姜波 副研究员/硕士生导师
中国科学院信息工程研究所
电子邮件:jiangbo@iie.ac.cn
通信地址:北京市海淀区树村路19号
邮政编码:100084
研究领域
网络与信息安全、数据科学与计算
招生信息
招生专业:083900-网络空间安全
招生方向:网络行为分析、大数据智能处理、人工智能
招生类型:硕士研究生
工作经历
2019.10 - 现在, 中国科学院信息工程研究所, 副研究员
2016.09 - 2019.10, 中国科学院信息工程研究所, 助理研究员
教授课程
专利与奖励
一、专利
[1] 刘俊荣, 潘海琪, 卢志刚, 崔泽林, 崔苏苏, 姜波. 一种基于基线行为刻画的通联异常发现方法及装置. (ZL202110750021.5)
[2] 韩瑶鹏, 姜波, 卢志刚, 刘玉岭, 刘俊荣. 一种基于BERT的网络空间安全领域命名实体识别方法和装置. (ZL202010151014.9)
[3] 蹇诗婕, 姜波, 卢志刚, 刘玉岭, 杜丹, 刘宝旭. 一种基于自动编码器的网络流量异常行为识别方法. (ZL202010217930.8)
[4] 凌玥, 刘玉岭, 卢志刚, 李宁, 姜波, 朱燕, 刘俊荣. 基于双层异质集成学习器的入侵检测方法. (ZL201910671353.7)
[5] 崔苏苏, 卢志刚, 姜波, 徐健锋, 刘松, 崔泽林. 一种加密流量的服务与应用分类方法. (ZL201910504060.X)
[6] 董聪, 姜波, 刘俊荣, 蔡真真, 刘宝旭, 卢志刚. 一种加密流量类别检测方法及系统. (ZL201910073768.4)
[7] 蔡真真, 姜波, 凌玥, 卢志刚, 刘俊荣, 董聪. 一种加密匿名网络流量识别方法. (ZL201910086039.2)
[8] 王天, 姜波, 江钧, 卢志刚,姜政伟. 面向威胁情报的安全知识图谱构建方法及系统. (ZL201811569400.9)
[9] 卢志刚, 李宁, 杨波, 姜波. 基于事件识别的搜索电子邮件内容的方法及系统. (ZL201810980147.X)
[10] 姜波, 卢志刚, 李宁, 姜政伟. 基于上下文感知张量分解的社交网络用户行为预测方法. (ZL201810332563.9)
[11] 姜波, 李宁, 卢志刚, 姜政伟. 基于自扩充表示和相似双向约束的短文本主题发现方法及系统. (ZL201810306013.X)
[12] 凌玥, 卢志刚, 姜波, 张尧, 王思培. 一种对抗性竞赛中的精彩时刻识别方法. (ZL201810934862.X)
二、奖励
[1] 网络威胁情报关键技术及应用奖
[2] 面向关键信息基础设施的网络安全态势感知技术及应用奖
出版信息
一、书籍
[1] 毋建军, 姜波, 郭舒 编著. 机器学习原理及应用. 机械工业出版社. 2025.1.
[2] 毋建军, 姜波 编著. 计算机视觉应用开发. 北京邮电大学出版社. 2022.6.
[3] 毋建军, 姜波 编著. Python数据分析、挖掘与可视化. 机械工业出版社. 2021.9.
二、代表性论文
[1] Yiru Gong, Song Liu, Changzhi Zhao, Junrong Liu, Tian Tian, Xiaobo Yang, Bo Jiang, Zhigang Lu. GARNET: GoT-Based Alert Reduction and Narrative Event Tracing. The 40th Annual AAAI Conference on Artificial Intelligence (AAAI 2026). January 22 – 25, 2026, Singapore. (CCF A)
[2] Wenhao Yan, Ning An, Wei Qiao, Weiheng Wu, Zhigang Lu, Bo Jiang, Baoxu Liu, Junrong Liu. Sentient: Detecting APTs via Capturing Indirect Dependencies and Behavioral Logic. The 40th Annual AAAI Conference on Artificial Intelligence (AAAI 2026). January 22 – 25, 2026, Singapore. (CCF A)
[3] Yiren Chen, Xiaobo Yang, Fangming Dong, Bo Jiang, Zhigang Lu, Baoxu Liu. MoPHoney: An adaptive honeyword generation system based on Mixture-of-prompts. Journal of Systems Architecture, 2026(170):103617. (CCF B)
[4] Wei Qiao, Weiheng Wu, Song Liu, Teng Li, Yebo Feng, Zehui Wang, Junrong Liu, Bo Jiang, Zhigang Lu, Baoxu Liu. SAURONEYES: Disentangling Voluminous Logs to Unveil Camouflaged Attack Intentions. IEEE Transactions on Information Forensics and Security (TIFS), 2025. (CCF A)
[5] Linghao Li, Yan Zhu, Yun Li, Wei Qiao, Zelin Cui, Susu Cui, Bo Jiang, Zhigang Lu. Towards effective black-box attacks on DoH tunnel detection systems. Computers & Security, 2025(138):111524. (CCF B)
[6] Yinhao Qi, Chuyi Yan, Zehui Wang, Chen Zhang, Song Liu, Zhigang Lu, Bo Jiang. ATHITD: Attention-based Temporal Heterogeneous Graph Neural Network for Insider Threat Detection. Computers & Security, 2025(157):104587. (CCF B)
[7] Zehui Wang, Hao Li, Yinhao Qi, Wei Qiao, Song Liu, Chen Zhang, Bo Jiang, Zhigang Lu. PathWatcher: A path-based behavior detection method for attack detection and investigation. Computers & Security, 2025(157):104563. (CCF B)
[8] Susu Cui, Xueying Han, Dongqi Han, Zhiliang Wang, Weihang Wang, Bo Jiang, Baoxu Liu, Zhigang Lu. FG-SAT: Efficient Flow Graph for Encrypted Traffic Classification under Environment Shifts. IEEE Transactions on Information Forensics and Security (TIFS), 2025. (CCF A)
[9] Weiheng Wu, Wei Qiao, Wenhao Yan, Bo Jiang, Yuling Liu, Baoxu Liu, Zhigang Lu, JunRong Liu. Brewing Vodka: Distilling Pure Knowledge for Lightweight Threat Detection in Audit Logs. Proceedings of the ACM on Web Conference (WWW 2025), Australia, 28 April - 2 May 2025, pp. 2172 - 2182. (CCF-A)
[10] Yun Li, Wei Qiao, Yan Zhu, Yunxiang Wang, Bo Jiang, Zhigang Lu. DCASI: A Sequence-based Attack Investigation Method Using DTW Contrastive Learning. Proceedings of International Conference on Acoustics, Speech and Signal Processing (ICASSP 2025), pp. 1-5. IEEE, 2025. (CCF B)
[11] Yiru Gong, Susu Cui, Song Liu, Bo Jiang(B), Cong Dong, Zhigang Lu. Graph-based insider threat detection: A survey. Computer Networks, 2024(254): 110757. (CCF B)
[12] Yiren Chen, Mengjiao Cui, Ding Wang, Yiyang Cao, Peian Yang, Bo Jiang, Zhigang Lu, Baoxu Liu. A Survey of Large Language Models for Cyber Threat Detection. Computers & Security, 2024(145):104016. (CCF B)
[13] Xueying Han, Song Liu, Junrong Liu, Bo Jiang, Zhigang Lu, Baoxu Liu. ECNet: Robust Malicious Network Traffic Detection with Multi-view Feature and Confidence Mechanism. IEEE Transactions on Information Forensics and Security (TIFS), vol. 19, pp. 6871-6885, 2024. (CCF A)
[14] Xueying Han, Susu Cui, Jian Qin, Song Liu, Bo Jiang, Cong Dong, Zhigang Lu, Baoxu Liu. ContraMTD: An Unsupervised Malicious Network Traffic Detection Method based on Contrastive Learning. Proceedings of the ACM on Web Conference (WWW 2024), Singapore, May 13 - 17, 2024. (CCF A)
[15] Yufan Chen, Jiahai Yang, Susu Cui, Cong Dong, Bo Jiang, Yuling Liu, Zhigang Lu. Unveiling Encrypted Traffic Types Through Hierarchical Network Characteristics. Computers & Security, 2024(138):103645. (CCF B)
[16] Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu. CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection. IEEE Transactions on Information Forensics and Security (TIFS), Volume 18, January 2023. pp 5011–5025. (CCF A)
[17] Xueying Han, Susu Cui, Song Liu, Chen Zhang, Bo Jiang, Zhigang Lu. Network Intrusion Detection Based on n-gram Frequency and Time-aware Transformer. Computers & Security, volume 128, May 2023, 103171. (CCF B)
[18] Chonghua Wang, Hao Zhou, Zhiqiang Hao, Shu Hu, Jun Li, Xueying Zhang, Bo Jiang, Xuehong Chen. Network Traffic Analysis Over Clustering-based Collective Anomaly Detection. Computer Networks, 2022:108760. (CCF B)
[19] Cong Dong, Chen Zhang, Zhigang Lu, Baoxu Liu, Bo Jiang. CETAnalytics: Comprehensive Effective Traffic Information Analytics for Encrypted Traffic Classification. Computer Networks, 2020,176:107258. (CCF B)
指导学生
已指导学生
张绩成 硕士研究生 085412-网络与信息安全
许思民 硕士研究生 083900-网络空间安全
尚梦川 硕士研究生 083900-网络空间安全
现指导学生
乔伟 硕士研究生 083900-网络空间安全
董天琦 硕士研究生 083900-网络空间安全
杨嫣然 硕士研究生 085412-网络与信息安全
杨光 硕士研究生 085412-网络与信息安全
刘秉鑫 硕士研究生 085412-网络与信息安全