Position: Home > Faculty > Associate Professor > L > Content

Qi Li

Apr 6, 2021 18:23

职称 Associate Professor 部门
加盟部门 邮箱 qli01@tsinghua.edu.cn
电话

Qi Li

Associate Professor

Email: qli01@tsinghua.edu.cn

Homepage:http://netsec.ccert.edu.cn/people/qli

Bio: Qi Li received his Ph.D. degree in Computer Science from Tsinghua University. Now he is an associate professor of Institute for Network Sciences and Cyberspace, Tsinghua University. He has ever worked at ETH Zurich, the University of Texas at San Antonio, The Chinese University of Hong Kong, Chinese Academy of Sciences, and Intel. He heads the Internet and Cloud Security Group with a group of graduate students working on different topics in security. His research interests are in network and system security, particularly in Internet security, mobile security, and big data security. He is currently an editorial board member of IEEE Transactions on Dependable and Secure Computing and ACM Digital Threats: Research and Practice, and has served on the organization or program committees of various premier conferences.

Education background

Ph.D., Tsinghua University, 2012.

Experience

Tsinghua University, Associate Professor (September 2014 - )

ETH Zurich, Scientific Specialist (March 2013 - August 2014)

The University of Texas at San Antonio, Postdoctoral Fellow (February 2012 - January 2013)

Social service

ACM SIGSAC China, Vice Chair

Journal Editorialship

Associate Editor: IEEE Transactions on Dependable and Secure Computing (2015-now)

Associate Editor: ACM Digital Threats: Research and Practice (2019-now)

Guest Editor: IEEE Transactions on Network and Service Management – Special Issue on Cybersecurity Techniques for Managing Networked Systems

Guest Editor: CCF Transactions on Networking – Special Issue on AI Security in Emerging Networking Contexts

Guest Editor: IEEE Transactions on Dependable and Secure Computing – Special Issue on AI/ML for Secure Computing

Guest Editor: IEEE Communications Magazine – Special Issue on Sustainable Incentive Mechanisms for Mobile Crowdsensing

Conference/Workshop Organization

Web Co-Chairs: IEEE International Conference on Computer Communications (INFOCOM) 2020

Vice General Co-Chairs: International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2019

Track Co-Chairs: International Conference on Computer Communications and Networks (ICCCN) 2018

Publicity Co-Chairs: International Performance Computing and Communications Conference (IPCCC) 2017

Publicity Co-Chairs: ACM TURC 2017 (SIGSAC China) 2017

Travel Grant Co-Chairs: ACM International Conference on Information-Centric Networking (ICN) 2016

Web and Publicity Chair: ACM Workshop on Scalable Trusted Computing (STC) 2012

TPC Member

2020: NDSS, IEEE DSN, ACM ASIACCS, ACM CODASPY, ACNS, IFIP Networking

2019: ACSAC, IEEE ICDCS, IFIP Networking, ACM CODASPY, ACM CPSS, ACM SCC, IEEE MASS, IEEE/ACM IWQoS

2018: IEEE ICDCS, ACM CODASPY, IEEE/ACM IWQoS, IEEE MASS, ACM SCC, ACM CPSS

2017: IEEE ICDCS, IEEE/ACM IWQoS, ACM CODASPY, ISC

2016: IEEE/ACM IWQoS, ACM CDOASPY,

2015: ICPP, ACM CODASPY

2014: ACM CODASPY

Areas of Research Interests/ Research Projects

Internet and cloud security, mobile security, big data security and privacy

Machine learning for security and privacy, Robust machine learning

Blockchain security, blockchain for security

Honors And Awards

Changjiang Young Scholar, 2019.

Best Paper Award, IEEE DSC 2019.

Best Paper Award, IEEE ICPADS 2018.

Beijing Science and Technology Award, Beijing, 2017.

Best Paper Award, SECURECOMM 2017.

Alibaba Innovative Research Award, Alibaba, 2017.

Academic Achievement

Conference Papers

[1] Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. To appear in the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020.

[2] Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu. Enabling Execution Assurance of Federated Learning at Untrusted Participants. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April 27-30, 2020.

[3] Ruming Tang, Zheng Yang, Zeyan Li, Weibin Meng, Haixin Wang, Qi Li, Yongqian Sun, Dan Pei, Tao Wei, Yanfei Xu, Yan Liu. ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April 27-30, 2020.

[4] Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. To appear in the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019.

[5] Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang. Certificate Transparency in the Wild: Exploring the Reliability of Monitors. To appear in the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019.

[6] Qingyuan Gong, Jiayun Zhang, Yang Chen, Qi Li, Yu Xiao, Xin Wang, Pan Hui. Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. To appear in the 28th ACM International Conference on Information and Knowledge Management (CIKM), Beijing, China, November 3-7, 2019.

[7] Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. To appear in 28th USENIX Security Symposium (USENIX Security), Santa Clara, CA, August 14-16, 2019.

[8] Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, and Dawn Song. Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study, To appear in ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Applied Data Science track, Anchorage, Alaska, August, 4-8, 2019.

[9] Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren. SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. To appear in the Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), Dallas, Texas, July 7-10, 2019.

[10] Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu. Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019.

[11] Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019.

[12] Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen. Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. To appear in the Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, Rhode Island, USA, April 13-17, 2019.

[13] Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang. ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. To appear in the Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2019.

[14] Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang. A Multi-tab Website Fingerprinting Attack. To appear in the Proceedings of Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 3-7, 2018.

[15] Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, October 15-19, 2018.

[16] Peng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, and Chengchen Hu. FOCES: Detecting Forwarding Anomalies in Software Defined Networks. In the Proceedings of 37th IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, July 2-5, 2018.

[17] Dong Yuan, Guoliang Li, Qi Li, and Yudian Zheng. Sybil Defense in Crowdsourcing Platforms. In Proceedings of the 26th ACM International Conference on Information and Knowledge Management (CIKM), Singapore, November 6-10, 2017.

[18] Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng. Vulnerable Implicit Service: A Revisit. In the Proceedings of the 24nd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, October 30-November 3, 2017.

[19] Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng, JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. In the Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017.

[20] Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng, Xede: Practical Exploit Early Detection, The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, November 2-4, 2015.

Book Chapter

[1] Qi Li, Jiahao Cao, Mingwei Xu, and Kun Sun, Flow Table Overflow Attacks. In Encyclopedia of Wireless Networks. Xuemin (Sherman) Shen, Xiaodong Lin, and Kuan Zhang (Eds.), Springer, 2019, 978-3-319-32903-1.

Journal Papers

[1] Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Yanjiao Chen, Peipei Jiang. Stealing Your Android Patterns via Acoustic Signals. IEEE Transactions on Mobile Computing, to appear.

[2] Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo. SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Communications Magazine, to appear.

[3] Pengfei Wu, Ximeng Liu, Robert H.J. Deng, Qingni Shen, Qi Li, Zhonghai Wu. ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Transactions on Dependable and Secure Computing, to appear.

[4] Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu, Towards Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Network Magazine, to appear.

[5] Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Shoushou Ren, Zhichao Zhang, Towards Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Network Magazine, to appear.

[6] Qi Li, Xiaoyue Zou, Qun Huang, Jing Zheng, and Patrick P.C. Lee. Dynamic Packet Forwarding Verification in SDN, IEEE Transactions on Dependable and Secure Computing, to appear.

[7] Qi Li, Yanyu Chen, Patrick P. C. Lee, Mingwei Xu, and Kui Ren. Security Policy Violations in SDN Data Plane, IEEE/ACM Transactions on Networking, 26(4): 1715-1727, 2018.

[8] Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, and Kui Ren. Enabling Generic, Verifiable, and Secure Data Search on Cloud, IEEE Transactions on Parallel and Distributed Systems, 29(8): 1721-1735, 2018.

[9] Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K.Y. Yau, and Jianping Wu. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis, IEEE Transactions on Information Forensics and Security, 13(7): 1838-1853, 2018.

[10] Yuan Yang, Mingwei Xu, and Qi Li. Fast Rerouting against Multi-link Failures without Topology Constraint, IEEE/ACM Transactions on Networking, 26(1): 384-397, 2018.

[11] Qi Li, Patrick P. C. Lee, Peng Zhang, Purui Su, Liang He, and Kui Ren. Capability-Based Security Enforcement in Named Data Networking, IEEE/ACM Transactions on Networking, 25(5): 2719-2730, 2017.

[12] Peng Zhang, Qi Li, and Patrick P. C. Lee, Achieving Content-Oriented Anonymity with CRISP, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(6): 578-590, 2017.

[13] Qi Li, Ravi Sandhu, Xinwen Zhang, Mingwei Xu, Mandatory Content Access Control for Privacy Protection in Information Centric Networks, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(5): 494-506, 2017.

[14] Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng, Direct Resource Hijacking in Android, Internet Computing, IEEE, 20(5):46-56, 2016.

[15] Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya, Ensuring Security and Privacy Preservation for Cloud Data Services, ACM Computing Surveys, ACM, 49(1):1-39, 2016.

[16] Qi Li, Xinwen Zhang, Xin Zhang, and Purui Su. Invalidating Idealized BGP Security Proposals and Countermeasures, IEEE Transactions on Dependable and Secure Computing, IEEE, 12(3): 298-311, 2015.

[17] Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, IEEE, 10(2):308-320, 2015.

[18] Qi Li, Mingwei Xu, Yuan Yang, Lixin Gao, Yong Cui, and Jianping Wu. Safe and Practical Energy-Efficient Detour Routing in IP Networks, IEEE/ACM Transactions on Networking, IEEE, 22(6): 1925-1937, 2014.

Previous:Jianmin LI

Next:Xiu LI

Close