
Qi Li 0002
Person information
- affiliation: Tsinghua University, Graduate School at Shenzhen, China
- affiliation (former): Tsinghua University, Department of Computer Science, Beijing, China
Other persons with the same name
- Qi Li — disambiguation page
- Qi Li 0001 — Western Kentucky University, Department of Mathematics and Computer Science, Bowling Green, KY, USA (and 1 more)
- Qi Li 0003
— China Earthquake Administration, China (and 1 more)
- Qi Li 0004
— Northern Kentucky University, Department of Computer Science, KY, USA (and 2 more)
- Qi Li 0005
— Chinese Academy of Sciences, Institute of Automation, CAS Center for Excellence in Brain Science and Intelligence Technology, Beijing, China
- Qi Li 0006 — Tsinghua University, Institute of Data Science, Centre for Computational Mental Healthcare Research, Beijing, China
- Qi Li 0007
— Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China (and 1 more)
- Qi Li 0008
— Beijing Jiaotong University, Department of Mechanical Engineering, China (and 1 more)
- Qi Li 0009
— Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Qi Li 0010
— National Grid UK, Electricity National Control Centre, Wokingham, UK (and 1 more)
- Qi Li 0011
— Nanjing University of Posts and Telecommunications, School of Computer Science / Jiangsu Key Laboratory of Big Data Security and Intelligent Processing / Jiangsu Innovative Coordination Center of Internet of Things, China (and 1 more)
- Qi Li 0012 — Iowa State University, Ames, IA, USA (and 2 more)
- Qi Li 0013 — Hong Kong University of Science and Technology, Hong Kong
- Qi Li 0014 — Rensselaer Polytechnic Institute, Department of Computer Science, Troy, NY USA (and 1 more)
- Qi Li 0015
— University of Pittsburgh, Department of Mechanical Engineering and Materials Science, PA, USA (and 1 more)
- Qi Li 0016 — University of Notre Dame, IN, USA
- Qi Li 0017 — Southeast University, Key Laboratory of Measurement and Control of Complex Systems of Engineering, Nanjing, China
- Qi Li 0018
— Zhejiang University, State Key Laboratory of Modern Optical Instrumentation, Hangzhou, China
- Qi Li 0019 — Partners HealthCare System, Clinical Informatics Research & Development, Boston, MA, USA
- Qi Li 0020 — University of Southern California, Center for Systems and Software Engineering, Los Angeles, CA, USA
- Qi Li 0021 — Hangzhou Normal University, Institute of Service Engineering, China (and 1 more)
- Qi Li 0022
— Beijing Institute of Technology, School of Software, China
- Qi Li 0023
— Chalmers University of Technology, Department of Microtechnology and Nanoscience, Gothenburg, Sweden
- Qi Li 0024
— China University of Petroleum (East China), College of Information and Control Engineering, Qingdao, China
- Qi Li 0025
— Shaoxing University, Department of Computer Science and Engineering, China (and 1 more)
- Qi Li 0026
— Xi'an Jiaotong University, School of Electrical Engineering, State Key Laboratory of Electrical Insulation and Power Equipment, China
- Qi Li 0027
— Harbin Institute of Technology (Weihai Campus), School of Automotive Engineering, China
- Qi Li 0028
— Changchun University of Science and Technology, School of Computer Science and Technology, China
- Qi Li 0029
— Dalian Maritime University, School of Information Science and Technology, China (and 1 more)
- Qi Li 0030
— Tianjin University, School of Electrical and Information Engineering, China
- Qi Li 0031
— Central South University, School of Information Science and Engineering, Changsha, China
- Qi Li 0032
— Zhongyuan University of Technology, School of Electronic and Information Engineering, Zhengzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j46]Qian Wang
, Baolin Zheng, Qi Li
, Chao Shen
, Zhongjie Ba:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 896-908 (2021) - 2020
- [j45]Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo:
SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Commun. Mag. 58(1): 47-53 (2020) - [j44]Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu:
Toward Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Netw. 34(1): 108-115 (2020) - [j43]Bo Wu, Ke Xu, Qi Li, Shoushou Ren, Zhuotao Liu, Zhichao Zhang:
Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Netw. 34(2): 30-36 (2020) - [j42]Xiaoliang Wang, Ke Xu, Wenlong Chen, Qi Li, Meng Shen, Bo Wu:
ID-Based SDN for the Internet of Things. IEEE Netw. 34(4): 76-83 (2020) - [j41]Dong Yuan, Qi Li
, Guoliang Li
, Qian Wang
, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 15: 299-314 (2020) - [j40]Rémi Badonnel
, Carol Fung, Qi Li
, Sandra Scott-Hayward
:
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. IEEE Trans. Netw. Serv. Manag. 17(1): 12-14 (2020) - [j39]Shu Yang
, Laizhong Cui
, Xinhao Deng
, Qi Li
, Yulei Wu
, Mingwei Xu, Dan Wang, Jianping Wu:
FISE: A Forwarding Table Structure for Enterprise Networks. IEEE Trans. Netw. Serv. Manag. 17(2): 1181-1196 (2020) - [j38]Peng Zhang
, Hui Wu
, Dan Zhang
, Qi Li
:
Verifying Rule Enforcement in Software Defined Networks With REV. IEEE/ACM Trans. Netw. 28(2): 917-929 (2020) - [c87]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CCS 2020: 1103-1119 - [c86]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CCS 2020: 1323-1335 - [c85]Jianhua Sun, Kun Sun, Qi Li:
Towards a Believable Decoy System: Replaying Network Activities from Real System. CNS 2020: 1-9 - [c84]Yunzhe Guo, Dan Wang, Arun Vishwanath, Cheng Xu, Qi Li:
Towards Federated Learning for HVAC Analytics: A Measurement Study. e-Energy 2020: 68-73 - [c83]Zihan Zhang, Mingxuan Liu, Chao Zhang, Yiming Zhang, Zhou Li
, Qi Li, Haixin Duan, Donghong Sun:
Argot: Generating Adversarial Readable Chinese Texts. IJCAI 2020: 2533-2539 - [c82]Ruming Tang, Zheng Yang, Zeyan Li, Weibin Meng, Haixin Wang, Qi Li, Yongqian Sun, Dan Pei, Tao Wei, Yanfei Xu, Yan Liu:
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. INFOCOM 2020: 2479-2488 - [c81]Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020 - [c80]Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu:
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. NDSS 2020 - [i5]Xuankai Liu, Fengting Li, Bihan Wen, Qi Li:
Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. CoRR abs/2008.00407 (2020) - [i4]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CoRR abs/2008.12981 (2020) - [i3]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CoRR abs/2009.00718 (2020)
2010 – 2019
- 2019
- [j37]Bo Wu, Ke Xu, Qi Li, Bingyang Liu, Shoushou Ren, Fan Yang, Meng Shen
, Kui Ren:
RFL: Robust fault localization on unreliable communication channels. Comput. Networks 158: 158-174 (2019) - [j36]Tao Lei
, Zhan Qin, Zhibo Wang
, Qi Li
, Dengpan Ye:
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet Things J. 6(4): 6668-6680 (2019) - [j35]Qi Li, Jiajia Liu, Yih-Chun Hu, Mingwei Xu, Jianping Wu:
BGP with BGPsec: Attacks and Countermeasures. IEEE Netw. 33(4): 194-200 (2019) - [j34]Qi Li
, Xiaoyue Zou
, Qun Huang
, Jing Zheng
, Patrick P. C. Lee
:
Dynamic Packet Forwarding Verification in SDN. IEEE Trans. Dependable Secur. Comput. 16(6): 915-929 (2019) - [j33]Yanjiao Chen
, Xin Tian, Qian Wang
, Minghui Li
, Minxin Du
, Qi Li
:
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum. IEEE Trans. Mob. Comput. 18(10): 2270-2284 (2019) - [c79]Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen:
Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. ASPLOS 2019: 93-105 - [c78]Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, Xiao Liang:
Detecting Fake Accounts in Online Social Networks at the Time of Registrations. CCS 2019: 1423-1438 - [c77]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. CCS 2019: 2505-2520 - [c76]Qingyuan Gong, Jiayun Zhang
, Yang Chen, Qi Li, Yu Xiao
, Xin Wang, Pan Hui:
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. CIKM 2019: 1251-1260 - [c75]Xingliang Yuan, Chengjun Cai
, Qian Wang, Qi Li:
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. DSC 2019: 1-8 - [c74]Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, Qi Li:
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. DSN 2019: 289-301 - [c73]Congli Wang, Jingqiang Lin, Bingyu Li, Qi Li, Qiongxiao Wang, Xiaokun Zhang:
Analyzing the Browser Security Warnings on HTTPS Errors. ICC 2019: 1-6 - [c72]Renjie Xie, Mingwei Xu, Jiahao Cao, Qi Li:
SoftGuard: Defend Against the Low-Rate TCP Attack in SDN. ICC 2019: 1-6 - [c71]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren:
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. ICDCS 2019: 1106-1116 - [c70]Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang:
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. ICDE 2019: 626-637 - [c69]Xiaoli Zhang, Huayi Duan
, Cong Wang, Qi Li, Jianping Wu:
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. INFOCOM 2019: 1162-1170 - [c68]Qian Wang
, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. INFOCOM 2019: 2062-2070 - [c67]Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, Dawn Song:
Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study. KDD 2019: 2012-2022 - [c66]Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:
Fingerprinting SDN Applications via Encrypted Control Traffic. RAID 2019: 501-515 - [c65]Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, Ravi Sandhu:
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. SACMAT 2019: 83-92 - [c64]Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. USENIX Security Symposium 2019: 19-36 - [i2]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. CoRR abs/1909.06961 (2019) - 2018
- [j32]Yuchao Zhang, Ke Xu, Haiyang Wang, Qi Li, Tong Li, Xuan Cao:
Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains. IEEE Netw. 32(2): 138-143 (2018) - [j31]Yuan Yang
, Mingwei Xu, Qi Li
:
Fast Rerouting Against Multi-Link Failures Without Topology Constraint. IEEE/ACM Trans. Netw. 26(1): 384-397 (2018) - [j30]Qi Li
, Yanyu Chen, Patrick P. C. Lee
, Mingwei Xu, Kui Ren:
Security Policy Violations in SDN Data Plane. IEEE/ACM Trans. Netw. 26(4): 1715-1727 (2018) - [j29]Jie Zhu, Qi Li
, Cong Wang
, Xingliang Yuan
, Qian Wang
, Kui Ren:
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Trans. Parallel Distributed Syst. 29(8): 1721-1735 (2018) - [j28]Peng Zhang
, Chengchen Hu, Di Chen, Hao Li
, Qi Li
:
ShiftRoute: Achieving Location Privacy for Map Services on Smartphones. IEEE Trans. Veh. Technol. 67(5): 4527-4538 (2018) - [c63]Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang:
A Multi-tab Website Fingerprinting Attack. ACSAC 2018: 327-341 - [c62]Man Zhou, Qian Wang
, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CCS 2018: 1775-1787 - [c61]Peng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, Chengchen Hu:
FOCES: Detecting Forwarding Anomalies in Software Defined Networks. ICDCS 2018: 830-840 - [c60]Helei Cui
, Yajin Zhou, Cong Wang, Qi Li, Kui Ren:
Towards Privacy-Preserving Malware Detection Systems for Android. ICPADS 2018: 545-552 - [c59]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang:
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. IWQoS 2018: 1-10 - [c58]Bo Wu, Qi Li, Ke Xu, Ruoyu Li, Zhuotao Liu:
SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection. MASS 2018: 308-316 - [c57]Jun Wu, Patrick P. C. Lee
, Qi Li, Lujia Pan, Jianfeng Zhang:
CellPAD: Detecting Performance Anomalies in Cellular Networks via Regression Analysis. Networking 2018: 19-27 - [c56]Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo:
A Comprehensive Study of Permission Usage on Android. NSS 2018: 64-79 - [i1]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CoRR abs/1810.02242 (2018) - 2017
- [j27]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1. IEEE Commun. Mag. 55(3): 60-61 (2017) - [j26]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2. IEEE Commun. Mag. 55(6): 118-119 (2017) - [j25]Yanyu Chen, Yuan Yang, Xiaoyue Zou, Qi Li, Yong Jiang:
Adaptive Distributed Software Defined Networking. Comput. Commun. 102: 120-129 (2017) - [j24]Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu:
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code. Future Gener. Comput. Syst. 72: 219-226 (2017) - [j23]Qing Li
, Mingwei Xu, Qi Li, Dan Wang, Yong Jiang, Shu-Tao Xia, Qingmin Liao:
Scale the Internet routing table by generalized next hops of strict partial order. Inf. Sci. 412: 101-115 (2017) - [j22]Qi Li, Ravi Sandhu, Xinwen Zhang, Mingwei Xu:
Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Trans. Dependable Secur. Comput. 14(5): 494-506 (2017) - [j21]Peng Zhang, Qi Li, Patrick P. C. Lee
:
Achieving Content-Oriented Anonymity with CRISP. IEEE Trans. Dependable Secur. Comput. 14(6): 578-590 (2017) - [j20]Qi Li
, Patrick P. C. Lee
, Peng Zhang, Purui Su, Liang He, Kui Ren:
Capability-Based Security Enforcement in Named Data Networking. IEEE/ACM Trans. Netw. 25(5): 2719-2730 (2017) - [c55]Lingguang Lei, Yi He, Kun Sun
, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng:
Vulnerable Implicit Service: A Revisit. CCS 2017: 1051-1063 - [c54]Dong Yuan, Guoliang Li, Qi Li, Yudian Zheng:
Sybil Defense in Crowdsourcing Platforms. CIKM 2017: 1529-1538 - [c53]Jianhua Sun, Kun Sun, Qi Li:
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms. CNS 2017: 1-9 - [c52]Qingji Zheng, Qi Li, Aytac Azgin, Jian Weng:
Data verification in information-centric networking with efficient revocable certificateless signature. CNS 2017: 1-9 - [c51]Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li:
SPEAKER: Split-Phase Execution of Application Containers. DIMVA 2017: 230-251 - [c50]Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. DSN 2017: 427-438 - [c49]Qian Wang
, Kui Ren, Minxin Du, Qi Li, Aziz Mohaisen:
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. Financial Cryptography 2017: 79-97 - [c48]Lang Liu, Yacong Gu, Qi Li, Purui Su:
RealDroid: Large-Scale Evasive Malware Detection on "Real Devices". ICCCN 2017: 1-8 - [c47]Zhongxing Ming, Mingwei Xu, Ning Wang, Bingjie Gao, Qi Li:
Truthful Auctions for User Data Allowance Trading in Mobile Networks. ICDCS 2017: 1271-1280 - [c46]Bo Wu, Ke Xu, Qi Li, Fan Yang:
Robust and lightweight fault localization. IPCCC 2017: 1-8 - [c45]Jing Zheng, Jianhua Sun, Kun Sun, Bo Wu, Qi Li:
Cookie-based amplification repression protocol. IPCCC 2017: 1-8 - [c44]Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang:
Generic and agile service function chain verification on cloud. IWQoS 2017: 1-10 - [c43]Zheng Liu, Mingwei Xu, Jiahao Cao, Qi Li:
TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN. MSN 2017: 483-496 - [c42]Yi He, Qi Li, Kun Sun:
LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection. SecureComm 2017: 291-311 - [c41]Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, Jing Zheng:
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. SecureComm 2017: 356-376 - 2016
- [j19]Jun Tang, Yong Cui, Qi Li, Kui Ren
, Jiangchuan Liu, Rajkumar Buyya:
Ensuring Security and Privacy Preservation for Cloud Data Services. ACM Comput. Surv. 49(1): 13:1-13:39 (2016) - [j18]Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng:
Direct Resource Hijacking in Android. IEEE Internet Comput. 20(5): 46-56 (2016) - [j17]Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini
, Alexey V. Vinel:
Editor's Note. IEEE Trans. Dependable Secur. Comput. 13(4): 409-410 (2016) - [c40]Chunhui Pang, Yong Jiang, Qi Li:
FADE: Detecting forwarding anomaly in software-defined networks. ICC 2016: 1-6 - [c39]Yuan Yang, Mingwei Xu, Qi Li:
Tunneling on demand: A lightweight approach for IP fast rerouting against multi-link failures. IWQoS 2016: 1-6 - [c38]Xiaomei Sun, Qi Li, Mingwei Xu, Yuan Yang:
Achieving Stable iBGP with Only One Add-Path. LCN 2016: 688-696 - [c37]Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su:
Exploiting Android System Services Through Bypassing Service Helpers. SecureComm 2016: 44-62 - 2015
- [j16]Bo Tang, Ravi S. Sandhu, Qi Li:
Multi-tenancy authorization models for collaborative cloud services. Concurr. Comput. Pract. Exp. 27(11): 2851-2868 (2015) - [j15]Xi Xiao, Zhenlong Wang, Qi Li, Qing Li
, Yong Jiang:
ANNs on Co-occurrence Matrices for Mobile Malware Detection. KSII Trans. Internet Inf. Syst. 9(7): 2736-2754 (2015) - [j14]Qi Li, Xinwen Zhang, Xin Zhang, Purui Su:
Invalidating Idealized BGP Security Proposals and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(3): 298-311 (2015) - [j13]Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, Xiaoming Fu
:
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. IEEE Trans. Inf. Forensics Secur. 10(2): 308-320 (2015) - [c36]Zhongxing Ming, Mingwei Xu, Ning Wang, Bingjie Gao, Qi Li:
TAFTA: A Truthful Auction Framework for User Data Allowance Trading in Mobile Networks. ICDCS 2015: 804-805 - [c35]Yanyu Chen, Qing Li
, Yuan Yang, Qi Li, Yong Jiang, Xi Xiao:
Towards adaptive elastic distributed Software Defined Networking. IPCCC 2015: 1-8 - [c34]Sheng Guo, Shu Yang, Qi Li, Yong Jiang:
Towards Controller Placement for robust Software-Defined Networks. IPCCC 2015: 1-8 - [c33]Zhen Feng, Mingwei Xu, Yuan Yang, Qi Li, Yu Wang, Qing Li
, Börje Ohlman, Meng Chen:
Joint optimization of content replication and Traffic Engineering in ICN. LCN 2015: 55-63 - [c32]Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:
Xede: Practical Exploit Early Detection. RAID 2015: 198-221 - 2014
- [j12]Yuan Yang, Mingwei Xu, Qi Li:
Towards fast rerouting-based energy efficient routing. Comput. Networks 70: 1-15 (2014) - [j11]Qi Li, Dah Ming Chiu, Mingwei Xu
, Jianping Wu:
An economic analysis of routing conflict and its resolution. Perform. Evaluation 71: 25-43 (2014) - [j10]Qi Li, Mingwei Xu, Yuan Yang, Lixin Gao, Yong Cui, Jianping Wu:
Safe and Practical Energy-Efficient Detour Routing in IP Networks. IEEE/ACM Trans. Netw. 22(6): 1925-1937 (2014) - [c31]Gautier Bayzelon, Shu Yang, Mingwei Xu, Qi Li:
Multi-dimensional Forwarding Tables. ICoC 2014: 68-79 - [c30]Yu Wang, Mingwei Xu, Zhen Feng, Qing Li
, Qi Li:
Session-based access control in information-centric networks: Design and analyses. IPCCC 2014: 1-8 - [c29]Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng:
Revisiting Node Injection of P2P Botnet. NSS 2014: 124-137 - 2013
- [c28]Hai-Tao Zheng, Qi Li, Yong Jiang, Shu-Tao Xia, Lan-Shan Zhang:
Exploiting Multiple Features for Learning to Rank in Expert Finding. ADMA (2) 2013: 219-230 - [c27]Bo Tang, Qi Li, Ravi Sandhu:
A multi-tenant RBAC model for collaborative cloud services. PST 2013: 229-238 - [c26]Qi Li, Dan Wang, Wenzeng Zhang, Zhenguo Sun:
Switchable under-actuated finger with multiple grasping modes. ROBIO 2013: 716-721 - [c25]Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. SecureComm 2013: 216-233 - 2012
- [j9]Mingwei Xu, Yuan Yang, Qi Li:
Selecting shorter alternate paths for tunnel-based IP Fast ReRoute in linear time. Comput. Networks 56(2): 845-857 (2012) - [j8]Mingwei Xu, Qing Li
, Lingtao Pan, Qi Li, Dan Wang:
Minimum Protection Cost Tree: A tunnel-based IP Fast Reroute Scheme. Comput. Commun. 35(17): 2082-2092 (2012) - [j7]Mingwei Xu, Qi Li, Patrick P. C. Lee
, Yanhai Peng, Jianping Wu:
VegaNet: a virtualized experimentation platform for production networks with connectivity consistency. IEEE Netw. 26(5): 15-21 (2012) - [j6]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee
, Ke Xu:
Enhancing the Trust of Internet Routing With Lightweight Route Attestation. IEEE Trans. Inf. Forensics Secur. 7(2): 691-703 (2012) - [j5]Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee
, Xingang Shi, Dah Ming Chiu, Yuan Yang:
A Unified Approach to Routing Protection in IP Networks. IEEE Trans. Netw. Serv. Manag. 9(3): 306-319 (2012) - 2011
- [j4]Mingwei Xu, Qi Li, Yuan Yang, Meijia Hou, Lingtao Pan:
Self-healing routing: failure, modeling and analysis. Sci. China Inf. Sci. 54(3): 609-622 (2011) - [j3]Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee
, Dah-Ming Chiu:
Toward a practical approach for BGP stability with root cause check. J. Parallel Distributed Comput. 71(8): 1098-1110 (2011) - [c24]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee
, Ke Xu:
Enhancing the trust of internet routing with lightweight route attestation. AsiaCCS 2011: 92-101 - [c23]Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee
, Ke Xu:
An Algebraic Approach to Computing the Reliability of Internet Routing. ICCCN 2011: 1-6 - [c22]Bin Zhang, Jiahai Yang, Jianping Wu, Qi Li, Donghong Qin:
An efficient parallel TCAM scheme for the forwarding engine of the next-generation router. Integrated Network Management 2011: 454-461 - [c21]Xue Zhi Jiang, Mingwei Xu, Qi Li:
Compact Route Computation: Improving Parallel BGP Route Processing for Scalable Routers. IPDPS Workshops 2011: 1496-1501 - [c20]Mingwei Xu, Qing Li, Lingtao Pan, Qi Li:
MPCT: Minimum protection cost tree for IP fast reroute using Tunnel. IWQoS 2011: 1-3 - [c19]