蒲誉文

25/03/19 11:21:59 作者: 点击:[] [小] [中] [大]

姓名:蒲誉文

职称:副教授、硕士生导师

研究方向:人工智能安全、数据安全与隐私保护

Emailyw.pu@cqu.edu.cn

地址重庆大学虎溪校区信息科研楼B707

蒲誉文现任重庆大学副教授、硕士生导师,长期从事人工智能安全、数据安全与隐私保护等相关研究,提出一系列创新性方法和关键技术,在ACM CCSUSENIX SecurityNDSSTIFSTDSC等领域权威会议和期刊上发表论文20余篇,申请发明专利20余项,获浙江省科技进步一等奖公安部科技进步二等奖、中国发明协会发明创业奖创新奖二等奖、IEEE VIS 2024 Honorable Mention AwardWASA 2018最佳论文奖等多项奖励,主持国家自然科学基金青年基金项目、国家重点研发计划项目子课题等多个项目和课题。在开展理论研究的同时,积极参与研制多个智能系统安全评测与加固平台,应用服务于华为等多个国家重要单位和头部企业,获得杭州亚运会组委会等的高度认可和官方致谢

团队长期招收硕研究生和本科实习生,热烈欢迎对人工智能安全与隐私相关研究感兴趣的同学与我联系。


教育及工作经历:

             2025.02 - 至今,重庆大学大数据与软件学院,副教授

             2021.10 – 2025.01,浙江大学计算机科学与技术学院,博士后

             2016.09 – 2021.06,重庆大学大数据与软件学院,博士

             2012.09 – 2016.06,重庆大学大数据与软件学院,学士


部分荣誉和获奖

        [5] 浙江省科技进步一等奖                                                      2024.11

        [4] 公安部科技进步二等奖                                                      2024.11   

        [3] 中国发明协会发明创业奖创新奖二等奖                          2024.08

        [2] IEEE VIS 2024 Honorable Mention Award                         2024.07

        [1] WASA最佳论文奖                                                              2018.07          


部分项目:    

        [3] 国家自然科学基金青年科学基金项目,面向大模型推理的数据隐私保护关键技术研究,2025.01-2027.12,在研,项目负责人

        [2] 国家重点研发计划项目,分布式学习中的数据安全基础理论,2022.12-2025.11,在研,子课题负责人

        [1] 浙江大学NGICS大平台课题,面向代码提交的动态漏洞挖掘技术,2022.01-2022.12,已结题,项目负责人


部分学术论文(*Corresponding author)

[23] Rui Zeng, Xi Chen, Yuwen Pu*, Xuhong Zhang, Tianyu Du, and Shouling Ji, CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models, NDSS 2025. (CCF A)

[22] Xing He, Jiahao Chen, Yuwen Pu, Qingming Li*, Chunyi Zhou, Yingcai Wu, Jinbao Li, and Shouling Ji, CAMH: Advancing Model Hijacking Attack in Machine Learning, AAAI 2025. (CCF A)

[21] Jiahao Chen, Zhou Feng, Rui Zeng, Yuwen Pu, Chunyi Zhou*, Yi Jiang, Yuyou Gan, Jinbao Li, and Shouling Ji, Enhancing Adversarial Transferability with Adversarial Weight Tuning, AAAI 2025.CCF A)

[20] Lujia Shen, Yuwen Pu*, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, and Ting Wang, Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention, NDSS 2024. (CCF A)

[19] Oubo Ma, Yuwen Pu*, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, and Shouling Ji*, SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems, ACM CCS 2024, pp.645-659. (CCF A)

[18] Zeyu Li, Yuwen Pu*, Xuhong Zhang, Yu Li, Jinbao Li, and Shouling Ji, Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage, IJCAI 2024, pp.431-439. (CCF A)

[17] Pengyu Qiu, Xuhong Zhang*, Shouling Ji, Changjiang Li, Yuwen Pu*, Xing Yang, and Ting Wang, Hijack Vertical Federated Learning Models As One Party, IEEE Transactions on Dependable and Secure Computing (TDSC) 2024. (CCF A)

[16] Pengyu Qiu, Yuwen Pu, Yongchao Liu, Wenyan Liu, Yun Yue, Xiaowei Zhu, Lichun Li, Jinbao Li, and Shouling Ji, Integer is Enough: When Vertical Federated Learning Meets Rounding, AAAI 2024, Vol.38, No.13, pp.14704-14712. (CCF A)

[15] Dazhen Deng, Chuhan Zhang, Huawei Zheng, Yuwen Pu, Shouling Ji, and Yingcai Wu, AdversaFlow: Visual Red Teaming for Large Language Models with Multi-Level Adversarial Flow, IEEE VIS 2024. (CCF AHonorable Mention Award)

[14] Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, and Raheem Beyah, UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware, USENIX Security 2023, Vol.5, pp.3421-3438. (CCF A)

[13] Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, and Ting Wang, ''Is your explanation stable?'': A Robustness Evaluation Framework for Feature Attribution, ACM CCS 2022, pp.1157-1171. (CCF A)

[12] Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, and Ting Wang, Your Labels Are Selling You Out: Relation Leaks in Vertical Federated Learning, IEEE Transactions on Dependable and Secure Computing (TDSC) 2022, Vol.20, No.5, pp.3653 - 3668. (CCF A)

[11] Yuwen Pu, Chunqiang Hu*, Shaojiang Deng, Arwa Alrawais, R^2PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme, IEEE Internet of Things Journal 2020, Vol.7, No.9, pp.8077 - 8089. (中科院1IF8.2)

[10] Chunqiang Hu*, Yuwen Pu, Feihong Yang, Ruifeng Zhao, Arwa Alrawai, Tao Xiang, Secure and Efficient Data Collection and Storage of IoT in Smart Ocean, IEEE Internet of Things Journal 2020, Vol.7, No.10, pp.9980 - 9994 (中科院1IF8.2)

[9] Yuwen Pu, Tao Xiang, Chunqiang Hu*, Arwa Alrawais, Hongyang Yan, An Efficient Blockchain-based Privacy Preserving Scheme for Vehicular Social Networks, Information Sciences 2020, Vol.540, No.2020, pp.308-324 (中科院1CCF B)

[8] Yuwen Pu, Jin Luo, Chunqiang Hu*, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang, Two Secure Privacy-Preserving Data Aggregation Schemes for IoT, Wireless Communications and Mobile Computing 2019, Vol.2019.

[7] Yuwen Pu, Ying Wang, Feihong Yang, Jin Luo, Chunqiang Hu*, Haibo Hu, An Efficient and Recoverable Data Sharing Mechanism for Edge Storage, WASA 2019, Vol.11604, pp.247-259.

[6] Feihong Yang, Yuwen Pu, Chunqiang Hu* and Yan Zhou, A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks, WASA 2020, Vol.12384, pp.627-639.

[5] Chunqiang Hu, Jin Luo, Yuwen Pu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang, An Efficient Privacy-Preserving Data Aggregation Scheme for IoT, WASA 2018, Vol.10874, pp.164-176. (Best Paper Award)

[4] 李泽宇,张旭鸿,蒲誉文,伍一鸣,纪守领*,多模态深度伪造及检测技术综述[J],计算机研究与发展,2023, 60(06)1396-1416.(中文期刊,CCF A

[3] 张旭鸿,梁红,夏亦凡,蒲誉文,纪守领*,并行化模糊测试研究综述,信息对抗技术[J]20221(01)24-42.

[2] 蒲誉文,胡海波*,何凌君,基于多用户垃圾短信数据的伪基站活动轨迹可视分析方法[J],计算机应用201838(04)1207-1212.

[1] 何凌君,胡海波*,蒲誉文,马奇,时变网络异常检测多视图协同可视分析[J],计算机工程与应用201854(21)71-79.


部分专利:

[21] 丁康一,刘小垒,纪守领,辛邦洲,蒲誉文,访问受限条件下的深度学习分类模型的知识产权验证方法,ZL202410149721.2,授权,2024.08

[20] 纪守领,丁卓远,周纯毅,李清明,蒲誉文,陈佳豪,一种面向分割学习的模型后门攻击脆弱性分析方法和系统,CN202410781553.9,申请,2024.06

[19] 刘小垒,纪守领,胥迤潇,丁康一,辛邦洲,蒲誉文,一种针对大语言模型的系统负载压力测试方法,ZL202410225058.X,授权,2024.06

[18] 胡春强,蒲誉文,胡海波,杨飞鸿,蔡斌,向涛,邓绍江,廖晓峰,基于区块链的电子医疗数据隐私保护与安全共享系统,ZL202011148017.3,授权,2024.03

[17] 纪守领,付冲,蒲誉文,潘家雨,伍一鸣,一种计算机视觉神经网络模型后门攻击清除方法和系统,CN202311543191.1,申请,2023.11

[16] 纪守领,麻瓯勃,张乔,张旭鸿,潘家雨,蒲誉文,沈剑,江莉,周颖杰,杨星,面向部分可观测多机器人竞争环境的对抗策略生成方法,申请,CN202311436314.12023.11

[15] 纪守领,杜扬恺,张旭鸿,蒲誉文,潘家雨,伍一鸣,一种零样本大模型生成代码检测方法和系统,CN202311418650.3,申请,2023.10

[14] 纪守领,杜扬恺,张旭鸿,蒲誉文,潘家雨,伍一鸣,一种面向代码相似性检测的跨编程语言迁移方法和系统,CN202311418645.2,申请,2023.10

[13] 纪守领,白熠阳,何平,张旭鸿,杜天宇,蒲誉文,一种音频数据反爬虫技术脆弱性分析方法及系统,ZL202210410624.5,授权,2023.10

[12] 纪守领,李泽宇,施程辉,张旭鸿,蒲誉文,沈剑,江莉,周颖杰,杨星,一种目标检测模型的窃取脆弱性分析方法和系统,CN202311374926.2,申请,2023.10

[11] 张旭鸿,付冲,纪守领,蒲誉文,刘沛宇,杨星,周颖杰,一种神经网络模型后门检测方法和系统, ZL202310644147.3,授权,2023.09

[10] 胡春强,刘泽伟,蒲誉文,熊庆宇,向涛,廖晓峰,安全可信执行环境下的基于区块链的外包计算系统及方法,ZL202110630295.0,授权,2023.08

[9] 纪守领,邱鹏宇,林瑞潇,张旭鸿,蒲誉文,一种基于深度哈希的纵向联邦学习隐私保护方法和系统,ZL202310210011.1,授权,2023.08

[8] 杨星,纪守领,吴志勇,张旭鸿,许颢砾,梁振宇,蒲誉文,沈传宝,马维士,刘加瑞,漏洞处理方法、装置、设备以及存储介质,ZL202310490884.2,授权,2023.08

[7] 杨星,沈传宝,纪守领,吴志勇,张旭鸿,许颢砾,蒲誉文,梁振宇,刘加瑞,马维士,APT软件家族识别方法、装置及电子设备,ZL202310384459.5,授权,2023.07

[6] 张旭鸿,叶童,纪守领,蒲誉文,刘沛宇,杨星,王文海,周颖杰,基于词级别检索的源代码注释自动化生成方法和系统,CN202310550101.5,申请,2023.05

[5] 纪守领,向意,张旭鸿,蒲誉文,王文海,杨星,王伟,吴志勇,刘沛宇,一种代码提交场景下的全局关联定向模糊测试方法和系统,CN202310312188.2,申请,2023.03

[4] 纪守领,马哲,董建锋,刘丰豪,张旭鸿,蒲誉文,陈建海,杨星,一种基于多视觉专家知识蒸馏的侵权视频检索方法及系统,CN202210529260.2,授权,2022.08

[3] 纪守领,何平,白熠阳,张旭鸿,杜天宇,蒲誉文,一种面向跨模态检索的数据采集处理方法和系统,CN202210260897.6,申请,2022.03

[2] 纪守领,王鹏程,陈晋音,伍一鸣,蒲誉文,张旭鸿,一种基于生成对抗网络的抵御网络流量侦察方法、系统、终端和存储介质,CN202210254356.2,申请,2022.03

[1] 纪守领,熊海洋,陈晋音,伍一鸣,蒲誉文,张旭鸿,基于模体的图网络的后门攻击防御方法、系统、终端和存储介质,CN202210253252.X,申请,2022.03




上一条:无

下一条: 钟刊