2024.png

๐Ÿ™‹โ€โ™‚๏ธ AP at BUPT

๐ŸŽ“ Ph.D. at THU

๐Ÿ“ Beijing, China


<aside> ๐Ÿ“ง Email

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" width="40px" /> Scholar

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" width="40px" /> Github

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" width="40px" /> Research Gate

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" width="40px" /> OCRID

</aside>

<aside> <img src="attachment:5bc04f55-8027-413d-8e52-34a922eee8ba:ๅŒ—้‚ฎๆ กๅพฝ.png" alt="attachment:5bc04f55-8027-413d-8e52-34a922eee8ba:ๅŒ—้‚ฎๆ กๅพฝ.png" width="40px" /> ไธชไบบไธป้กต๏ผˆไธญๆ–‡๏ผ‰

</aside>


Publications

CV

ไธญๆ–‡ไธป้กต

Past News


[Last Update June 13, 2025]

๐Ÿ‘จ๐Ÿผโ€๐ŸŽ“ About

Iโ€™m an associate researcher (assistant professor) at the Beijing University of Posts and Telecommunications (BUPT). Before that, I received my Ph.D. from Tsinghua University in 2024, advised by Prof. Zhiliang Wang, and also a joint Ph.D. at Nanyang Technological University advised by Prof. Yang Liu. My research focuses on the intersection between AI and Cybersecurity.

<aside> <img src="/icons/fire_red.svg" alt="/icons/fire_red.svg" width="40px" /> Research Interests

  1. AI/LLM + Security: trustworthy AI & AI for cybersecurity
  2. Traffic Analysis: anomaly detection, fingerprinting, classification, etc.
  3. Network Security: measurement and security analysis on diverse network architectures and protocols </aside>

๐Ÿ“– Education

๐Ÿ’ผ Experience

๐Ÿ“ Publications

Untitled

๐Ÿ† Honors & Awards

๐ŸงพPatents

โœ๏ธ Academic Services

๐Ÿ‘จ๐Ÿผโ€๐ŸซTeaching