教师名录

邮箱:yiping@sjtu.edu.cn
所在研究所:网络空间安全研究所
个人简介
易平,IEEE高级会员、计算机学会高级会员,长期从事网络安全与人工智能安全领域的研究工作,承担了国家重点研发计划、国家863项目、自然科学基金项目、总装预研基金项目、上海科委重点科技攻关项目多项国家和上海市项目,相关研究成果已经在各类著名国际性学术期刊和会议上发表学术研究论文100余篇,其中包括IEEE Transactions on Multimedia、INFOCOM、ICC、GlobeCom多个顶级国际学术期刊和国际学术会议。
教授课程
l 人工智能安全
Ø 本科生和研究生专业课程
Ø 教育部产学合作协同育人项目
Ø 2026美加墨世界杯官方网-蚂蚁集团校企合作课程
Ø 配套教材《人工智能与大模型安全》
Ø 本课程慕课已经发布于“好大学在线”
l 无线网络原理
Ø 本科生和研究生专业课程
Ø 2026美加墨世界杯官方网公司产品研究项目
Ø 2026美加墨世界杯官方网虚拟仿真实验项目
Ø 配套教材《无线网络攻防原理与实践(第二版)》
Ø 配套实验教程《无线网络攻防教程》
论文发表
1. Xuhong Wang,Haoyu Jiang,Yi Yu,Jingru Yu,Yilun Lin,Ping Yi*,Yingchun Wang, Yu Qiao,Li Li,Fei-Yue Wang,“Building intelligence identification system via large language model watermarking: a survey and beyond”,Artificial Intelligence Review,Vol.58,2025
2. Zehui Zhang,Futai Zou*,Jianan Hong,Libo Chen,Ping Yi,“Detection and Analysis of Broken Access Control Vulnerabilities in App–Cloud Interaction in IoT”,IEEE Internet of Things Journal,vol.11, No.17, 2024
3. Bolun Wu, Futai Zou, Ping Yi,Yue Wu,, Liang Zhang, “SlicedLocator: Code Vulnerability Locator Based on Sliced Dependence Graph”, Computers & Security, Vol. 134, November 2023
4. Yihao Li, Ping Yi*, “A Contrastive Learning Framework for Detecting Anomalous Behavior in Commodity Trading Platforms”, Applied Sciences, vol.13, No.9, 2023
5. Baixi Lai, Ping Yi*, Yu Sui, Qingquan Zhang, “Energy distribution in EV energy network under energy shortage”, Neurocomputing, Vol. 444, pp179-188, July 2021
6. Zhiyang Xia,Ping Yi*,Yunyu Liu,Bo Jiang,Wei Wang,Ting Zhu,“GENPass: A Multi-Source Deep Learning Model for Password Guessing”,IEEE Transaction on Multimedia,vol.22, No.5, pp1323 – 1332, May, 2020
7. Cheng Huang, Ping Yi*, Futai Zou, Yao Yao, Wei Wang, and Ting Zhu, "CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS," Wireless Communications and Mobile Computing, vol. 2019, pp1-9, February 21, 2019
8. Qingquan Zhang, Yao Yao, Ting Zhu, Ziqiao Zhou, Wei Xu, Ping Yi, Sheng Xiao, “Dynamic Enhanced Field Division: An Advanced Localizing and Tracking Middleware”, ACM Transactions on Sensor Networks (TOSN), Vol.15, No.1, pp 1-26, December 2018
9. Ping Yi*, Yuxiang Guan, Futai Zou, Yao Yao, Wei Wang, and Ting Zhu, “Web Phishing Detection Using a Deep Learning Framework”, Wireless Communications and Mobile Computing, Vol.2018, pp 1-9, September, 2018
10. Jianwen Xu , Ping Yi*, Wei Wang, Ting Zhu, "A Power Storage Station Placement Algorithm for Power Distribution Based on Electric Vehicle", International Journal of Distributed Sensor Networks, Vol.13, Vol.2, pp 1-10, February 2017
11. Jialin Gao, Ping Yi*, Zicheng Chi, Ting Zhu, "A smart medical system for dynamic closed-loop blood glucose-insulin control", Smart Health(Elsevier), Vol.1, pp 18-33, June 2017
12. Ping Yi*, Ting Zhu, Bo Jiang, Ruofan Jin, Bing Wang, "Deploying Energy Routers in an Energy Internet Based on Electric Vehicles", IEEE Transactions on Vehicular Technology, Vol.65, No.6, pp. 4714-4725, June, 2016
13. Ping Yi*, Ting Zhu, Qingquan Zhang, Yue Wu, Li Pan, "Puppet Attack: A Denial of Service Attack in Advanced Metering Infrastructure Network", Journal of Network and Computer Applications, Vol.59, No.1, pp. 325–332, January, 2016
14. HaiYang Yu, Tian Xie, Jiaping Gui, Pengyang Wang, Pengzhou Cheng, Ping Yi*, Yue Wu,“BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense Evaluation”,Th e 2025 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 3 - 7 August, 2025,Toronto, Canada
15. Yidong Ding, Jiafei Niu and Ping Yi*, “MBTSAD: Mitigating Backdoors in Language Models Based on Token Splitting and Attention Distillation”, The IEEE International Conference on Tools with Artificial Intelligence (ICTAI2024), 28-30 October, 2024, Herndon, VA, USA
16. Haoyu Jiang,Haiyang Yu,Nan Li,Ping Yi*, “OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection”, IEEE International Joint Conference on Neural Networks (IJCNN2024), 30 June - 5th July, 2024, Yokohama, Japan
17. Yong Xiao, Jin Ma,Ping Yi*,Xiuzhen Chen, “Sponge Backdoor Attack: Increasing the Latency of Object Detection Exploiting Non-Maximum Suppression”, IEEE International Joint Conference on Neural Networks (IJCNN2024), 30 June - 5th July, 2024, Yokohama, Japan
18. Haoyu Jiang,Nan Li,Ping Yi*, “PUBA: A Physical Undirected Backdoor Attack in Vision-based UAV Detection and Tracking Systems”, IEEE International Joint Conference on Neural Networks (IJCNN2024), 30 June - 5th July, 2024, Yokohama, Japan
19. Tianming Zheng, Zhixin Tong, Ping Yi*, Yue Wu,Automated Generation of Bug Samples Based on Source Code Analysis,29th Asia-Pacific Software Engineering Conference (APSEC 2022), December 6-9, 2022, Virtually
20. Xiang Li, Yihao Li, Ping Yi*, Graph-based Malicious Account Groups Detection in Electronic Trading of Bulk Commodities,The 9th IEEE International Conference on Cyber Security and Cloud Computing,June 25-27, 2022, Xi'an, China
21. Dongliang Guan, Sheng Liu, Yihao Li, Ping Yi*, Graph-based Algorithm For Self-trading Accounts Detection in Bulk Commodity Trade, The 9th IEEE International Conference on Cyber Security and Cloud Computing,June 25-27, 2022, Xi'an, China
22. Chenqi Xie, Ping Yi*, Baowen Zhang, Futai Zou, “DeepMark: Embedding Watermarks into Deep Neural Network Using Pruning” The IEEE International Conference on Tools with Artificial Intelligence (ICTAI2021), 1-3 November 2021, Virtually
23. Giulia Serafini, Ping Yi*, Qingquan Zhang, Marco Brambillay, Jiayue Wangk, Yiwei Hu and Beibei Li, “Sentiment-Driven Price Prediction of the Bitcoin based on Statistical and Deep Learning Approaches”, IEEE International Joint Conference on Neural Networks (IJCNN2020), 19 - 24th July, 2020, Glasgow, UK
24. 谢天, 李强, 鞠卓亚, 韩嘉祺, 易平*,“人工智能后门防御评估方法及其架构研究”,智能科学与技术学报,Vol.6,No.3,2024,pp.381-393
25. 李南,丁益东,江浩宇,牛佳飞,易平*,“面向大语言模型的越狱攻击综述”,计算机研究与发展,Vol.65,No.5,2024,pp.1-26
26. 林点,潘理,易平*,“面向图像识别的卷积神经网络鲁棒性研究进展”,网络与信息安全学报,Vol.8,No.3,2022,pp.111-122
27. 邱宝琳,易平*,“基于多维特征图知识蒸馏的对抗样本防御方法”,网络与信息安全学报,Vol.8,No.2,2022,pp.88-99
28. 张维,易平*,“一种基于知识蒸馏的神经网络鲁棒性迁移方法”,信息安全学报,Vol.6,No.4,2021,pp.60-71
29. 陈皓,易平*,“基于图神经网络的代码漏洞检测方法”,网络与信息安全学报,Vol.7,No.3,2021,pp.37-45.
30. 王科迪,易平*,“人工智能对抗环境下的模型鲁棒性研究综述”,信息安全学报,Vol.5,No.3,2020,pp.13-22
资助项目
1. 国家自然科学基金“基于电动汽车的能源互联网传输与交换模型研究”,项目负责人。
2. 国家高技术研究发展863计划“无线自组网实时入侵检测和主动防护机制研究”,项目负责人。
3. 上海市自然科学基金“基于电动汽车的能源互联网传输与交换模型研究”,项目负责人。
4. 上海市自然科学基金“无线MESH网络主动安全防护模型研究”,项目负责人。
5. 航天科学技术基金“深度神经网络模型鲁棒性评估方法”项目负责人。
6. 上海商用飞机联合基金项目“基于ARINC827标准的机载航线可加载软件远程加载技术研究”,项目负责人。
7. 太平洋保险-交大人工智能联合实验室项目“基于AI的漏洞挖掘方法”,项目负责人。
8. 华为创新研究计划“AI计算过程中的对抗样本攻击与防御”,项目负责人。
9. 华为创新研究计划“基于反馈网络的对抗样本防御”,项目负责人。
10. 华为创新研究计划“基于人工智能的漏洞挖掘”,项目负责人。
11. CCF-绿盟科技“鲲鹏”基金“基于人工智能的漏洞检测技术”,项目负责人
12. 国家科技部科技人员服务企业行动“安全可控的无线MESH网络路由器研发及产业化”,项目负责人。