Huashan Chen

alt text 

Ph.D.,
Young Associate Professor,
State Key Laboratory of Information Security (LOIS),
Institute of Information Engineering (IIE),
Chinese Academy of Sciences (CAS)
Email: chenhuashan@iie.ac.cn

About Me

I received the B.S. and M.Sc. degrees in Computer Science from Shandong University, and the Institute of Information Engineering, Chinese Academy of Sciences, respectively. In December 2021, I received the Ph.D. degree in Computer Science at the University of Texas at San Antonio. My PhD supervisors are Prof. Shouhuai Xu and Prof. Ravi Sandhu. I joined the Institute of Information Engineering as a Young Associate Professor in 2022.

Research

I am always looking for self-motivated students/interns to join my research group. My research interests include:

  • Audio-visual-based Biometric Authentication

  • VR/AR/XR Security & Privacy

Selected Publications (Full List)

  1. Yufan Liu, Jinyang An, Huashan Chen, Wanqian Zhang, Ming Li, Dayan Wu, Jingzi Gu, Zheng Lin, Weiping Wang. "Corer: Concept Residue Erasing in Text-to-Image Diffusion Models", IEEE International Conference on Multimedia&Expo, 2025. (CCF-B)

  2. Sa Zhu, Huashan Chen, Wanqian Zhang, Jinchao Zhang, Zexian Yang, Xiaoshuai Hao, Bo Li. "Uneven Event Modeling for Partially Relevant Video Retrieval", IEEE International Conference on Multimedia&Expo, 2025. (CCF-B)

  3. Wenhao Li, Riccardo Spolaor, Chuanwen Luo, Yuchao Sun, Huashan Chen, Guoming Zhang, Yanni Yang, Xiuzhen Cheng, Pengfei Hu. "Acoustic Eavesdropping from Sound-Induced Vibrations with Multi-Antenna mmWave Radar", IEEE Transactions on Mobile Computing, 2025. (CCF-A, IF 7.7)

  4. Yuantian Zhang, Weixia Cai, Huashan Chen, Zhenyu Qi, Hong Chen, Feng Liu, Sen He. "A Learning-Based POMDP Approach for Adaptive Cyber Defense Against Multi-Stage Attacks", the 26th International Conference on High Performance Computing and Communications, 2024. (CCF-C)

  5. Weixia Cai, Huashan Chen, Han Miao, Feng Liu, Yong Zhang, Xiaojia Yang. "A Vulnerability-Driven Gym for Training Autonomous Cyber Agents with Reinforcement Learning", the 21th IEEE International Conference on Ubiquitous Intelligence and Computing, 2024. (CCF-C)

  6. Xiao Zhang, Shuqing Xu, Huashan Chen, Zekai Chen, Fuzhen Zhuang, Hui Xiong, Dongxiao Yu. "Rethinking Robust Multivariate Time Series Anomaly Detection: A Hierarchical Spatio-Temporal Variational Perspective", IEEE Transactions on Knowledge and Data Engineering, 2024. (CCF-A, IF 8.9)

  7. Huaifeng Bao, Wenhao Li, Huashan Chen, Han Miao, Qiang Wang, Zixian Tang, Feng Liu, Wen Wang. "Stories Behind Decisions: Towards Interpretable Malware Family Classification with Hierarchical Attention", Computers & Security, 2024. (CCF-B, IF 5.6)

  8. Weixia Cai, Hong Chen, Huashan Chen, Feng Liu. "Optimal Defense Strategy for Multi-Agents Using Value Decomposition Networks", the 20th International Conference on Intelligent Computing, 2024. (CCF-C)

  9. Yu Liu, Qi Luo, Mengbai Xiao, Dongxiao Yu, Huashan Chen, Xiuzhen Cheng. "Reordering and Compression for Hypergraph Processing", IEEE Transactions on Computers, 2024. (CCF-A, IF 3.7)

  10. Yangyang Wang, Xiao Zhang, Mingyi Li, Tian Lan, Huashan Chen, Hui Xiong, Xiuzhen Cheng, Dongxiao Yu. "Theoretical convergence guaranteed resource-adaptive federated learning with mixed heterogeneity", the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023. (CCF-A)

  11. Yuantian Zhang, Feng Liu and Huashan Chen. "Optimal strategy selection for cyber deception via deep reinforcement learning", the 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022. (CCF-C)

  12. Yuantian Zhang, Feng Liu and Huashan Chen. "Optimal strategy selection for attack graph games using deep reinforcement learning", the 24th International Conference on High Performance Computing and Communications, 2022. (CCF-C)

  13. Songlin He, Eric Ficke, Mir Mehedi Pritom, Huashan Chen, Qiang Tang, Qian Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. "Blockchain-based automated and robust cyber security management." Journal of Parallel and Distributed Computing (2022). (CCF-B, IF 3.8)

  14. Huashan Chen, Hasan Cam, and Shouhuai Xu. "Quantifying cybersecurity effectiveness of dynamic network diversity," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 3804-3821, 2022. (CCF-A, IF 7.3)

  15. Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. "A survey on ethereum systems security: Vulnerabilities, attacks, and defenses." ACM Computing Surveys 53, no. 3 (2020): 1-43. (JCR-Q1, IF 23.8, ranked 1/143 in Computer Science Theory & Methods)

  16. Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, and Shouhuai Xu. "Statistical estimation of malware detection metrics in the absence of ground truth." IEEE Transactions on Information Forensics and Security 13, no. 12 (2018): 2965-2980. (CCF-A, IF 6.8)

  17. Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu, and Wenlian Lu. "Optimizing interconnections to maximize the spectral radius of interdependent networks." Physical Review E 95, no. 3 (2017): 032308. (JCR-Q1, IF 2.7)

Services

Service as an Editorial Board Member

  • International Journal of Digital Crime and Forensics

Service as a reviewer of the following journals

  • IEEE Transactions on Dependable and Secure Computing

  • IEEE Transactions on Information Forensics and Security

  • ACM Transactions on Internet Technology

  • IEEE Internet of Things Journal

  • Journal of Computer Security

  • The Computer Journal

  • Cybersecurity

  • Journal of Computer Science and Technology

  • Future Generation Computer Systems

  • Computer Communications

  • Sensors

  • Electronics

  • Information Systems Frontiers

Service as a program committee member of the following conferences

  • 2024 39th IEEE/ACM International Conference on Automated Software Engineering Workshops