沈超教授

2018-11-20 11:29:58 88

基本介绍

姓名: 沈超 
职称: 教授、博导
职位: 自动化系系统工程研究所
职位: 网络空间安全学院副院长
地址: 西安市咸宁西路28号1088号信箱
电话: 029-82667281
传真: 029-82667795
电子邮件:chaoshen@xjtu.edu.cn  

教育经历

 2011.02~2013.08,联合培养博士&研究助理,美国卡内基梅隆大学,计算机学院
 2003.09~2014.03,本科、硕士、博士,西安交通大学电子与信息工程

工作经历

2018.07~至今,副院长,网络安全学院
2014.03~至今,讲师、副教授、教授,博导,电子信息与工程学院
2017.01~至今,中国计算机学会YOCSEF西安,副主席
2017.12~至今,中国自动化学会青年工作委员会,委员
2018.07~至今,中国中文信息学会大数据安全与隐私保护专委会,委员

学术荣誉与获奖

2018年,国家优秀青年科学基金
2018年,陕西省青年科技新星
2018年,西安交通大学青年拔尖人才计划(A类)入选者
2018年,IEEE ICCSS Best Paper Award
2017年,电子战三新学术年会优秀论文
2016年,西安交通大学优秀博士论文
2015年,盲信号处理大会优秀论文
2013年,生物特征识别大会最佳论文
2012年,西安交通大学“信源通”优博
2011年,教育部学术新人

学术兼职

中国计算机学会YOCSEF西安,副主席
中国自动化学会青年工作委员会,委员
中国自动化学会工业控制系统信息安全专委会,委员
中国中文信息学会大数据安全与隐私保护专委会,委员
中国人工智能学会智能服务专委会,委员
中国人工智能学会模式识别专委会,委员
国家自然科学基金信息学部,同行评议人
下列国际学术期刊的Associate Editor:
International Journal of Digital Crime and Forensics.
Wiley Security and Privacy.

研究方向

智能终端人机交互行为分析与应用
数据驱动的网络行为与内容安全
人工智能安全
信息物理融合系统综合安全
安全大数据关联分析与图结构分析

论文著选

著作

[1] 互联网安全的40个智慧洞见(2016)—移动终端交互行为分析的身份主动认证,人民邮电出版社,2017

论文

[1] Chao Shen; Yufei Chen; Yao Liu; Xiaohong Guan, Adaptive Human-Machine Interactive Behavior Analysis with Wrist-Worn Devices for Password Inference. IEEE Transactions on Neural Networks and Learning Systems, 2018 (DOI: 10.1109/TNNLS.2018.2829223).
[2] Chao Shen; Yufei Chen; Xiaohong Guan; Roy Maxion, Pattern-Growth based Mining Mouse-Interaction Behavior for an Active User Authentication System, IEEE Transactions on Dependable Secure Computing, 2017.11.09, (DOI: 10.1109/TDSC.2017.2771295)
[3] Chao Shen; Yuanxun Li; Yufei Chen; Xiaohong Guan; Roy A. Maxion, Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication, IEEE Transactions on Information Forensics and Security, 2018.01.01, 13(1): 48~62
[4] Chao Shen; Yong Zhang; Xiaohong Guan; Roy A. Maxion, Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication, IEEE Transactions on Information Forensics and Security, 2016, 11(3): 498~513
[5] Chao Shen; Zhongmin Cai; Xiaohong Guan; Youtian Du; Roy A. Maxion, User Authentication through Mouse Dynamics, IEEE Transactions on Information Forensics and Security, 2013, 8(1): 16~30
[6] Chao Shen; Yufei Chen; Gengshan Yang; Xiaohong Guan, Towards Hand-dominated Activity Recognition Systems with Wristband-Interaction Behavior Analysis, IEEE Transactions on Systems, Man and Cybernetics: Systems, 2018 (DOI: 10.1109/TSMC.2018.2819026)
[7] Chao Shen; Yufei Chen; Xiaohong Guan, Performance Evaluation of Implicit Smartphones Authentication via Sensor-behavior Analysis, Information Sciences, 2018.03, 430–431: 538~553
[8] Chao Shen; Zhongmin Cai; Liu, Xiaomei; Guan, Xiaohong; Maxion, Roy A., MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System, IEEE Transactions on Human-Machine Systems, 2016.10, 46(5): 734~748
[9] Xiaoming Liu; Chao Shen*; Xiaohong Guan; Yadong Zhou, We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018 (DOI: 10.1109/TSMC.2018.2826555)
[10] Xiaoming Liu, Chao Shen*, Xiaohong Guan, Yadong Zhou. DIGGER: Detect Similar Groups in Heterogeneous Social Networks, ACM Transactions on Knowledge Discovery from Data, 2018, Accepted.
[11] Zhongmin Cai; Chao Shen*; Xiaohong Guan, Mitigating behavioral variability for mouse dynamics: A dimensionality-reduction-based approach, IEEE Transactions on Human-Machine Systems, 2014.4, 44(2): 44~255
[12] Chao Shen; Shichao Pei; Zhenyu Yang; Xiaohong Guan,Input extraction via motion-sensor behavior analysis on smartphones, Computers & Security, 2015.7.17, 53: 143~155
[13] Chao Shen; Yu, Tianwen; Xu, Haodi; Yang, Gengshan; Guan, Xiaohong, User practice in password security: An empirical study of real-life passwords in the wild, Computers & Security, 2016.8, 61: 130~141
[14] Chao Shen; Zhongmin Cai; Xiaohong Guan; Roy Maxion, Performance evaluation of anomaly-detection algorithms for mouse dynamics, Computers & Security, 2014.9, 45: 156~171
[15] Yufei Chen; Chao Shen*, Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition , IEEE Access, 2017, 5: 3095~3110

项目

纵向

[1] 2019-2021,多源人机行为分析的身份安全认证,国家优秀青年科学基金(主持)
[2] 2018-2021,触感行为特征识别的移动智能终端隐式身份认证方法研究,国家自然科学基金项目(主持)
[3] 2018-2021,面向大规模多源数据的人物画像及定位技术,国家自然科学基金重点项目(参与)
[4] 2017-2021,大规模交互行为分析技术,装备预研重点项目(主持)
[5] 2018-2020,“网络目标个体认知技术”,装备预研国防科技基金(主持)
[6] 2017-2019,“网络设备识别技术”,装备预研国防科技基金(主持)
[7] 2017-2019,"内生安全的主动防御工控系统防护技术研究"子课题“脆弱性分析与威胁态势感知”,国家重点研发计划(参与)

横向

[1] 2018-2019,多源身份认证技术,阿里巴巴/蚂蚁金服(主持)
[2] 2016-2018,无线网络指纹认知技术,中国电子科技集团第29研究所(主持)
[3] 2016-2018,半监督融合学习的网络目标识别技术,中国电子科技集团第29研究所(主持)

专利

[1] 沈超; 章勇; 管晓宏, 基于触屏滑动行为特征的身份持续认证方法, 2014.9.15, 中国, CN201410469276.4 (专利)
[2] 沈超; 裴仕超; 管晓宏; 余天文, 基于传感器特征分区建模的触屏设备用户身份监控方法, 2015.6.30, 中国, CN201510374939.9 (专利)
[3] 沈超; 陈宇飞; 王诏; 杨庚山; 管晓宏, 基于运动传感行为特征的智能手表解锁和认证方法, 2017.5.5, 中国, CN201710314023.3 (专利)
[4] 沈超; 陈宇飞; 王诏; 吕启; 管晓宏, 基于手腕穿戴电子设备的书写行为特征认证方法, 2017.5.5, 中国, CN201710313542.8 (专利)
[5] 沈超; 蔡忠闽; 左幸存; 余天文; 管晓宏, 基于陀螺仪行为特征的智能手机用户身份认证方法, 2014.11.13, 中国, CN201410641806.9 (专利)
[6] 沈超; 杨振宇; 管晓宏, 基于网页输入行为特征的网络用户身份监控方法2015.7.29, 中国, CN201510214216.2 (专利)
[7] 沈超; 程颢; 张泽华; 管晓宏, 基于家族基因码的恶意代码快速归类方法2014.10.23, 中国, CN201410571621.5 (专利)

软件著作权

[1] 基于交互行为认知的终端安全监控与预警系统, 2015SR288469, 原始取得, 全部权利, 2015.09.18 
[2] 触屏行为主动认证, 2015SR175947, 原始取得, 全部权利, 2015.06.
[3] 基于移动互联网的电力设备诊断系统, 2015SR287880,原始取得, 全部权利, 2015.09.12

代表性突出成果

[1] 目前主要研究方向为数据驱动的网络空间安全、人工智能安全、信息物理融合系统安全,在IEEE TDSC、IEEE TIFS、ACM CCS、IEEE DSN等权威刊物上发表论文50余篇。主持和参与国家自然科学基金、重点研发计划、基金委创新群体、装备预研基金等课题20余项,研制多个系统并应用于国家大型企业和国防单位。获得2013年全国特征识别大会最佳论文奖,2015年全国盲信号处理大会最佳论文奖,2018年IEEE ICCSS会议最佳论文奖。

English

Name: Chao Shen
Photo:
Job Tittle: Professor
Position: Professor
Addr:  No.28 Xianning West Road, Xi'an, Shaanxi, 710049, P.R. China
Tel: 86-29-82667281
Fax: 86-29-82667995
Email: chaoshen@xjtu.edu.cn 

EDUCATION

2009 ~ 2013 Ph.D. in System Engineering, Xi’an Jiaotong University
2011 ~ 2013 Joint Ph.D. Program in Carnegie Mellon University
2007 ~ 2009 Master in Automation,  Xi’an Jiaotong University
2003 ~ 2007 Bachelor in Information & Automation Engineering, Xi’an Jiaotong University

EXPERIENCES

2018 ~ present Associate Dean, School of Cyber Security, Xi’an Jiaotong University
2018 ~ present Professor, Xi’an Jiaotong University
2016 ~ 2018 Associate Professor,  Xi’an Jiaotong University
2014 ~ 2016 Assistant Professor,  Xi’an Jiaotong University
2011 ~ 2014 Research Associate, Computer Science Department, Carnegie Mellon University
2007 ~ 2013 Research Assistant, MOE Key Lab for Intelligent Networks and Network Security

ACADEMIC AWARDs and Honors

ACADEMIC Services

2016 ~ present Associate Editor: International Journal of Digital Crime and Forensics,
Wiley Security and Privacy. 
2017 ~ present Vice President, China Computer Federation YOCSEF Xi'an
2017 ~ present Committee Member, CAA Industrial Control System Information Security Committee
2011 ~ present Peer Reviewers: ACM Transactions on Privacy and Security, ACM Transactions on Information System and Security, IEEE Transactions on Dependable Secure Computing, IEEE Transactions on Information Forensics and Security, IEEE Transactions on Mobile Computing, IEEE Transactions on Human-Machine Systems
PC Chairs & Members ICDCS 2018, IEEE ICCSS 2018,  NetSci 2018, IEEE AVSS 2018, ICDIS 2018/2017, CCBR 2018, HoMGR 2018
Expertise and Research Interests:
Human-Machine Interaction, Data Driven Network and Computer Security, System Optimization and Security, Artificial Intelligence and Security

Papers

[1] Chao Shen; Yufei Chen; Yao Liu; Xiaohong Guan, Adaptive Human-Machine Interactive Behavior Analysis with Wrist-Worn Devices for Password Inference. IEEE Transactions on Neural Networks and Learning Systems, 2018 (DOI: 10.1109/TNNLS.2018.2829223).
[2] Chao Shen; Yufei Chen; Xiaohong Guan; Roy Maxion, Pattern-Growth based Mining Mouse-Interaction Behavior for an Active User Authentication System, IEEE Transactions on Dependable Secure Computing, 2017.11.09, (DOI: 10.1109/TDSC.2017.2771295)
[3] Chao Shen; Yuanxun Li; Yufei Chen; Xiaohong Guan; Roy A. Maxion, Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication, IEEE Transactions on Information Forensics and Security, 2018.01.01, 13(1): 48~62
[4] Chao Shen; Yong Zhang; Xiaohong Guan; Roy A. Maxion, Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication, IEEE Transactions on Information Forensics and Security, 2016, 11(3): 498~513
[5] Chao Shen; Zhongmin Cai; Xiaohong Guan; Youtian Du; Roy A. Maxion, User Authentication through Mouse Dynamics, IEEE Transactions on Information Forensics and Security, 2013, 8(1): 16~30
[6] Chao Shen; Yufei Chen; Gengshan Yang; Xiaohong Guan, Towards Hand-dominated Activity Recognition Systems with Wristband-Interaction Behavior Analysis, IEEE Transactions on Systems, Man and Cybernetics: Systems, 2018 (DOI: 10.1109/TSMC.2018.2819026)
[7] Chao Shen; Yufei Chen; Xiaohong Guan, Performance Evaluation of Implicit Smartphones Authentication via Sensor-behavior Analysis, Information Sciences, 2018.03, 430–431: 538~553
[8] Chao Shen; Zhongmin Cai; Liu, Xiaomei; Guan, Xiaohong; Maxion, Roy A., MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System, IEEE Transactions on Human-Machine Systems, 2016.10, 46(5): 734~748
[9] Xiaoming Liu; Chao Shen*; Xiaohong Guan; Yadong Zhou, We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018 (DOI: 10.1109/TSMC.2018.2826555)
[10] Xiaoming Liu, Chao Shen*, Xiaohong Guan, Yadong Zhou. DIGGER: Detect Similar Groups in Heterogeneous Social Networks, ACM Transactions on Knowledge Discovery from Data, 2018, Accepted.
[11] Zhongmin Cai; Chao Shen*; Xiaohong Guan, Mitigating behavioral variability for mouse dynamics: A dimensionality-reduction-based approach, IEEE Transactions on Human-Machine Systems, 2014.4, 44(2): 44~255
[12] Chao Shen; Shichao Pei; Zhenyu Yang; Xiaohong Guan,Input extraction via motion-sensor behavior analysis on smartphones, Computers & Security, 2015.7.17, 53: 143~155
[13] Chao Shen; Yu, Tianwen; Xu, Haodi; Yang, Gengshan; Guan, Xiaohong, User practice in password security: An empirical study of real-life passwords in the wild, Computers & Security, 2016.8, 61: 130~141
[14] Chao Shen; Zhongmin Cai; Xiaohong Guan; Roy Maxion, Performance evaluation of anomaly-detection algorithms for mouse dynamics, Computers & Security, 2014.9, 45: 156~171
[15] Yufei Chen; Chao Shen*, Performance Analysis of Smartphone-Sensor Behavior for Human Activity Recognition , IEEE Access, 2017, 5: 3095~3110