基本信息

姜波 副研究员/硕士生导师

中国科学院信息工程研究所

电子邮件:jiangbo@iie.ac.cn

通信地址:北京市海淀区树村路19号

邮政编码:100084

研究领域

网络与信息安全、数据科学与计算

招生信息

招生专业:083900-网络空间安全

招生方向:网络行为分析、大数据智能处理、人工智能

招生类型:硕士研究生

工作经历

2019.10 - 现在, 中国科学院信息工程研究所, 副研究员
2016.09 - 2019.10, 中国科学院信息工程研究所, 助理研究员

教授课程

操作系统(研讨课)
网络安全数据分析基础

专利与奖励

一、专利

[1] 刘俊荣, 潘海琪, 卢志刚, 崔泽林, 崔苏苏, 姜波. 一种基于基线行为刻画的通联异常发现方法及装置. (ZL202110750021.5)

[2] 韩瑶鹏, 姜波, 卢志刚, 刘玉岭, 刘俊荣. 一种基于BERT的网络空间安全领域命名实体识别方法和装置. (ZL202010151014.9)

[3] 蹇诗婕, 姜波, 卢志刚, 刘玉岭, 杜丹, 刘宝旭. 一种基于自动编码器的网络流量异常行为识别方法. (ZL202010217930.8)

[4] 凌玥, 刘玉岭, 卢志刚, 李宁, 姜波, 朱燕, 刘俊荣. 基于双层异质集成学习器的入侵检测方法. (ZL201910671353.7)

[5] 崔苏苏, 卢志刚, 姜波, 徐健锋, 刘松, 崔泽林. 一种加密流量的服务与应用分类方法. (ZL201910504060.X)

[6] 董聪, 姜波, 刘俊荣, 蔡真真, 刘宝旭, 卢志刚. 一种加密流量类别检测方法及系统. (ZL201910073768.4)

[7] 蔡真真, 姜波, 凌玥, 卢志刚, 刘俊荣, 董聪. 一种加密匿名网络流量识别方法. (ZL201910086039.2)

[8] 王天, 姜波, 江钧, 卢志刚,姜政伟. 面向威胁情报的安全知识图谱构建方法及系统. (ZL201811569400.9) 

[9] 卢志刚, 李宁, 杨波, 姜波. 基于事件识别的搜索电子邮件内容的方法及系统. (ZL201810980147.X)

[10] 姜波, 卢志刚, 李宁, 姜政伟. 基于上下文感知张量分解的社交网络用户行为预测方法. (ZL201810332563.9)

[11] 姜波, 李宁, 卢志刚, 姜政伟. 基于自扩充表示和相似双向约束的短文本主题发现方法及系统. (ZL201810306013.X)

[12] 凌玥, 卢志刚, 姜波, 张尧, 王思培. 一种对抗性竞赛中的精彩时刻识别方法. (ZL201810934862.X)


二、奖励

[1] 网络威胁情报关键技术及应用奖

[2] 面向关键信息基础设施的网络安全态势感知技术及应用奖

出版信息

一、书籍

[1] 毋建军, 姜波, 郭舒 编著. 机器学习原理及应用. 机械工业出版社. 2025.1.

[2] 毋建军, 姜波 编著. 计算机视觉应用开发. 北京邮电大学出版社. 2022.6.

[3] 毋建军, 姜波 编著. Python数据分析、挖掘与可视化. 机械工业出版社. 2021.9.


二、代表性论文

[1] Yiru Gong, Song Liu, Changzhi Zhao, Junrong Liu, Tian Tian, Xiaobo Yang, Bo Jiang, Zhigang Lu. GARNET: GoT-Based Alert Reduction and Narrative Event Tracing. The 40th Annual AAAI Conference on Artificial Intelligence (AAAI 2026). January 22 – 25, 2026, Singapore. (CCF A)

[2] Wenhao Yan, Ning An, Wei Qiao, Weiheng Wu, Zhigang Lu, Bo Jiang, Baoxu Liu, Junrong Liu. Sentient: Detecting APTs via Capturing Indirect Dependencies and Behavioral Logic. The 40th Annual AAAI Conference on Artificial Intelligence (AAAI 2026). January 22 – 25, 2026, Singapore. (CCF A)

[3] Yiren Chen, Xiaobo Yang, Fangming Dong, Bo Jiang, Zhigang Lu, Baoxu Liu. MoPHoney: An adaptive honeyword generation system based on Mixture-of-prompts. Journal of Systems Architecture, 2026(170):103617. (CCF B)

[4] Wei Qiao, Weiheng Wu, Song Liu, Teng Li, Yebo Feng, Zehui Wang, Junrong Liu, Bo Jiang, Zhigang Lu, Baoxu Liu. SAURONEYES: Disentangling Voluminous Logs to Unveil Camouflaged Attack Intentions. IEEE Transactions on Information Forensics and Security (TIFS), 2025. (CCF A)

[5] Linghao Li, Yan Zhu, Yun Li, Wei Qiao, Zelin Cui, Susu Cui, Bo Jiang, Zhigang Lu. Towards effective black-box attacks on DoH tunnel detection systems. Computers & Security, 2025(138):111524. (CCF B)

[6] Yinhao Qi, Chuyi Yan, Zehui Wang, Chen Zhang, Song Liu, Zhigang Lu, Bo Jiang. ATHITD: Attention-based Temporal Heterogeneous Graph Neural Network for Insider Threat Detection. Computers & Security, 2025(157):104587. (CCF B)

[7] Zehui Wang, Hao Li, Yinhao Qi, Wei Qiao, Song Liu, Chen Zhang, Bo Jiang, Zhigang Lu. PathWatcher: A path-based behavior detection method for attack detection and investigation. Computers & Security, 2025(157):104563. (CCF B)

[8] Susu Cui, Xueying Han, Dongqi Han, Zhiliang Wang, Weihang Wang, Bo Jiang, Baoxu Liu, Zhigang Lu. FG-SAT: Efficient Flow Graph for Encrypted Traffic Classification under Environment Shifts. IEEE Transactions on Information Forensics and Security (TIFS), 2025. (CCF A)

[9] Weiheng Wu, Wei Qiao, Wenhao Yan, Bo Jiang, Yuling Liu, Baoxu Liu, Zhigang Lu, JunRong Liu. Brewing Vodka: Distilling Pure Knowledge for Lightweight Threat Detection in Audit Logs. Proceedings of the ACM on Web Conference (WWW 2025), Australia, 28 April - 2 May 2025, pp. 2172 - 2182. (CCF-A)

[10] Yun Li, Wei Qiao, Yan Zhu, Yunxiang Wang, Bo Jiang, Zhigang Lu. DCASI: A Sequence-based Attack Investigation Method Using DTW Contrastive Learning. Proceedings of International Conference on Acoustics, Speech and Signal Processing (ICASSP 2025), pp. 1-5. IEEE, 2025. (CCF B)

[11] Yiru Gong, Susu Cui, Song Liu, Bo Jiang(B), Cong Dong, Zhigang Lu. Graph-based insider threat detection: A survey. Computer Networks, 2024(254): 110757. (CCF B)

[12] Yiren Chen, Mengjiao Cui, Ding Wang, Yiyang Cao, Peian Yang, Bo Jiang, Zhigang Lu, Baoxu Liu. A Survey of Large Language Models for Cyber Threat Detection. Computers & Security, 2024(145):104016. (CCF B)

[13] Xueying Han, Song Liu, Junrong Liu, Bo Jiang, Zhigang Lu, Baoxu Liu. ECNet: Robust Malicious Network Traffic Detection with Multi-view Feature and Confidence Mechanism. IEEE Transactions on Information Forensics and Security (TIFS), vol. 19, pp. 6871-6885, 2024. (CCF A)

[14] Xueying Han, Susu Cui, Jian Qin, Song Liu, Bo Jiang, Cong Dong, Zhigang Lu, Baoxu Liu. ContraMTD: An Unsupervised Malicious Network Traffic Detection Method based on Contrastive Learning. Proceedings of the ACM on Web Conference (WWW 2024), Singapore, May 13 - 17, 2024. (CCF A)

[15] Yufan Chen, Jiahai Yang, Susu Cui, Cong Dong, Bo Jiang, Yuling Liu, Zhigang Lu. Unveiling Encrypted Traffic Types Through Hierarchical Network Characteristics. Computers & Security, 2024(138):103645. (CCF B)

[16] Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu. CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection. IEEE Transactions on Information Forensics and Security (TIFS), Volume 18, January 2023. pp 5011–5025. (CCF A)

[17] Xueying Han, Susu Cui, Song Liu, Chen Zhang, Bo Jiang, Zhigang Lu. Network Intrusion Detection Based on n-gram Frequency and Time-aware Transformer. Computers & Security, volume 128, May 2023, 103171. (CCF B)

[18] Chonghua Wang, Hao Zhou, Zhiqiang Hao, Shu Hu, Jun Li, Xueying Zhang, Bo Jiang, Xuehong Chen. Network Traffic Analysis Over Clustering-based Collective Anomaly Detection. Computer Networks, 2022:108760. (CCF B)

[19] Cong Dong, Chen Zhang, Zhigang Lu, Baoxu Liu, Bo Jiang. CETAnalytics: Comprehensive Effective Traffic Information Analytics for Encrypted Traffic Classification. Computer Networks, 2020,176:107258. (CCF B)

指导学生

已指导学生

张绩成  硕士研究生  085412-网络与信息安全  

许思民  硕士研究生  083900-网络空间安全  

尚梦川  硕士研究生  083900-网络空间安全  

现指导学生

乔伟  硕士研究生  083900-网络空间安全  

董天琦  硕士研究生  083900-网络空间安全  

杨嫣然  硕士研究生  085412-网络与信息安全  

杨光  硕士研究生  085412-网络与信息安全  

刘秉鑫  硕士研究生  085412-网络与信息安全