删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

北京交通大学计算机与信息技术学院导师教师师资介绍简介-王伟

本站小编 Free考研考试/2020-05-09

基本信息 办公电话: 电子邮件: wangwei1@bjtu.edu.cn
通讯地址:本网页不经常更新。最新信息请访问:http://infosec.bjtu.edu.cn/wangwei 邮编:100044

教育背景 2005年毕业于西安交通大学获博士学位(导师:管晓宏院士)。2006-2007在意大利Trento大学做博士后研究。2007-2008在法国Telecom Bretagne及法国国家计算机与自动化研究院(INRIA)做博士后研究。2009-2011作为欧洲ERCIM Fellow在挪威科技大学以及卢森堡大学SnT研究中心从事研究工作。2011年底加入北京交通大学计算机学院。2011年与2014年短期访问纽约大学;2019-2020年访问阿卜杜拉国王科技大学。
工作经历 个人中文简历(2019年10月更新)

王伟,目前任北京交通大学计算机与信息技术学院教授,博导,信息安全系主任。2005年毕业于西安交通大学获博士学位。2005-2011年先后在意大利、法国、挪威和卢森堡等国家从事博士后或Research Fellow研究工作。

主要研究网络、系统、数据及区块链安全。目前主持国家重点研发计划项目(任务)和国家自然科学基金项目等项目。在国内外重要学术期刊或国际会议上发表论文90余篇,论文被引2000余次。2009和2010年连续两年获欧洲ERCIM“Alain Bensoussan”研究奖(ERCIM Fellowship)。2009年获科技部和教育部联合主办的“春晖杯”创新创业大赛二等奖。2018年获省部级科技进步二等奖。是中国计算机协会(CCF)高级会员,CCF青年计算机科技论坛(YOCSEF)学术委员会委员;CCF出版工作委员会执行委员;CCF区块链专业委员会发起委员;北京市网络法学研究会常务理事。

目前担任信息安全领域权威SCI期刊Computers & Security的编委,担任SCI期刊Frontiers of Computer Science的青年AE,担任《网络空间安全》期刊的编委;是期刊IEEE Network的客座编辑(Guest Editor);是国际会议ICDIS 2018年技术委员会共同主席,是Globecom 2019,ICC 2018, ECML/PKDD 2018, SecureComm 2018,AsiaCCS 2016等60余个国际会议的程序委员会委员。
研究方向 系统安全
应用安全
计算机技术(专业学位)
软件工程(专业学位)
招生专业 网络空间安全硕士
网络空间安全博士
电子信息硕士
科研项目
国家自然科学基金,2018-2020,主持
国家重点研发计划子课题,2017-2021,主持
企业横向课题1,2019-2020,主持
企业横向课题2,2019-2021,主持
企业横向课题3,2018-2020,主持
企业横向课题4,2018-2020,主持
教育部留学回国人员基金,2014-01-07--2017-01-06,主持
中央高校基本科研业务费,2013-01-01--2014-12-31,主持
教育部博士点基金,2013-01-01--2015-12-31,主持
北京交通大学人才基金,2012-01-01--2013-12-31,主持
主要研究方向(基于课题以及长期兴趣):
1. 社交网络隐私分析;
2. 物联网安全;
3. 区块链安全与应用;
4. 恶意软件分析。


研究小组近几年课题经费充足,希望有志于科研的同学积极与我联系,攻读硕士或博士学位。有信必复!
课题组将为各位同学提供良好的科研条件和经费支持,优秀的同学有机会出国深造一段时间(对方提供所有经费)。
教学工作

入侵与检测技术(本科生课程,2011-至今;中国大学MOOC(慕课)-国家精品课程在线学习平台建设课程)
恶意代码与异常检测(研究生课程,2018-至今)
专业实习(本科生课程,2014-至今)
算法设计与分析(研究生课程,2013-2017)
专业研究方法论与创新教育(本科生课程,2011-2017)
Information Security(留学生硕士课程,2015-2016)
密码学与安全协议(研究生课程,2012)


论文/期刊 本列表不经常更新,详细信息请查看我的个人主页:http://infosec.bjtu.edu.cn/wangwei


Journal Papers
Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors,Information Sciences, 511: 284-296 (2020) [DOI][PDF].
Xing Liu, Jiqiang Liu, Sencun Zhu,Wei Wang*, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem,IEEE Transactions on Mobile Computing, 2019 [DOI][PDF](to appear).
Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li,Wei Wang,Chao Shen, Using Sparse Representation to Detect Anomalies in Complex WSNs,ACM Transactions on Intelligent Systems and Technology (TIST), 2019[DOI][PDF](to appear) .
Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, andWei Wang*: Sensing Users’ Emotional Intelligence in Social Networks,IEEE Transactions on Computational Social Systems, 2019 [DOI][PDF](to appear).
Xiaoming Liu, Chao Shen,Wei Wang, Xiaohong Guan, CoEvil: A Co-Evolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection,IEEE Transactions on Fuzzy Systems, 2019 [DOI][PDF](to appear) .
Lichen Cheng, Jiqiang Liu,Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, andWei Wang*:SCTSC: A Semi-centralized Traffic Signal Control Mode with Attribute-based Blockchain in IoVs,IEEE Transactions on Computational Social Systems, 2019[DOI][PDF](to appear).
Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu,Wei Wang*, “Polynomial-based Modifiable Blockchain Structure for Removing Fraud Transactions”,Future Generation Computer Systems,99(10):154-163(2019) [DOI][PDF].
Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Yuanyuan Li, Hequn Xian, Xiangliang Zhang:Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions,IEEE Access, 7: 67602 – 67631, 2019 [DOI][PDF].
Nannan Xie, Xing Wang,Wei Wang*, Jiqiang Liu, “Fingerprinting Android Malware Families”,Frontiers of Computer Science, 13(3): 637–646 (2019)[DOI][PDF].
Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si,Wei Wang: Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality,IEEE Access, 7: 33380-33392 (2019)[PDF][PDF].
Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang*, Dynamic privacy leakage analysis of Android third-party libraries,Journal of Information Security and Applications, 99 (10): 154-163 (2019) [DOI][PDF].
Dan Su, Jiqiang Liu, Xiaoyang Wang,Wei Wang*, Detecting Android Locker-ransomware on Chinese Social Networks,IEEE Access, 7(1): 20381-20393, 2019[DOI][PDF].
Wei Wang, Mengxue Zhao, Jigang Wang,“Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”,Journal of Ambient Intelligence and Humanized Computing, 10(8): 3035-3043 (2019) [DOI][PDF].
Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu,Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”,IEEE Transactions on Intelligent Transportation Systems,19(7): 2204-2220 (2018) [DOI][PDF],one of the 50 most frequently accessed documents for this Transaction! (2800+ full text views since 2018).
Xing Liu,Jiqiang Liu,Wei Wang*, Sencun Zhu, “Android single sign-on security: Issues, taxonomy and directions”,Future Generation Computer Systems,vol.89, pp. 402-420 (2018) [DOI][PDF].
Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers”,Future Generation Computer Systems,vol.78, pp. 987–994 (2018) [DOI][PDF].
Heng Ye, Jiqiang Liu,Wei Wang,Ping Li, Tong Li, Jin Li,“Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system”,Future Generation Computer Systems(to appear), 2018 [DOI][PDF].
Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li,Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”,IEEE Transactions on Cloud Computing, 6(3):747-759 (2018) [DOI].
Dan Su, Jiqiang Liu,Wei Wang*,Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, “Discovering communities of malapps on Android-based mobile cyber-physical systems”,Ad Hoc Networks,80: 104-115 (2018) [DOI][PDF].
Yongzhong He, Endalew Elsabeth Alem,Wei Wang*, “Hybritus: A Password Strength Checker by Ensemble Learning from the Query Feedbacks of Websites”,Frontiers of Computer Science(to appear), 2018 [DOI][PDF].
Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features.IEEE Access6: 31798-31807(2018) [DOI][PDF].
Xing Liu, Jiqiang Liu,Wei Wang*,Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”,World Wide Web,21(1): 105-126 (2018)[DOI]
Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang,“Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks”,Information Sciences,433–434(4): 417-430 (2018) [DOI].
Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang, “DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications”,Cluster Computing(2018) 21: 265–275 [DOI][PDF].
Ming Fan, Jun Liu,Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android PiggybackedApps Based on Sensitive-subgraph Analysis”,IEEE Transactions on Information Forensics and Security (TIFS),vol. 12, no. 8, pp.1772-1785,2017 [DOI].
Xing Wang,Wei Wang*, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang,“Characterizing Android Apps’ Behavior for Effective Detection of Malapps at Large Scale”,Future Generation Computer Systems, vol. 75, pp. 30-45 (2017) [DOI].
Wei Huang, Chunwang Yan, Jinsong Wang,Wei Wang,“A time-delay neural network for solving time-dependent shortest path problem”,Neural Networks,vol.90, pp. 21-28, 2017 [DOI].
马洪亮,王伟*, 韩臻, “混淆恶意JavaScript代码的检测与反混淆方法研究”.计算机学报, 40(7): 1799-1713, 2017.
马洪亮,王伟*, 韩臻,“面向drive-by-download攻击的检测方法”.华中科技大学学报(自然科学版). 44卷, 3期, pp. 6-11, 2016 [PDF].
Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”.IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.
Georgios Pitsilis,Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”,Computers in Human Behavior(SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”.IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882,2014 (frequently downloaded paper)[PDF][DOI].
Wei Wang, Thomas Guyet, Rene Quiniou,Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang,“Autonomic Intrusion Detection: Adaptively Detecting Anomaliesover Unlabeled Audit Data Streams in Computer Networks”.Knowledge-Based Systems(IF(2012)=4.104,IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [PDF][DOI]
Tong Wu, Zhen Han,Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”.Journal of Southeast University (English Edition). vol. 30, no. 3, pp.289-295, 2014.
马洪亮,王伟*,韩臻, “基于Javascript的轻量级恶意网页异常检测方法”.华中科技大学学报(自然科学版). 42卷, 11期, pp. 34-38, 2014.
Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Understanding and analyzing network traffic”.IEEE Network, vol. 26, no.1, pp. 4-5, Jan 2012
Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Networktraffic monitoring, analysis and anomaly detection”,IEEE Network,vol. 25, no. 3, pp. 6-7, May 2011
Wei Wang, XiangliangZhang, Sylvain Gombault, “Constructing Attribute Weights fromAudit Data for Effective Intrusion Detection”,Journal of Systemsand Software, vol.82, no.12, pp.1974-1981, 2009
Li Feng,Wei Wang, Lina Zhu, Yi Zhang, “Predicting Intrusion Goal Using Dynamic Bayesian Network with Transfer Probability Estimation”.Journal of Network and Computer Applications, vol. 32, no. 3, pp. 721-732, 2009
XiaohongGuan,Wei Wang(corresponding author), Xiangliang Zhang, “Fast IntrusionDetection Based on a Non-negative Matrix Factorization Model”.Journal of Network and Computer Applications, vol. 32, no.1, pp.31-44, 2009
Wei Wang, Xiaohong Guanand Xiangliang Zhang, “Processing of Massive Audit DataStreams for Real-Time Anomaly Intrusion Detection”.ComputerCommunications,vol. 31, no. 1, pp.58-72, 2008
Wei Wang, Xiaohong Guan, XiangliangZhang, Liwei Yang, “Profiling program behavior for anomalyintrusion detection based on the transition and frequency propertyof computer audit data”.Computers & Security, vol. 25,no 7, pp. 539-550, 2006
张响亮,王伟,管晓宏;基于隐马尔可夫模型的程序行为异常检测[J];西安交通大学学报;2005年10期,Vol. 39, no.10, pp. 1056-1059
王伟,陈秀真,管晓宏,张响亮;深度防卫的自适应入侵检测系统[J];西安交通大学学报;2005年04期, vol 39, no. 4, pp. 339~342
王伟,彭勤科.主机日志分析及其在入侵检测中的应用.计算机工程与应用, 2002(13):35-37
林晖,王伟,张优云;基于产品特征的信息检索技术[J];计算机辅助设计与图形学学报;2002年03期, pp.261~265, 2002







































Conference Paper


[1].Jin Li, Heng Ye, Wei Wang, WenjingLou, Y. Thomas Hou, Jiqiang Liu and Rongxing Lu: Efficient and SecureOutsourcing of Differentially Private Data Publication, accepted by 23rdEuropean Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, September 3-7, 2018 (acceptancerate = 56/283 = 19.8%).

[3].Yan Chen, Wei Wang, XiangliangZhang: Randomizing SVM against Adversarial Attacks Under Uncertainty, acceptedby 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2018), Melbourne, Australia,June 3rd - 6th, 2018 (regular paper with long presentation, acceptance rate =59/590=10%).
[4].Longfei Wu, Xiaojiang Du, WeiWang, Bin Lin, “An Out-of-band Authentication Scheme for Internet of ThingsUsing Blockchain Technology”. Accepted by 2018 International Conference onComputing, Networking and Communications (ICNC2018), Maui, Hawaii, USA, March 5-8, 2018 (acceptance rate = 26%).
[5]. XingLiu, Sencun Zhu, Wei Wang*, JiqiangLiu, “Alde: Privacy Risk Analysis of Analytics Libraries in the AndroidEcosystem”. Accepted by the 12th EAI International Conference on Security andPrivacy in Communication Networks (SecureComm2016), Guangzhou, China, October, 10-12, 2016 (acceptancerate=32/137=23.4%).
[6]. DanSu, Wei Wang*, Xing Wang,Jiqiang Liu, “Anomadroid: profiling Android application behaviors foridentifying unknown malapps”, accepted by 15th IEEE International Conference onTrust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China,23-26 August, 2016.
[7]. ShuoQiu, Boyang Wang, Ming Li, JesseVictors, Jiqiang Liu, Yanfeng Shi, Wei Wang, “Fast, Private and Verifiable:Server-aided Approximate Similarity Computation over Large-Scale Datasets”.Proceedings of the 4th ACM International Workshop on Security in CloudComputing, SCC@AsiaCCS, pp. 29-36,Xi’an, China, May 30 – June 3, 2016
[8]. XingLiu, Jiqiang Liu, Wei Wang*“Exploring Sensor Usage Behaviors of Android Applications Based on Data FlowAnalysis”, Proceedings of the 34th IEEE International Performance Computing andCommunications Conference (IPCCC 2015),Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%).
[9]. XingLiu, Wei Wang, Jiqiang Liu, “POSTER:The Popular Apps in Your Pocket Are Leaking Your Privacy”, 22nd ACM Conferenceon Computer and Communications Security (ACMCCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.
[10].Georgios Pitsilis, XiangliangZhang, Wei Wang, “Clustering Recommenders in Collaborative Filtering UsingExplicit Trust Information”, 5th IFIP WG 11.11 International Conference onTrust Management (IFIPTM 2011), Springer, pp. 82-97, Copenhagen, Denmark, June29- July 1, 2011
[11].Wei Wang, Xiangliang Zhang,“High-speed Web Attack Detection through Extracting Exemplars from HTTPTraffic”, 26th ACM Symposium on Applied Computing (ACM SAC 2011)(Securitytrack), ACM Press, pp. 1538-1543, TaiChung, Taiwan, 21-25 March, 2011 (securitytrack acceptance rate=9/41=22%). }
[12].Xiangliang Zhang, Wei Wang, KjetilNorvag, Michele Sebag, “K-AP: Generating Specified K Clusters by EfficientAffinity Propagation”, 10th IEEE International Conference on Data Mining (ICDM2010), pp. 1187-1192, Sydney, Australia, December 14-17, 2010 (acceptancerate=155/797=19.4%)
[13].Atef Abdelkefi, Yuming Jiang, WeiWang, Arne Aslebo, Olav Kvittem, “Robust Traffic Anomaly Detection withPrincipal Component Pursuit”, Student Workshop, ACM CoNEXT 2010, Philadelphia,USA, November 2010
[14].Wei Wang, Xiangliang Zhang,Georgios Pitsilis, “Abstracting Audit Data for Efficient Anomaly IntrusionDetection”, Sixth International Conference on Information Systems Security(ICISS 2010), pp. 201-215, Gandhinagar, Gujarat, India, December 15-19, 2010(acceptance rate 14/51=27.5%)
[15].Xiangliang Zhang, Wei Wang,“Self-adaptive Change Detection in Streaming Data with Non-stationaryDistribution”, 6th International Conference on Advanced Data Mining andApplications (ADMA 2010), pp. 334-345, Chongqing, China, Nov. 19-21, 2010 (oralfull paper, acceptance rate = 17%)}
[16].Wei Wang, Xiangliang Zhang, SylvainGombault, Svein J. Knapskog, “Attribute Normalization in Network IntrusionDetection”, 10th International Symposium on Pervasive Systems, Algorithms andNetworks (I-SPAN 2009), IEEE Press, pp. 448-453, Kaohxiung, Taiwan, China, Dec14-16, 2009
[17].Wei Wang, Thomas Guyet and SveinJ. Knapskog, “Autonomic Intrusion Detection System”. Proceedings of 12thInternational Symposium on Recent Advances in Intrusion Detection (RAID 2009),pp. 359-361, LNCS 5758, Sep 23-25, 2009 (Poster presentation)
[18].Wei Wang, Florent Masseglia,Thomas Guyet, Rene Quiniou and Marie-Odile Cordier, “A General Framework forAdaptive and Online Detection of Web attacks”. 18th international World WideWeb conference (WWW 2009), pp. 1141-1142, ACM press, Madrid, Spain, Apr 20-24,2009 (Poster presentation)
[19].Thomas Guyet, Wei Wang, ReneQuiniou, Marie-Odile Cordier, “Diagnostic adaptatif distribue d’un flux dedonnees. Application a la detection d’intrusion dans des serveurs Web”.Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009),pp. 325-336, Strasbourg, France, Jan 2009 (Nominated for best application paperaward, in French)
[20].Wei Wang, Thomas Guyet, ReneQuiniou, Marie-Odile Cordier, Florent Masseglia, “Online and adaptive anomalyDetection: detecting intrusions in unlabelled audit data streams”, Proceedingsof conference Extraction et Gestion des Connaissances (EGC 2009)(Poster), pp.457-458, Strasbourg, France, Jan 2009
[21].Wei Wang, Sylvain Gombault,“Efficient Detection of DDoS Attacks with Important Attributes”. Proceedings of3rd International Conference on Risks and Security of Internet and Systems(CRiSIS 2008), pp. 61-67, IEEE Press,Tozeur, Tunisia, Oct 28-30, 2008.
[22].Wei Wang, Sylvain Gombault, ThomasGuyet, “Towards fast detecting intrusions: using key attributes of networktraffic”. Proceedings of The Third International Conference on InternetMonitoring and Protection (ICIMP 2008), IEEE Computer society press, Bucharest,Romania, pp. 86-91, June 29 – July 5, 2008 (acceptance rate 23%) (Best paperaward)
[23].Wei Wang, Sylvain Gombault, AmineBsila, “Building multiple behavioral models for network intrusion detection”.2nd IEEE Workshop on “Monitoring, Attack Detection and Mitigation” (MonAM 2007),Toulouse, pp. 31-36, France, Nov 2007
[24].Wei Wang, Sylvain Gombault,“Detecting masquerades with principal component analysis based on crossfrequency weights”. Proceedings of 14th Anniversary HP-SUA Workshop, Munich,Germany, pp. 227-232, July 2007
[25].Wei Wang, Sylvain Gombault,“Distance measures for anomaly intrusion detection”. Proceedings of 2007International Conference on Security and management, Las Vegas, NV, pp. 17-23,June 2007 (SAM 2007) (regular paper, acceptance rate 28%)
[26].Wei Wang, Roberto Battiti,“Identifying Intrusions in Computer Networks with Principal ComponentAnalysis”. Proceedings of First IEEE International Conference on Availability,Reliability and Security (ARES 2006), IEEE press society, pp. 270-277, April,20-22nd, Vienna, Austria, 2006
[27].Wei Wang, Xiaohong Guan,Xiangliang Zhang, “Profiling Program and User Behavior for Anomaly IntrusionDetection Based on Non-negative Matrix Factorization”. Proceedings of 43rd IEEEConference on Decision and Control (CDC 2004), Atlantis, Paradise Island,Bahamas, pp. 99-104, Dec 2004
[28].Wei Wang, Xiaohong Guan andXiangliang Zhang. “A Novel Intrusion Detection Method Based on PrincipalComponent Analysis in Computer Security”. Advances in Neural Networks-ISNN2004. International IEEE Symposium on Neural Networks, Dalian, China. LectureNotes in Computer Science (LNCS), No. 3174. pp. 657-662. Aug 2004
[29].Wei Wang, Xiaohong Guan andXiangliang Zhang, “Modeling Program Behavior by Hidden Markov Models forIntrusion Detection”. The Third IEEE International Conference on MachineLearning and Cybernetics (ICMLC 2004), Shanghai, China, pp. 2830-2835.
Ph.D. Thesis
王伟,多信息源的实时入侵检测方法研究, 西安交通大学, 2005 [WangPhDThesis]
Other Papers
王伟, 何永忠,以完整解决一个具体问题为中心的研究性教学,计算机教育(录用), 2014年
何永忠, 王伟,黎琳,基于云计算的信息安全实验教学系统构建,计算机教育(录用), 2014年


专著/译著
专利
软件著作权
获奖与荣誉 2018年,省部级科技进步二等奖
2010年,欧洲ERCIM奖(ERCIM “Alain Bensoussan” Fellowship Award (2010-2011) (http://fellowship.ercim.eu/))
2009年,第四届“春晖杯”留学人员创新创业大赛(教育部科技部联合主办)二等奖 (第一完成人)
2009年,EGC最佳应用论文提名奖
2008年,欧盟ERCIM奖(ERCIM “Alain Bensoussan" Fellowship Award (2009-2010))
2008年,ICIMP 最佳论文奖

社会兼职 国际权威SCI期刊Computers & Security编委
《网络空间安全》期刊编委
60余个国际学术会议的程序委员会委员-TPC Member
SCI期刊Frontiers of Computer Science的青年AE (Associate Editor)
中国计算机协会高级会员 (CCF)
中国计算机协会青年科技论坛学术委员会委员(YOCSEF AC)
CCF 区块链专委会发起委员
CCF出版工委执行委员
北京市网络法学研究会常务理事




相关话题/北京交通大学 计算机

  • 领限时大额优惠券,享本站正版考研考试资料!
    大额优惠券
    优惠券领取后72小时内有效,10万种最新考研考试考证类电子打印资料任你选。涵盖全国500余所院校考研专业课、200多种职业资格考试、1100多种经典教材,产品类型包含电子书、题库、全套资料以及视频,无论您是考研复习、考证刷题,还是考前冲刺等,不同类型的产品可满足您学习上的不同需求。 ...
    本站小编 Free壹佰分学习网 2022-09-19
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-金一
    基本信息办公电话:电子邮件:yjin@bjtu.edu.cn通讯地址:北京市海淀区上园村3号,北京交通大学,计算机与信息技术学院邮编:100044教育背景金一,女,博士,北京交通大学计算机与信息技术学院副教授,计算机科学与技术专业,博士研究生导师。2010年1月获得北京交通大学信号与信息处理专业博士学位。后进入北京交通大学计算机科学与技术博士后流动站工作两年。主要研究经历:2016/01今,北京交 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-王公仆
    基本信息办公电话:电子邮件:gpwang@bjtu.edu.cn通讯地址:北京交通大学主校区九教北201房间邮编:100044教育背景王公仆,北京交通大学教授,博士生导师。2001年于安徽大学获得学士学位,2004年于北京邮电大学获得硕士学位,2011年于加拿大阿尔伯塔大学获得博士学位,博士导师:Prof.ChinthaTellambura(IEEEFellow)http://www.ece.ua ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-周围
    基本信息办公电话:(010)5168电子邮件:wzhou@bjtu.edu.cn通讯地址:北京市海淀区上园村3号逸夫楼112邮编:100044教育背景WeiZHOUisSeniorResearcherofComputerandInformationTechnologyatBeijingJiaotongUniversity.ShereceivedtheB.Eng.degreefromHebeiUni ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-李浥东
    基本信息办公电话:电子邮件:ydli@bjtu.edu.cn通讯地址:北京市海淀区上园村3号邮编:100044教育背景李浥东,现任北京交通大学计算机与信息技术学院副院长、教授、博士生导师,SAP大学能力中心(中国)主任。2003年本科毕业于北京交通大学信息与通信工程系。2006年和2011年在澳大利亚阿德莱德大学计算机系分别获得硕士和博士学位。研究方向主要在大数据分析与安全、人工智能、云计算与高性 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-万丽莉
    基本信息办公电话:电子邮件:llwan@bjtu.edu.cn通讯地址:北京交通大学信息科学研究所邮编:100044教育背景2007年7月获北京航空航天大学计算机应用技术专业博士学位,同年进入北京交通大学计算机学院信息所工作。2014年9月2015年9月作为访问赴加拿大SFU的GrUVi实验室工作1年。工作经历研究方向模式识别与智能系统智能感知与人机交互电子与通信工程(专业学位)软件工程(专业学位 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-王升辉
    基本信息办公电话:电子邮件:shwang@bjtu.edu.cn通讯地址:北京交通大学信息所邮编:100044教育背景20012007,博士,信号与信息处理,北京交通大学信息所;19972001,学士,自动控制,北京交通大学通控系;工作经历2007至今,讲师,副教授,北京交通大学信息所20142015,美国路易斯维尔大学访问研究方向模式识别与智能系统网络通信与信息处理关键技术电子与通信工程(专业学 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-冯松鹤
    基本信息办公电话:N/A电子邮件:shfeng@bjtu.edu.cn通讯地址:北京交通大学计算机学院9号教学楼北524室邮编:100044教育背景2003.092009.01北京交通大学,计算机与信息技术学院,计算机应用技术专业,博士,导师:须德教授1999.092003.06北京交通大学,计算机与信息技术学院,计算机科学与技术专业,学士工作经历2017.12至今北京交通大学,计算机与信息技术学 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-于双元
    基本信息办公电话:电子邮件:shyyu@bjtu.edu.cn通讯地址:北京交通大学计算机与信息技术学院邮编:100044教育背景教育背景1983.91987.7北京邮电学院本科,获工学学士学位1987.91990.3北京交通大学研究生,获工学硕士学位工作经历1990.3至今北京交通大学计算机与信息技术学院工作经历研究方向数据与知识工程人工智能及应用计算机技术(专业学位)软件工程(专业学位)招生专 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-杨芳南
    基本信息办公电话:**电子邮件:fnyang@bjtu.edu.cn通讯地址:邮编:教育背景19811985年,中南大学计算机科学与技术专业,本科;19851988年,中南大学计算机应用专业,硕士研究生;工作经历1988年1999年,北京交通大学管理科学研究所工作;1999年至今,北京交通大学计算机学院网络管理研究中心工作研究方向招生专业科研项目1.神华集团重大科研课题:神华重载铁路货车状态检修成 ...
    本站小编 Free考研考试 2020-05-09
  • 北京交通大学计算机与信息技术学院导师教师师资介绍简介-赵耀
    基本信息办公电话:电子邮件:yzhao@bjtu.edu.cn通讯地址:北京交通大学信息科学研究所邮编:100044教育背景赵耀:博士,教授,博导,,国家基金获得者,科技创新领军人才,第七届"信息与通信工程学科"国务院学科评议组成员,科技北京百名领军人才。1996年获北京交通大学工学博士学位,2001年破格晋升为教授,2002被遴选为博士生指导教师。2001年至2002年在荷兰代尔夫特理工大学(T ...
    本站小编 Free考研考试 2020-05-09