Shengjie Xu
- Assistant Professor
- Member of the Graduate Faculty
- (520) 626-2422
- UA Sierra Vista Campus, Rm. 101
- Tucson, AZ 85721
- sjxu@arizona.edu
Biography
Shengjie Xu received a Ph.D. degree in Computer Engineering from the University of Nebraska-Lincoln in 2019, an M.S. degree in Telecommunications from the University of Pittsburgh in 2014, and a B.E. degree in Information Security in 2012. He has been a tenure-track assistant professor at the University of Arizona (U of A) since August 2024. Before joining U of A, he was a tenure-track assistant professor at San Diego State University (Fowler College of Business) and at Dakota State University (Beacom College of Computer and Cyber Sciences).
His research interests include cybersecurity, Cyber AI, Zero Trust, Cryptography, Secure AI, and Graph Modeling. He is the author of one book and more than 40 articles. He is the lead author of the book `Cybersecurity in Intelligent Networking Systems' (John Wiley/IEEE Press, 2023). He currently serves as a Technical Editor for the IEEE Wireless Communications Magazine, an Associate Editor for the IEEE Access, an Editor for the International Journal of Sensor Networks, and a Technical Program Committee (TPC) Vice Chair for the International Symposium on Intelligent Computing and Networking (ISICN) 2025. He has received grants and contracts in research and educational projects from the U.S. National Science Foundation (NSF) and other organizations. He served as a proposal panel reviewer for the NSF.
He was a recipient of the Outstanding Faculty Award from the Fowler College of Business at San Diego State University in 2024, the Institution of Engineering and Technology (IET) Journals Premium Award for Best Paper in 2020, the Milton E. Mohr Graduate Fellowship Award from the College of Engineering at the University of Nebraska-Lincoln in 2017, and the Best Poster Award from the International Conference on Design of Reliable Communication Networks (DRCN) in 2015. He is a member of IEEE and ACM and holds multiple professional certifications in cybersecurity and computer networking.
Degrees
- Ph.D. Computer Engineering
- University of Nebraska-Lincoln, Lincoln, Nebraska, United States
- M.S. Telecommunications
- University of Pittsburgh, Pittsburgh, Pennsylvania, United States
Work Experience
- San Diego State University, San Diego, California (2022 - 2024)
- Dakota State University (2019 - 2022)
Awards
- Outstanding Faculty Award
- San Diego State University, Spring 2024
- IET Journal Premium Award for Best Paper
- IET - Institution of Engineering and Technology, Winter 2020
- Milton E. Mohr Graduate Fellowship Award
- University of Nebraska-Lincoln, Spring 2017
- Best Poster Award
- International Conference on Design of Reliable Communication Networks, Spring 2015
- Outstanding Graduate Students Scholarship
- University of Pittsburgh, Spring 2013
Licensure & Certification
- Cisco Certified Network Associate (CCNA) in Security, Cisco (2013)
- CNSS No. 4014A – Information Systems Security Officer, Committee on National Security Systems (CNSS) (2014)
- CNSS No. 4015 – System Certifiers, Committee on National Security Systems (CNSS) (2014)
- CNSS No. 4012 – Designated Approving Authority, Committee on National Security Systems (CNSS) (2014)
- CNSS No. 4013 – System Administrators in Information Systems Security, Committee on National Security Systems (CNSS) (2014)
- Cisco Certified Network Associate (CCNA) in Routing and Switching, Cisco (2012)
- CNSS No. 4011 – Information Systems Security Professionals, Committee on National Security Systems (CNSS) (2014)
Interests
Teaching
Cybersecurity, AI, Machine Learning, Cryptography
Research
Cybersecurity, AI, Machine Learning, Cryptography, Privacy-Preserving Computing
Courses
2024-25 Courses
-
Capstone in Cyber Operations
CYBV 498 (Spring 2025) -
Directed Research
CYBV 692 (Spring 2025) -
Masters Thesis in Cyber Ops
CYBV 910 (Spring 2025) -
Network Security Prin
NETV 371 (Spring 2025) -
Artificial Intelligence
CSCV 471 (Fall 2024) -
Capstone in Cyber Operations
CYBV 498 (Fall 2024)
Scholarly Contributions
Books
- Xu, S., Qian, Y. i., & Hu, R. Q. (2022). Cybersecurity in Intelligent Networking Systems. John Wiley & Sons.
Chapters
- Xu, S., Qian, Y. i., & Hu, R. Q. (2023). Adversarial Examples: Challenges and Solutions. In Cybersecurity in Intelligent Networking Systems.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2023). Cyber Threats and Gateway Defense. In Cybersecurity in Intelligent Networking Systems.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2023). Cybersecurity in the Era of Artificial Intelligence. In Cybersecurity in Intelligent Networking Systems.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2023). Edge Computing and Secure Edge Intelligence. In Cybersecurity in Intelligent Networking Systems.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2023). Efficient Pre-processing Scheme for Anomaly Detection. In Cybersecurity in Intelligent Networking Systems.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2023). Privacy preservation in the era of big data. In Cybersecurity in Intelligent Networking Systems.
- Xu, S., Xu, S., Qian, Y. i., Qian, Y. i., Hu, R. Q., & Hu, R. Q. (2023). Robust Intrusion Detection. In Cybersecurity in Intelligent Networking Systems.
Journals/Publications
- McCully, G. A., Hastings, J. D., & Xu, S. (2024). Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code. arXiv preprint arXiv:2412.02048.
- McCully, G. A., Hastings, J. D., Xu, S., & Fortier, A. (2024). Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code. arXiv preprint arXiv:2405.20611.
- McCully, G. A., Hastings, J. D., Xu, S., & Fortier, A. (2024). Comparing unidirectional, bidirectional, and word2vec models for discovering vulnerabilities in compiled lifted code. arXiv preprint arXiv:2409.17513.
- Gyawali, S., Xu, S., Qian, Y. i., & Hu, R. Q. (2020). Challenges and solutions for cellular based V2X communications. IEEE Communications Surveys & Tutorials, 23(1), 222--255.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2020). Edge intelligence assisted gateway defense in cyber security. IEEE Network, 34(4), 14--19.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2019). Data-driven edge intelligence for robust network anomaly detection. IEEE Transactions on Network Science and Engineering, 7(3), 1481--1492.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2019). Data-driven network intelligence for anomaly detection. IEEE Network, 33(3), 88--95.
- Xu, S., & Qian, Y. i. (2018). Machine Learning Enabled Data Preprocessing in Cyber Security Applications. IEEE ComSoc MMTC Communications - Frontiers, 13(6), 15--18.
- Xu, S., Qian, Y. i., & Qingyang, H. R. (2018). Reliable and resilient access network design for advanced metering infrastructures in smart grid. IET Smart Grid, 1(1), 24--30.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2015). On reliability of smart grid neighborhood area networks. IEEE Access, 3, 2352--2365.
Proceedings Publications
- Fehrman, B., Akowuah, F., & Xu, S. (2024). Adversarial Attacks in Problem Space for VBA Code Samples. In International Symposium on Intelligent Computing and Networking.
- Ikei, B., Thiry, H., & Xu, S. (2024). Towards Robust IoT Security: A Blockchain Design with Attribute-Based Encryption. In International Symposium on Intelligent Computing and Networking.
- Liu, J., Vyas, P., & Xu, S. (2024). Real-Time Fake News Detection on the X (Twitter): An Online Machine Learning Approach. In Americas' Conference on Information Systems (AMCIS).
- Nelson, T., O’Brien, A., Noteboom, C., & Xu, S. (2024). WCFG: A Weighted Control Flow Graph Dataset Design for Malware Classification. In International Symposium on Intelligent Computing and Networking.
- Zhang, K., Xu, S., & Shin, B. (2023). Towards Adaptive Zero Trust Model for Secure AI. In 2023 IEEE Conference on Communications and Network Security (CNS).
- Ahmed, T., & Xu, S. (2022). Shellcoding: Hunting for Kernel32 Base Address. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
- Bradley, M., & Xu, S. (2021). A Metric for Machine Learning Vulnerability to Adversarial Examples. In IEEE International Conference on Computer Communications (INFOCOM).
- Burr, J., & Xu, S. (2021). Improving Adversarial Attacks Against Executable Raw Byte Classifiers. In IEEE International Conference on Computer Communications (INFOCOM).
- Chaudhary, S., O’Brien, A., & Xu, S. (2020). Automated post-breach penetration testing through reinforcement learning. In 2020 IEEE Conference on Communications and Network Security (CNS).
- Fang, D., Xu, S., & Sharif, H. (2019). Security analysis of wireless train control systems. In 2019 IEEE Globecom Workshops (GC Wkshps).
- Xu, S., Fang, D., & Sharif, H. (2019). Efficient network anomaly detection for edge gateway defense in 5G. In 2019 IEEE Globecom Workshops (GC Wkshps).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2019). A semi-supervised learning approach for network anomaly detection in fog computing. In ICC 2019-2019 IEEE International Conference on Communications (ICC).
- Gyawali, S., Xu, S., Ye, F., Hu, R. Q., & Qian, Y. i. (2018). A D2D based clustering scheme for public safety communications. In 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
- Xu, S., & Ye, F. (2018). A predicate encryption based anomaly detection scheme for e-Health communications network. In 2018 IEEE International Conference on Communications (ICC).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2018). Privacy-preserving data preprocessing for fog computing in 5G network security. In 2018 IEEE Global Communications Conference (GLOBECOM).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2017). A data-driven preprocessing scheme on anomaly detection in big data applications. In 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2017). A study on communication network reliability for advanced metering infrastructure in smart grid. In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2016). A secure data learning scheme in big data applications. In 2016 25th International Conference on Computer Communication and Networks (ICCCN).
- Xu, S., & Qian, Y. i. (2015). Quantitative study of reliable communication infrastructure in smart grid NAN. In 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).
- Xu, S., Lei, X., Li, J., & Shi, H. (2011). USB Storage Device Surveillance System in Intranet. In Proceedings of the 2011 International Conference on Information Security and Intelligence Control.
Others
- Zurawski, J. (2021, November). South Dakota Region Scientific Deep Dive. osti.gov.