孙东红副研究员
个人介绍

姓名:孙东红

职称:副研究员

电话:+86-10-62603222

邮箱:sundonghong@tsinghua.edu.cn

教育背景

工学博士(机电工程) ,北京理工大学,2010

工学硕士(计算机应用技术),吉林大学,2002

工作经历

2002年-2012 清华大学信息网络工程研究中心

2012年 至今 清华大学网络科学与网络空间研究院

研究领域

网络安全与应急响应

安全计划与灾难恢复

网络空间测量与测绘

入侵检测与反垃圾邮件

研究概况

在网络与信息安全领域深耕26年,作为项目/课题负责人主持国家863、重点研发、前沿创新、自然基金青年及面上、各部委专项等研究工作15+项,作为骨干参与研究课题30+项,科研成果论文50+篇,专利及软件著作权20+项,参与编撰国际/国内相关标准10+项,翻译及编著书目3本,作为指导教师培养清华博硕研究生10+名。
       在入侵检测技术、反垃圾邮件技术与管理,网络安全应急响应技术、网络空间测绘、网络空间态势感知与安全管理、移动互联网监测预警、网络漏洞分析、网络犯罪检测等方面进行科学研究和工程开发工作,成果丰富并获得多项科研奖励。

奖励与荣誉

1. 无连接网络中安全可信的端到端传送关键技术及应用,中国电子学会,科技进步一等奖,2022 (科研奖励)

2. 基于物理不可克隆函数的设备身份认证技术及其在工业互联网中的应用,中国发明协会,发明创业奖创新奖,2021(科研奖励)

3. 位置网创新研究及应用,中国电子学会,科技进步一等奖,2017 (科研奖励)

4. 计算机保密核查取证技术研究及应用,保密科学技术二等奖,2017 (科研奖励)

5. 大规模网络防御技术与应用,军队科技进步一等奖,2010 (科研奖励)

6. 清华大学信息网络工程研究中心优秀个人奖,2010

学术成果

(1) Yan Li, Zhenrui Zhang, Zhiyu Lang, Xiang Li, Jia Zhang, Donghong Sun: Wolf in Sheep's Clothing: Understanding and Detecting Mobile Cloaking in Blackhat SEO. ACNS (2) 2025: 74-103

(2) Guodong Zhang, Tianyu Yao, Jiawei Qin, Yitao Li, Qiao Ma, Donghong Sun,CodeSAGE:A multi-feature fusion vulnerability detection approach using code attribute graphs and attention mechanisms, J. Inf. Secur. Appl. 89: 103973,2025

(3) 刘世明, 李瑞烜, 刘保君, 段海新, 孙东红,  我国互联网域名基础设施集中化程度测量研究, 通信学报, 2024.

(4) 孙俊哲, 陆超逸, 刘保君, 段海新, 孙东红, 政府教育域名权威资源记录异常变更测量研究,通信学报,2024.

(5) 张国栋,刘子龙,姚天宇,靳卓,孙东红,秦佳伟,基于中间语言的PHP注入漏洞检测方法研究,信息安全学报,2024,9(6):114-128 (7)

(6) Yubo Chen, Chuhan Wu, Tao Qi, Zhigang Yuan, Yuesong Zhang, Shuai Yang, Jian Guan, Donghong Sun, Yongfeng Huang,Semi-supervised named entity recognition in multi-level contexts. Neurocomputing 520: 194-204,2023(期刊)

(7) Mingxuan Liu, Zihan Zhang, Yiming Zhang, Chao Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun, Automatic Generation of Adversarial Readable Chinese Texts. IEEE Trans. Dependable Secur. Comput. 20(2): 1756-1770,2023(期刊)

(8) 张国栋,刘子龙,靳卓,姚天宇,秦佳伟,孙东红,用于漏洞检测的中间语言表示方法,计算机应用研究,2023

(9) 刘武,李风华,段海新,孙东红,王继龙,吴海燕,刘沐,张龙,校园网挖矿行为自动识别处置系统,福州大学学报(自然科学版), 2023

(10) Zihan Zhang, Jinfeng Li, Ning Shi, Bo Yuan, Xiangyu Liu, Rong Zhang, Hui Xue, Donghong Sun, Chao Zhang: RoChBert: Towards Robust BERT Fine-tuning for Chinese. EMNLP (Findings) 2022: 3502-3516

(11) Chuyun Deng, Mingxuan Liu, Yue Qin, Jia Zhang, Hai-Xin Duan, Donghong Sun: ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model. NAACL-HLT 2022: 1735-1746

(12) Zihan Zhang, Jinfeng Li, Ning Shi, Bo Yuan, Xiangyu Liu, Rong Zhang, Hui Xue, Donghong Sun, Chao Zhang:RoChBert: Towards Robust BERT Fine-tuning for Chinese. CoRR abs/2210.15944,2022

(13) 齐伊宁,秦宣梅,孙东红,潘鸿运,李琪,黄永峰,王丹丹,面向领域数据安全可信共享的云链融合系统,中国传媒大学学报(自然科学版),2022

(14) Mingxuan Liu, Yiming Zhang, Baojun Liu, Zhou Li, Haixin Duan, Donghong Sun: Detecting and Characterizing SMS Spearphishing Attacks. ACSAC 2021: 930-94

(15) Zihan Zhang, Mingxuan Liu, Chao Zhang, Yiming Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun: Argot: Generating Adversarial Readable Chinese Texts. IJCAI 2020: 2533-2539

(16) Yixuan Chai, Guohua Liu, Ziwei Jin, Donghong Sun: How to Keep an Online Learning Chatbot From Being Corrupted. IJCNN 2020: 1-8

(17) Di Cao, Shan Chang, Zhijian Lin, Guohua Liu, Donghong Sun:    Understanding Distributed Poisoning Attack in Federated Learning. ICPADS 2019: 233-239

(18) Shanila Azhar, Shan Chang, Ye Liu, Yuting Tao, Guohua Liu, Donghong Sun:Utility-Aware Participant Selection with Budget Constraints for Mobile Crowd Sensing. QSHINE 2019: 38-49

(19) Wu Liu, Ping Ren, Donghong Sun, Ke Liu: H6Proxy: Address forging and data-gram forwarding based attack testing proxy system in IPv6 network. DSP 2017: 1-5

(20) 刘武,王永科,孙东红,任萍,刘柯,开源智能终端认证漏洞挖掘及登录认证改进,清华大学学报(自然科学版),2017

(21) Cheng Ling, Tsuyoshi Hamada, Jing-Yang Gao, Guoguang Zhao, Donghong Sun, Weifeng Shi:MrBayes tgMC3++: A High Performance and Resource-Efficient GPU-Oriented Phylogenetic Analysis Method. IEEE ACM Trans. Comput. Biol. Bioinform. 13(5): 845-854,2016(期刊)

(22) Donghong Sun, Wu Liu, Ping Ren, Ke Liu:Reputation and attribute based dynamic access control framework in cloud computing environment for privacy protection. ICNC-FSKD 2016: 1239-1245

(23) Ping Ren, Wu Liu, Donghong Sun, Jian-Ping Wu, Ke Liu:Analysis and forensics for Behavior Characteristics of Malware in Internet. PST 2016: 637-641

(24) Longhui Wang, Guoguang Zhao, Donghong Sun:Modeling Documents with Event Model. Algorithms 8(3): 562-572,2015

(25) Guoguang Zhao, Cheng Ling, Donghong Sun: SparkSW: Scalable Distributed Computing System for Large-Scale Biological Sequence Alignment. CCGRID 2015: 845-852

(26) Ping Ren, Wu Liu, Donghong Sun, Ke Liu:Node Localization based on Convex Optimization in Wireless Sensor Networks. FSKD 2015: 2169-2173

(27) Wu Liu, Ping Ren, Donghong Sun, Yawei Zhao, Ke Liu:Study on attacking and defending techniques in IPv6 networks. DSP 2015

(28) Wang Yongke,Zhuge Jianwei,Sun Donghong,Liu Wu,Li Fenghua: ActivityFuzzer: Detecting the Security Vulnerabilities of Android Activity Components,2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SMTA), 2015

(29) Huaizhou Tao, Donghong Sun, Yongfeng Huang, Ping Hu:A detection method of subliminal channel based on VoIP communication. ASIA CCS: ACM Asia Conference on Computer and Communications Security,IWIHC’2014

(30) Donghong Sun,Zhibiao Shu,Wu Liu,Ping Ren, Analysis of Network Security Data Using Wavelet Transforms, Journal of Algorithms & Computational Technology,2014

(31) Feng Zheng, Yongfeng Huang, Donghong Sun: Designing a new TCP based on FAST TCP for datacenter. ICC 2014: 3209-3214

(32) Ping Ren, Wu Liu, Donghong Sun:Partition-based data cube storage and parallel queries for cloud computing. ICNC 2013: 1183-11872013

(33)  Wu Liu, Donghong Sun, Ping Ren, Yihui Zhang,Co-SRL: A Convex Optimization Algorithm for Anchor Localization in Wireless Sensor Networks,AASRI Conference on Parallel and Distributed Computing and Systems,2013

(34) Dongbin Sun, Wu Liu, Donghong Sun, Ping Ren:Study on Anti-Attack Model for Low-Latency Anonymous Communication System. CGC 2012: 327-328

(35) WuLiu,Donghong Sun, Ping Ren, Haibin Xiong: Path-Calculation-Based XML Data Cube Model. ICHIT (1) 2012: 541-549

(36) Donghong Sun,Wu Liu,Ping Ren:A Data Security Protection Mechanism Based on Transparent Biometric Authentication for Mobile Intelligent Terminals,Third Cybercrime and Trustworthy Computing Workshop,2012

(37) Liu Wu, Ren Ping, Sun Donghong, Zhao Yawei, Wu Jian-ping:Protocol Analysis and Online Forensics in IPv6 Network Environment,ICWCNMC 2012

(38) Sun Donghong, Guo Yunchuan, Yin Lihua, Hu Changzhen:COMPARISON OF MEASURING INFORMATION LEAKAGE FOR FULLY PROBABILISTIC SYSTEMS,International Journal of Innovative Computing Information and Control, 2012

(39) Sun DongHong, Liu Li, Zhang Peng, Zhu Xingquan, Shi Yong,Decision Rule Extraction for Regularized Multiple Criteria Linear Programming Model,International Journal of Data Warehousing and Mining, 2011(期刊)

(40) Tao L, Wu L, Duan H, Sun DI;Pv6 traffic hijack test system and defense tools using DNSSEC, iTAP 2011