Biography
Shengjie Xu is currently an assistant professor in the College of Information Science at the University of Arizona. He is the director of the Secure and Intelligent Networking Systems Research Group, and a Co-PI for the Google-funded Arizona Cybersecurity Clinic. He received a PhD in Computer Engineering from the University of Nebraska-Lincoln, an M.S. degree in Telecommunications from the University of Pittsburgh, and a B.E. degree in Computer Science.
His research interests span cybersecurity, AI and machine learning for cybersecurity, secure edge AI and edge computing. His research and educational projects have received support from the U.S. National Science Foundation (NSF), Google, and other funding agencies in the U.S. He is the lead author of the book Cybersecurity in Intelligent Networking Systems (John Wiley/IEEE Press, 2023) and has published more than 40 peer-reviewed articles.
He currently serves as a Technical Editor for IEEE Wireless Communications and an Associate Editor for IEEE Access. He will serve as a Symposia Co-Chair for the Communication and Information System Security Symposium at IEEE Global Communications Conference (GLOBECOM) 2026. His previous roles include Editor for the International Journal of Sensor Networks and Technical Program Committee (TPC) Vice Chair for the International Symposium on Intelligent Computing and Networking (ISICN) 2025. He is a Senior Member of IEEE and holds multiple professional certifications in cybersecurity and computer networking.
Degrees
- Ph.D. Computer Engineering
- University of Nebraska-Lincoln, Lincoln, Nebraska, United States
- M.S. Telecommunications
- University of Pittsburgh, Pittsburgh, Pennsylvania, United States
Work Experience
- San Diego State University, San Diego, California (2022 - 2024)
- Dakota State University (2019 - 2022)
Awards
- Exemplary Editor Award
- IEEE Wireless Communications Magazine, Spring 2025
- Outstanding Faculty Award
- San Diego State University, Spring 2024
- IET Journal Premium Award for Best Paper
- IET - Institution of Engineering and Technology, Winter 2020
- Milton E. Mohr Graduate Fellowship Award
- University of Nebraska-Lincoln, Spring 2017
- Best Poster Award
- International Conference on Design of Reliable Communication Networks, Spring 2015
- Outstanding Graduate Students Scholarship
- University of Pittsburgh, Spring 2013
Licensure & Certification
- CNSS No. 4015 – System Certifiers, Committee on National Security Systems (CNSS) (2014)
- CNSS No. 4013 – System Administrators in Information Systems Security, Committee on National Security Systems (CNSS) (2014)
- CNSS No. 4014A – Information Systems Security Officer, Committee on National Security Systems (CNSS) (2014)
- Cisco Certified Network Associate (CCNA) in Routing and Switching, Cisco (2012)
- Cisco Certified Network Associate (CCNA) in Security, Cisco (2013)
- CNSS No. 4012 – Designated Approving Authority, Committee on National Security Systems (CNSS) (2014)
- CNSS No. 4011 – Information Systems Security Professionals, Committee on National Security Systems (CNSS) (2014)
Interests
Research
Cybersecurity, AI, Machine Learning, Zero Trust, Graph Modeling, Edge Computing, Edge AI, Cryptography
Teaching
Cybersecurity, AI, Machine Learning, Computer Networks
Courses
2025-26 Courses
-
Capstone in Cyber Operations
CYBV 498 (Spring 2026) -
Deep Learning in Cyber
APCV 485 (Spring 2026) -
Masters Thesis in Cyber Ops
CYBV 910 (Spring 2026) -
Data Analysis & Visualization
APCV 361 (Fall 2025) -
Directed Research
CYBV 692 (Fall 2025) -
Security Programming
CYBV 500 (Fall 2025)
2024-25 Courses
-
Statistics in Information Age
APCV 302 (Summer I 2025) -
Capstone in Cyber Operations
CYBV 498 (Spring 2025) -
Directed Research
CYBV 692 (Spring 2025) -
Network Security Prin
NETV 371 (Spring 2025) -
Artificial Intelligence
CSCV 471 (Fall 2024) -
Capstone in Cyber Operations
CYBV 498 (Fall 2024)
Scholarly Contributions
Books
- Xu, S., Qian, Y. i., & Hu, R. Q. (2022).
Cybersecurity in Intelligent Networking Systems
. John Wiley & Sons.
Journals/Publications
- Cordill, B., Fang, D., & Xu, S. (2025). A Comprehensive Survey of Security and Privacy in UAV Systems. IEEE Access.
- Grabowski, A., & Xu, S. (2025). Advancing Cybersecurity Practice: Explainable Machine Learning for Network Intrusion Detection. Journal of Cybersecurity Education, Research and Practice, 2025(1), 25.
- McCully, G. A., Hastings, J. D., & Xu, S. (2025). TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code. IEEE Access.
- Meoak, J., & Xu, S. (2025). Static Malware Analysis for Incident Response: Developing a Tactical Aid with EMBER. Journal of Cybersecurity Education, Research and Practice, 2025(1), 16.
- Montes, M., & Xu, S. (2025). PhishBusters: A Comprehensive Approach to Phishing Awareness Training in Organizational Settings. Cybersecurity Pedagogy and Practice Journal, 4(2), 36--50.
- Gyawali, S., Xu, S., Qian, Y. i., & Hu, R. Q. (2020). Challenges and solutions for cellular based V2X communications. IEEE Communications Surveys & Tutorials, 23(1), 222--255.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2020). Edge intelligence assisted gateway defense in cyber security. IEEE Network, 34(4), 14--19.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2019). Data-driven edge intelligence for robust network anomaly detection. IEEE Transactions on Network Science and Engineering, 7(3), 1481--1492.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2019). Data-driven network intelligence for anomaly detection. IEEE Network, 33(3), 88--95.
- Xu, S., & Qian, Y. i. (2018). Machine Learning Enabled Data Preprocessing in Cyber Security Applications. IEEE ComSoc MMTC Communications - Frontiers, 13(6), 15--18.
- Xu, S., Qian, Y. i., & Qingyang, H. R. (2018). Reliable and resilient access network design for advanced metering infrastructures in smart grid. IET Smart Grid, 1(1), 24--30.
- Xu, S., Qian, Y. i., & Hu, R. Q. (2015). On reliability of smart grid neighborhood area networks. IEEE Access, 3, 2352--2365.
Proceedings Publications
- Hardgrove, I., & Xu, S. (2025).
Towards Intelligent Fuzzing: Leveraging Large Language Models for Improved Software Security
. In Proceedings of the International Symposium on Intelligent Computing and Networking 2025: ISICN 2025. - Hartono, D., Fang, D., & Xu, S. (2025).
ENIDSGAN: An Efficient GAN-Based Framework for Adversarial Robustness Evaluation in ML-Based Network Intrusion Detection Systems
. In IEEE Annual Congress on Artificial Intelligence of Things (AIoT). - McCully, G. A., Hastings, J. D., & Xu, S. (2025).
Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
. In Proceedings of the International Symposium on Intelligent Computing and Networking 2025: ISICN 2025. - McCully, G. A., Hastings, J. D., Xu, S., & Fortier, A. (2025). Comparing unidirectional, bidirectional, and word2vec models for discovering vulnerabilities in compiled lifted code. In 2025 13th International Symposium on Digital Forensics and Security (ISDFS).
- Pillay, S., Walia, E., Yoeurng, C., Fang, D., & Xu, S. (2025).
Temporal-Spatial Feature Modification Attacks Against Machine Learning-Based Network Intrusion Detection Systems
. In 22nd Annual International Conference on Privacy, Security, and Trust (PST). - Wagner, P., Honomichl, R., Xu, S., & Mapp, E. (2025). Bridging the Cybersecurity Skills Gap by Leveraging Cybersecurity Clinics: Developing the Arizona Cybersecurity Clinic. In 2025 Information Systems & Computing Academic Professionals (ISCAP) Conference.
- Xu, S., & Qian, Y. (2025).
Quantum-Inspired Trust Scoring for Zero Trust Security: A Simulation-Based Approach
. In 2025 IEEE International Conference on Quantum Computing and Engineering (QCE). - Xu, S., & Qian, Y. i. (2025). Dynamic Trust Scoring for Zero Trust at the Edge: A Multi-Factor, Context-Aware Approach. In 2025 IEEE Conference on Communications and Network Security (CNS).
- Xu, S., & Qian, Y. i. (2025). Zero Trust Architecture for Securing Edge AI and Federated Learning in Edge Computing. In IEEE INFOCOM 2025-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
- Fehrman, B., Akowuah, F., & Xu, S. (2024). Adversarial Attacks in Problem Space for VBA Code Samples. In International Symposium on Intelligent Computing and Networking.
- Ikei, B., Thiry, H., & Xu, S. (2024). Towards Robust IoT Security: A Blockchain Design with Attribute-Based Encryption. In International Symposium on Intelligent Computing and Networking.
- McCully, G. A., Hastings, J. D., Xu, S., & Fortier, A. (2024). Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code. In 2024 IEEE Cyber Awareness and Research Symposium (CARS).
- Nelson, T., O’Brien, A., Noteboom, C., & Xu, S. (2024). WCFG: A Weighted Control Flow Graph Dataset Design for Malware Classification. In International Symposium on Intelligent Computing and Networking.
- Vyas, P., Liu, J., & Xu, S. (2024). Real-Time Fake News Detection on the X (Twitter): An Online Machine Learning Approach. In Americas Conference on Information Systems (AMCIS).
- Ward, B., Gonzalez, D., Alt, J., Fang, D., & Xu, S. (2024). Optimizing Weighted Ensemble ML IDS Using Parallelization and Batch Learning in Healthcare Networks. In 2024 IEEE International Conference on E-health Networking, Application & Services (HealthCom).
- Zhang, K., Xu, S., & Shin, B. (2023). Towards adaptive zero trust model for secure AI. In 2023 IEEE Conference on Communications and Network Security (CNS).
- Ahmed, T., & Xu, S. (2022). Shellcoding: hunting for kernel32 base address. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
- Bradley, M., & Xu, S. (2021). A Metric for Machine Learning Vulnerability to Adversarial Examples. In IEEE International Conference on Computer Communications (INFOCOM).
- Burr, J., & Xu, S. (2021). Improving Adversarial Attacks Against Executable Raw Byte Classifiers. In IEEE International Conference on Computer Communications (INFOCOM).
- Chaudhary, S., O’Brien, A., & Xu, S. (2020). Automated post-breach penetration testing through reinforcement learning. In 2020 IEEE Conference on Communications and Network Security (CNS).
- Fang, D., Xu, S., & Sharif, H. (2019). Security analysis of wireless train control systems. In 2019 IEEE Globecom Workshops (GC Wkshps).
- Xu, S., Fang, D., & Sharif, H. (2019). Efficient network anomaly detection for edge gateway defense in 5G. In 2019 IEEE Globecom Workshops (GC Wkshps).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2019). A semi-supervised learning approach for network anomaly detection in fog computing. In ICC 2019-2019 IEEE International Conference on Communications (ICC).
- Gyawali, S., Xu, S., Ye, F., Hu, R. Q., & Qian, Y. i. (2018). A D2D based clustering scheme for public safety communications. In 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
- Xu, S., & Ye, F. (2018). A predicate encryption based anomaly detection scheme for e-Health communications network. In 2018 IEEE International Conference on Communications (ICC).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2018). Privacy-preserving data preprocessing for fog computing in 5G network security. In 2018 IEEE Global Communications Conference (GLOBECOM).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2017). A data-driven preprocessing scheme on anomaly detection in big data applications. In 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2017). A study on communication network reliability for advanced metering infrastructure in smart grid. In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech).
- Xu, S., Qian, Y. i., & Hu, R. Q. (2016). A secure data learning scheme in big data applications. In 2016 25th International Conference on Computer Communication and Networks (ICCCN).
- Xu, S., & Qian, Y. i. (2015). Quantitative study of reliable communication infrastructure in smart grid NAN. In 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).
- Xu, S., Lei, X., Li, J., & Shi, H. (2011). USB Storage Device Surveillance System in Intranet. In Proceedings of the 2011 International Conference on Information Security and Intelligence Control.
Others
- Xu, S. (2019). Data-driven network intelligence for anomaly detection and information privacy.
