I am a lecturer at Beijing University of Posts and Telecommunications (BUPT).
My research interests are in software engineering and software security.
Before joining BUPT, I received my Ph.D. degree in Computer Science from BUPT in 2019.
I was very fortunate to be advised by Prof. Qiaoyan Wen.
I earned my B.S. in Software Engineering from Qingdao
University in 2013. In 2017-2018, I was a visiting Ph.D student in Penn
State University, advised by Prof. Linhai
Song.
I am always looking for highly-motivated undergraduate and undergraduate
students to join our group. If you are interested, please send me your CV and transcripts.
Top News
06/2024, One paper accepted to IEEE Transactions on Information Forensics and Security.
04/2024, One paper accepted to Artificial Intelligence Review.
08/2023, One paper accepted to Applied Sciences.
07/2023, One paper accepted to Journal of Information Security and Applications.
Selected Publications
NUAT-GAN: Generating Black-box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks
H. Gao, H. Zhang*, J. Wang, H. Wang, W. Li, T. Tu,
IEEE Transactions on Information Forensics and Security ( Early Access ). 2024
Intelligent Analysis of Android Application Privacy Policy and Permission Consistency
T. Tu, H. Zhang*, B. Gong, D. Du, Q. Wen
Artificial Intelligence Review. 2024
A detector for Android repackaged applications with layout-fingerprint
T. Tu, H. Zhang*, Y. Hu, D. Cui, X. Zhai
Journal of Information Security and Applications 76, 103527
Deep-Learning Based Injection Attacks Detection Method for HTTP
C. Zhao, S. Si, T. Tu, Y. Shi, and S. Qin*
A special issue of Mathematics Journal.
Jasmine: A Static Analysis Framework for Spring Core Technologies
M. Chen, T. Tu*, H. Zhang, Q. Wen, and W. Wang.
In Proceedings of the 37th ACM/IEEE International Conference on Automated Software Engineering (ASE), 2022.
KRProtector: Detection and Files Protection for IoT devices on Android without ROOT against Ransomware Based on Decoys
S. Wang, H. Zhang*, S. Qin, W. Li, T. Tu, A. Shen, and W. Liu
IEEE Internet of Things Journal, 2022.
A Comprehensive Study of Mozi Bot
T. Tu, J. Qin, H. Zhang*,M. Chen, T. Xu, and Y. Huang
International Journal of Intelligent Systems, 2022.
Sound Can Help Us See More Clearly
Y. Li, T. Tu, H. Zhang, J. Li, Z. Jin, and Q. Wen
Sensors, 2022.
DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined Network
J. Li, T. Tu, Y. Li, S. Qin, Y. Shi, and Q. Wen
Sensors, 2022.
Packet Injection Exploiting Attack and Mitigation in Software-Defined Network
J. Li, S. Qin, T. Tu*, H. Zhang, and Y. Li
Applied Sciences, 2022.
上下文感知的安卓应用程序漏洞检测
秦佳伟, 张华 *, 严寒冰, 何能强, 涂腾飞
通信学报, 2021.
ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
T. Tu, W. Yin, H. Zhang, X. Zeng, X. Deng, Y. Zhou, and X. Liu
Computers, Materials & Continua, 2021.
Understanding the Performance of WebAssembly Applications
Y. Yan, T. Tu, L. Zhao, Y. Zhou, and W. Wang
The ACM Internet Measurement Conference, 2021.
Algorithmic Profiling for Real-World Complexity Problems
B. Qin, T. Tu, Z. Liu, T. Yu, and L. Song
IEEE Transactions on Software Engineering, 2021.
(accepted as a journal-first paper by ICSE'2022)
An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-time Substation Communication
H. Zhang, B. Qin, T. Tu, Z. Guo, F. Gao, and Q. Wen
IEEE Transactions on Industrial Information, 2020.
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
L. Rao, H. Zhang, and T. Tu
IEEE Transactions on Services Computing, 2020.
Understanding Real-World Concurrency Bugs in Go
T. Tu, X. Liu, L. Song, and Y. Zhang
The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2019.
|