Huashan Chen

alt text 

Ph.D.,
Young Associate Professor,
State Key Laboratory of Information Security (LOIS),
Institute of Information Engineering (IIE),
Chinese Academy of Sciences (CAS)
Email: chenhuashan@iie.ac.cn

About Me

I received the B.S. and M.Sc. degrees in Computer Science from Shandong University, and the Institute of Information Engineering, Chinese Academy of Sciences, respectively. In December 2021, I received the Ph.D. degree in Computer Science at the University of Texas at San Antonio. I joined the Institute of Information Engineering as a Young Associate Professor in 2022.

Research

I am always looking for self-motivated students/interns to join my research group. My research interests include:

  • Physical Adversarial Attacks

  • AI-based Automated Attacks

  • Cybersecurity Metrics and Quantification

Selected Publications

  1. Yu Liu, Qi Luo, Mengbai Xiao, Dongxiao Yu, Huashan Chen, Xiuzhen Cheng. "Reordering and Compression for Hypergraph Processing", IEEE Transactions on Computers, 2024. (CORE-A, CCF-A)

  2. Yangyang Wang, Xiao Zhang, Mingyi Li, Tian Lan, Huashan Chen, Hui Xiong, Xiuzhen Cheng, Dongxiao Yu. "Theoretical convergence guaranteed resource-adaptive federated learning with mixed heterogeneity", the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023. (CORE-A+, CCF-A)

  3. Yuantian Zhang, Feng Liu and Huashan Chen. "Optimal strategy selection for cyber deception via deep reinforcement learning", the 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022. (CORE-B, CCF-C)

  4. Yuantian Zhang, Feng Liu and Huashan Chen. "Optimal strategy selection for attack graph games using deep reinforcement learning", the 24th International Conference on High Performance Computing and Communications, 2022. (CORE-B, CCF-C)

  5. Songlin He, Eric Ficke, Mir Mehedi Pritom, Huashan Chen, Qiang Tang, Qian Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. "Blockchain-based automated and robust cyber security management." Journal of Parallel and Distributed Computing (2022). (CORE-A, CCF-B)

  6. Huashan Chen, Hasan Cam, and Shouhuai Xu. "Quantifying cybersecurity effectiveness of dynamic network diversity," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 3804-3821, 2022. (CORE-A, CCF-A)

  7. Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. "A survey on ethereum systems security: Vulnerabilities, attacks, and defenses." ACM Computing Surveys 53, no. 3 (2020): 1-43. (CORE-A+,JCR-Q1)

  8. Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, and Shouhuai Xu. "Statistical estimation of malware detection metrics in the absence of ground truth." IEEE Transactions on Information Forensics and Security 13, no. 12 (2018): 2965-2980. (CORE-A, CCF-A)

  9. Huashan Chen, Jin-Hee Cho, and Shouhuai Xu. "Quantifying the security effectiveness of firewalls and DMZs." In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, pp. 1-11. 2018.

  10. Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu, and Wenlian Lu. "Optimizing interconnections to maximize the spectral radius of interdependent networks." Physical Review E 95, no. 3 (2017): 032308. (JCR-Q1)

Services

Service as a reviewer of the following journals

  • IEEE Transactions on Dependable and Secure Computing

  • ACM Transactions on Internet Technology

  • IEEE Internet of Things Journal

  • Journal of Computer Security

  • Cybersecurity

  • Journal of Computer Science and Technology

  • Future Generation Computer Systems

  • Computer Communications

  • Information Systems Frontiers