Wei Huang

发布时间:2021-03-03作者:

Name

Wei Huang 中文简历)             


Title

Associate Professor

Department 

Department of Cybersecurity

E-Mail 

huangwei.me@cuc.edu.cn

Courses Taught 

Network Security, Mobile Internet Security, Linux System and Network Management, Cryptography 

Application Practice (second semester), and Information Security Comprehensive Practice (second semester)


Research Interest or 

Teaching Expertise

Network Security, Attack-Defense Confrontation and Threat Detection



Self-Introduction 

From 2001 to 2010, I studied in Beijing University of Posts and Telecommunications, obtaining the Doctorate of Engineering in Information Security. After graduation, I worked in the School of Computer Science and 

Cyber Space, Communication University of China.


Publication

1. G. Yu, W. Fan, W. Huang, and J. An, “An Explainable Method of Phishing Emails Generation and Its Applica-

tion in Machine Learning,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation 

Control Conference (ITNEC), 2020, vol. 1, pp. 1279–1283.

2. G. Yu, W. Fan, W. Huang, and J. An, “An Explainable Method of Phishing Emails Generation and Its Applica-

tion in Machine Learning,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation 

Control Conference (ITNEC), Jun. 2020, vol. 1, pp. 1279–1283, doi: 10.1109/ITNEC48623.2020.9085171.

3. M. Huang, W. Fan, W. Huang, Y. Cheng, and H. Xiao, “Research on Building Exploitable Vulnerability Data-

base for Cloud-Native App,” in 2020 IEEE 4th Information Technology, Networking, Electronic and 

Automation Control Conference (ITNEC), 2020, vol. 1, pp. 758–762.

4. M. Huang, W. Fan, W. Huang, Y. Cheng, and H. Xiao, “Research on Building Exploitable Vulnerability Data-

base for Cloud-Native App,” in 2020 IEEE 4th Information Technology, Networking, Electronic and 

Automation Control Conference (ITNEC), Jun. 2020, vol. 1, pp. 758–762, doi: 10.1109/ITNEC48623.2020.9084733.

5. Y. Pan, J. An, W. Fan, and W. Huang, “Shellfier: A Shellcode Detection Method based on Dynamic Binary 

Instrumentation and Convolutional Neural Network,” in Proceedings of the 2019 8th International 

Conference on Software and Computer Applications, 2019, pp. 462–466.


Projects

Scientific Research Projects

1. Basic Environment of Wireless Router Firmware Vulnerability Analysis, China Information Security Assess-ment Center, November 2020- November 2021, Participant, RMB 278,000.00

2. Basic Open Source Software Version Database Information Collection System for Database and Other 

Products, Institute of Information Engineering, Chinese Academy of Sciences, December 2019-

December 2020, Principle Investigator, RMB148,000.00

3. Key Technologies of Construction and Exercise Evaluation of the Cyberspace Vulnerability Shooting Range, China Mobile Research Fund Project of the Ministry of Education, November 2019 - December 2021, 

Participant, RMB1,000,000.00

4. Web Module Vulnerability Mining and Verification Tools, Institute of Information Engineering, Chinese 

Academy of Sciences, December 2019-December 2020, Participant, RMB 248,000.00

  

Admission Requirements

Master Degree Candidates:

1. Highly interested in Cybersecurity and technical research

2. Knowledgeable in basic theories and skills of Computer Science and Information Security and related 

fields




返回原图
/