Huashan Chen

alt text 

Ph.D.,
Young Associate Professor,
State Key Laboratory of Information Security (LOIS),
Institute of Information Engineering (IIE),
Chinese Academy of Sciences (CAS)
Email: chenhuashan@iie.ac.cn

About Me

I received the B.S. and M.Sc. degrees in Computer Science from Shandong University, and the Institute of Information Engineering, Chinese Academy of Sciences, respectively. In December 2021, I received the Ph.D. degree in Computer Science at the University of Texas at San Antonio. I joined the Institute of Information Engineering as a Young Associate Professor in 2022.

Research

I am always looking for self-motivated students/interns to join my research group. My research interests include:

  • Physical Adversarial Attacks and Defenses

  • AI-based Automated Attacks and Defenses

  • Cybersecurity Metrics and Quantification

Publications

  1. Yuantian Zhang, Weixia Cai, Huashan Chen, Zhenyu Qi, Hong Chen, Feng Liu, Sen He. "A Learning-Based POMDP Approach for Adaptive Cyber Defense Against Multi-Stage Attacks", the 26th International Conference on High Performance Computing and Communications, 2024. (CCF-C)

  2. Xiao Zhang, Shuqing Xu, Huashan Chen, Zekai Chen, Fuzhen Zhuang, Hui Xiong, Dongxiao Yu. "Rethinking Robust Multivariate Time Series Anomaly Detection: A Hierarchical Spatio-Temporal Variational Perspective", IEEE Transactions on Knowledge and Data Engineering, 2024. (CCF-A, IF 8.9)

  3. Huaifeng Bao, Wenhao Li, Huashan Chen, Han Miao, Qiang Wang, Zixian Tang, Feng Liu, Wen Wang. "Stories Behind Decisions: Towards Interpretable Malware Family Classification with Hierarchical Attention", Computers & Security, 2024. (CCF-B, IF 5.6)

  4. Weixia Cai, Hong Chen, Huashan Chen, Feng Liu. "Optimal Defense Strategy for Multi-Agents Using Value Decomposition Networks", International Conference on Intelligent Computing, 2024. (CCF-C)

  5. Yu Liu, Qi Luo, Mengbai Xiao, Dongxiao Yu, Huashan Chen, Xiuzhen Cheng. "Reordering and Compression for Hypergraph Processing", IEEE Transactions on Computers, 2024. (CCF-A, IF 3.7)

  6. Yangyang Wang, Xiao Zhang, Mingyi Li, Tian Lan, Huashan Chen, Hui Xiong, Xiuzhen Cheng, Dongxiao Yu. "Theoretical convergence guaranteed resource-adaptive federated learning with mixed heterogeneity", the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023. (CCF-A)

  7. Yuantian Zhang, Feng Liu and Huashan Chen. "Optimal strategy selection for cyber deception via deep reinforcement learning", the 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022. (CCF-C)

  8. Yuantian Zhang, Feng Liu and Huashan Chen. "Optimal strategy selection for attack graph games using deep reinforcement learning", the 24th International Conference on High Performance Computing and Communications, 2022. (CCF-C)

  9. Songlin He, Eric Ficke, Mir Mehedi Pritom, Huashan Chen, Qiang Tang, Qian Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. "Blockchain-based automated and robust cyber security management." Journal of Parallel and Distributed Computing (2022). (CCF-B, IF 3.8)

  10. Huashan Chen, Hasan Cam, and Shouhuai Xu. "Quantifying cybersecurity effectiveness of dynamic network diversity," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 3804-3821, 2022. (CCF-A, IF 7.3)

  11. Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. "A survey on ethereum systems security: Vulnerabilities, attacks, and defenses." ACM Computing Surveys 53, no. 3 (2020): 1-43. (JCR-Q1, IF 23.8, ranked 1/143 in Computer Science Theory & Methods)

  12. Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, and Shouhuai Xu. "Statistical estimation of malware detection metrics in the absence of ground truth." IEEE Transactions on Information Forensics and Security 13, no. 12 (2018): 2965-2980. (CCF-A, IF 6.8)

  13. Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu, and Wenlian Lu. "Optimizing interconnections to maximize the spectral radius of interdependent networks." Physical Review E 95, no. 3 (2017): 032308. (JCR-Q1, IF 2.7)

Services

Service as a reviewer or program committee member of the following journals or conferences

  • IEEE Transactions on Dependable and Secure Computing

  • IEEE Transactions on Information Forensics and Security

  • ACM Transactions on Internet Technology

  • IEEE Internet of Things Journal

  • Journal of Computer Security

  • The Computer Journal

  • Cybersecurity

  • Journal of Computer Science and Technology

  • Future Generation Computer Systems

  • Computer Communications

  • Sensors

  • Information Systems Frontiers

  • 2024 39th IEEE/ACM International Conference on Automated Software Engineering Workshops