網絡空間科技學院 | 教學人員

國愛博士 

PhD (Beijing University of Posts and Telecommunications)
副教授 

中國通信學會通信安全委員會委員
中國通信學會數據安全委員會委員

教學領域:網絡空間安全、異常檢測、二進制安全分析、安卓惡意軟件檢測、隱私保護技術、聯邦學習 
簡歷

國愛博士現任港專學院網絡空間科技學院副教授。他於北京郵電大學取得博士學位,在高等教育及科研領域擁有超過二十年的豐富經驗。博士曾於2022年10月至2024年8月擔任哈爾濱工業大學(深圳)教授,並於2001年9月至2022年10月擔任北京郵電大學教授。 

博士的研究方向涵蓋網絡空間安全、異常檢測、二進制安全分析、深度偽造檢測、安卓惡意軟件檢測、隱私保護技術及聯邦學習等多個前沿領域。他曾主持多項國家級重大科研項目,包括兩項國家重點研發計劃「網絡空間安全治理」專項課題,項目總經費超過人民幣9,500萬元。 

徐博士在國際頂級學術會議及期刊上發表了大量高水平論文,包括ICSE、USENIX Security、FSE、AAAI、ACM TOSEM、IEEE Internet of Things Journal及IEEE Transactions on Vehicular Technology等。他還擁有六項已授權的中國發明專利,涉及異常檢測、認證加密、聯邦學習等關鍵技術方向。 

在學術服務方面,徐博士曾擔任多個國家級專業組織的重要職務,包括中國通信學會通信安全委員會委員、中國通信學會數據安全委員會委員、中國網絡空間安全協會委員,以及移動互聯網安全技術國家工程研究中心副主任等。 

研究領域

網絡空間安全、制安全分析安卓意軟件檢測

發表的部分文章
期刊論文

Yi, C., Dai, W., Deng, Y., Bao, L., & Xu, G. (2025). Enhancing Binary Security Analysis Through Pre-Trained Semantic and Structural Feature Matching. Applied Sciences, 15(21), 11610. 

Guo, Y., Xu, G., & Yin, J. (2025). ZSCIAD: a preliminary exploration of zero-shot class incremental anomaly detection method. Journal of Intelligent Manufacturing, 1-23. 

Guo, Y., Xu, G., Yin, J., & Wang, S. (2025). Patch Feature Transformation: An Anomaly Detection Method with Succinct Feature Filtering. International Journal of Pattern Recognition and Artificial Intelligence, 39(06), 2559006. 

Zou, S., Cao, Q., Huangqi, C., Huang, A., Li, Y., Wang, C., & Xu, G. (2024). A physician's privacy-preserving authentication and key agreement protocol based on decentralized identity for medical data sharing in IoMT. IEEE Internet of Things Journal, 11(17), 29174-29189. 

Xia, P., Guo, Y., Lin, Z., Wu, J., Duan, P., He, N., ... & Wang, H. (2024). WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets. Automated Software Engineering, 31(1), 32. 

Zou, S., Cao, Q., Lu, R., Wang, C., Xu, G., Ma, H., ... & Xi, J. (2024). A robust and effective 3-factor authentication protocol for smart factory in IIoT. Computer Communications, 220, 81-93. 

Yu, S., Cao, Q., Wang, C., Xu, G., Ma, H., Zhu, Y., ... & Jia, Y. (2023). Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V. IEEE Transactions on Vehicular Technology, 72(11), 15028-15039. 

Wang, C., Wang, D., Xu, G., & He, D. (2022). Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Science China Information Sciences, 65(1), 112301. 

Mao, J., Wang, C., Guo, Y., Xu, G., Cao, S., Zhang, X., & Bi, Z. (2022). A novel model for voice command fingerprinting using deep learning. Journal of Information Security and Applications, 65, 103085. 

Xia, P., Wang, H., Gao, B., Su, W., Yu, Z., Luo, X., ... & Xu, G. (2022). Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange. ACM SIGMETRICS Performance Evaluation Review, 50(1), 23-24. 

Cheng, X., Wang, H., Hua, J., Xu, G., & Sui, Y. (2021). Deepwukong: Statically detecting software vulnerabilities using deep graph neural network. ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3), 1-33. 

會議論文

Li, H., Cheng, X., Zhao, Y., Xu, G., Xu, G., & Wang, H. (2025). Understanding Model Weaknesses: A Path to Strengthening DNN-Based Android Malware Detection. Proceedings of the ACM on Software Engineering, 2(ISSTA), 320-342. 

Li, H., Cheng, X., Zhang, G., Xu, G., Xu, G., & Wang, H. (2025). Mitigating Emergent Malware Label Noise in DNN-Based Android Malware Detection. Proceedings of the ACM on Software Engineering, 2(FSE), 1136-1159. 

Song, M., Hua, Z., Zheng, Y., Xiang, T., Xu, G., & Yuan, X. (2025). Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting. In 34th USENIX Security Symposium (USENIX Security 25) (pp. 7683-7702). 

Nie, Y., Wang, C., Wang, K., Xu, G., Xu, G., & Wang, H. (2025, April). Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. In 2025 IEEE/ACM 47th International Conference on Software Engineering (ICSE) (pp. 2880-2892). IEEE. 

Zhang, K., Hua, Z., Lan, R., Guo, Y., Zhang, Y., & Xu, G. (2025, April). Multi-View Collaborative Learning Network for Speech Deepfake Detection. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 39, No. 1, pp. 1075-1083).  

Dong, Z., Liu, T., Deng, J., Li, L., Yang, M., Wang, M., ... & Xu, G. (2024). Exploring covert third-party identifiers through external storage in the Android new era. In 33rd USENIX Security Symposium (USENIX Security 24) (pp. 4535-4552). 

Li, H., Xu, G., Wang, L., Xiao, X., Luo, X., Xu, G., & Wang, H. (2024, April). Malcertain: Enhancing deep neural network based android malware detection by tackling prediction uncertainty. In Proceedings of the IEEE/ACM 46th International Conference on Software Engineering (ICSE) (pp. 1-13). 

Hou, J., Jian, Y., Xu, G., Cao, Q., & Xu, G. (2024, April). Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV. In International Conference on Intelligent Information Processing (pp. 345-354). Springer. 

Chen, Y., Gao, C., Zhu, M., Liao, Q., Wang, Y., & Xu, G. (2024, March). Apigen: Generative api method recommendation. In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (pp. 171-182). IEEE. 

Xu, G., Luo, L., & Xu, G. (2022, December). Robust Crack Detection Method by Reconstruction-Based Segmentation Network in Road Maintenance. In 2022 IEEE 8th International Conference on Computer and Communications (ICCC) (pp. 1522-1529). IEEE. 

Gao, Y., Xu, G., Li, L., Luo, X., Wang, C., & Sui, Y. (2022, November). Demystifying the underground ecosystem of account registration bots. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE) (pp. 897-909). 

Xia, P., Wang, H., Yu, Z., Liu, X., Luo, X., Xu, G., & Tyson, G. (2022, October). Challenges in decentralized name management: the case of ENS. In Proceedings of the 22nd ACM Internet Measurement Conference (pp. 65-82). 

Dong, Z., Wang, L., Xie, H., Xu, G., & Wang, H. (2022, October). Privacy analysis of period tracking mobile apps in the post-roe v. wade era. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (ASE) (pp. 1-6). 

Xu, G., Li, S., Zhou, H., Liu, S., Tang, Y., Li, L., ... & Wang, H. (2022, April). Lie to me: Abusing the mobile content sharing service for fun and profit. In Proceedings of the ACM Web Conference 2022 (pp. 3327-3335). 

Xia, P., Wang, H., Gao, B., Su, W., Yu, Z., Luo, X., ... & Xu, G. (2021). Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 5(3), 1-26.