招生工作
新闻动态
通知公告
导师简介

付玉龙

2025年11月03日 11:57  点击: []


付玉龙,男,1983年生,中共党员,教授,博士研究生导师,法国波城大学博士。塔里木大学网络安全学院副院长,软件系统安全方向学术带头人,Electionic编委,人工智能学会人工智能与安全专委会委员,5G应用安全专委会-工信安联盟专委委员,Computers & Security、Journal of Network and Computer Applications、Engineering Applications of Artificial Intelligence等期刊审稿人。

一、研究方向

主要从事无线网络安全、软件系统安全和密码协议安全等研究。

二、科研项目与学术成果

近年来在TDSC、ACM Computing Surveys、Computers & Security、Soft Computing、SCN、IEEE Network、Computer Networks、网络与信息安全学报等国际、国内学术期刊和会议上发表论文40余篇。主持和参与国家自然基金、国家重点研发计划、陕西省自然基金、陕西省重点链项目、博士后基金面上项目等20余项,主持和参与华为、OPPO、IBM、中国网安公司、航空工业自控所等横向项目10余项。

(一)主持重要科研项目:

1)国家自然科学基金青年项目,面向多重协议组合实现的形式化安全检测理论和方法研究, 2016-2019, 21万元。

2)国家重点研发计划网络空间安全重点专项子课题,面向多重协议组合实现的形式化安全检测理论和方法研究, 2015-2019, 210万元。

3)华为技术有限公司横向项目,形式化验证项目, 2020, 20万元。

4)华为技术有限公司横向项目,复杂数据场景下的自适应AI安全检测算法项目, 2021, 41万元。

5)陕西省重点研发计划,云雾混构环境下移动互联网大规模身份管理与认证关键技术研究, 2019-2022, 80万元。

6)陕西省自然科学基础研究计划面上项目,后5G网络自动化安全建模及分析关键技术研究, 2020-2022, 5万元。

7)OPPO中国横向项目,无线AI安全技术研究, 2021-2022, 29.8万元。

8)腾讯云计算(北京)有限责任公司横向项目,面向分支OSS代码仓库的安全补丁存在性智能识别算法, 2022-2023, 45万元。

9)国家重点研发项目子课题,6G安全内生及隐私保护关键技术评估, 2022-2025, 316万元。

10)联合基金项目,多层跨域星地融合网络异构组网与通信安全关键技术, 2023-2026, 215万元。

11)塔里木大学校长基金创新团队项目,新疆广袤地形地形特点下的4G/5G网络承载电力业务安全防护技术创新团队, 2025-2028, 10万元。

(二)主要成果:

1、代表性期刊论文:

[1] Fu Y, Xie Y, Yi W, et al. IPO-ZTA: An Intelligent Policy Orchestration Zero Trust Architecture for B5G and 6G[J]. Computer Networks, 2025: 111450.

[2] Q-PGD: A stealthy and effective Speaker Recognition Adversarial Attacks based on Quantized Projected Gradient Descent, IJCNN 2025(国际神经网络联合会议, CCF C类会议)

[3] Yi W, Fu Y, Cao J, et al. AotmAuth: Atomic Function Module-Based 6 G Authentication Protocol Combination Framework[J]. IEEE Transactions on Dependable and Secure Computing, 2025.

[4] Yi W, Fu Y, Cao J, et al. Towards Seamless 6G and AI/ML Convergence: Architectural Enhancements and Security Challenges[J]. IEEE Network, 2025.

[5] Gao S, Lin R, Fu Y, et al. Security Threats, Requirements and Recommendations on Creating 5G Network Slicing System: A Survey[J]. Electronics, 2024, 13(10): 1860.

[6] Lin R, Fu Y, Yi W, et al. Vulnerabilities and Security Patches Detection in OSS: A Survey[J]. ACM Computing Surveys, 2024, 57(1): 1-37.

[7] Peng K, Fu Y, Yang J, et al. PAVR: A Pre-Training Approach with Self-attention for Vulnerability Repair[C]//International Conference on Network Simulation and Evaluation. Singapore: Springer Nature Singapore, 2023: 427-441.

[8] Wang J, Fu Y, Liu M, et al. Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics[C]//International Conference on Information Security Practice and Experience. Singapore: Springer Nature Singapore, 2023: 52-73.

[9] 张成磊,付玉龙,李晖,等.6G网络安全场景分析及安全模型研究[J].网络与信息安全学报,2021,7(01):28-45.

[10] 刘梦如,付玉龙,曹进,等.基于区块链的天地一体化信息网络非交互式密钥交换方法[J].天地一体化信息网络,2021,2(03):48-56.

[11] Fu Y, Chen H, Zheng Q, et al. An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks[J]. Journal of Network and Computer Applications, 2020.

[12] Cao X, Fu Y, Chen B. Packet-based intrusion detection using Bayesian topic models in mobile edge computing[J]. Security and Communication Networks, 2020, 2020: 1-12.

[13] Xin X L, Ma Y C, Fu Y L. The existence of states on EQ-algebras[J]. Mathematica Slovaca, 2020.

[14] 龚宇翔,曹进,付玉龙,等.针对LTE-A网络中的DDoS攻击流量检测模型[J].信息安全学报, 2019,4(01):27-38.

[15] 刘高,闫峥,付玉龙.DSR路由发现中基于微支付的安全数据采集激励机制[J].信息安全学报, 2019, 4(01): 1-13.

[16] Cao J, Ma M, Fu Y, et al. CPPHA: Capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets[J]. IEEE transactions on dependable and secure computing, 2019, 18(3): 1182-1195.

[17] Xin X, Fu Y, Lai Y, et al. Monadic pseudo BCI-algebras and corresponding logics[J]. Soft Computing, 2019.

[18] Lin H, Yan Z, Fu Y. Adaptive security-related data collection with context awareness[J]. Journal of Network and Computer Applications, 2019, 126: 88-103.

[19] Li G, Fu Y, Yan Z, et al. Quantifiable Network Security Measurement: A Study Based on an Index System[C]//Machine Learning for Cyber Security: Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedings 2. Springer International Publishing, 2019.

[20] Fu Y, Yuan X, Wang K, et al. A Security Formal Model for Multiple Channels Communication[C]//2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2019.

[21] Fu Y, Li G, Mohammed A, et al. A study and enhancement to the security of MANET AODV protocol against black hole attacks[C]//2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2019.

[22] Xin X, Fu Y, Lai Y, et al. Monadic pseudo BCI-algebras and corresponding logics[J]. Soft Computing, 2019.

[23] Fu Y L, Xin X L, Wang J T. State maps on semihoops[J]. Open Mathematics, 2018.

[24] Li G, Yan Z, Fu Y, et al. Data fusion for network intrusion detection: a review[J]. Security and Communication Networks, 2018, 2018(1): 8210614.

[25] Li G, Yan Z, Fu Y. A study and simulation research of blackhole attack on mobile adhoc network[C]//2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 2018: 1-6.

[26] Fu Y, Yan Z, Li H, et al. A secure SDN based multi-RANs architecture for future 5G networks[J]. Computers & Security, 2017, 70: 648-662.

[27] Fu Y, Yan Z, Cao J, et al. An automata based intrusion detection method for internet of things[J]. Mobile Information Systems, 2017, 2017(1): 1750637.

[28] Chen H, Fu Y, Yan Z. Survey on big data analysis algorithms for network security measurement[C]//Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings 11. Springer International Publishing, 2017: 128-142.

2、会议报告:

[1] 第十八届中国网络空间安全学科专业建设与人才培养研讨会网络安全学生开源软件开发能力培养方法探索,中国武汉,2025年10月

[2] The 11th IEEE International conference on Privacy computing and Data Security(PCDS-2025),ADFS: an Attention-Driven Feature Selection Approach for Data Security-Related Traffic Analysis,日本 函馆,2025年8月

[3] International Joint Conference on Neural Networks 2025,Q-PGD: A stealthy and effective Speaker Recognition Adversarial Attacks based on Quantized Projected Gradient Descent, 意大利 罗马,2025年6月

3、科研奖励与荣誉

[1] 兵团科学技术奖二等奖(排名第3),“智能制造物联网全场景安全防护体系研究”2024

[2] 校级教学成果一等奖(排名第5),“课程-方法-评价”三位一体的人工智能赋能网络安全实践能力培养体系,2025

[3] 校级教学成果二等奖(排名第8),“厚植爱疆情 砥砺戍边志:兵团特色信息类卓越工程师培养模式创新与实践”,2024

[4] 校级教学成果一等奖(排名第2),“以立德树人为纲、实战能力为目,坚持因材施教、特色化培养的网安拔尖人才自主培养创新方法与实践”,2023

4、知识产权

[1] 授权发明专利,基于深度学习的漏洞补丁存在性检测方法,CN202211557968.5,付玉龙;易威;杨金城;王福维;董志强,2025/5/13

[2] 授权发明专利,一种 5G 大规模终端的自适应组合认证方法CN202111210432.1付玉龙;张才玲;曹进;李晖;王珂,2024/4/2

[3] 授权发明专利,基于开集识别DNS隧道检测方法、系统、设备及终端 CN202210308273.7付玉龙;焦小斌;刘璐璐,2024/3/19

[4] 授权发明专利,用于生物识别身份认证的接入认证和密钥派生方法及系统CN202210191226.9付玉龙;刘梦如;曹进;李晖, 2023/10/13

[5] 授权发明专利,面向物联网设备的分布式DGA域名检测方法及系统CN202210321365.9付玉龙;刘璐璐;焦小彬,2023/3/24

[6] 授权发明专利,一种通讯软件的安全性的自动化验证方法CN202110653403.6付玉龙;沈啸;刘辰吴;李晖,2022/9/20

[7] 授权发明专利,基于5G云雾混构统一认证平台的生物身份信息认证方法CN201911129276.9王珂;付玉龙;袁心怡;曹进;李晖,2021/11/23

[8] 授权发明专利,基于SDN-5G网络架构的SDN组件间安全保护方法CN201710566565.X付玉龙,李国权,闫峥,李晖,2021/3/3

[9] 授权发明专利,基于串并行结构网络安全数据处理方法及系统、社交网络CN201710740993.X陈寒露,闫峥,付玉龙,2020/6/30

[10] 授权发明专利,一种基于SDN的多信道传输的5G网络及传输数据的方法CN201710593817.8付玉龙,李国权, 闫峥,李晖,2020/1/19

[11] 授权发明专利,一种基于有限自动机的物联网入侵检测方法及检测系统CN201710158735.0付玉龙,闫峥,李晖,2020/1/21

三、联系方式

E-mail:ylfu@xidian.edu.cn

话:15399016660


上一条:李春雨

下一条:吴昕炜

关闭