究会常务理事。

目前担任信息安全领域权威SCI期刊Computers & Security的编委,担任SCI期刊Frontiers of Computer Science的青年AE,担任《网络空间安全》期刊的编委;是期刊IEEE Network的客座编辑(Guest Editor);是国际会议ICDIS 2018年技术委员会共同主席,是Globecom 2019,ICC 2018, ECML/PKDD 2018, SecureComm 2018,AsiaCCS 2016等60余个国际会议的程序委员会委员。
研究方向 系统安全
应用安全
计算机技术(专业学位)
软件工程(专业学位)
招生专业 网络空间安全硕士
网络空间安全博士
电子信息硕士
科研项目
国家自然科学基金,2018-2020,主持
国家重点研发计划子课题,2017-2021,主持
企业横向课题1,2019-2020,主持
企业横向课题2,2019-2021,主持
企业横向课题3,2018-2020,主持
企业横向课题4,2018-2020,主持
教育部留学回国人员基金,2014-01-07--2017-01-06,主持
中央高校基本科研业务费,2013-01-01--2014-12-31,主持
教育部博士点基金,2013-01-01--2015-12-31,主持
北京交通大学人才基金,2012-01-01--2013-12-31,主持
主要研究方向(基于课题以及长期兴趣):
1. 社交网络隐私分析;
2. 物联网安全;
3. 区块链安全与应用;
4. 恶意软件分析。


研究小组近几年课题经费充足,希望有志于科研的同学积极与我联系,攻读硕士或博士学位。有信必复!
课题组将为各位同学提供良好的科研条件和经费支持,优秀的同学有机会出国深造一段时间(对方提供所有经费)。
教学工作

入侵与检测技术(本科生课程,2011-至今;中国大学MOOC(慕课)-国家精品课程在线学习平台建设课程)
恶意代码与异常检测(研究生课程,2018-至今)
专业实习(本科生课程,2014-至今)
算法设计与分析(研究生课程,2013-2017)
专业研究方法论与创新教育(本科生课程,2011-2017)
Information Security(留学生硕士课程,2015-2016)
密码学与安全协议(研究生课程,2012)


论文/期刊 本列表不经常更新,详细信息请查看我的个人主页:http://infosec.bjtu.edu.cn/wangwei


Journal Papers
Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors,Information Sciences, 511: 284-296 (2020) [DOI][PDF].
Xing Liu, Jiqiang Liu, Sencun Zhu,Wei Wang*, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem,IEEE Transactions on Mobile Computing, 2019 [DOI][PDF](to appear).
Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li,Wei Wang,Chao Shen, Using Sparse Representation to Detect Anomalies in Complex WSNs,ACM Transactions on Intelligent Systems and Technology (TIST), 2019[DOI][PDF](to appear) .
Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, andWei Wang*: Sensing Users’ Emotional Intelligence in Social Networks,IEEE Transactions on Computational Social Systems, 2019 [DOI][PDF](to appear).
Xiaoming Liu, Chao Shen,Wei Wang, Xiaohong Guan, CoEvil: A Co-Evolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection,IEEE Transactions on Fuzzy Systems, 2019 [DOI][PDF](to appear) .
Lichen Cheng, Jiqiang Liu,Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, andWei Wang*:SCTSC: A Semi-centralized Traffic Signal Control Mode with Attribute-based Blockchain in IoVs,IEEE Transactions on Computational Social Systems, 2019[DOI][PDF](to appear).
Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu,Wei Wang*, “Polynomial-based Modifiable Blockchain Structure for Removing Fraud Transactions”,Future Generation Computer Systems,99(10):154-163(2019) [DOI][PDF].
Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Yuanyuan Li, Hequn Xian, Xiangliang Zhang:Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions,IEEE Access, 7: 67602 – 67631, 2019 [DOI][PDF].
Nannan Xie, Xing Wang,Wei Wang*, Jiqiang Liu, “Fingerprinting Android Malware Families”,Frontiers of Computer Science, 13(3): 637–646 (2019)[DOI][PDF].
Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si,Wei Wang: Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality,IEEE Access, 7: 33380-33392 (2019)[PDF][PDF].
Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang*, Dynamic privacy leakage analysis of Android third-party libraries,Journal of Information Security and Applications, 99 (10): 154-163 (2019) [DOI][PDF].
Dan Su, Jiqiang Liu, Xiaoyang Wang,Wei Wang*, Detecting Android Locker-ransomware on Chinese Social Networks,IEEE Access, 7(1): 20381-20393, 2019[DOI][PDF].
Wei Wang, Mengxue Zhao, Jigang Wang,“Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”,Journal of Ambient Intelligence and Humanized Computing, 10(8): 3035-3043 (2019) [DOI][PDF].
Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu,Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”,IEEE Transactions on Intelligent Transportation Systems,19(7): 2204-2220 (2018) [DOI][PDF],one of the 50 most frequently accessed documents for this Transaction! (2800+ full text views since 2018).
Xing Liu,Jiqiang Liu,Wei Wang*, Sencun Zhu, “Android single sign-on security: Issues, taxonomy and directions”,Future Generation Computer Systems,vol.89, pp. 402-420 (2018) [DOI][PDF].
Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers”,Future Generation Computer Systems,vol.78, pp. 987–994 (2018) [DOI][PDF].
Heng Ye, Jiqiang Liu,Wei Wang,Ping Li, Tong Li, Jin Li,“Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system”,Future Generation Computer Systems(to appear), 2018 [DOI][PDF].
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li,Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”,IEEE Transactions on Cloud Computing, 6(3):747-759 (2018) [DOI].
Dan Su, Jiqiang Liu,Wei Wang*,Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, “Discovering communities of malapps on Android-based mobile cyber-physical systems”,Ad Hoc Networks,80: 104-115 (2018) [DOI][PDF].
Yongzhong He, Endalew Elsabeth Alem,Wei Wang*, “Hybritus: A Password Strength Checker by Ensemble Learning from the Query Feedbacks of Websites”,Frontiers of Computer Science(to appear), 2018 [DOI][PDF].
Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features.IEEE Access6: 31798-31807(2018) [DOI][PDF].
Xing Liu, Jiqiang Liu,Wei Wang*,Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”,World Wide Web,21(1): 105-126 (2018)[DOI]
Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang,“Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks”,Information Sciences,433–434(4): 417-430 (2018) [DOI].
Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang, “DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications”,Cluster Computing(2018) 21: 265–275 [DOI][PDF].
Ming Fan, Jun Liu,Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android PiggybackedApps Based on Sensitive-subgraph Analysis”,IEEE Transactions on Information Forensics and Security (TIFS),vol. 12, no. 8, pp.1772-1785,2017 [DOI].
Xing Wang,Wei Wang*, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang,“Characterizing Android Apps’ Behavior for Effective Detection of Malapps at Large Scale”,Future Generation Computer Systems, vol. 75, pp. 30-45 (2017) [DOI].
Wei Huang, Chunwang Yan, Jinsong Wang,Wei Wang,“A time-delay neural network for solving time-dependent shortest path problem”,Neural Networks,vol.90, pp. 21-28, 2017 [DOI].
马洪亮,王伟*, 韩臻, “混淆恶意JavaScript代码的检测与反混淆方法研究”.计算机学报, 40(7): 1799-1713, 2017.
马洪亮,王伟*, 韩臻,“面向drive-by-download攻击的检测方法”.华中科技大学学报(自然科学版). 44卷, 3期, pp. 6-11, 2016 [PDF].
Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”.IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.
Georgios Pitsilis,Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”,Computers in Human Behavior(SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”.IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882,2014 (frequently downloaded paper)[PDF][DOI].
Wei Wang, Thomas Guyet, Rene Quiniou,Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang,“Autonomic Intrusion Detection: Adaptively Detecting Anomaliesover Unlabeled Audit Data Streams in Computer Networks”.Knowledge-Based Systems(IF(2012)=4.104,IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [PDF][DOI]
Tong Wu, Zhen Han,Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”.Journal of Southeast University (English Edition). vol. 30, no. 3, pp.289-295, 2014.
马洪亮,王伟*,韩臻, “基于Javascript的轻量级恶意网页异常检测方法”.华中科技大学学报(自然科学版). 42卷, 11期, pp. 34-38, 2014.
Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Understanding and analyzing network traffic”.IEEE Network, vol. 26, no.1, pp. 4-5, Jan 2012
Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Networktraffic monitoring, analysis and anomaly detection”,IEEE Network,vol. 25, no. 3, pp. 6-7, May 2011
Wei Wang, XiangliangZhang, Sylvain Gombault, “Constructing Attribute Weights fromAudit Data for Effective Intrusion Detection”,Journal of Systemsand Software, vol.82, no.12, pp.1974-1981, 2009
Li Feng,Wei Wang, Lina Zhu, Yi Zhang, “Predicting Intrusion Goal Using Dynamic Bayesian Network with Transfer Probability Estimation”.Journal of Network and Computer Applications, vol. 32, no. 3, pp. 721-732, 2009
XiaohongGuan,Wei Wang(corresponding author), Xiangliang Zhang, “Fast IntrusionDetection Based on a Non-negative Matrix Factorization Model”.Journal of Network and Computer Applications, vol. 32, no.1, pp.31-44, 2009
Wei Wang, Xiaohong Guanand Xiangliang Zhang, “Processing of Massive Audit DataStreams for Real-Time Anomaly Intrusion Detection”.ComputerCommunications,vol. 31, no. 1, pp.58-72, 2008
Wei Wang, Xiaohong Guan, XiangliangZhang, Liwei Yang, “Profiling program behavior for anomalyintrusion detection based on the transition and frequency propertyof computer audit data”.Computers & Security, vol. 25,no 7, pp. 539-550, 2006
张响亮,王伟,管晓宏;基于隐马尔可夫模型的程序行为异常检测[J];西安交通大学学报;2005年10期,Vol. 39, no.10, pp. 1056-1059
王伟,陈秀真,管晓宏,张响亮;深度防卫的自适应入侵检测系统[J];西安交通大学学报;2005年04期, vol 39, no. 4, pp. 339~342
王伟,彭勤科.主机日志分析及其在入侵检测中的应用.计算机工程与应用, 2002(13):35-37
林晖,王伟,张优云;基于产品特征的信息检索技术[J];计算机辅助设计与图形学学报;2002年03期, pp.261~265, 2002







































Conference Paper


[1].Jin Li, Heng Ye, Wei Wang, WenjingLou, Y. Thomas Hou, Jiqiang Liu and Rongxing Lu: Efficient and SecureOutsourcing of Differentially Private Data Publication, accepted by 23rdEuropean Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, September 3-7, 2018 (acceptancerate = 56/283 = 19.8%).

[3].Yan Chen, Wei Wang, XiangliangZhang: Randomizing SVM against Adversarial Attacks Under Uncertainty, acceptedby 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2018), Melbourne, Australia,June 3rd - 6th, 2018 (regular paper with long presentation, acceptance rate =59/590=10%).
[4].Longfei Wu, Xiaojiang Du, WeiWang, Bin Lin, “An Out-of-band Authentication Scheme for Internet of ThingsUsing Blockchain Technology”. Accepted by 2018 International Conference onComputing, Networking and Communications (ICNC2018), Maui, Hawaii, USA, March 5-8, 2018 (acceptance rate = 26%).
[5]. XingLiu, Sencun Zhu, Wei Wang*, JiqiangLiu, “Alde: Privacy Risk Analysis of Analytics Libraries in the AndroidEcosystem”. Accepted by the 12th EAI International Conference on Security andPrivacy in Communication Networks (SecureComm2016), Guangzhou, China, October, 10-12, 2016 (acceptancerate=32/137=23.4%).
[6]. DanSu, Wei Wang*, Xing Wang,Jiqiang Liu, “Anomadroid: profiling Android application behaviors foridentifying unknown malapps”, accepted by 15th IEEE International Conference onTrust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China,23-26 August, 2016.
[7]. ShuoQiu, Boyang Wang, Ming Li, JesseVictors, Jiqiang Liu, Yanfeng Shi, Wei Wang, “Fast, Private and Verifiable:Server-aided Approximate Similarity Computation over Large-Scale Datasets”.Proceedings of the 4th ACM International Workshop on Security in CloudComputing, SCC@AsiaCCS, pp. 29-36,Xi’an, China, May 30 – June 3, 2016
[8]. XingLiu, Jiqiang Liu, Wei Wang*“Exploring Sensor Usage Behaviors of Android Applications Based on Data FlowAnalysis”, Proceedings of the 34th IEEE International Performance Computing andCommunications Conference (IPCCC 2015),Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%).
[9]. XingLiu, Wei Wang, Jiqiang Liu, “POSTER:The Popular Apps in Your Pocket Are Leaking Your Privacy”, 22nd ACM Conferenceon Computer and Communications Security (ACMCCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.
[10].Georgios Pitsilis, XiangliangZhang, Wei Wang, “Clustering Recommenders in Collaborative Filtering UsingExplicit Trust Information”, 5th IFIP WG 11.11 International Conference onTrust Management (IFIPTM 2011), Springer, pp. 82-97, Copenhagen, Denmark, June29- July 1, 2011
[11].Wei Wang, Xiangliang Zhang,“High-speed Web Attack Detection through Extracting Exemplars from HTTPTraffic”, 26th ACM Symposium on Applied Computing (ACM SAC 2011)(Securitytrack), ACM Press, pp. 1538-1543, TaiChung, Taiwan, 21-25 March, 2011 (securitytrack acceptance rate=9/41=22%). }
[12].Xiangliang Zhang, Wei Wang, KjetilNorvag, Michele Sebag, “K-AP: Generating Specified K Clusters by EfficientAffinity Propagation”, 10th IEEE International Conference on Data Mining (ICDM2010), pp. 1187-1192, Sydney, Australia, December 14-17, 2010 (acceptancerate=155/797=19.4%)
[13].Atef Abdelkefi, Yuming Jiang, WeiWang, Arne Aslebo, Olav Kvittem, “Robust Traffic Anomaly Detection withPrincipal Component Pursuit”, Student Workshop, ACM CoNEXT 2010, Philadelphia,USA, November 2010
[14].Wei Wang, Xiangliang Zhang,Georgios Pitsilis, “Abstracting Audit Data for Efficient Anomaly IntrusionDetection”, Sixth International Conference on Information Systems Security(ICISS 2010), pp. 201-215, Gandhinagar, Gujarat, India, December 15-19, 2010(acceptance rate 14/51=27.5%)
[15].Xiangliang Zhang, Wei Wang,“Self-adaptive Change Detection in Streaming Data with Non-stationaryDistribution”, 6th International Conference on Advanced Data Mining andApplications (ADMA 2010), pp. 334-345, Chongqing, China, Nov. 19-21, 2010 (oralfull paper, acceptance rate = 17%)}
[16].Wei Wang, Xiangliang Zhang, SylvainGombault, Svein J. Knapskog, “Attribute Normalization in Network IntrusionDetection”, 10th International Symposium on Pervasive Systems, Algorithms andNetworks (I-SPAN 2009), IEEE Press, pp. 448-453, Kaohxiung, Taiwan, China, Dec14-16, 2009
[17].Wei Wang, Thomas Guyet and SveinJ. Knapskog, “Autonomic Intrusion Detection System”. Proceedings of 12thInternational Symposium on Recent Advances in Intrusion Detection (RAID 2009),pp. 359-361, LNCS 5758, Sep 23-25, 2009 (Poster presentation)
[18].Wei Wang, Florent Masseglia,Thomas Guyet, Rene Quiniou and Marie-Odile Cordier, “A General Framework forAdaptive and Online Detection of Web attacks”. 18th international World WideWeb conference (WWW 2009), pp. 1141-1142, ACM press, Madrid, Spain, Apr 20-24,2009 (Poster presentation)
[19].Thomas Guyet, Wei Wang, ReneQuiniou, Marie-Odile Cordier, “Diagnostic adaptatif distribue d’un flux dedonnees. Application a la detection d’intrusion dans des serveurs Web”.Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009),pp. 325-336, Strasbourg, France, Jan 2009 (Nominated for best application paperaward, in French)
[20].Wei Wang, Thomas Guyet, ReneQuiniou, Marie-Odile Cordier, Florent Masseglia, “Online and adaptive anomalyDetection: detecting intrusions in unlabelled audit data streams”, Proceedingsof conference Extraction et Gestion des Connaissances (EGC 2009)(Poster), pp.457-458, Strasbourg, France, Jan 2009
[21].Wei Wang, Sylvain Gombault,“Efficient Detection of DDoS Attacks with Important Attributes”. Proceedings of3rd International Conference on Risks and Security of Internet and Systems(CRiSIS 2008), pp. 61-67, IEEE Press,Tozeur, Tunisia, Oct 28-30, 2008.
[22].Wei Wang, Sylvain Gombault, ThomasGuyet, “Towards fast detecting intrusions: using key attributes of networktraffic”. Proceedings of The Third International Conference on InternetMonitoring and Protection (ICIMP 2008), IEEE Computer society press, Bucharest,Romania, pp. 86-91, June 29 – July 5, 2008 (acceptance rate 23%) (Best paperaward)
[23].Wei Wang, Sylvain Gombault, AmineBsila, “Building multiple behavioral models for network intrusion detection”.2nd IEEE Workshop on “Monitoring, Attack Detection and Mitigation” (MonAM 2007),Toulouse, pp. 31-36, France, Nov 2007
[24].Wei Wang, Sylvain Gombault,“Detecting masquerades with principal component analysis based on crossfrequency weights”. Proceedings of 14th Anniversary HP-SUA Workshop, Munich,Germany, pp. 227-232, July 2007
[25].Wei Wang, Sylvain Gombault,“Distance measures for anomaly intrusion detection”. Proceedings of 2007International Conference on Security and management, Las Vegas, NV, pp. 17-23,June 2007 (SAM 2007) (regular paper, acceptance rate 28%)
[26].Wei Wang, Roberto Battiti,“Identifying Intrusions in Computer Networks with Principal ComponentAnalysis”. Proceedings of First IEEE International Conference on Availability,Reliability and Security (ARES 2006), IEEE press society, pp. 270-277, April,20-22nd, Vienna, Austria, 2006
[27].Wei Wang, Xiaohong Guan,Xiangliang Zhang, “Profiling Program and User Behavior for Anomaly IntrusionDetection Based on Non-negative Matrix Factorization”. Proceedings of 43rd IEEEConference on Decision and Control (CDC 2004), Atlantis, Paradise Island,Bahamas, pp. 99-104, Dec 2004
[28].Wei Wang, Xiaohong Guan andXiangliang Zhang. “A Novel Intrusion Detection Method Based on PrincipalComponent Analysis in Computer Security”. Advances in Neural Networks-ISNN2004. International IEEE Symposium on Neural Networks, Dalian, China. LectureNotes in Computer Science (LNCS), No. 3174. pp. 657-662. Aug 2004
[29].Wei Wang, Xiaohong Guan andXiangliang Zhang, “Modeling Program Behavior by Hidden Markov Models forIntrusion Detection”. The Third IEEE International Conference on MachineLearning and Cybernetics (ICMLC 2004), Shanghai, China, pp. 2830-2835.
Ph.D. Thesis
王伟,多信息源的实时入侵检测方法研究, 西安交通大学, 2005 [WangPhDThesis]
Other Papers
王伟, 何永忠,以完整解决一个具体问题为中心的研究性教学,计算机教育(录用), 2014年
何永忠, 王伟,黎琳,基于云计算的信息安全实验教学系统构建,计算机教育(录用), 2014年


专著/译著
专利
软件著作权
获奖与荣誉 2018年,省部级科技进步二等奖
2010年,欧洲ERCIM奖(ERCIM “Alain Bensoussan” Fellowship Award (2010-2011) (http://fellowship.ercim.eu/))
2009年,第四届“春晖杯”留学人员创新创业大赛(教育部科技部联合主办)二等奖 (第一完成人)
2009年,EGC最佳应用论文提名奖
2008年,欧盟ERCIM奖(ERCIM “Alain Bensoussan" Fellowship Award (2009-2010))
2008年,ICIMP 最佳论文奖

社会兼职 国际权威SCI期刊Computers & Security编委
《网络空间安全》期刊编委
60余个国际学术会议的程序委员会委员-TPC Member
SCI期刊Frontiers of Computer Science的青年AE (Associate Editor)
中国计算机协会高级会员 (CCF)
中国计算机协会青年科技论坛学术委员会委员(YOCSEF AC)
CCF 区块链专委会发起委员
CCF出版工委执行委员
北京市网络法学研究会常务理事




相关话题/北京交通大学

  • 领限时大额优惠券,享本站正版考研考试资料!
    大额优惠券
    优惠券领取后72小时内有效,10万种最新考研考试考证类电子打印资料任你选。涵盖全国500余所院校考研专业课、200多种职业资格考试、1100多种经典教材,产品类型包含电子书、题库、全套资料以及视频,无论您是考研复习、考证刷题,还是考前冲刺等,不同类型的产品可满足您学习上的不同需求。 ...
    本站小编 Free壹佰分学习网 2022-09-19
  • 北京交通大学导师教师师资介绍简介-卜伟
    基本信息办公电话:电子邮件:bwei@bjtu.edu.cn通讯地址:北京交通大学经济管理学院经济系办公室邮编:100044教育背景卜伟(1968),河南省安阳县人。博士,教授,博导,经济学院党总支书记兼副院长。1983年9月——1986年6月,河南省安阳市第二师范学校;1986年9月——1989年8月,河南省安阳县磊口乡中学三级中教;1989年9月——1993年6月,河南财经学院贸易经济系,工商 ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-张大伟
    基本信息办公电话:电子邮件:dwzhang@bjtu.edu.cn通讯地址:北京交通大学计算机与信息技术学院邮编:100044教育背景1993年至1997年,就读于哈尔滨理工大学计算机学院,获计算机学士学位;1997年至2000年,就读于哈尔滨理工大学计算机学院,获计算机软件与理论硕士学位;2000年至2004年,就读于北京航空航天大学电子信息工程学院,获通信与信息系统博士学位。工作经历2004年 ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-冯华
    基本信息办公电话:**电子邮件:hfeng@bjtu.edu.cn通讯地址:北京交通大学经济管理学院邮编:100044教育背景1968年11月出生于山东省新泰市,2004年6月毕业于复旦大学,获得经济学博士学位。1991年7月——1994年3月,在山东轻工业学院任教,担任硅酸盐工程系政治辅导员、团总支副书记,兼任社会科学部教师。1994年3月——2009年7月,在山东财政学院任教,历任助教、讲师、 ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-曹志刚
    基本信息办公电话:电子邮件:zhigangcao@amss.ac.cn通讯地址:北京市海淀区上园村3号北京交通大学思源东楼734邮编:100044教育背景2007.9—2010.7,中国科学院数学与系统科学研究院,博士2009.2—2010.2,以色列希伯来大学理性研究中心,访问学生2003.9—2006.7,曲阜师范大学运筹与管理学院,硕士1999.9—2003.7,曲阜师范大学数学科学学院,本 ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-柯金川
    基本信息办公电话:电子邮件:jchke@bjtu.edu.cn通讯地址:邮编:教育背景福州大学,学士,1987;中国矿业大学(北京),硕士,1991U.ofAlaskaFairbanks,MS,1999;U.ofAlaskaFairbanks,Ph.D,2002工作经历研究方向资本市场与金融风险管理金融学、金融工程和价格理论及政策数量经济与技术经济工商管理硕士(专业学位)民航管理铁路管理(高铁)物 ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-皇甫晓涛
    基本信息办公电话:电子邮件:xthuangfu@bjtu.edu.cn通讯地址:邮编:教育背景四川大学文学博士,清华大学文化产业方向博士后工作经历研究方向应用传播理论传播产业组织、产业结构与产业安全招生专业新闻传播学硕士新闻与传播硕士应用经济学博士科研项目其它部市:国家文化产业发展专项资金重大课题研究计划——文化强国目标与战略研究,2013063020141231,8.0万元,主持其它部市:全球生 ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-李红昌
    基本信息办公电话:电子邮件:hchli@bjtu.edu.cn通讯地址:北京交通大学经济管理学院经济系邮编:100044教育背景2004年4月至今北京交通大学经济管理学院任教.2000年4月至2004年4月北京交通大学产业经济专业,攻读经济学博士学位.1997年9月-2000年4月北京交通大学产业经济专业,获经济学硕士学位.1991年9月–1995年9月北京科技大学管理科学与工程专业,获学士学位. ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-刘德红
    基本信息办公电话:**电子邮件:dhliu@bjtu.edu.cn通讯地址:邮编:100044教育背景教授,经济学博士,博士研究生导师,证券投资、金融风险管理与公司金融方向的硕士研究生导师。2010年2月至8月到美国德克萨斯大学达拉斯分校进行访学,参观了哈佛大学,麻省理工学院,芝加哥大学,美国西北大学等世界著名大学,参加了在美国达拉斯联邦储备银行举行的诺贝尔经济学奖获得者阿克洛夫的学术讲座与交流。 ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-陆超
    基本信息办公电话:电子邮件:chaolu@bjtu.edu.cn通讯地址:邮编:教育背景北京交通大学博士中国人民大学财政金融学院博士后合作导师:吴晓求教授工作经历研究方向资本市场与金融风险管理证券投资公司金融综合管理金融学、金融工程和价格理论及政策招生专业金融学硕士金融硕士工商管理硕士应用经济学博士科研项目首都高端智库课题:世界级机场群比较研究(3),20202020国家社会科学基金“后期资助”: ...
    本站小编 Free考研考试 2020-05-08
  • 北京交通大学导师教师师资介绍简介-李卫东
    基本信息办公电话:**电子邮件:wdli@bjtu.edu.cn通讯地址:邮编:100044教育背景1988.91992.7中国人民大学统计系,统计学专业,学士1992.71995.7青岛海尔洗衣机有限总公司,总工程师办公室1995.71998.7中国人民大学统计系,数理统计专业,硕士2002.92007.7北京交通大学经济管理学院,企业管理专业,博士工作经历北京交通大学经济管理学院教授,博士,博 ...
    本站小编 Free考研考试 2020-05-08