洪赓

助理研究员、硕导
ghong@fudan.edu.cn
复旦大学江湾校区二号交叉学科楼 D6007(200438)

简介

洪赓博士的研究聚焦于网络黑灰产检测、网络犯罪治理、人工智能安全治理等,目前已在IEEE S&P、USENIX Security、ACM CCS、NDSS等国际顶级会议上发表十余篇高水平学术论文,担任ACM CCS 24、CCS 25程序委员会委员,并主持国家自然科学基金青年项目等重要研究课题。相关成果在执法机关、头部公司均有成功应用,曾获ACM SIGSAC China优博奖(全国共3位)、ACM CCS 2018亮点论文等;学生培养方面,指导本科生团队获得“挑战杯”全国大学生课外学术科技作品竞赛全国特等奖、全国大学生信息安全竞赛一等奖等荣誉。

研究领域:互联网地下产业检测、网络犯罪治理、移动应用隐私保护、区块链安全等

Biography

Hong Geng

Assistant Professor at Cyberspace International Givernance Research Center, Fudan University, also a faculty of System Software and Security Group in School of Computer Science

Research Interests: Cybercrime, Privacy on Mobile App, Novel Cybersecurity Threat


开设课程

  1. 深度学习基础(25年春,本科生课程,复旦大学AI-BEST序列课程);
  2. 高级移动安全(24年秋,研究生课程,专业选修课);
  3. 现代操作系统(23年秋,研究生课程,专业选修课);
  4. 网络黑灰产治理实践(Planning)

近期论文发表(详见个人主页)

  1. NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines,2025
    The 34th USENIX Security Symposium (USENIX Security’25, CCF-A)
  2. You Can’t Eat Your Cake and Have It Too: The Performance Degradation of LLMs with Jailbreak Defense,2025
    The Web Conference 2025 (ACM WWW 25, CCF-A)
  3. Exposing the Hidden Layer: Software Repositories in the Service of SEO Manipulation,2024
    In Proceedings of the 47nd International Conference on Software Engineering (IEEE/ACM ICSE’25, CCF-A)
  4. Revealing the black box of device search engine: scanning assets, strategies, and ethical consideration,2024
    the Network and Distributed System Security (NDSS) Symposium 2025 (NDSS’25, CCF-A)
  5. HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists,2024
    the Network and Distributed System Security (NDSS) Symposium 2025 (NDSS’25, CCF-A)
  6. Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service,2024
    the Network and Distributed System Security (NDSS) Symposium 2025 (NDSS’25, CCF-A)
  7. Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets,2024
    The Web Conference 2024 (ACM WWW 24, CCF-A)
  8. Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild,2023
    30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS’23, CCF-A)
  9. Understanding and Detecting Abused Image Hosting Modules as Malicious Services,2023
    30th ACM SIGSAC Conference on Computer and Communications Security (ACM CCS’23, CCF-A)
  10. Analyzing Ground-Truth Data of Mobile Gambling Scams,2022
    43rd IEEE Symposium on Security and Privacy (IEEE S&P Oakland’22, CCF-A)