蔡忠闽教授

2020-06-18 14:38:10 88

基本介绍

姓名: 蔡忠闽 
职称: 教授、博导
职位: 西安交通大学电信学部教授,美国卡耐基梅陇大学(CMU)、匹兹堡大学(PITT)访问教授
地址:彭康楼211
电话:
传真:
电子邮件:zmcai@sei.xjtu.edu.cn

 
教育经历:

1998年9月~2004年12月,西安交通大学系统工程研究所,研究方向为网络安全
1994年9月~1998年7月,西安交通大学信控系自控专业
 

工作经历:

2017年8月至2018年8月,美国匹兹堡大学(PITT)、卡耐基梅陇大学(CMU) 访问教授
2014年12月至今,西安交通大学 自动化系教授,博士生导师
2008年9月-2014年12月,西安交通大学 自动化系副教授,博士生导师
2005年3月-2008年9月,西安交通大学 自动化系讲师
2008-2017,智能网络与网络安全教育部重点实验室副主任
2004年8月~2005年3月,IBM中国研究院
 

研究方向:

·研究方向为混合增强智能、智能交互、虚拟现实(VR)和增强现实,人机交互安全
·承担2030科技创新“新一代人工智能”重大专项课题、国家自然科学基金、863项目7项
·2013年获陕西省科技奖一等奖(排序第四),2013年获第8届中国生物特征识别大会唯一最佳论文奖,2004年获首届“中国青少年科技创新奖”,指导博士生发表西安交通大学首篇安全领域顶会IEEE Symposium on Security & Privacy(Oakland Conference)论文,指导博士生发表西安交通大学首篇人机交互领域顶会CHI 2020 和CSCW2019论文,培养博士生毕业后已获得国家“优青”资助,
 

项目:

国家级科研项目

[1]     大电网调控人在回路混合增强智能建模方法研究,2030科技创新“新一代人工智能”重大专项课题,2019.12-2023.12,负责人
[2]     面向可穿戴设备的多源行为身份认证(61772415),国家自然科学基金,2018.1 -2021.12,负责人
[3]     基于指点触控行为的用户身份认证与监控(61175039),国家自然科学基金,2012.1 -2015.12,负责人
[4]     基于行为模型的桌面安全阻断系统的研究与实现 (2007AA01Z464),国家863项目,2007.12-2010.12,负责人
 

省部级科研项目:

[1]     图形交互环境中的生物行为特征建模与分析(20070698107),教育部博士点新教师基金,2008.1 - 2011.12,负责人
[2]     人机交互中的行为特征识别技术研究(2013KW11),陕西省国际合作项目,2013.1 - 2015.12,负责人
 

横向合作项目:

[1]     账号风控技术,华为2012合作项目,2016.10-2017.4,负责人
[2]     认知指纹技术,华为2012合作项目,2015.10-2016.5,负责人
[3]     触摸屏滑动方式用户认证,华为Shield实验室合作项目,2013.9-2014.8,负责人
[4]     移动设备行为认证,华为Shield实验室合作项目,2013.12-2014.12,负责人
 

论文著选:

 

论文:  

[1]      Yunpeng Song, Yun Huang, Zhongmin Cai, Jason I. Hong:I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios. CHI 2020: 1-13 (人机交互领域顶会,CCF A)
[2]      Yunpeng Song, Cori Faklaris, Zhongmin Cai, Jason I. Hong, Laura Dabbish:Normal and Easy: Account Sharing Practices in the Workplace. PACMHCI 3(CSCW): 83:1-83:25 2019(人机交互领域顶会,CCF A)
[3]      Yunpeng Song, Zhongmin Cai, Zhi-Li Zhang:Multi-touch Authentication Using Hand Geometry and Behavioral Information. IEEE Symposium on Security and Privacy 2017: 357-372(计算机领域顶会,CCF A)
[4]      Yuan Yang, Zhongmin Cai, Chunyan Wang, Junjie Zhang:Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network. IEEE Trans. Information Forensics and Security 13(11): 2913-2928 (2018) (TIFS,CCF A类期刊)
[5]      Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion:User Authentication Through Mouse Dynamics. IEEE Trans. Information Forensics and Security 8(1): 16-30 (2013) (TIFS,CCF A类期刊)
[6]        Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan:Probabilistic Inference on Integrity for Access Behavior Based Malware Detection. RAID 2015: 155-176) (RAID,安全领域著名会议,CCF B)
[7]      Zhongmin Cai, Chao Shen, Miao Wang, Yunpeng Song, Jialin Wang:Mobile Authentication through Touch-Behavior Features. CCBR 2013: 386-393(第8届中国生物特征识别大会唯一最佳论文奖)
[8]      Jianmin Dong, Youtian Du, Zhongmin Cai:Gender recognition using motion data from multiple smart devices. Expert Syst. Appl. 147: 113195 (2020)
[9]      Weixuan Mao, Zhongmin Cai, Bo Zeng, Xiaohong Guan:Learning edge weights in file co-occurrence graphs for malware detection. Data Min. Knowl. Discov. 33(1): 168-203 (2019)
[10]   Zhongmin Cai:Security and confidentiality of network communication using chaotic encryption technology. J. Comput. Methods Sci. Eng. 19(4): 1083-1092 (2019)
[11]   Weixuan Mao, Zhongmin Cai, Yuan Yang, Xiaohong Shi, Xiaohong Guan:From big data to knowledge: A spatio-temporal approach to malware detection. Comput. Secur. 74: 167-183 (2018)  .
[12]   Ang Wei, Yuxuan Zhao, Zhongmin Cai:A Deep Learning Approach to Web Bot Detection Using Mouse Behavioral Biometrics. CCBR 2019: 388-395
[13]   Weixuan Mao, Zhongmin Cai, Don Towsley, Qian Feng, Xiaohong Guan:Security importance assessment for system objects and malware detection. Comput. Secur. 68: 47-68 (2017).
[14]   Jianmin Dong, Zhongmin Cai, Shaoyi Du:Improvement of affine iterative closest point algorithm for partial registration. IET Comput. Vis. 11(2): 135-144 (2017)
[15]   Zhihai Yang, Zhongmin Cai, Yuan Yang:Spotting anomalous ratings for rating systems by analyzing target users and items. Neurocomputing 240: 25-46 (2017).
[16]   Zhihai Yang, Zhongmin Cai, Yuan Yang:Spotting anomalous ratings for rating systems by analyzing target users and items. Neurocomputing 240: 25-46 (2017)
[17]     Aghil Esmaeili Kelishomi, Zhongmin Cai, Mohammad Hossein Shayesteh:Tracking user information using motion data through smartphones. IJCB 2017: 286-293
[18]     Zhihai Yang, Zhongmin Zhihai Yang, Lin Xu, Zhongmin Cai, Zongben Xu:Re-scale AdaBoost for attack detection in collaborative filtering recommender systems. Knowl. Based Syst. 100: 74-88 (2016)Cai:Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems. IJDCF 8(2): 16-26 (2016)
[19]     Zhihai Yang, Zhongmin Cai, Xiaohong Guan:Estimating user behavior toward detecting anomalous ratings in rating systems. Knowl. Based Syst. 111: 144-158 (2016).
[20]     Chao Shen, Zhongmin Cai, Xiaomei Liu, Xiaohong Guan, Roy A. Maxion:MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System. IEEE Trans. Human-Machine Systems 46(5): 734-748 (2016)
[21]     Jianmin Dong, Zhongmin Cai:User Authentication Using Motion Sensor Data from Both Wearables and Smartphones. CCBR 2016: 756-764
[22]     Shaoyi Du, Jianmin Dong, Guanglin Xu, Bo Bi, Zhongmin Cai:An Improvement of Affine Iterative Closest Point Algorithm for Partial Registration. ICIMCS 2016: 72-75
[23]     Zhihai Yang, Zhongmin Cai, Xinyuan Chen:Detecting Anomalous Ratings Using Matrix Factorization for Recommender Systems. WAIM (2) 2016: 3-14
[24]     Yuan Yang, Zhongmin Cai, Weixuan Mao, Zhihai Yang:Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network. DIMVA 2015: 307-326
[25]     Chao Shen, Yong Zhang, Zhongmin Cai, Tianwen Yu, Xiaohong Guan:Touch-interaction behavior for continuous user authentication on smartphones. ICB 2015: 157-162
[26]     Zhihai Yang, Zhongmin Cai:Defending Suspected Users by Exploiting Specific Distance Metric in Collaborative Filtering Recommender Systems. ICDM Workshops 2015: 1001-1006.
[27]     Zhihai Yang, Lin Xu, Zhongmin Cai:Re-scale AdaBoost for Attack Detection in Collaborative Filtering Recommender Systems. CoRR abs/1506.04584 (2015)
[28]     Chao Shen, Zhongmin Cai, Xiaohong Guan, Roy A. Maxion:Performance evaluation of anomaly-detection algorithms for mouse dynamics. Comput. Secur. 45: 156-171 (2014)
[29]     Zhongmin Cai, Chao Shen, Xiaohong Guan:Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach. IEEE Trans. Human-Machine Systems 44(2): 244-255 (2014)
[30]     Weixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley:Centrality metrics of importance in access behaviors and malware detections. ACSAC 2014: 376-385
[31]     Weibo Chu, Xiaohong Guan, Zhongmin Cai, Lixin Gao:Real-time volume control for interactive network traffic replay. Comput. Networks 57(7): 1611-1629 (2013)
[32]     Youtian Du, Qian Li, Zhongmin Cai, Xiaohong Guan:Multi-view semi-supervised web image classification via co-graph. Neurocomputing 122: 430-440 (2013)
[33]     Youtian Du, Chang Su, Zhongmin Cai, Xiaohong Guan:Web page and image semi-supervised classification with heterogeneous information fusion. J. Inf. Sci. 39(3): 289-306 (2013)
[34]     Chao Shen, Roy A. Maxion, Zhongmin Cai:A Study of the Consistency in Keystroke Dynamics. CCBR 2013: 409-416
[35]     Weibo Chu, Bin B. Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai:Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs. ICC 2013: 1990-1994
[36]     Weibo Chu, Xiaohong Guan, John C. S. Lui, Zhongmin Cai, Xiaohong Shi:Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication. ICDCS Workshops 2013: 58-63
[37]     Chao Shen, Zhongmin Cai, Roy A. Maxion, Xiaohong Guan:On User Interaction Behavior as Evidence for Computer Forensic Analysis. IWDW 2013: 221-231
[38]     Chao Shen, Zhongmin Cai, Roy A. Maxion, Guang Xiang, Xiaohong Guan:Comparing classification algorithm for mouse dynamics based user identification. BTAS 2012: 61-66
[39]     Chao Shen, Zhongmin Cai, Xiaohong Guan:Continuous authentication for mouse dynamics: A pattern-growth approach. DSN 2012: 1-12
[40]     Chao Shen, Zhongmin Cai, Xiaohong Guan, Jialin Wang:On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study. ICB 2012: 378-383
[41]     Weibo Chu, Xiaohong Guan, Lixin Gao, Zhongmin Cai:Model-based real-time volume control for interactive network traffic replay. NOMS 2012: 163-170
[42]     Chao Shen, Zhongmin Cai, Xiaohong Guan:Poster: can it be more practical?: improving mouse dynamics biometric performance. ACM Conference on Computer and Communications Security 2011: 853-856
[43]     Weibo Chu, Xiaohong Guan, Zhongmin Cai, Mingxu Chen:Balance Based Performance Enhancement for Interactive TCP Traffic Replay. ICC 2010: 1-5
[44]     Youtian Du, Xiaohong Guan, Zhongmin Cai:Enhancing Web Page Classification via Local Co-training. ICPR 2010: 2905-2908
[45]     Chao Shen, Zhongmin Cai, Xiaohong Guan, Huilan Sha, Jingzi Du:Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring. ICC 2009: 1-5
[46]     Zhongmin Cai, Xiaohong Guan, Ping Shao, Qingke Peng, Guoji Sun:A rough set theory based method for anomaly intrusion detection in computer network systems. Expert Systems 20(5): 251-259 (2003)
 

已毕业的学生:

[1]     沈超,西安交通大学,2014,博士(与管晓宏教授联合指导,国家“优青”资助)
[2]     毛尉轩,国家应急响应中心,2016,博士(与管晓宏教授联合指导)
[3]     杨志海,西安理工大学,2016,博士
[4]     杨渊,华为公司,2018,博士
[5]     王嘉霖,阿里巴巴,2015,硕士
[6]     滕千礼,字节跳动,2019,硕士
[7]     王鹤翔,华为公司,2019,硕士
[8]     蔡志波,百度,2019,硕士
[9]     周存理,民生银行,2019,硕士
[10] 廉美惠,阿里巴巴,2018,硕士
 
 
Name: Cai Zhongmin
Photo:
Job Tittle: Professor
Position:
 
Addr: Room 211, PENG-KANG Building
Tel:
Fax:
Email: zmcai@sei.xjtu.edu.cn
 

EDUCATION:

1998/09--2004/12 , Xi’an Jiaotong University, Ph.D Degree
1994/09--1998/07,Xi’an Jiaotong University

 

EXPERIENCES:

2017/08--2018/08 , Visiting Professor( PITT ,CMU)
2014/12-- ,Professor, Xi’an Jiaotong University
2008/09—2014/12 , Associate professor , Xi’an Jiaotong University
2005/03—2008/09, Teacher in Xian Jiaotong Unversity, Xi'an, China
2004/08—2005/03, IBM Research - China