智慧在前进✊

导师照片

赵智慧(Zhihui Zhao)

硕士生导师

太原理工大学计算机科学与技术学院(大数据学院)

工业互联网安全山西省重点实验室(主任:陈永乐教授)

电子邮箱: zhaozhihui@tyut.edu.cn

办公地址: 山西省晋中市榆次区大学街209号,030600

导师座右铭
教育经历
  • 2018-09至2024-07 中国科学院信息工程研究所,网络空间安全,博士
  • 2014-09至2018-07 大连理工大学,信息与计算科学,学士
研究方向

面向工业控制系统、具身智能、边缘智能等场景,研究在不可信第三方、复杂软件供应链与强对抗环境下,系统与智能体的服务可信性、行为对齐性与安全可验证性问题。重点关注第三方服务、边缘节点与智能体在实际运行中是否按预期提供正确结果与安全行为,并探索人工智能技术对网络攻防的赋能作用。

  • 结果正确性验证:
    面向边缘计算、具身智能等场景,针对租赁式计算节点可能因经济动机或攻击行为返回错误结果的问题,研究计算服务的正确性验证与篡改检测方法,包括威胁分析、错误结果检测与溯源等,确保其实际执行行为与预期之间的一致性。
  • AI赋能的网络攻防:
    基于“以攻促防”理念,利用大语言模型与智能体技术提升网络攻击分析、防御决策生成与自动化响应能力,从而增强复杂对抗环境下的网络安全防护效率。
  • 软件供应链安全:
    软硬件组件、开源依赖、第三方服务与外包环节的全链条风险,重点关注组件与服务的可信溯源、风险评估与运行期验证,旨在揭示供应链攻击的隐蔽性与系统性特点,提出可落地的监测、验证与响应机制。
主要学术成果
研究项目
  • [1] 具身智能体的任务意图理解与安全执行机制研究,互联网体系结构全国重点实验室开放课题,2025.12-2027.12,主持.
  • [2] XX要素模型相关算法(4),北方自动控制技术研究所,2025.01-2025.12,主持.
  • 曾参与国家重点研发计划项目、国家自然科学基金重点项目、北京市科技计划项目、信息工程研究所国际合作项目等多项科研项目或课题。
学术成果
  • [1] Zhihui Zhao, Xiaorong Dong, Yaowen Zheng, Xiaohui Chen, Yimo Ren, Hangbei Cheng, Yongle Chen, and Limin Sun. Breaking Cross-modal Alignment in Embodied Intelligence: A Multimodal Adversarial Attack Framework for Vision-Language-Action Models. In Proceedings of the ACM Web Conference 2026 (WWW 26).(CCF A)
  • [2] Zhihui Zhao, Haoyu Bin, Hong Li, Nan Yu, Hongsong Zhu, Limin Sun. FeaShare: Feature Sharing for Computation Correctness in Edge Preprocessing[J]. IEEE Transactions on Mobile Computing, 2024. doi: 10.1109/TMC.2024.3391294. (CCF A,中科院1区Top)
  • [3] Zhihui Zhao, Yicheng Zeng, Jinfa Wang, Hong Li, Hongsong Zhu, and Limin Sun.Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing[C]. IEEE 41st International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2022: 166-177.Vienna, Austria, September 19-22, 2022. (CCF B)
  • [4] Zhihui Zhao, Yuan Jin, Siyan Zhu, Dan Yu, Hongsong Zhu, Yongle Chen, RDGV: Reputation-driven Gradual Verification for Tampering Localization in Cooperative Task Offloading, IEEE Transactions on Reliability, 2025. (中科院2区)
  • [5] Zhihui Zhao, Sen Zhao, Fei Lv, Shuaizong Si, Hongsong Zhu, and Limin Sun. RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection[J]. IEEE Internet of Things Journal,vol.11,no.8, pp.14771-14788. (中科院2区Top)
  • [6] Zhihui Zhao, Weizhong Wang, Hongsong Zhu, Hong Li, Limin Sun, Sen Zhao,Yan Hu.EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients[C].Wireless Algorithms, Systems, and Applications: 15th International Conference (WASA) 2020, Proceedings,PartI 2020: 755-767.Qingdao, China, September 13–15, 2020.(CCF C)
  • [7] Xiaorong Dong, Zhihui Zhao*, Hangbei Cheng, Yimo Ren, Dan Yu, Yongle Chen. MTSec: AIGC-Enhanced Security Model Training for Multimodal Federated Learning[J]. Knowledge-Based Systems, 2025: 114748. (中科院1区Top, 指导学生一作)
  • [8] Dan Yu, Juntao Shi, Jiaqian Ren, Zhaoteng Yan, Zhihui Zhao*, Yongle Chen, Enhancing Security in Embodied Intelligence: Attack Detection via Constraint Functions,International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2025 (CCF C)
  • [9] 赵智慧. 边缘篡改检测与定位:现状、挑战与应对,西安交通大学出版社,2025.
  • [10] Yimo Ren, Jinfa Wang, Zhihui Zhao, Hui Wen, Hong Li, Hongsong Zhu, Automated tactics Planning for Cyber Attack and Defense based on Large Language Model Agents, Neural Networks, 2025:191, 107842. (CCF B)
  • [11] Sen Zhao, Jinfa Wang, Shouguo Yang, Yicheng Zeng, Zhihui Zhao, Hongsong Zhu*, Limin Sun. ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification[C]. IEEE 30th International Conference on Network Protocols (ICNP), 2022, 1-12. (CCF B)
  • [12] Ying Liang, Zhihui Zhao, Yaowen Zheng, Zhen Dai, Yongle Chen, Limin Sun. RoboClarify: Clarifying Ambiguous Instructions through Scenario-Guided Risk Assessment for Home Embodied Agents, International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2025. (CCF C, 指导学生一作)
  • [13] Guoli Zhao, Junze Hu, Haoran Yang, Zhihu Zhao, Yimo Ren, Yubo Li, Hongsong Zhu, GRADERAG: Black-box Semantic Path Injection Attacks on Graph Rag Systms, ICASSP 2026. (CCF B)
  • [14] Yuhang Lu, Zhen Wang, Sen Zhao, Zhihui Zhao, Yongji Liu, Yimo Ren, Hongsong Zhu, Synergistic Struture-aware Guided Network for Binary Protocol Format Inference, ICASSP 2026. (CCF B)
  • [15] Yicheng Zeng. Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun, SIFOL: Solving Implicit Flows in Loops for Concolic Execution, IEEE International Performance, Computing, and Communications Conference (IPCCC), Austin, TX, USA, 2022, pp. 290-297. (CCF C)
国家发明专利
  • [1] 朱红松,赵智慧,李志,李红,于楠,孙利民. 一种边缘服务迁移方法及装置,2023-05-30,授权号:CN 111381962 B
  • [2] 于楠,赵智慧,朱红松,王进法,孙利民. 数据传输与处理可信认证的方法、装置及电子设备,2024-05-26,授权号:CN 114520733 B
  • [3] 于丹,金源,赵智慧,陈永乐,王建华.一种适用于任务卸载场景的边缘节点异常行为检测与定位方法,授权号:CN 119696915 B
标准
  • [1] 中国人工智能产业发展联盟,具身智能总体架构及技术能力要求,AIIA/T 0198-2024,2025-01-10.(已发布,参与)
  • [2] 中国人工智能产业发展联盟,具身智能产品 能力要求与评估方法 第1部分:家庭陪伴机器人,AIIA/T 0199-2024,2025-01-10.(已发布,参与)
  • [3] 中国信息协会,人工智能大模型生成内容安全评测方法,2026-01-16.(公开征求意见)
社会兼职与荣誉
  • [1] CCF网络与系统安全专委会执行委员
  • [2] 《Digital Twins and Applications》期刊青年编委
  • [3] ACM太原分会新星奖(2024年度)
  • [4] 广东省数字安全协会/数字政府网络安全产业联盟特聘专家
  • [5] 中国物联网学术会议(CWSN 2024)组织委员会成员
  • [6] CyberC 2025会议大数据竞赛主席
  • [7] 曾担任TIFS、AAAI、IoTJ、Cybersecurity、Globecom、IPCCC、ICA3PP、计算机研究与发展、信息安全学报、信息网络安全等国内外期刊或会议审稿人