国产伦精品一区二区高清_亚洲精品无码av一二三乱码_国产AV无码变态另类专区_无码精品黑人一二区三区_91精品啪在线观看国产81_偷国产乱人伦精品一区二区

永利yl23411官網(wǎng)
師資隊(duì)伍
當(dāng)前位置:    首頁 > 師資隊(duì)伍 > 全體教師 > 教授(研究員) >    正文
方勇

日期:2021-01-22                   來源:                   作者:               關(guān)注:次

專業(yè) 研究方向
Email 電話



方勇

博士,教授,博士生導(dǎo)師

專業(yè):網(wǎng)絡(luò)空間安全

研究方向:網(wǎng)絡(luò)對(duì)抗技術(shù)

Emailyfang@scu.edu.cn

電話:028-85402720

學(xué)習(xí)和工作簡(jiǎn)歷

1993年、2010年在永利yl23411官網(wǎng)先后獲理學(xué)碩士和博士學(xué)位??萍疾俊⒔逃靠萍柬?xiàng)目及科學(xué)技術(shù)獎(jiǎng)勵(lì)評(píng)審專家,四川省科技項(xiàng)目評(píng)審專家。

多年致力于網(wǎng)絡(luò)信息安全方面的科學(xué)研究和人才培養(yǎng),目前主要從事網(wǎng)絡(luò)信息安全及信息對(duì)抗方向的理論與應(yīng)用研究。

科研及獲獎(jiǎng)

方勇教授長(zhǎng)期從事通信與網(wǎng)絡(luò)信息系統(tǒng)安全、網(wǎng)絡(luò)信息對(duì)抗技術(shù)的應(yīng)用研究和技術(shù)開發(fā),作為項(xiàng)目負(fù)責(zé)人承擔(dān)并完成了國(guó)家自然科學(xué)基金、國(guó)家863計(jì)劃及其它省部級(jí)縱向科研計(jì)劃項(xiàng)目20余項(xiàng),其科研成果獲國(guó)家部委科技進(jìn)步二等獎(jiǎng)一項(xiàng)、成都市科技進(jìn)步一等獎(jiǎng)一項(xiàng)。在信息對(duì)抗技術(shù)研究與應(yīng)用中取得顯著成果。

代表性論文專著

近年完成專著和教材4本,在信息系統(tǒng)安全研究領(lǐng)域公開發(fā)表學(xué)術(shù)論文50余篇,其中SCI/EI檢索論文10余篇,代表性論文著作有:

(1) 王禎學(xué)、方勇、劉亮、張磊、周安民、歐曉聰,網(wǎng)絡(luò)安全風(fēng)險(xiǎn)評(píng)估與控制理論(第二版),科學(xué)出版社,2021.1

(2) 方勇,劉嘉勇等,信息系統(tǒng)安全理論與技術(shù)(“十一五”國(guó)家級(jí)規(guī)劃教材),高等教育出版社,2008.3

(3) 方勇,劉嘉勇,信息系統(tǒng)安全導(dǎo)論, 電子工業(yè)出版社,2003.4

(4) Fang Y, Wang C, Fang Z, et al. LMTracker: Lateral Movement Path Detection based on Heterogeneous Graph Embedding[J]. Neurocomputing, 2021.

(5) Fang Y, Yang S, Zhao B, et al. Cyberbullying detection in social networks using Bi-gru with self-attention mechanism[J]. Information, 2021, 12(4): 171.

(6)  Fang Y, Xie M, Huang C. PBDT: Python Backdoor Detection Model Based on Combined Features[J]. Security and Communication Networks, 2021.

(7)  Fang Y, Zhou X, Huang C. Effective method for detecting malicious PowerShell scripts based on hybrid features☆[J]. Neurocomputing, 2021, 448: 30-39.

(8)  Fang Y, Zhang Y, Huang C. CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network[J]. The Computer Journal, 2021, 64(8): 1215-1225.

(9)  Liu Z, Fang Y, Huang C, et al. GraphXSS: An Efficient XSS Payload Detection Approach Based on Graph Convolutional Network[J]. Computers & Security, 2021: 102597.

(10)  Fang Y, Gao J, Liu Z, et al. Detecting cyber threat event from twitter using IDCNN and BILSTM[J]. Applied Sciences, 2020, 10(17): 5922.

(11)  Fang Y, Huang C, Su Y, et al. Detecting malicious JavaScript code based on semantic analysis[J]. Computers & Security, 2020, 93: 101764.

(12)  Fang Y, Liu Y, Huang C, et al. FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm[J]. Plos one, 2020, 15(2): e0228439.

(13)  Fang Y, Zhao C, Huang C, et al. SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods[J]. Forensic Science International: Digital Investigation, 2020, 35: 300981.

(14)  Fang Y, Xu Y, Jia P, et al. Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads[J]. Applied Sciences, 2020, 10(13): 4425.

關(guān)閉