网络空间科技学院 | 教学人员

国爱博士 

PhD (Beijing University of Posts and Telecommunications)
副教授 

中国通信学会通信安全委员会委员
中国通信学会数据安全委员会委员

教学领域:网络空间安全、异常检测、二进制安全分析、安卓恶意软件检测、隐私保护技术、联邦学习 
简历

国爱博士现任港专学院网络空间科技学院副教授。他于北京邮电大学取得博士学位,在高等教育及科研领域拥有超过二十年的丰富经验。博士曾于2022年10月至2024年8月担任哈尔滨工业大学(深圳)教授,并于2001年9月至2022年10月担任北京邮电大学教授。 

博士的研究方向涵盖网络空间安全、异常检测、二进制安全分析、深度伪造检测、安卓恶意软件检测、隐私保护技术及联邦学习等多个前沿领域。他曾主持多项国家级重大科研项目,包括两项国家重点研发计划“网络空间安全治理”专项课题,项目总经费超过人民币9,500万元。 

徐博士在国际顶级学术会议及期刊上发表了大量高水平论文,包括ICSE、USENIX Security、FSE、AAAI、ACM TOSEM、IEEE Internet of Things Journal及IEEE Transactions on Vehicular Technology等。他还拥有六项已授权的中国发明专利,涉及异常检测、认证加密、联邦学习等关键技术方向。 

在学术服务方面,徐博士曾担任多个国家级专业组织的重要职务,包括中国通信学会通信安全委员会委员、中国通信学会数据安全委员会委员、中国网络空间安全协会委员,以及移动互联网安全技术国家工程研究中心副主任等。 

研究领域

网络空间安全、制安全分析安卓意软件检测

发表的部分文章
期刊论文

Yi, C., Dai, W., Deng, Y., Bao, L., & Xu, G. (2025). Enhancing Binary Security Analysis Through Pre-Trained Semantic and Structural Feature Matching. Applied Sciences, 15(21), 11610. 

Guo, Y., Xu, G., & Yin, J. (2025). ZSCIAD: a preliminary exploration of zero-shot class incremental anomaly detection method. Journal of Intelligent Manufacturing, 1-23. 

Guo, Y., Xu, G., Yin, J., & Wang, S. (2025). Patch Feature Transformation: An Anomaly Detection Method with Succinct Feature Filtering. International Journal of Pattern Recognition and Artificial Intelligence, 39(06), 2559006. 

Zou, S., Cao, Q., Huangqi, C., Huang, A., Li, Y., Wang, C., & Xu, G. (2024). A physician's privacy-preserving authentication and key agreement protocol based on decentralized identity for medical data sharing in IoMT. IEEE Internet of Things Journal, 11(17), 29174-29189. 

Xia, P., Guo, Y., Lin, Z., Wu, J., Duan, P., He, N., ... & Wang, H. (2024). WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets. Automated Software Engineering, 31(1), 32. 

Zou, S., Cao, Q., Lu, R., Wang, C., Xu, G., Ma, H., ... & Xi, J. (2024). A robust and effective 3-factor authentication protocol for smart factory in IIoT. Computer Communications, 220, 81-93. 

Yu, S., Cao, Q., Wang, C., Xu, G., Ma, H., Zhu, Y., ... & Jia, Y. (2023). Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V. IEEE Transactions on Vehicular Technology, 72(11), 15028-15039. 

Wang, C., Wang, D., Xu, G., & He, D. (2022). Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Science China Information Sciences, 65(1), 112301. 

Mao, J., Wang, C., Guo, Y., Xu, G., Cao, S., Zhang, X., & Bi, Z. (2022). A novel model for voice command fingerprinting using deep learning. Journal of Information Security and Applications, 65, 103085. 

Xia, P., Wang, H., Gao, B., Su, W., Yu, Z., Luo, X., ... & Xu, G. (2022). Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange. ACM SIGMETRICS Performance Evaluation Review, 50(1), 23-24. 

Cheng, X., Wang, H., Hua, J., Xu, G., & Sui, Y. (2021). Deepwukong: Statically detecting software vulnerabilities using deep graph neural network. ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3), 1-33. 

会议论文

Li, H., Cheng, X., Zhao, Y., Xu, G., Xu, G., & Wang, H. (2025). Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection. Proceedings of the ACM on Software Engineering, 2(ISSTA), 320-342. 

Li, H., Cheng, X., Zhang, G., Xu, G., Xu, G., & Wang, H. (2025). Mitigating Emergent Malware Label Noise in DNN-Based Android Malware Detection. Proceedings of the ACM on Software Engineering, 2(FSE), 1136-1159. 

Song, M., Hua, Z., Zheng, Y., Xiang, T., Xu, G., & Yuan, X. (2025). Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting. In 34th USENIX Security Symposium (USENIX Security 25) (pp. 7683-7702). 

Nie, Y., Wang, C., Wang, K., Xu, G., Xu, G., & Wang, H. (2025, April). Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. In 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE) (pp. 2880-2892). IEEE. 

Zhang, K., Hua, Z., Lan, R., Guo, Y., Zhang, Y., & Xu, G. (2025, April). Multi-View Collaborative Learning Network for Speech Deepfake Detection. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 39, No. 1, pp. 1075-1083).  

Dong, Z., Liu, T., Deng, J., Li, L., Yang, M., Wang, M., ... & Xu, G. (2024). Exploring covert third-party identifiers through external storage in the Android new era. In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 4535-4552). 

Li, H., Xu, G., Wang, L., Xiao, X., Luo, X., Xu, G., & Wang, H. (2024, April). Malcertain: Enhancing deep neural network based android malware detection by tackling prediction uncertainty. In Proceedings of the IEEE/ACM 46th International Conference on Software Engineering (ICSE) (pp. 1-13). 

Hou, J., Jian, Y., Xu, G., Cao, Q., & Xu, G. (2024, April). Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV. In International Conference on Intelligent Information Processing (pp. 345-354). Springer. 

Chen, Y., Gao, C., Zhu, M., Liao, Q., Wang, Y., & Xu, G. (2024, March). Apigen: Generative api method recommendation. In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (pp. 171-182). IEEE. 

Xu, G., Luo, L., & Xu, G. (2022, December). Robust Crack Detection Method by Reconstruction-Based Segmentation Network in Road Maintenance. In 2022 IEEE 8th International Conference on Computer and Communications (ICCC) (pp. 1522-1529). IEEE. 

Gao, Y., Xu, G., Li, L., Luo, X., Wang, C., & Sui, Y. (2022, November). Demystifying the underground ecosystem of account registration bots. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE) (pp. 897-909). 

Xia, P., Wang, H., Yu, Z., Liu, X., Luo, X., Xu, G., & Tyson, G. (2022, October). Challenges in decentralized name management: the case of ENS. In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 65-82). 

Dong, Z., Wang, L., Xie, H., Xu, G., & Wang, H. (2022, October). Privacy analysis of period tracking mobile apps in the post-roe v. wade era. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE) (pp. 1-6). 

Xu, G., Li, S., Zhou, H., Liu, S., Tang, Y., Li, L., ... & Wang, H. (2022, April). Lie to me: Abusing the mobile content sharing service for fun and profit. In Proceedings of the ACM Web Conference 2022 (pp. 3327-3335). 

Xia, P., Wang, H., Gao, B., Su, W., Yu, Z., Luo, X., ... & Xu, G. (2021). Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 5(3), 1-26.