Institute of Cyberspace Technology | Academic Staff

Dr Xu GuoAi  

PhD (Beijing University of Posts and Telecommunications)
Associate Professor 

Committee Member, Committee of Communication Security, China Institute of Communications (CIC)
Committee of Data Security, China Institute of Communications (CIC)

Teaching Area: Cyberspace Security, Anomaly Detection, Binary Security Analysis, Android Malware Detection, Privacy-Preserving Technologies, Federated Learning 
Biography

Dr XU Guoai is an Associate Professor at the Institute of Cyberspace Technology, HKCT Institute of Higher Education. He holds a PhD from Beijing University of Posts and Telecommunications. Prior to joining HKCT in 2024, Dr Xu served as a Professor at Harbin Institute of Technology (Shenzhen) from October 2022 to August 2024, and as a Professor at Beijing University of Posts and Telecommunications from September 2001 to October 2022, accumulating over two decades of experience in tertiary education and research. 

Dr Xu's research interests span cyberspace security, anomaly detection, binary security analysis, deepfake detection, Android malware detection, privacy-preserving technologies, and federated learning. He has led major national research projects, including serving as Principal Investigator for two National Key R&D Programmes of China under the Cyberspace Security Governance Special Project, with combined funding exceeding 95 million RMB. 

He has published extensively in top-tier venues including ICSE, USENIX Security, FSE, AAAI, ACM TOSEM, IEEE Internet of Things Journal, and IEEE Transactions on Vehicular Technology. Dr. Xu also holds six granted Chinese patents in areas such as anomaly detection, authenticated encryption, and federated learning.  

He has served in leadership roles in multiple national professional bodies, including the Cyber Security Association of China and the National Engineering Research Center for Mobile Internet Security Technology. 

Research Areas

Cyberspace Security, Binary Security Analysis, Android Malware Detection, Federated Learning

Selected Publications
Journal Articles

Yi, C., Dai, W., Deng, Y., Bao, L., & Xu, G. (2025). Enhancing Binary Security Analysis Through Pre-Trained Semantic and Structural Feature Matching. Applied Sciences, 15(21), 11610. 

Guo, Y., Xu, G., & Yin, J. (2025). ZSCIAD: a preliminary exploration of zero-shot class incremental anomaly detection method. Journal of Intelligent Manufacturing, 1-23. 

Guo, Y., Xu, G., Yin, J., & Wang, S. (2025). Patch Feature Transformation: An Anomaly Detection Method with Succinct Feature Filtering. International Journal of Pattern Recognition and Artificial Intelligence, 39(06), 2559006. 

Zou, S., Cao, Q., Huangqi, C., Huang, A., Li, Y., Wang, C., & Xu, G. (2024). A physician's privacy-preserving authentication and key agreement protocol based on decentralized identity for medical data sharing in IoMT. IEEE Internet of Things Journal, 11(17), 29174-29189. 

Xia, P., Guo, Y., Lin, Z., Wu, J., Duan, P., He, N., ... & Wang, H. (2024). WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets. Automated Software Engineering, 31(1), 32. 

Zou, S., Cao, Q., Lu, R., Wang, C., Xu, G., Ma, H., ... & Xi, J. (2024). A robust and effective 3-factor authentication protocol for smart factory in IIoT. Computer Communications, 220, 81-93. 

Yu, S., Cao, Q., Wang, C., Xu, G., Ma, H., Zhu, Y., ... & Jia, Y. (2023). Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V. IEEE Transactions on Vehicular Technology, 72(11), 15028-15039. 

Wang, C., Wang, D., Xu, G., & He, D. (2022). Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Science China Information Sciences, 65(1), 112301. 

Mao, J., Wang, C., Guo, Y., Xu, G., Cao, S., Zhang, X., & Bi, Z. (2022). A novel model for voice command fingerprinting using deep learning. Journal of Information Security and Applications, 65, 103085. 

Xia, P., Wang, H., Gao, B., Su, W., Yu, Z., Luo, X., ... & Xu, G. (2022). Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange. ACM SIGMETRICS Performance Evaluation Review, 50(1), 23-24. 

Cheng, X., Wang, H., Hua, J., Xu, G., & Sui, Y. (2021). Deepwukong: Statically detecting software vulnerabilities using deep graph neural network. ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3), 1-33. 

Conference Papers

Li, H., Cheng, X., Zhao, Y., Xu, G., Xu, G., & Wang, H. (2025). Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection. Proceedings of the ACM on Software Engineering, 2(ISSTA), 320-342. 

Li, H., Cheng, X., Zhang, G., Xu, G., Xu, G., & Wang, H. (2025). Mitigating Emergent Malware Label Noise in DNN-Based Android Malware Detection. Proceedings of the ACM on Software Engineering, 2(FSE), 1136-1159. 

Song, M., Hua, Z., Zheng, Y., Xiang, T., Xu, G., & Yuan, X. (2025). Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting. In 34th USENIX Security Symposium (USENIX Security 25) (pp. 7683-7702). 

Nie, Y., Wang, C., Wang, K., Xu, G., Xu, G., & Wang, H. (2025, April). Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. In 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE) (pp. 2880-2892). IEEE. 

Zhang, K., Hua, Z., Lan, R., Guo, Y., Zhang, Y., & Xu, G. (2025, April). Multi-View Collaborative Learning Network for Speech Deepfake Detection. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 39, No. 1, pp. 1075-1083).  

Dong, Z., Liu, T., Deng, J., Li, L., Yang, M., Wang, M., ... & Xu, G. (2024). Exploring covert third-party identifiers through external storage in the Android new era. In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 4535-4552). 

Li, H., Xu, G., Wang, L., Xiao, X., Luo, X., Xu, G., & Wang, H. (2024, April). Malcertain: Enhancing deep neural network based android malware detection by tackling prediction uncertainty. In Proceedings of the IEEE/ACM 46th International Conference on Software Engineering (ICSE) (pp. 1-13). 

Hou, J., Jian, Y., Xu, G., Cao, Q., & Xu, G. (2024, April). Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV. In International Conference on Intelligent Information Processing (pp. 345-354). Springer. 

Chen, Y., Gao, C., Zhu, M., Liao, Q., Wang, Y., & Xu, G. (2024, March). Apigen: Generative api method recommendation. In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (pp. 171-182). IEEE. 

Xu, G., Luo, L., & Xu, G. (2022, December). Robust Crack Detection Method by Reconstruction-Based Segmentation Network in Road Maintenance. In 2022 IEEE 8th International Conference on Computer and Communications (ICCC) (pp. 1522-1529). IEEE. 

Gao, Y., Xu, G., Li, L., Luo, X., Wang, C., & Sui, Y. (2022, November). Demystifying the underground ecosystem of account registration bots. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE) (pp. 897-909). 

Xia, P., Wang, H., Yu, Z., Liu, X., Luo, X., Xu, G., & Tyson, G. (2022, October). Challenges in decentralized name management: the case of ENS. In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 65-82). 

Dong, Z., Wang, L., Xie, H., Xu, G., & Wang, H. (2022, October). Privacy analysis of period tracking mobile apps in the post-roe v. wade era. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE) (pp. 1-6). 

Xu, G., Li, S., Zhou, H., Liu, S., Tang, Y., Li, L., ... & Wang, H. (2022, April). Lie to me: Abusing the mobile content sharing service for fun and profit. In Proceedings of the ACM Web Conference 2022 (pp. 3327-3335). 

Xia, P., Wang, H., Gao, B., Su, W., Yu, Z., Luo, X., ... & Xu, G. (2021). Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 5(3), 1-26.