
葉傲霜,男,1992年1月生,講師,工學博士,碩士生導師。2022年12月畢業於武漢大學國家網絡安全學院,獲工學博士學位;2018年3月畢業於日本北陸先端科學技術大學院大學情報工學研究科,獲信息科學碩士學位;2015年6月畢業於江漢大學機械設計製造及其自動化專業,獲工學學士學位。
郵箱:asye@hzyuandun.com;yasfrost@whu.edu.cn
1. 主要研究方向
智能系統安全、軟件安全
2. 教學、科研項目
1) 湖北省自然科學基金青年項目,2025.03-2027.02,主持
2) 湖北省教育廳科學研究青年人才項目,2024.10-2025.12,主持
3) 先進密碼技術與系統安全四川省重點實驗室開放課題,2023.11-2025.12,主持
4) 武漢紡織大學校基金培育A類,2025.05-2027.05,主持
5) 武漢紡織大學博士科研啟動基金,2023.05-2026.05,主持
6) ********漏洞利用方法,2024.11-2025.11,參與(武漢大學主持)
7) 國家自然科學基金面上項目, 2025.01-2028.12, 參與
8) 科技部, 十三五國家重點研發計劃項目「網絡空間安全」重點專項, 2016.12-2020.12, 參與
3. 論文與專利
[1] Ye A, Zhang S, Yan R, Ke J, Zhu F, Tang B. CtrlFuzz: A controllable diffusion-based fuzz testing for deep neural networks via coverage-aware manifold guidance[J]. Information and Software Technology, 2025, 187: 107856.(CCF-B/中科院二區期刊)
[2] Ye A, Zhang S, Tang B, Ke J, Zhao Y, Peng T. DeFinder: Error-sensitive testing of deep neural networks via vulnerability interpretation[J]. Journal of Network and Computer Applications, 2025, 241: 104212.(CCF-C/中科院二區期刊)
[3] Tang B, Zhang S, Zhu F, Ye A*. CAPRA: Context-aware patch risk assessment for detecting immature vulnerability in open-source software[J]. Computers & Security, 2025, 157: 104540.(CCF-B/中科院二區期刊)
[4] Ye A, Wang L, Zhao L, Ke J. Ex^2: Monte Carlo Tree Search based test inputs prioritization for fuzzing deep neural networks[J]. International Journal of Intelligent Systems, 2022.(CCF-C/中科院二區期刊)
[5] Ye A, Wang L, Zhao L, Wang W, Ke J, Liu Q. RapidFuzz: Accelerating fuzzing via generative adversarial networks[J]. Neurocomputing, 2021, 460: 195-204.(CCF-C/中科院二區期刊)
[6] Ye A, Wang L, Zhao L, Ke J. DANCe: Dynamic adaptive neuron coverage for fuzzing deep neural networks[C]//International Joint Conference on Neural Networks, 2022.(CCF C類會議)
[7] Xiong S, Ye A*, Iida H. A game informatical analysis of dark chess by game refinement theory[C]//International Summit Smart City 360, 2019. (EI會議)
[8] Wang W, Wang R, Wang L, Wang Z, Ye A. Towards a robust deep neural network against adversarial texts: A survey[J]. IEEE Transactions on Knowledge and Data Engineering, 2023.(CCF A/中科院一區期刊)
[9] Wang W, Wang L, Wang R, Ye A, Ke J. Better constraints of imperceptibility, better adversarial examples in the text[J]. International Journal of Intelligent Systems, 2021.(CCF-C/中科院二區期刊)
[10] Wang L, Yang K, Wang W, Wang R, Ye A. MGAAttack: Toward more query-efficient black-box attack by microbial genetic algorithm[C]//ACM Multimedia, 2020: 2592-2600.(CCF A類會議)
[11] Wang W, Wang L, Yang K, Ye A, Wang R, Ke J. Omni-detection of adversarial examples with diverse magnitudes[J]. China Communications, 2021, 18(7): 103-118.(中科院三區期刊)
[12] Luo Z, Wang L, Wang W, Ye A. Annealing attention networks for user feature-based rumor early detection on Weibo[C]//International Joint Conference on Neural Networks, 2021.(CCF C類會議)
[13] Ke J, Wang L, Ye A, Fu J. Combating multi-level adversarial text with pruning based adversarial training[C]//International Joint Conference on Neural Networks, 2022.(CCF C類會議)
專利:
[1]基於可解釋性框架的脆弱性感知深度神經網絡測試方法和系統,202510110921.1 (實質審查)
[2]一種基於蒙特卡洛搜索樹種子調度的深度學習模糊測試方法,ZL202110946922.1
[3]一種基於三元特徵的深度注意力謠言鑑別方法及裝置,ZL201911074952.7
[4]一種基於用戶特徵的退火注意力謠言鑑別方法及裝置,ZL202110389173.7
[5]一種基於微生物遺傳算法的黑盒對抗樣本生成方法,ZL202010585924.8
4.教科研獎勵
5.個人榮譽和指導學生獲獎
2021年,華為獎學金
2017年,JAIST校長獎
2016年,日本石川縣私費留學生獎學金
