School of Information Security Engineering

  • Name:Xiuzhen CHEN
  • Title:Associate Professor
  • Office:SEIEE-1-107
  • Office Phone:021-34205415
  • Website:

Research Field

Computer Network Security,Industrial Control System Security,Big Data Mining and Analysis


Sep.2001 – Jul.2005
PhD of Network Security, Xi'an Jiao Tong University (XJTU), Xi'an, China.
Sep.1998 - Jul.2001
Master, China University of Petroleum (CUP), China.
Sep.1994 - Jul.1998
Bachelor, China University of Petroleum (CUP), China.

Work experience

School of Information Security Engineering, Shanghai Jiao Tong University (SJTU), China.
Department of Informatique et Reseaux (INFRES), Telecom ParisTech, France.
Institut Galilée, Universitié Paris 13, France.
Department of Informatique et Reseaux (INFRES), Telecom ParisTech, France.


2007–2009 Research of Optimal Security Assessment for Computer Networked Systems, National Natural Science Foundation of China, Role: PI.
2012.04–2014.03 Study of IP traceback for reflective DDoS attack smurf in Networked Manufacturing Systems, Opening Project of State Key Laboratory of Manufacturing System of Xi’an Jiao Tong University, China, Role: PI.
2014.07–2014.12 Study of Security Technologies and Evaluation System for E-government Cloud, Project of Ningbo Academy of Smart City Development, China, Role: PI.
2014.07 2015.12 Study of IP Traceback of Large Scale DDoS Attacks, Opening Project of Key Lab of Information Network Security, Ministry of Public Security, China, Role: PI.
2008–2010 Theory of Security Situation Assessment in Large Scale Network and Its Application, Ministry of Education Doctoral Fund of China, Role: Co-PI.
2009–2014 Typical Application of Social Group Behavior Awareness and Management, The National Basic Research Program (973 Program), Role: Core Researcher.
2013.09–2016.08 Fundamental Theory and Key Technologies of Network Security Threat Situation Assessment in Cloud Computing Environment, Natural Science Foundation of Shanghai Municipal Science and Technology Commission, China, Role: Core researcher.
2012.05–2014.12 Key Technologies and System Development of Mining Massive Intelligence Information from Internet, National Key Technology Support Program of China, Role: Core researcher.
2013–2016 Study of Network Information Analysis and Situation Forecast for Social Security Events, National Natural Science Foundation of China, Role: Core researcher.

Awards and Honors

2014 Outstanding teacher of SJTU
2009 Chenxing young scholar Award of SJTU
2009 Excellent teacher scholarship of studying abroad, China Scholarship Council (CSC)
2006 Outstanding teacher of SJTU


Master Course: Basic Technology of Information Security, Modern Communication Switching Technology
Undergraduate Course:Technology and system of Information Security Management, Innovation of Information Security Technology


Jounal Papers:
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan, Chenguang Lin, Sun Jie, “Multiple Behavior Information Fusion Based Quantitative Threat Evaluation”, Computers & Security, May, 2005, 24(3): 218~231.
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan, Chenguang Lin, “Quantitative Hierarchical Threat Evaluation Model for Network Security”, Journal of Software, 2006, 17(4): 885~897. (in Chinese)
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan, An OVAL-based Active Vulnerability Assessment System for Enterprise Computer Networks, Information System Frontier, 2008, Vol.10, No.5, pp. 573~588.
Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan, Building Network Attack Graph for Alert Causal Correlation, Computers & Security, 2008, 27 (5-6): 188~196.
Hu Wei, Li Jianhua, Chen Xiuzhen, Jiang Xinghao, Network Security Situation Prediction Based on Improved Adaptive Grey Verhulst Model. Journal of Shanghai Jiao Tong University (Science), 2010, Vol. 15, No. 4, pp.408-413.
Xiuzhen Chen, Shenghong Li, Jianhua Li, Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork, Journal of Computer Networks and Communications, Volume 2011 (2011), Article ID 150762, 9 pages, doi: 10.1155/2011/150762.
CHEN Xiuzhen, MA Jin, LI Shenghong, Ken Chen, Ahmed Serhrouchni, A Dynamic Probabilistic Marking Approach with Multi-tag for Tracing ICMP based DoS Attacks,Wuhan University Journal of Natural Sciences,2013,Vol.18,No.6,pp:484-488.
Conference Papers:
Liangxiu Li, Shenghong Li, Xiuzhen Chen (Correspondence author), A New Genetics-based Diffusion Model for Social Networks, The International Conference on Computational Aspects of Social Networks (CASoN 2011), October 19-21, 2011, Salamanca, Spain.
Chungang Liu, Jianhua Li, Xiuzhen Chen (Correspondence author), Network Vulnerability Analysis Using Text Mining, the 4th Asia Conference on Intelligent Information and Database Systems (ACIIDS 2012), March 19~21, 2012, Kaohsiung, Taiwan.
Xiuzhen CHEN, Jianhua Li, Shenghong Li, Yanan Wang, Hierarchical Activeness State Evaluation Model for BBS Network Community, 7th International Conference on Communications and Networking in China (ChinaCom 2012), August 8–10, 2012, Kunming, People's Republic of China.
Chenye SHI, Jianhua LI, Jieyuan CHEN, Xiuzhen CHEN (correspondence author), Chinese SNS Blog Classification Using Semantic Similarity, Fifth International Conference on Computational Aspects of Social Networks (CASoN 2013), August 12-14, Fargo, USA.
Yanan Wang, Jianhua Li, Xiuzhen CHEN (correspondence author), Multiple evidence fusion based information diffusion model for social network, 9th International Conference on Communications and Networking in China (ChinaCom 2014), August 14–16, 2014 Maoming, People's Republic of China.
Mounira Msahli, Xiuzhen CHEN, Ahmed Serhrouchni, Towards a Fine-grained Access Control for Cloud, The 11th IEEE International Conference on e-Business Engineering (ICEBE 2014), November 5-7, 2014, Sun Yat-sen University, Guangzhou, China.
Quan Zhou, Xiuzhen Chen, Changsong Chen, Authoritative scholarly paper recommendation based on paper communities, 13th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN 2014) , Chengdu, China, Dec. 19-21, 2014.


Authorized Patents:
Active Security Vulnerability Checker for Computer Networks, NO.ZL200510042655.6
System of Attack Graph Generation for Alert Correlation, NO.ZL200810037824.0
System of Automatic Network Connectivity Analysis, No.ZL201110370523.1
Approach of Mining Social Community Structure based on Network Potential Energy, No.ZL20120104303.9
Man-in-Middle Attack Defense for Online Payment Systems, No.ZL201210362877.6

Security Management Theory for Information System and Its Application, China Machine Press, Sep 1, 2009. (in Chinese)