Tengfei Tu

Tengfei Tu (涂腾飞)

Lecturer, Master’s Supervisor
Faculty Network Security Research Center
State Key Laboratory of Networking and Switching Technology
School of Cyber Security
Beijing University of Posts and Telecommunications

Address:Room 214, Wangan Building, Bupt Shahe Campus, Changping District, Beijing
E-mail: tutengfei.kevin [at] bupt.edu.cn
[Google Scholar]

I am a lecturer at Beijing University of Posts and Telecommunications (BUPT). My research interests are in software engineering and software security. Before joining BUPT, I received my Ph.D. degree in Computer Science from BUPT in 2019. I was very fortunate to be advised by Prof. Qiaoyan Wen. I earned my B.S. in Software Engineering from Qingdao University in 2013. In 2017-2018, I was a visiting Ph.D student in Penn State University, advised by Prof. Linhai Song.

I am always looking for highly-motivated undergraduate and undergraduate students to join our group. If you are interested, please send me your CV and transcripts.


Top News

  • 06/2024, One paper accepted to IEEE Transactions on Information Forensics and Security.

  • 04/2024, One paper accepted to Artificial Intelligence Review.

  • 08/2023, One paper accepted to Applied Sciences.

  • 07/2023, One paper accepted to Journal of Information Security and Applications.


Selected Publications

  • NUAT-GAN: Generating Black-box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks
    H. Gao, H. Zhang*, J. Wang, H. Wang, W. Li, T. Tu,
    IEEE Transactions on Information Forensics and Security ( Early Access ). 2024

  • Intelligent Analysis of Android Application Privacy Policy and Permission Consistency
    T. Tu, H. Zhang*, B. Gong, D. Du, Q. Wen
    Artificial Intelligence Review. 2024

  • A detector for Android repackaged applications with layout-fingerprint
    T. Tu, H. Zhang*, Y. Hu, D. Cui, X. Zhai
    Journal of Information Security and Applications 76, 103527

  • Deep-Learning Based Injection Attacks Detection Method for HTTP
    C. Zhao, S. Si, T. Tu, Y. Shi, and S. Qin*
    A special issue of Mathematics Journal.

  • Jasmine: A Static Analysis Framework for Spring Core Technologies
    M. Chen, T. Tu*, H. Zhang, Q. Wen, and W. Wang.
    In Proceedings of the 37th ACM/IEEE International Conference on Automated Software Engineering (ASE), 2022.

  • KRProtector: Detection and Files Protection for IoT devices on Android without ROOT against Ransomware Based on Decoys
    S. Wang, H. Zhang*, S. Qin, W. Li, T. Tu, A. Shen, and W. Liu
    IEEE Internet of Things Journal, 2022.

  • A Comprehensive Study of Mozi Bot
    T. Tu, J. Qin, H. Zhang*,M. Chen, T. Xu, and Y. Huang
    International Journal of Intelligent Systems, 2022.

  • Sound Can Help Us See More Clearly
    Y. Li, T. Tu, H. Zhang, J. Li, Z. Jin, and Q. Wen
    Sensors, 2022.

  • DoSGuard: Mitigating Denial-of-Service Attacks in Software-Defined Network
    J. Li, T. Tu, Y. Li, S. Qin, Y. Shi, and Q. Wen
    Sensors, 2022.

  • Packet Injection Exploiting Attack and Mitigation in Software-Defined Network
    J. Li, S. Qin, T. Tu*, H. Zhang, and Y. Li
    Applied Sciences, 2022.

  • 上下文感知的安卓应用程序漏洞检测
    秦佳伟, 张华 *, 严寒冰, 何能强, 涂腾飞
    通信学报, 2021.

  • ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector
    T. Tu, W. Yin, H. Zhang, X. Zeng, X. Deng, Y. Zhou, and X. Liu
    Computers, Materials & Continua, 2021.

  • Understanding the Performance of WebAssembly Applications
    Y. Yan, T. Tu, L. Zhao, Y. Zhou, and W. Wang
    The ACM Internet Measurement Conference, 2021.

  • Algorithmic Profiling for Real-World Complexity Problems
    B. Qin, T. Tu, Z. Liu, T. Yu, and L. Song
    IEEE Transactions on Software Engineering, 2021. (accepted as a journal-first paper by ICSE'2022)

  • An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-time Substation Communication
    H. Zhang, B. Qin, T. Tu, Z. Guo, F. Gao, and Q. Wen
    IEEE Transactions on Industrial Information, 2020.

  • Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
    L. Rao, H. Zhang, and T. Tu
    IEEE Transactions on Services Computing, 2020.

  • Understanding Real-World Concurrency Bugs in Go
    T. Tu, X. Liu, L. Song, and Y. Zhang
    The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2019.