
Yichuan Wang
Email: chuan@xaut.edu.cn
Mailing Address: No. 5 Jinhua South Road, Xi’an, Shaanxi, 710048, China
PROFILE
Yichuan Wang, China, holds a Ph.D. and is a professor and doctoral supervisor at the School of Computer Science and Engineering, Xi’an University of Technology. He received his Ph.D. in Computer System Architecture from Xidian University in 2014 and joined the School of Computer Science and Engineering at Xi’an University of Technology.His research focuses on system vulnerability analysis, network attack and defense confrontation, distributed and federated learning , cryptology , and physical layer security.
APPOINTMENTS
l Executive Director, Cyberspace Security Research Institute, Xi’an University of Technology
l Deputy Director, Shaanxi Provincial Key Laboratory of Network Computing and Security Technology
l Director, Shaanxi Province “Four-Subjects-in-One Partnership” Joint Research Center for Intelligent Cyber Countermeasures
l Outstanding Reviewer for Computer Networks
l Senior Member, China Computer Federation (CCF)
l Executive Committee Member, CCF Technical Committee on Blockchain
l Member, Cyber Security Technical Committee, Chinese Institute of Electronics
l Member, Association for Computing Machinery (ACM)
l Member, Institute of Electrical and Electronics Engineers (IEEE)
l Member, Chinese Association for Cryptologic Research
l Member, Chinese Association for Artificial Intelligence
l Secretary-General, Cyberspace Security Technical Committee, Shaanxi Computer Society
RESEARCH & TEACHING ACHIEVEMENTS
l Has successively led vertical and horizontal projects, including the Key R&D Program of the Ministry of Industry and Information Technology, National Natural Science Foundation of China (Youth Program and General Program), Shaanxi Key R&D Program, Shaanxi Natural Science Foundation, and Natural Science Special Project of Shaanxi Provincial Department of Education.
l Has published over 70 papers indexed by SCI/EI, and obtained more than 30 authorized invention patents.
l Founded the Xi’an University of Technology Security Group in 2016; led students to win multiple national first prizes in well-known competitions such as the National College Student Information Security Contest and the National College Student Information Security and Countermeasures Technology Competition, and has devoted efforts to nurturing over 300 talents in network and information security.
APPLICATIONS OF RESEARCH
l The team has conducted a series of studies to address needs in areas such as cyber offensive and defensive operations and network construction. Aiming at challenges including the difficulty in reconstructing multi-step cyber attack scenarios and the complexity of attack behaviors, the team designed and built a pruning algorithm based on network topology graphs to reconstruct entire multi-step cyber attack scenarios, solving the problem of poor sample space generalization in traditional methods.
l The team also carried out research on unknown network protocol analysis and reverse identification methods & technologies. This research covered bitstream protocol visualization methods, optimized feature extraction methods for unknown protocols, intelligent reverse analysis methods for protocol syntax, and the development of an unknown bitstream protocol analysis and reverse identification system. These efforts enable rapid and intelligent analysis of unknown protocol syntax, providing a research foundation and platform support for network protocol analysis.
l The outcomes have been applied to the secure operation of various system platforms such as Baidu and Tencent, generating significant social and economic benefits.