Name | Wei Huang (中文简历) | |
Title | Associate Professor | |
Department | Department of Cybersecurity | |
huangwei.me@cuc.edu.cn | ||
Courses Taught | Network Security, Mobile Internet Security, Linux System and Network Management, Cryptography Application Practice (second semester), and Information Security Comprehensive Practice (second semester) | |
Research Interest or Teaching Expertise | Network Security, Attack-Defense Confrontation and Threat Detection | |
Self-Introduction | From 2001 to 2010, I studied in Beijing University of Posts and Telecommunications, obtaining the Doctorate of Engineering in Information Security. After graduation, I worked in the School of Computer Science and Cyber Space, Communication University of China. | |
Publication | 1. G. Yu, W. Fan, W. Huang, and J. An, “An Explainable Method of Phishing Emails Generation and Its Applica- tion in Machine Learning,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2020, vol. 1, pp. 1279–1283. 2. G. Yu, W. Fan, W. Huang, and J. An, “An Explainable Method of Phishing Emails Generation and Its Applica- tion in Machine Learning,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Jun. 2020, vol. 1, pp. 1279–1283, doi: 10.1109/ITNEC48623.2020.9085171. 3. M. Huang, W. Fan, W. Huang, Y. Cheng, and H. Xiao, “Research on Building Exploitable Vulnerability Data- base for Cloud-Native App,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2020, vol. 1, pp. 758–762. 4. M. Huang, W. Fan, W. Huang, Y. Cheng, and H. Xiao, “Research on Building Exploitable Vulnerability Data- base for Cloud-Native App,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Jun. 2020, vol. 1, pp. 758–762, doi: 10.1109/ITNEC48623.2020.9084733. 5. Y. Pan, J. An, W. Fan, and W. Huang, “Shellfier: A Shellcode Detection Method based on Dynamic Binary Instrumentation and Convolutional Neural Network,” in Proceedings of the 2019 8th International Conference on Software and Computer Applications, 2019, pp. 462–466. | |
Projects | Scientific Research Projects 1. Basic Environment of Wireless Router Firmware Vulnerability Analysis, China Information Security Assess-ment Center, November 2020- November 2021, Participant, RMB 278,000.00 2. Basic Open Source Software Version Database Information Collection System for Database and Other Products, Institute of Information Engineering, Chinese Academy of Sciences, December 2019- December 2020, Principle Investigator, RMB148,000.00 3. Key Technologies of Construction and Exercise Evaluation of the Cyberspace Vulnerability Shooting Range, China Mobile Research Fund Project of the Ministry of Education, November 2019 - December 2021, Participant, RMB1,000,000.00 4. Web Module Vulnerability Mining and Verification Tools, Institute of Information Engineering, Chinese Academy of Sciences, December 2019-December 2020, Participant, RMB 248,000.00 | |
Admission Requirements | Master Degree Candidates: 1. Highly interested in Cybersecurity and technical research 2. Knowledgeable in basic theories and skills of Computer Science and Information Security and related fields |