孙德刚-中国科学院大学-UCAS


本站和网页 http://people.ucas.ac.cn/~0017963 的作者无关,不对其内容负责。快照谨为网络故障时之索引,不代表被搜索网站的即时页面。

孙德刚-中国科学院大学-UCAS
[中文]
[English]
教育背景
工作经历
教授课程
专利与奖励
出版信息
科研活动
指导学生
基本信息
孙德刚 男 博导 院机关电子邮件: sundegang@iie.ac.cn通信地址: 北京市海淀区闵庄路甲89号邮政编码: 100093
招生信息
招生专业
083900-网络空间安全
招生方向
移动互联网安全,网络体系结构与安全防护
教育背景
1998-08--2002-06 北京交通大学 工学硕士
工作经历
社会兼职
2016-01-01-2020-01-01,中国计算机学会信息保密专委会, 副主任2015-08-01-2020-07-31,中国保密协会科学技术分会, 主任2014-08-01-2018-07-31,信息安全共性技术国家工程研究中心, 主任
教授课程
无线安全保密科学技术无线通信安全技术电磁泄漏发射与防护
专利与奖励
奖励信息
(1)&nbsp某应用研发,&nbsp二等奖,&nbsp部委级,&nbsp2018(2)&nbsp某工程建设,&nbsp三等奖,&nbsp其他,&nbsp2016(3)&nbsp重要场所安全工程建设,&nbsp三等奖,&nbsp其他,&nbsp2014(4)&nbsp计算机及移动存储介质管理系统研制、标准制定及配备应用示范,&nbsp二等奖,&nbsp部委级,&nbsp2012(5)&nbsp文档管理系统,&nbsp二等奖,&nbsp部委级,&nbsp2009(6)&nbsp分级保护标准及应用示范,&nbsp二等奖,&nbsp部委级,&nbsp2007(7)&nbsp两办工程建设,&nbsp二等奖,&nbsp部委级,&nbsp2004(8)&nbspTEMPEST技术研究,&nbsp二等奖,&nbsp国家级,&nbsp2001(9)&nbspTEMPEST标准制定,&nbsp一等奖,&nbsp部委级,&nbsp1997(10)&nbsp信息保护机研制,&nbsp二等奖,&nbsp部委级,&nbsp1995
出版信息
发表论文
[1] Li, Ce, Lv, Qiujian, Li, Ning, Wang, Yan, Sun, Degang, Qiao, Yuanyuan. A novel deep framework for dynamic malware detection based on API sequence intrinsic features. COMPUTERS & SECURITY[J]. 2022, 116: http://dx.doi.org/10.1016/j.cose.2022.102686.[2] Yang, Haitian, Zhao, Xuan, Wang, Yan, Sun, Degang, Chen, Wei, Huang, Weiqing. BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection. KNOWLEDGE AND INFORMATION SYSTEMS[J]. 2022, 64(8):&nbsp2189-2213, http://dx.doi.org/10.1007/s10115-022-01703-7.[3] 王思叶. URTracker: unauthorized reader detection and localization using COTS RFID. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 12937 LNCS, p 339-350, 2021, Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Proceedings;. 2021, [4] Wang, Tingting, Zhao, Xufeng, Lv, Qiujian, Hu, Bo, Sun, Degang, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Density Weighted Diversity Based Query Strategy for Active Learning. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 156-161, [5] 孙德刚, 郭韵婷, 喻民, 姜建国, 黄伟庆. FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNNnull. 2021, [6] Ou, Changhai, Lam, SiewKei, Sun, Degang, Zhou, Xinping, Qiao, Kexin, Wang, Qu. SNR-Centric Power Trace Extractors for Side-Channel Attacks. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS[J]. 2021, 40(4):&nbsp620-632, https://www.webofscience.com/wos/woscc/full-record/WOS:000633495300002.[7] Sun Degang. DeepMIT: A Novel Malicious Insider Treat Detection Framework based on Recurreent Neural Network. Proceedings of the 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design. 2021, [8] Yang, Yang, Li, Min, Meng, Bo, Ren, Junxing, Sun, Degang, Huang, Zihao. Rethinking the Aligned and Misaligned Features in One-stage Object Detection. 2021, [9] 王婷婷, 吕遒健, 胡波, Sun Degang. A Few-Shot Class-Incremental Learning Approach for Intrusion Detection.. The 30th International Conference on Computer Communication and Networks (ICCCN)[J]. 2021, [10] Yang, Yang, Li, Min, Meng, Bo, Huang, Zihao, Ren, Junxing, Sun, Degang. Objects as Extreme Points. 2021, http://arxiv.org/abs/2104.14066.[11] Sun, Degang, Liu, Meichen, Li, Meimei, Shi, Zhixin, Liu, Pengcheng, Wang, Xu, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 335-341, [12] 王婷婷, 吕遒健, 胡波, Sun Degang. CVSS-based Multi-Factor Dynamic Risk Assessment Model for Network System.. In 2020 IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC)[J]. 2020, [13] 魏冬. Spectrum Demand Estimation Model for NGSO Communication Systems Considering Time Delay Constraints and Different Spectrum Access Strategies. 2020 27th International Conference on Telecommunications (ICT). 2020, [14] Sun, Degang, Zhang, Qiaoyu, Wei, Dong, Zhang, Meng. A Secure Constellation Design for Polarized Modulation in Wireless Communications. IEEE ACCESS[J]. 2020, 8: 130588-130597, https://doaj.org/article/01dda75c7e0740a2ade45b45b11cd162.[15] Sun, Degang, Yang, Yang, Li, Min, Yang, Jian, Meng, Bo, Bai, Ruwen, Li, Linghan, Ren, Junxing. A Scale Balanced Loss for Bounding Box Regression. IEEE ACCESS[J]. 2020, 8: 108438-108448, https://doaj.org/article/6f63cb6c44cd4bfe9c139ea814f5415e.[16] Sun Degang. Terminator: A File-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. International Conference on Computing Frontiers. 2020, [17] Ou, Changhai, Wang, Zhu, Sun, Degang, Zhou, Xinping. Group Collision Attack. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2019, 14(4):&nbsp939-953, https://www.webofscience.com/wos/woscc/full-record/WOS:000449082400009.[18] Sun, Degang, Wu, Zhengrong, Wang, Yan, Lv, Qiujian, Hu, Bo, IEEE. Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control. 2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)null. 2019, 836-842, [19] Sun, Degang, Wu, Zhengrong, Wang, Yan, Lv, Qiujian, Hu, Bo, IEEE. Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2019, [20] Sun Degang. An Improved Adaptive Anomaly Detection Method for Electromagnetic Streaming Data. International Conference on Information Technology and Science. 2019, [21] Sun Degang. An Efficient Electromag-netic Streaming Data Anomaly Detection Framework Based on Storm. International Conference on Big Data and Computing. 2019, [22] Zhou, Xinping, Whitnall, Carolyn, Oswald, Elisabeth, Sun, Degang, Wang, Zhu, Eisenbarth, T, Teglia, Y. A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017)null. 2018, 10728: 70-87, [23] 孙德刚. 基于HOG的跳频信号自动化检测模型. 通信技术. 2018, [24] 孙德刚. 电子邮件信息泄露问题探讨. 通信技术. 2018, [25] Sun, Degang, Yang, Kun, Shi, Zhixin, Lv, Bin, Li, G, Ge, Y, Zhang, Z, Jin, Z, Blumenstein, M. A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017)null. 2017, 10412: 129-136, [26] Kong, Bin, Yang, Kun, Sun, Degang, Li, Meimei, Shi, Zhixin. Distinguishing Flooding Distributed Denial of Service from Flash Crowds Using Four Data Mining Approaches. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2017, 14(3):&nbsp839-856, https://www.webofscience.com/wos/woscc/full-record/WOS:000413777600019.[27] Sun Degang. Towards easy key enumeration. IACR Cryptology ePrint Archive. 2017, [28] Sun Degang, Yang Kun, Shi Zhixin, Wang Yan, Ma L, Khreishah A, Zhang Y, Yan M. Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 729-740, [29] Sun Degang. Towards optimal pre-processing in leakage detection. IACR Cryptology ePrint Archive. 2017, [30] 周新平, 孙德刚, 王竹, 欧长海. 一种基于奇异值分解的功耗轨迹筛选方法. 电子学报[J]. 2017, 45(9):&nbsp2250-2255, http://lib.cqvip.com/Qikan/Article/Detail?id=673352127.[31] Sun Degang, Li Yiwei, Xu Yanyun, Hu Jianlin, IEEE. A Novel Method for Specific Emitter Identification Based on Singular Spectrum Analysis. 2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)null. 2017, [32] Sun Degang. Profiling good leakage models for masked implementations. IACR Cryptology ePrint Archive. 2017, [33] Sun Degang, Yang Kun, Lv Bin, Shi Zhixin, IEEE. Could We Beat A New Mimicking Attack?. 2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGSnull. 2017, 247-250, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000417431200045.[34] Sun Degang. Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptology ePrint Archive. 2017, [35] Sun Degang. Group verification based multiple-differential collision attack. In Information and Communications Security - 18th International Conference. 2016, [36] Sun, DeGang, Shi, Jun, Wei, Dong, Zhang, Meng, Huang, WeiQing. Method for detecting text information leakage in electromagnetic radiation from a computer display. IET INFORMATION SECURITY[J]. 2016, 10(6):&nbsp413-417, https://www.webofscience.com/wos/woscc/full-record/WOS:000386964400010.[37] Ou Changhai, Wang Zhu, Sun Degang, Zhou Xinping, Ai Juan, Hoepman JH, Katzenbeisser S. Uncertain? No, It's Very Certain! Recovering the Key from Guessing Entropy Enhanced CPA. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016null. 2016, 471: 308-320, [38] Sun Degang, Wei Di, Zhang Ning, Lv Zhiqiang, Yin Xi, IEEE. Network Transmission of Hidden Data using Smartphones based on Compromising Emanations. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC)null. 2016, 190-193, [39] Sun, Degang, Shi, Jun, Ding, Xuejie, Zhang, Meng, Huang, Weiqing, IEEE. Method for Detecting Information Leakage From Computer Display in Electromagnetic Radiation. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 2041-2046, [40] Zhou Xinping, Sun Degang, Wang Zhu, Ou Changhai, Ai Juan, IEEE. Double-Key Recovery Based Correlation Power Analysis. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 1016-1022, [41] Sun Degang. Enhanced correlation power analysis by biasing power traces. In Information Security - 19th International Conference. 2016, [42] Ou, Changhai, Wang, Zhu, Sun, Degang, Zhou, Xinping, Ai, Juan, IEEE. Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 989-995, [43] Sun Degang, Shi Jun, Wei Dong, Zhang Meng, Huang Weiqing, Qiu Xuguang, IEEE. A New Method to Recognize Computer through Electromagnetic Radiation Based on Spectral Centroid. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC)null. 2016, 184-186, [44] 孙德刚. An Efficient and Anti-interference Method of Synchronizing Information Extraction for Video Leaking Signal [J].. IET Signal Processing. 2015, [45] 孙德刚. An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks. Information and Communications Security. Springer International Publishing. 2015, [46] Sun Degang. POSTER: using improved singular value decomposition to enhance correlation power analysis. In Security and Privacy in Communication Networks - 11th International Conference. 2015, [47] 孙德刚. 电磁泄漏文本信息检测方法. International Conference on Information and Communications Security. 2014, [48] 孙德刚. 基于访问控制矩阵的移动存储介质安全控制. The 2014 2nd International Conference on Systems and Informatics(ICSAI2014). 2014, [49] 孙德刚. A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction[C]. Proc of International Conference on Systems and Informatics. Shanghai: IEEE, 2014.. 2014, [50] 孙德刚. 视频电磁泄漏频率的判断方法. The 2014 2nd International Conference on Systems and Informatics(ICSAI2014)EI. 2014, [51] Ce Li, Zijun Cheng, He Zhu, Leiqi Wang, Qiujian Lv, Yan Wang, Ning Li, Degang Sun. DMalNet: Dynamic Malware Analysis Based on API Feature Engineering and Graph Learning. Computers & Security. http://dx.doi.org/10.1016/j.cose.2022.102872.
发表著作
(1) 高级DPA理论与实践—迈向安全嵌入式电路的安全极限, 国防工业出版社, 2016-01, 第 3 作者
科研活动
科研项目
( 1 )&nbsp虚拟化技术在信息系统中应用与实现, 主持, 国家级, 2012-05--2014-06( 2 )&nbsp207项目, 主持, 国家级, 2018-01--2020-12
指导学生
已指导学生杨文 硕士研究生 081201-计算机系统结构 邓辉 硕士研究生 081201-计算机系统结构 王浩 硕士研究生 0812Z1-信息安全 韦迪 硕士研究生 085211-计算机技术 郭辰阳 硕士研究生 081201-计算机系统结构 李怡伟 硕士研究生 0812Z1-信息安全 崔亚洲 硕士研究生 085211-计算机技术 曾佳 硕士研究生 085212-软件工程 周新平 博士研究生 0812Z1-信息安全 杨琨 博士研究生 081202-计算机软件与理论 石珺 博士研究生 081202-计算机软件与理论 张杰 硕士研究生 085211-计算机技术 刘赛 硕士研究生 081001-通信与信息系统 王友军 硕士研究生 081202-计算机软件与理论 欧长海 博士研究生 083900-网络空间安全 现指导学生王婷婷 博士研究生 0812Z1-信息安全 毛锐 博士研究生 0812Z1-信息安全 吴峥嵘 硕士研究生 081001-通信与信息系统 胡羽蓝 硕士研究生 085211-计算机技术 房鹏飞 硕士研究生 085211-计算机技术 崔越 博士研究生 081002-信号与信息处理 杨阳 博士研究生 083900-网络空间安全 卢思学 博士研究生 083900-网络空间安全 刘超超 博士研究生 083900-网络空间安全 夏宇琦 硕士研究生 081001-通信与信息系统 李慧艳 硕士研究生 081201-计算机系统结构 耿静茹 硕士研究生 083900-网络空间安全 田雨 硕士研究生 085211-计算机技术 白入文 博士研究生 083900-网络空间安全 徐国坤 博士研究生 083900-网络空间安全 杨峥 博士研究生 083900-网络空间安全 程子俊 硕士研究生 081203-计算机应用技术 李妍 硕士研究生 085211-计算机技术 张艺馨 硕士研究生 085211-计算机技术
2013 中国科学院大学,网络信息中心.