
臧天宁
中国科学院信息工程研究所 正高级工程师 博士生导师
中国科学院大学 岗位教授
电子邮件: zangtianning@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100084
研究领域
网络空间安全
招生信息
招生专业
083900-网络空间安全
招生方向
网络安全与人工智能技术、网络安全与大数据分析
威胁检测与信息对抗、安全态势感知技术
威胁检测与信息对抗、安全态势感知技术
教育背景
2006-09--2011-10 中国科学院计算技术研究所/哈尔滨工程大学 硕博连读/工学博士
学历
研究生
学位
工学博士
工作经历
工作简历
2019-10~现在, 中国科学院信息工程研究所, 正高级工程师(正研级)
2013-10~2019-09,中国科学院信息工程研究所, 高级工程师(副研级)
2012-04~2013-09,中国科学院信息工程研究所, 助理研究员
2013-10~2019-09,中国科学院信息工程研究所, 高级工程师(副研级)
2012-04~2013-09,中国科学院信息工程研究所, 助理研究员
教授课程
域名系统安全
计算机网络安全技术
计算机网络安全技术
专利与奖励
专利成果
[1] 云晓春, 张永铮, 王曦, 常鹏, 王勇, 臧天宁, 李高超, 薛晨, 吴震. 网络设备监控方法及系统. CN: CN103516555A, 2014-01-15.
[2] 云晓春, 陈训逊, 王东安, 张晓明, 张永铮, 王曦, 杜飞, 王勇, 臧天宁. 一种面向大规模包分类规则集的规则冲突检测方法及系统. CN: CN103516550A, 2014-01-15.
[3] 云晓春, 李书豪, 张永铮, 臧天宁, 王一鹏. 一种恶意代码捕获方法及系统. CN: CN102833240A, 2012-12-19.
[2] 云晓春, 陈训逊, 王东安, 张晓明, 张永铮, 王曦, 杜飞, 王勇, 臧天宁. 一种面向大规模包分类规则集的规则冲突检测方法及系统. CN: CN103516550A, 2014-01-15.
[3] 云晓春, 李书豪, 张永铮, 臧天宁, 王一鹏. 一种恶意代码捕获方法及系统. CN: CN102833240A, 2012-12-19.
出版信息
部分发表论文
[1] Weiguang Wang, Qi Wang, 臧天宁, 张晓宇, Lu Liu, Taorui Yang, Yijing Wang. BotRGA: Neighborhood-aware twitter bot detection with relational graph aggregation. International Conference on Computational Science (ICCS). 2024, 第 3 作者 通讯作者 null(null):
[2] 陆文煊, 臧天宁. Hit the Nail on the Head: Parameter-Efficient Multi-task Tuning via Human Language Intervention. The 2024 Conference on Empirical Methods in Natural Language Processing[J]. 2024, 第 2 作者 通讯作者 null(null):
[3] 李想, 臧天宁. Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. 2023 IEEE Symposium on Computers and Communications (ISCC)[J]. 2023, 第 2 作者 通讯作者 null(null):
[4] 臧天宁, 李盛葆. FusionTC: Encrypted App Traffic Classification Using Decision- Level Multimodal Fusion Learning of Flow Sequence. Wireless Communications and Mobile Computing[J]. 2023, 第 1 作者
[5] 蒋松浩, 臧天宁. Explainable Text Classification via Attentiveand Targeted Mixing Data Augmentation. the 32nd International Joint Conferenceon Artificial Intelligence[J]. 2023, 第 2 作者 通讯作者
[6] 王海平, 李斌斌, 臧天宁, 杨奕飞, 亓子森, 贾思宇, 丁煜. Real-time Aggregation for Massive Alerts based on Dynamic Attack Granularity Graph. SCISEC2023. 2023, 第 3 作者http://10.28.8.10/handle/2XRVQ92A/9951.
[7] 王中华, 徐杰, 韩健, 臧天宁. 基于卷积神经网络的恶意区块链域名检测方法. 信息安全研究[J]. 2022, 第 4 作者8(8): 760-767, http://lib.cqvip.com/Qikan/Article/Detail?id=7107698812.
[8] zeng yuwei, Zang, Tianning. Hidden Path: Understanding the Intermediary in Malicious Redirections. IEEE Transactions on Information Forensics and Security[J]. 2022, 第 2 作者 通讯作者
[9] Zang Tianning. Winding Path:Characterizing the Malicious Redirection in Squatting Domain Names. Passive and Active Measurement Conference 2021. 2021, 第 1 作者 通讯作者
[10] Chen, Yige, Zang, Tianning. Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering. 17th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing[J]. 2021, 第 2 作者 通讯作者
[11] Zang Tianning. Mobile Encrypted Traffic Classification Based on Message Type Inference. 17th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing. 2021, 第 1 作者 通讯作者
[12] Chen, Yige, Zang, Tianning. Incremental Learning for Mobile Encrypted Traffic Classification. IEEE International Conference on Communications/2021. 2021, 第 2 作者 通讯作者
[13] Zeng, Yuwei, Yun, Xiaochun, Chen, Xunxun, Li, Boquan, Tsang, Haiwei, Wang, Yipeng, Zang, Tianning, Zhang, Yongzheng. Finding disposable domain names: A linguistics-based stacking approach?. COMPUTER NETWORKS[J]. 2021, 第 7 作者 通讯作者 184: http://dx.doi.org/10.1016/j.comnet.2020.107642.
[14] Yun, Xiaochun, Huang, Ji, Wang, Yipeng, Zang, Tianning, Zhou, Yuan, Zhang, Yongzheng. Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 第 4 作者15: 2225-2240, http://dx.doi.org/10.1109/TIFS.2019.2960647.
[15] Zhao, Chen, zhang yongzheng, Zang Tianning. A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic. 27th International Conference on Telecommunications (ICT). 2020, 第 3 作者
[16] Liang, Zhizhou, Zang, Tianning, Zeng, Yuwei, IEEE. MalPortrait: Sketch Malicious Domain Portraits Based on Passive DNS Data. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)[J]. 2020, 第 2 作者 通讯作者
[17] Zang Tianning. Leopard: Understanding the Threat of Blockchain Domain Name Based Malware. Passive and Active Measurement Conference 2020. 2020, 第 1 作者 通讯作者
[18] Zang Tianning. Nemesis: Detecting Algorithmically Generated Domains with An LSTM Language Model. CollaborateCom 2019. 2019, 第 1 作者 通讯作者
[19] Zeng, Yuwei, Zang, Tianning, Zhang, Yongzheng, Chen, Xunxun, Wang, YiPeng, IEEE. A Comprehensive Measurement Study of Domain-squatting Abuse. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)[J]. 2019, 第 2 作者 通讯作者
[20] Zeng, Yuwei, Zhang, Yongzheng, Zang, Tianning, Chen, Xunxun, Wang, Yipeng, IEEE Comp Soc. A Linguistics-based Stacking Approach to Disposable Domains Detection. 2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP). 2019, 第 3 作者 通讯作者
[21] Zang Tianning. Pontus: A Linguistics-based DGA Detection System. IEEE GLOBECOM 2019. 2019, 第 1 作者 通讯作者
[22] Zheng, Chaoyi, Qiang, Qian, Zang, Tianning, Chao, Wenhan, Zhou, Yuan, IEEE. Themis: A Novel Detection approach for detecting mixed Algorithmically Generated Domains. 2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019). 2019, 第 3 作者 通讯作者 259-264, http://dx.doi.org/10.1109/MSN48538.2019.00057.
[23] Chen, Yige, Zang, Tianning, Zhang, Yongzheng, Zhou, Yuan, Wang, Yipeng, IEEE Comp Soc. Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. 2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP)[J]. 2019, 第 2 作者 通讯作者
[24] Zhao, Chen, zhang yongzheng, Zang Tianning. A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic . CollaborateCom 2018[J]. 2018, 第 3 作者
[25] Yu, Miao, Zhang, Yongzheng, Zang, Tianning, Wang, Yipeng, Wang, Yijing. Information Propagation Prediction Based on Key Users Authentication in Microblogging. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, 第 3 作者https://doaj.org/article/952e73fb210941989512383baa106929.
[26] Huang Ji, Wang Pei, Zang Tianning, Qiang Qian, Wang Yipeng, Yu Miao, IEEE. Detecting Domain Generation Algorithms With Convolutional Neural Language Models. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)[J]. 2018, 第 3 作者 通讯作者 1360-1367,
[27] Wang, YiPeng, Yun, Xiaochun, Zhang, Yongzheng, Chen, Liwei, Zang, Tianning. Rethinking robust and accurate application protocol identification. COMPUTER NETWORKS[J]. 2017, 第 5 作者 通讯作者 129: 64-78, http://dx.doi.org/10.1016/j.comnet.2017.09.006.
[28] Wang Jinxia, Xu Xiaoyan, Yang Min, Zang Tianning, IEEE. IP Geolocation Technology Research Based on Network Measurement. PROCEEDINGSOF2016SIXTHINTERNATIONALCONFERENCEONINSTRUMENTATIONMEASUREMENTCOMPUTERCOMMUNICATIONANDCONTROLIMCCC2016. 2016, 第 4 作者892-897,
[29] Zhang Lulu, Zhang Yongzheng, Zang Tianning, Tian J, Jing J, Srivatsa M. Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I. 2015, 第 3 作者152: 454-462,
[30] 臧天宁, 云晓春, 张永铮, 门朝光. 僵尸网络关系云模型分析算法. 武汉大学学报:信息科学版[J]. 2012, 第 1 作者37(2): 247-251, http://lib.cqvip.com/Qikan/Article/Detail?id=40817070.
[31] Wang, Yongjian, Xu, Junfeng, Li, D, Yang, F, Ren, F, Wang, W. COOPERATIVE WORK SYSTEMS FOR THE SECURITY OF DIGITAL COMPUTING INFRASTRUCTURE COOPERATIVE DETECTION SYSTEMS FOR BOTNET DETECTION. 2012IEEE2NDINTERNATIONALCONFERENCEONCLOUDCOMPUTINGANDINTELLIGENTSYSTEMSCCISVOLS13. 2012, 674-680,
[32] 臧天宁, 云晓春, 张永铮, 门朝光, 孙建亮. 网络设备协同联动模型. 计算机学报[J]. 2011, 第 1 作者34(2): 216-228, http://lib.cqvip.com/Qikan/Article/Detail?id=36835621.
[33] Yin Lihua. Andbot: Towards Advanced Mobile Botnets. Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats. 2011,
[34] 臧天宁, 云晓春, 张永铮, 门朝光, 崔翔. 基于通信特征和D-S证据理论分析僵尸网络相似度. 通信学报[J]. 2011, 第 1 作者32(4): 66-76, http://lib.cqvip.com/Qikan/Article/Detail?id=37426756.
[35] Zang Tianning. A Survey of Alert Fusion Techniques for Security Incident. 2008, 第 1 作者
[2] 陆文煊, 臧天宁. Hit the Nail on the Head: Parameter-Efficient Multi-task Tuning via Human Language Intervention. The 2024 Conference on Empirical Methods in Natural Language Processing[J]. 2024, 第 2 作者 通讯作者 null(null):
[3] 李想, 臧天宁. Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. 2023 IEEE Symposium on Computers and Communications (ISCC)[J]. 2023, 第 2 作者 通讯作者 null(null):
[4] 臧天宁, 李盛葆. FusionTC: Encrypted App Traffic Classification Using Decision- Level Multimodal Fusion Learning of Flow Sequence. Wireless Communications and Mobile Computing[J]. 2023, 第 1 作者
[5] 蒋松浩, 臧天宁. Explainable Text Classification via Attentiveand Targeted Mixing Data Augmentation. the 32nd International Joint Conferenceon Artificial Intelligence[J]. 2023, 第 2 作者 通讯作者
[6] 王海平, 李斌斌, 臧天宁, 杨奕飞, 亓子森, 贾思宇, 丁煜. Real-time Aggregation for Massive Alerts based on Dynamic Attack Granularity Graph. SCISEC2023. 2023, 第 3 作者http://10.28.8.10/handle/2XRVQ92A/9951.
[7] 王中华, 徐杰, 韩健, 臧天宁. 基于卷积神经网络的恶意区块链域名检测方法. 信息安全研究[J]. 2022, 第 4 作者8(8): 760-767, http://lib.cqvip.com/Qikan/Article/Detail?id=7107698812.
[8] zeng yuwei, Zang, Tianning. Hidden Path: Understanding the Intermediary in Malicious Redirections. IEEE Transactions on Information Forensics and Security[J]. 2022, 第 2 作者 通讯作者
[9] Zang Tianning. Winding Path:Characterizing the Malicious Redirection in Squatting Domain Names. Passive and Active Measurement Conference 2021. 2021, 第 1 作者 通讯作者
[10] Chen, Yige, Zang, Tianning. Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering. 17th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing[J]. 2021, 第 2 作者 通讯作者
[11] Zang Tianning. Mobile Encrypted Traffic Classification Based on Message Type Inference. 17th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing. 2021, 第 1 作者 通讯作者
[12] Chen, Yige, Zang, Tianning. Incremental Learning for Mobile Encrypted Traffic Classification. IEEE International Conference on Communications/2021. 2021, 第 2 作者 通讯作者
[13] Zeng, Yuwei, Yun, Xiaochun, Chen, Xunxun, Li, Boquan, Tsang, Haiwei, Wang, Yipeng, Zang, Tianning, Zhang, Yongzheng. Finding disposable domain names: A linguistics-based stacking approach?. COMPUTER NETWORKS[J]. 2021, 第 7 作者 通讯作者 184: http://dx.doi.org/10.1016/j.comnet.2020.107642.
[14] Yun, Xiaochun, Huang, Ji, Wang, Yipeng, Zang, Tianning, Zhou, Yuan, Zhang, Yongzheng. Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 第 4 作者15: 2225-2240, http://dx.doi.org/10.1109/TIFS.2019.2960647.
[15] Zhao, Chen, zhang yongzheng, Zang Tianning. A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic. 27th International Conference on Telecommunications (ICT). 2020, 第 3 作者
[16] Liang, Zhizhou, Zang, Tianning, Zeng, Yuwei, IEEE. MalPortrait: Sketch Malicious Domain Portraits Based on Passive DNS Data. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)[J]. 2020, 第 2 作者 通讯作者
[17] Zang Tianning. Leopard: Understanding the Threat of Blockchain Domain Name Based Malware. Passive and Active Measurement Conference 2020. 2020, 第 1 作者 通讯作者
[18] Zang Tianning. Nemesis: Detecting Algorithmically Generated Domains with An LSTM Language Model. CollaborateCom 2019. 2019, 第 1 作者 通讯作者
[19] Zeng, Yuwei, Zang, Tianning, Zhang, Yongzheng, Chen, Xunxun, Wang, YiPeng, IEEE. A Comprehensive Measurement Study of Domain-squatting Abuse. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)[J]. 2019, 第 2 作者 通讯作者
[20] Zeng, Yuwei, Zhang, Yongzheng, Zang, Tianning, Chen, Xunxun, Wang, Yipeng, IEEE Comp Soc. A Linguistics-based Stacking Approach to Disposable Domains Detection. 2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP). 2019, 第 3 作者 通讯作者
[21] Zang Tianning. Pontus: A Linguistics-based DGA Detection System. IEEE GLOBECOM 2019. 2019, 第 1 作者 通讯作者
[22] Zheng, Chaoyi, Qiang, Qian, Zang, Tianning, Chao, Wenhan, Zhou, Yuan, IEEE. Themis: A Novel Detection approach for detecting mixed Algorithmically Generated Domains. 2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019). 2019, 第 3 作者 通讯作者 259-264, http://dx.doi.org/10.1109/MSN48538.2019.00057.
[23] Chen, Yige, Zang, Tianning, Zhang, Yongzheng, Zhou, Yuan, Wang, Yipeng, IEEE Comp Soc. Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. 2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP)[J]. 2019, 第 2 作者 通讯作者
[24] Zhao, Chen, zhang yongzheng, Zang Tianning. A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic . CollaborateCom 2018[J]. 2018, 第 3 作者
[25] Yu, Miao, Zhang, Yongzheng, Zang, Tianning, Wang, Yipeng, Wang, Yijing. Information Propagation Prediction Based on Key Users Authentication in Microblogging. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, 第 3 作者https://doaj.org/article/952e73fb210941989512383baa106929.
[26] Huang Ji, Wang Pei, Zang Tianning, Qiang Qian, Wang Yipeng, Yu Miao, IEEE. Detecting Domain Generation Algorithms With Convolutional Neural Language Models. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)[J]. 2018, 第 3 作者 通讯作者 1360-1367,
[27] Wang, YiPeng, Yun, Xiaochun, Zhang, Yongzheng, Chen, Liwei, Zang, Tianning. Rethinking robust and accurate application protocol identification. COMPUTER NETWORKS[J]. 2017, 第 5 作者 通讯作者 129: 64-78, http://dx.doi.org/10.1016/j.comnet.2017.09.006.
[28] Wang Jinxia, Xu Xiaoyan, Yang Min, Zang Tianning, IEEE. IP Geolocation Technology Research Based on Network Measurement. PROCEEDINGSOF2016SIXTHINTERNATIONALCONFERENCEONINSTRUMENTATIONMEASUREMENTCOMPUTERCOMMUNICATIONANDCONTROLIMCCC2016. 2016, 第 4 作者892-897,
[29] Zhang Lulu, Zhang Yongzheng, Zang Tianning, Tian J, Jing J, Srivatsa M. Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I. 2015, 第 3 作者152: 454-462,
[30] 臧天宁, 云晓春, 张永铮, 门朝光. 僵尸网络关系云模型分析算法. 武汉大学学报:信息科学版[J]. 2012, 第 1 作者37(2): 247-251, http://lib.cqvip.com/Qikan/Article/Detail?id=40817070.
[31] Wang, Yongjian, Xu, Junfeng, Li, D, Yang, F, Ren, F, Wang, W. COOPERATIVE WORK SYSTEMS FOR THE SECURITY OF DIGITAL COMPUTING INFRASTRUCTURE COOPERATIVE DETECTION SYSTEMS FOR BOTNET DETECTION. 2012IEEE2NDINTERNATIONALCONFERENCEONCLOUDCOMPUTINGANDINTELLIGENTSYSTEMSCCISVOLS13. 2012, 674-680,
[32] 臧天宁, 云晓春, 张永铮, 门朝光, 孙建亮. 网络设备协同联动模型. 计算机学报[J]. 2011, 第 1 作者34(2): 216-228, http://lib.cqvip.com/Qikan/Article/Detail?id=36835621.
[33] Yin Lihua. Andbot: Towards Advanced Mobile Botnets. Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats. 2011,
[34] 臧天宁, 云晓春, 张永铮, 门朝光, 崔翔. 基于通信特征和D-S证据理论分析僵尸网络相似度. 通信学报[J]. 2011, 第 1 作者32(4): 66-76, http://lib.cqvip.com/Qikan/Article/Detail?id=37426756.
[35] Zang Tianning. A Survey of Alert Fusion Techniques for Security Incident. 2008, 第 1 作者