Huashan Chen
|
Ph.D., Young Associate Professor, State Key Laboratory of Information Security (LOIS), Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS)
Email: chenhuashan@iie.ac.cn
|
About Me
I received the B.S. and M.Sc. degrees in Computer Science from Shandong University, and the Institute of Information Engineering, Chinese Academy of Sciences, respectively. In December 2021, I received the Ph.D. degree in Computer Science at the University of Texas at San Antonio. I joined the Institute of Information Engineering as a Young Associate Professor in 2022.
Research
I am always looking for self-motivated students/interns to join my research group. My research interests include:
Physical Adversarial Attacks and Defenses
AI-based Automated Attacks and Defenses
Cybersecurity Metrics and Quantification
Publications
Yuantian Zhang, Weixia Cai, Huashan Chen, Zhenyu Qi, Hong Chen, Feng Liu, Sen He. "A Learning-Based POMDP Approach for Adaptive Cyber Defense Against Multi-Stage Attacks", the 26th International Conference on High Performance Computing and Communications, 2024. (CCF-C)
Xiao Zhang, Shuqing Xu, Huashan Chen, Zekai Chen, Fuzhen Zhuang, Hui Xiong, Dongxiao Yu. "Rethinking Robust Multivariate Time Series Anomaly Detection: A Hierarchical Spatio-Temporal Variational Perspective", IEEE Transactions on Knowledge and Data Engineering, 2024. (CCF-A, IF 8.9)
Huaifeng Bao, Wenhao Li, Huashan Chen, Han Miao, Qiang Wang, Zixian Tang, Feng Liu, Wen Wang. "Stories Behind Decisions: Towards Interpretable Malware Family Classification with Hierarchical Attention", Computers & Security, 2024. (CCF-B, IF 5.6)
Weixia Cai, Hong Chen, Huashan Chen, Feng Liu. "Optimal Defense Strategy for Multi-Agents Using Value Decomposition Networks", International Conference on Intelligent Computing, 2024. (CCF-C)
Yu Liu, Qi Luo, Mengbai Xiao, Dongxiao Yu, Huashan Chen, Xiuzhen Cheng. "Reordering and Compression for Hypergraph Processing", IEEE Transactions on Computers, 2024. (CCF-A, IF 3.7)
Yangyang Wang, Xiao Zhang, Mingyi Li, Tian Lan, Huashan Chen, Hui Xiong, Xiuzhen Cheng, Dongxiao Yu. "Theoretical convergence guaranteed resource-adaptive federated learning with mixed heterogeneity", the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023. (CCF-A)
Yuantian Zhang, Feng Liu and Huashan Chen. "Optimal strategy selection for cyber deception via deep reinforcement learning", the 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022. (CCF-C)
Yuantian Zhang, Feng Liu and Huashan Chen. "Optimal strategy selection for attack graph games using deep reinforcement learning", the 24th International Conference on High Performance Computing and Communications, 2022. (CCF-C)
Songlin He, Eric Ficke, Mir Mehedi Pritom, Huashan Chen, Qiang Tang, Qian Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. "Blockchain-based automated and robust cyber security management." Journal of Parallel and Distributed Computing (2022). (CCF-B, IF 3.8)
Huashan Chen, Hasan Cam, and Shouhuai Xu. "Quantifying cybersecurity effectiveness of dynamic network diversity," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 3804-3821, 2022. (CCF-A, IF 7.3)
Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. "A survey on ethereum systems security: Vulnerabilities, attacks, and defenses." ACM Computing Surveys 53, no. 3 (2020): 1-43. (JCR-Q1, IF 23.8, ranked 1/143 in Computer Science Theory & Methods)
Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, and Shouhuai Xu. "Statistical estimation of malware detection metrics in the absence of ground truth." IEEE Transactions on Information Forensics and Security 13, no. 12 (2018): 2965-2980. (CCF-A, IF 6.8)
Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu, and Wenlian Lu. "Optimizing interconnections to maximize the spectral radius of interdependent networks." Physical Review E 95, no. 3 (2017): 032308. (JCR-Q1, IF 2.7)
Services
Service as a reviewer or program committee member of the following journals or conferences
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Information Forensics and Security
ACM Transactions on Internet Technology
IEEE Internet of Things Journal
Journal of Computer Security
The Computer Journal
Cybersecurity
Journal of Computer Science and Technology
Future Generation Computer Systems
Computer Communications
Sensors
Information Systems Frontiers
2024 39th IEEE/ACM International Conference on Automated Software Engineering Workshops
|