


Остановите войну!
for scientists:
Qi Li 0002
Person information

- affiliation: Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China
- affiliation: Beijing National Research Center for Information Science and Technology, Beijing, China
- affiliation (former): Tsinghua University, Graduate School at Shenzhen, China
- affiliation (former): Tsinghua University, Department of Computer Science, Beijing, China
- affiliation (former): Chinese Academy and Sciences, Institute of Software, Beijing, China
Other persons with the same name
- Qi Li — disambiguation page
- Qi Li 0001 — Western Kentucky University, Department of Mathematics and Computer Science, Bowling Green, KY, USA (and 1 more)
- Qi Li 0003
— China Earthquake Administration, China (and 1 more)
- Qi Li 0004
— Northern Kentucky University, Department of Computer Science, KY, USA (and 2 more)
- Qi Li 0005
— Chinese Academy of Sciences, Institute of Automation, CAS Center for Excellence in Brain Science and Intelligence Technology, Beijing, China
- Qi Li 0006 — Tsinghua University, Institute of Data Science, Centre for Computational Mental Healthcare Research, Beijing, China
- Qi Li 0007
— Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China (and 1 more)
- Qi Li 0008
— Beijing Jiaotong University, Department of Mechanical Engineering, China (and 1 more)
- Qi Li 0009
— Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Qi Li 0010
— National Grid UK, Electricity National Control Centre, Wokingham, UK (and 1 more)
- Qi Li 0011
— Nanjing University of Posts and Telecommunications, School of Computer Science / Jiangsu Key Laboratory of Big Data Security and Intelligent Processing / Jiangsu Innovative Coordination Center of Internet of Things, China (and 1 more)
- Qi Li 0012 — Iowa State University, Ames, IA, USA (and 2 more)
- Qi Li 0013 — Hong Kong University of Science and Technology, Hong Kong
- Qi Li 0014 — Rensselaer Polytechnic Institute, Department of Computer Science, Troy, NY USA (and 1 more)
- Qi Li 0015
— University of Pittsburgh, Department of Mechanical Engineering and Materials Science, PA, USA (and 1 more)
- Qi Li 0016
— University of Notre Dame, IN, USA
- Qi Li 0017 — Southeast University, Key Laboratory of Measurement and Control of Complex Systems of Engineering, Nanjing, China
- Qi Li 0018
— Zhejiang University, State Key Laboratory of Modern Optical Instrumentation, Hangzhou, China
- Qi Li 0019 — Partners HealthCare System, Clinical Informatics Research & Development, Boston, MA, USA
- Qi Li 0020 — University of Southern California, Center for Systems and Software Engineering, Los Angeles, CA, USA
- Qi Li 0021 — Hangzhou Normal University, Institute of Service Engineering, China (and 1 more)
- Qi Li 0022
— Beijing Institute of Technology, School of Software, China
- Qi Li 0023
— Chalmers University of Technology, Department of Microtechnology and Nanoscience, Gothenburg, Sweden
- Qi Li 0024
— China University of Petroleum (East China), College of Information and Control Engineering, Qingdao, China
- Qi Li 0025
— Shaoxing University, Department of Computer Science and Engineering, China (and 1 more)
- Qi Li 0026
— Xi'an Jiaotong University, School of Electrical Engineering, State Key Laboratory of Electrical Insulation and Power Equipment, China
- Qi Li 0027
— Harbin Institute of Technology (Weihai Campus), School of Automotive Engineering, China
- Qi Li 0028
— Changchun University of Science and Technology, School of Computer Science and Technology, China
- Qi Li 0029
— Dalian Maritime University, School of Information Science and Technology, China (and 1 more)
- Qi Li 0030
— Tianjin University, School of Electrical and Information Engineering, China
- Qi Li 0031
— Central South University, School of Information Science and Engineering, Changsha, China
- Qi Li 0032
— Zhongyuan University of Technology, School of Electronic and Information Engineering, Zhengzhou, China
- Qi Li 0033
— University of Guelph, School of Computer Science, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j65]Jie Sun
, Lingchen Zhao, Zhuotao Liu, Qi Li, Xinhao Deng, Qian Wang
, Yong Jiang:
Practical differentially private online advertising. Comput. Secur. 112: 102504 (2022) - [j64]Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun
, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. IEEE Trans. Dependable Secur. Comput. 19(1): 607-619 (2022) - [j63]Qi Li
, Xinhao Deng
, Zhuotao Liu
, Yuan Yang, Xiaoyue Zou
, Qian Wang
, Mingwei Xu
, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. IEEE Trans. Inf. Forensics Secur. 17: 486-499 (2022) - [j62]Xuewei Feng
, Qi Li
, Kun Sun
, Chuanpu Fu, Ke Xu
:
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. IEEE/ACM Trans. Netw. 30(1): 409-422 (2022) - [j61]Bingyu Li
, Jingqiang Lin
, Fengjun Li
, Qiongxiao Wang, Wei Wang
, Qi Li
, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. IEEE/ACM Trans. Netw. 30(2): 749-765 (2022) - [i16]Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li:
Towards Benchmarking and Evaluating Deepfake Detection. CoRR abs/2203.02115 (2022) - 2021
- [j60]Meng Shen
, Huan Wang, Bin Zhang, Liehuang Zhu
, Ke Xu
, Qi Li
, Xiaojiang Du
:
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing. IEEE Internet Things J. 8(4): 2265-2275 (2021) - [j59]Laizhong Cui
, Ziteng Chen
, Shu Yang
, Zhongxing Ming
, Qi Li
, Yipeng Zhou
, Shiping Chen
, Qinghua Lu
:
A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles. IEEE Internet Things J. 8(4): 2395-2408 (2021) - [j58]Peipei Jiang
, Qian Wang
, Muqi Huang, Cong Wang
, Qi Li
, Chao Shen
, Kui Ren
:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j57]Chalee Vorakulpipat
, Ryan K. L. Ko
, Qi Li
, Ahmed Meddahi
:
Security and Privacy in Smart Cities. Secur. Commun. Networks 2021: 9830547:1-9830547:2 (2021) - [j56]Pengfei Wu
, Robert H. Deng
, Qingni Shen
, Ximeng Liu
, Qi Li
, Zhonghai Wu:
ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Trans. Dependable Secur. Comput. 18(5): 2331-2348 (2021) - [j55]Qian Wang
, Baolin Zheng, Qi Li
, Chao Shen
, Zhongjie Ba:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 896-908 (2021) - [j54]Qiyang Song
, Zhuotao Liu
, Jiahao Cao
, Kun Sun
, Qi Li
, Cong Wang
:
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 1795-1809 (2021) - [j53]Meng Shen
, Hao Yu
, Liehuang Zhu
, Ke Xu
, Qi Li
, Jiankun Hu
:
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 4063-4077 (2021) - [j52]Man Zhou, Qian Wang
, Jingxiao Yang
, Qi Li
, Peipei Jiang
, Yanjiao Chen, Zhibo Wang
:
Stealing Your Android Patterns via Acoustic Signals. IEEE Trans. Mob. Comput. 20(4): 1656-1671 (2021) - [j51]Rémi Badonnel
, Carol Fung, Sandra Scott-Hayward, Qi Li, Jie Zhang, Cristian Hesselman:
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services. IEEE Trans. Netw. Serv. Manag. 18(2): 1120-1124 (2021) - [j50]Xiaoli Zhang
, Qi Li
, Zeyu Zhang
, Jianping Wu, Jiahai Yang
:
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud. IEEE/ACM Trans. Netw. 29(1): 78-91 (2021) - [j49]Peng Zhang, Fangzheng Zhang
, Shimin Xu, Zuoru Yang
, Hao Li
, Qi Li, Huanzhao Wang, Chao Shen, Chengchen Hu:
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks. IEEE/ACM Trans. Netw. 29(1): 332-345 (2021) - [j48]Guanyu Li
, Menghao Zhang
, Shicheng Wang
, Chang Liu, Mingwei Xu
, Ang Chen, Hongxin Hu
, Guofei Gu, Qi Li
, Jianping Wu:
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches. IEEE/ACM Trans. Netw. 29(4): 1509-1526 (2021) - [j47]Lingchen Zhao
, Qian Wang
, Cong Wang
, Qi Li
, Chao Shen
, Bo Feng:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. IEEE Trans. Parallel Distributed Syst. 32(10): 2524-2540 (2021) - [j46]Qi Li, Yunpeng Liu, Zhuotao Liu, Peng Zhang, Chunhui Pang:
Efficient Forwarding Anomaly Detection in Software-Defined Networks. IEEE Trans. Parallel Distributed Syst. 32(11): 2676-2690 (2021) - [c114]Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu:
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. ACSAC 2021: 260-272 - [c113]Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Zhenqiang Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu:
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks. ACSAC 2021: 297-310 - [c112]Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang:
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. AsiaCCS 2021: 565-577 - [c111]Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li:
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. AsiaCCS 2021: 931-943 - [c110]Baolin Zheng, Peipei Jiang
, Qian Wang
, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CCS 2021: 86-107 - [c109]Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. CCS 2021: 108-125 - [c108]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. CCS 2021: 3431-3446 - [c107]Xiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang:
Fast IPv6 Network Periphery Discovery and Security Implications. DSN 2021: 88-100 - [c106]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. ICML 2021: 1640-1650 - [c105]Jie Sun, Qi Li, Yong Jiang:
Privacy-Preserving Convex Factorization Machine. IJCNN 2021: 1-8 - [c104]Jingwen Fan, Yi He, Bo Tang, Qi Li, Ravi S. Sandhu:
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. INFOCOM 2021: 1-10 - [c103]Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li:
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. INFOCOM 2021: 1-10 - [c102]Songtao Fu, Ke Xu, Qi Li, Xiaoliang Wang, Su Yao, Yangfei Guo, Xinle Du:
MASK: Practical Source and Path Verification based on Multi-AS-Key. IWQoS 2021: 1-10 - [c101]Nan Geng, Mingwei Xu, Yuan Yang, Chenyi Liu, Jiahai Yang, Qi Li, Shize Zhang:
Distributed and Adaptive Traffic Engineering with Deep Reinforcement Learning. IWQoS 2021: 1-10 - [c100]Xiao Liang, Zheng Yang, Binghui Wang, Shaofeng Hu, Zijie Yang, Dong Yuan, Neil Zhenqiang Gong, Qi Li, Fang He:
Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach. KDD 2021: 3240-3250 - [c99]Yunjie Ge, Qian Wang
, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, Cong Wang:
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. ACM Multimedia 2021: 826-834 - [c98]Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu:
Data Poisoning Attacks to Deep Learning Based Recommender Systems. NDSS 2021 - [c97]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021 - [e2]Debin Gao
, Qi Li
, Xiaohong Guan, Xiaofeng Liao
:
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12918, Springer 2021, ISBN 978-3-030-86889-5 [contents] - [e1]Debin Gao
, Qi Li
, Xiaohong Guan, Xiaofeng Liao
:
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12919, Springer 2021, ISBN 978-3-030-88051-4 [contents] - [i15]Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu:
Data Poisoning Attacks to Deep Learning Based Recommender Systems. CoRR abs/2101.02644 (2021) - [i14]Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li:
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. CoRR abs/2102.05241 (2021) - [i13]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. CoRR abs/2106.06667 (2021) - [i12]Man Zhou, Qian Wang, Qi Li, Peipei Jiang, Jingxiao Yang, Chao Shen, Cong Wang, Shouhong Ding:
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns. CoRR abs/2106.08013 (2021) - [i11]Guangmeng Zhou, Ke Xu, Qi Li, Yang Liu, Yi Zhao:
AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning. CoRR abs/2106.14126 (2021) - [i10]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. CoRR abs/2106.14707 (2021) - [i9]Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. CoRR abs/2108.09513 (2021) - [i8]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CoRR abs/2110.09714 (2021) - 2020
- [j45]Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo:
SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Commun. Mag. 58(1): 47-53 (2020) - [j44]Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu:
Toward Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Netw. 34(1): 108-115 (2020) - [j43]Bo Wu, Ke Xu, Qi Li, Shoushou Ren, Zhuotao Liu, Zhichao Zhang:
Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Netw. 34(2): 30-36 (2020) - [j42]Xiaoliang Wang, Ke Xu, Wenlong Chen, Qi Li, Meng Shen, Bo Wu:
ID-Based SDN for the Internet of Things. IEEE Netw. 34(4): 76-83 (2020) - [j41]Dong Yuan, Qi Li
, Guoliang Li
, Qian Wang
, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 15: 299-314 (2020) - [j40]Rémi Badonnel
, Carol Fung, Qi Li
, Sandra Scott-Hayward
:
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. IEEE Trans. Netw. Serv. Manag. 17(1): 12-14 (2020) - [j39]Shu Yang
, Laizhong Cui
, Xinhao Deng
, Qi Li
, Yulei Wu
, Mingwei Xu, Dan Wang, Jianping Wu:
FISE: A Forwarding Table Structure for Enterprise Networks. IEEE Trans. Netw. Serv. Manag. 17(2): 1181-1196 (2020) - [j38]Peng Zhang
, Hui Wu
, Dan Zhang
, Qi Li
:
Verifying Rule Enforcement in Software Defined Networks With REV. IEEE/ACM Trans. Netw. 28(2): 917-929 (2020) - [c96]Shu Wang
, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CCS 2020: 1103-1119 - [c95]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CCS 2020: 1323-1335 - [c94]Jianhua Sun, Kun Sun, Qi Li:
Towards a Believable Decoy System: Replaying Network Activities from Real System. CNS 2020: 1-9 - [c93]Yunzhe Guo, Dan Wang, Arun Vishwanath, Cheng Xu, Qi Li:
Towards Federated Learning for HVAC Analytics: A Measurement Study. e-Energy 2020: 68-73 - [c92]Xuankai Liu, Fengting Li, Bihan Wen
, Qi Li:
Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. ICPR 2020: 10149-10156 - [c91]Zihan Zhang, Mingxuan Liu, Chao Zhang, Yiming Zhang, Zhou Li
, Qi Li, Haixin Duan, Donghong Sun:
Argot: Generating Adversarial Readable Chinese Texts. IJCAI 2020: 2533-2539 - [c90]Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu:
Enabling Execution Assurance of Federated Learning at Untrusted Participants. INFOCOM 2020: 1877-1886 - [c89]Ruming Tang, Zheng Yang, Zeyan Li, Weibin Meng, Haixin Wang, Qi Li, Yongqian Sun, Dan Pei
, Tao Wei, Yanfei Xu, Yan Liu:
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. INFOCOM 2020: 2479-2488 - [c88]Fan Yang, Ke Xu, Qi Li, Rongxing Lu, Bo Wu, Tong Zhang, Yi Zhao, Meng Shen:
I Know If the Journey Changes: Flexible Source and Path Validation. IWQoS 2020: 1-6 - [c87]Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020 - [c86]Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu:
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. NDSS 2020 - [c85]Shu Wang, Jiahao Cao, Kun Sun, Qi Li:
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. RAID 2020: 365-379 - [c84]Ruming Tang, Cheng Huang, Yanti Zhou, Haoxian Wu, Xianglin Lu, Yongqian Sun, Qi Li, Jinjin Li, Weiyao Huang, Siyuan Sun, Dan Pei
:
A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in Enterprises. SecureComm (2) 2020: 1-21 - [c83]Songsong Liu, Qiyang Song, Kun Sun, Qi Li:
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage. SecureComm (2) 2020: 275-290 - [i7]Xuankai Liu, Fengting Li, Bihan Wen, Qi Li:
Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. CoRR abs/2008.00407 (2020) - [i6]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CoRR abs/2008.12981 (2020) - [i5]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CoRR abs/2009.00718 (2020) - [i4]Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du:
Robust Attacks on Deep Learning Face Recognition in the Physical World. CoRR abs/2011.13526 (2020)
2010 – 2019
- 2019
- [j37]Bo Wu, Ke Xu, Qi Li, Bingyang Liu, Shoushou Ren, Fan Yang, Meng Shen
, Kui Ren:
RFL: Robust fault localization on unreliable communication channels. Comput. Networks 158: 158-174 (2019) - [j36]Tao Lei
, Zhan Qin, Zhibo Wang
, Qi Li
, Dengpan Ye:
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet Things J. 6(4): 6668-6680 (2019) - [j35]Qi Li, Jiajia Liu, Yih-Chun Hu, Mingwei Xu, Jianping Wu:
BGP with BGPsec: Attacks and Countermeasures. IEEE Netw. 33(4): 194-200 (2019) - [j34]Qi Li
, Xiaoyue Zou
, Qun Huang
, Jing Zheng
, Patrick P. C. Lee
:
Dynamic Packet Forwarding Verification in SDN. IEEE Trans. Dependable Secur. Comput. 16(6): 915-929 (2019) - [j33]Yanjiao Chen
, Xin Tian, Qian Wang
, Minghui Li
, Minxin Du
, Qi Li
:
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum. IEEE Trans. Mob. Comput. 18(10): 2270-2284 (2019) - [c82]Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen:
Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. ASPLOS 2019: 93-105 - [c81]Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang
, Xiao Liang:
Detecting Fake Accounts in Online Social Networks at the Time of Registrations. CCS 2019: 1423-1438 - [c80]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. CCS 2019: 2505-2520 - [c79]Qingyuan Gong, Jiayun Zhang
, Yang Chen, Qi Li, Yu Xiao
, Xin Wang, Pan Hui:
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. CIKM 2019: 1251-1260 - [c78]Xingliang Yuan, Chengjun Cai
, Qian Wang
, Qi Li:
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. DSC 2019: 1-8 - [c77]Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, Qi Li:
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. DSN 2019: 289-301 - [c76]Shengsheng Yao, Mingwei Xu, Qi Li, Jiahao Cao, Qiyang Song:
cSFC: Building Credible Service Function Chain on the Cloud. GLOBECOM 2019: 1-6 - [c75]Congli Wang, Jingqiang Lin, Bingyu Li, Qi Li, Qiongxiao Wang, Xiaokun Zhang:
Analyzing the Browser Security Warnings on HTTPS Errors. ICC 2019: 1-6 - [c74]Renjie Xie, Mingwei Xu, Jiahao Cao, Qi Li:
SoftGuard: Defend Against the Low-Rate TCP Attack in SDN. ICC 2019: 1-6 - [c73]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren:
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. ICDCS 2019: 1106-1116 - [c72]Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang:
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. ICDE 2019: 626-637 - [c71]Xiaoli Zhang, Huayi Duan
, Cong Wang, Qi Li, Jianping Wu:
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. INFOCOM 2019: 1162-1170 - [c70]Qian Wang
, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. INFOCOM 2019: 2062-2070 - [c69]Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, Dawn Song:
Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study. KDD 2019: 2012-2022 - [c68]Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:
Fingerprinting SDN Applications via Encrypted Control Traffic. RAID 2019: 501-515 - [c67]Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, Ravi S. Sandhu:
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. SACMAT 2019: 83-92 - [c66]Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li:
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. SecureComm (1) 2019: 429-449 - [c65]Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. USENIX Security Symposium 2019: 19-36 - [i3]Shu Yang, Laizhong Cui, Xinhao Deng, Qi Li, Yulei Wu, Mingwei Xu, Dan Wang, Jianping Wu:
Two Dimensional Router: Design and Implementation. CoRR abs/1908.04374 (2019) - [i2]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. CoRR abs/1909.06961 (2019) - 2018
- [j32]Yuchao Zhang, Ke Xu, Haiyang Wang, Qi Li, Tong Li, Xuan Cao:
Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains. IEEE Netw. 32(2): 138-143 (2018) - [j31]Yuan Yang
, Mingwei Xu, Qi Li
:
Fast Rerouting Against Multi-Link Failures Without Topology Constraint. IEEE/ACM Trans. Netw. 26(1): 384-397 (2018) - [j30]Qi Li
, Yanyu Chen, Patrick P. C. Lee
, Mingwei Xu, Kui Ren:
Security Policy Violations in SDN Data Plane. IEEE/ACM Trans. Netw. 26(4): 1715-1727 (2018) - [j29]Jie Zhu, Qi Li
, Cong Wang
, Xingliang Yuan
, Qian Wang
, Kui Ren:
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Trans. Parallel Distributed Syst. 29(8): 1721-1735 (2018) - [j28]Peng Zhang
, Chengchen Hu, Di Chen, Hao Li
, Qi Li
:
ShiftRoute: Achieving Location Privacy for Map Services on Smartphones. IEEE Trans. Veh. Technol. 67(5): 4527-4538 (2018) - [c64]Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang:
A Multi-tab Website Fingerprinting Attack. ACSAC 2018: 327-341 - [c63]Man Zhou, Qian Wang
, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CCS 2018: 1775-1787 - [c62]Peng Zhang, Shimin Xu, Zuoru Yang, Hao Li
, Qi Li, Huanzhao Wang, Chengchen Hu:
FOCES: Detecting Forwarding Anomalies in Software Defined Networks. ICDCS 2018: 830-840 - [c61]