Jing An

发布时间:2021-03-03来源:伟德betvlctor体育官方网站

Name

Jing An (中文简历                


Title

Lecturer 

Department 

Department of Cybersecurity

E-Mail 

anjing@cuc.edu.cn

Courses Taught 

Computer Security and Maintenance (Bachelor Program), Comprehensive Practice of Information Security

 (Bachelor Program), Python Programming (Bachelor Program), Digital Media Security Application and 

Practice (Bachelor Program), and Computer Network Programming Practice (Master Program)


Research Interest or 

Teaching Expertise

Software Security and Program Analysis



Self-Introduction 

I graduated from Department of Information Security, Beijing University of Posts and Telecommunications in 2014, with the doctor’s degree in Engineering. Then, I took office in Department of Computer Science and 

Cyber Space, Communication University of China.


Publication

1. PAN Y, AN J, FAN W, HUANG W. Shellfier: A Shellcode Detection Method based on Dynamic Binary 

Instrumentation and Convolutional Neural Network[C/OL]//Proceedings of the 2019 8th International 

Conference on Software and Computer Applications. New York, NY, USA: Association for Computing 

Machinery, 2019: 462–466[2020–11–25]. https://doi.org/10.1145/3316615.3316731. DOI:10.1145/3316615.3316731.

2. MAN H, AN J, HUANG W, FAN W. JSEFuzz: Vulnerability Detection Method for Java Web Appli-

cation[C]//2018 3rd International Conference on System Reliability and Safety (ICSRS). . 

DOI:10.1109/ICSRS.2018.8688844.

3. WANG Y, AN J, HUANG W. Using CNN-based Representation Learning Method for Malicious 

Traffic Identification[C]//2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS). . DOI:10.1109/ICIS.2018.8466404.

4. XIAO S, AN J, FAN W. Constructing an Intrusion Detection Model based on Long Short-term 

Neural Networks[C]//2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS). . DOI:10.1109/ICIS.2018.8466445.

5. ZOU Q, AN J, HUANG W, FAN W. Integrating assertion stack and caching to optimize constraint solving[C]//

2015 4th International Conference on Computer Science and Network Technology (ICCSNT). . DOI:10.1109/ICCSNT.2015.7490777.


Projects

Scientific Research Projects

1. Traceability Method of Convergence Media Content, Ministry of Science and Technology, May 2020-

November 2022, Principle Investigator, RMB100,000.00

2. Convergence Media Technology Support and Service Mode, Ministry of Science and Technology, 

December 2019-November 2022, Participant, RMB710,000.00

3. Basic Environment of Wireless Router Firmware Vulnerability Analysis, China Information Technology 

Security Evaluation Center, November 2020-November 2021 Participant, RMB 278,000.00

4. Basic Open Source Software Version Database Information Collection System for Database and Other 

Products, Institute of Information Engineering, Chinese Academy of Sciences, December 2019-

December 2020, Participant, RMB 148,000.00

5. Cyberspace Vulnerability Range Construction and Exercise Evaluation Key Technology, China Mobile 

Scientific Research Fund Project of the Ministry of Education, November, 2019-December 2021, Participant, 

RMB 1,000,000.00

  

Teaching Reform Projects

1. Online Open Courses Construction Project - Computer Security and Maintenance, Communication 

University of China, January 2018- December 2018, RMB 89,000.00

2. Reform of Teaching Methods for Computer Security and Maintenance, Communication University of China, January 2016-December 2016, RMB 10,000.00


Admission Requirements

Master Degree Candidates:

1. Passionate about technical research;

2. Equipped with basic knowledge and skills of Computer Science and Information Security.



返回原图
/