李琦(校内兼职)

2021.03.31 18:24

职称 副教授 电话
邮箱 qli01 at tsinghua.edu.cn

姓名:李琦

职称:副教授

邮箱:qli01 at tsinghua.edu.cn

主页:http://netsec.ccert.edu.cn/people-cn/qli

简介:李琦目前为清华大学副教授,入选2018年教育部青年长江学者,研究兴趣包括互联网和云安全、移动安全以及大数据安全。发表论文包括USENIX Security、ACM CCS、NDSS和IEEE/ACM汇刊等会议和期刊论文。相关研究成果被谷歌和腾讯等采纳,曾获得2017年北京市科学技术二等奖和SECURECOMM 2017最佳论文等荣誉。目前是IEEE TDSC和ACM DTRAP等国际期刊的编委,国际会议RAID 2019会议副主席、以及NDSS和ACSAC等会议的程序或组织委员会委员。

教育背景

博士,计算机科学与技术,清华大学,2012

工作履历

副教授,清华大学,中国,2014.9-至今

研究科学家,苏黎世联邦理工学院,瑞士,2013.3-2014.8

博士后,德州大学圣安东尼奥分校,美国,2012.2-2013.1

社会兼职

ACM SIGSAC China, Vice Chair (2020至今)

中国计算机学会互联网专业委员会常委 (2015至今)

中国密码学会安全协议专家委员会委员 (2017至今)

中国计算机学会高级会员 (2016至今)

国际电子电器工程师学会高级会员 (2016至今)

期刊编辑

Associate Editor: IEEE Transactions on Dependable and Secure Computing (2015-now)

Associate Editor: ACM Digital Threats: Research and Practice (2019-now)

Guest Editor: IEEE Transactions on Network and Service Management – Special Issue on Cybersecurity Techniques for Managing Networked Systems

Guest Editor: CCF Transactions on Networking – Special Issue on AI Security in Emerging Networking Contexts

Guest Editor: IEEE Transactions on Dependable and Secure Computing – Special Issue on AI/ML for Secure Computing

Guest Editor: IEEE Communications Magazine – Special Issue on Sustainable Incentive Mechanisms for Mobile Crowdsensing

会议组织委员会委员

Web Co-Chairs: IEEE International Conference on Computer Communications (INFOCOM) 2020

Vice General Co-Chairs: International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2019

Track Co-Chairs: International Conference on Computer Communications and Networks (ICCCN) 2018

Publicity Co-Chairs: International Performance Computing and Communications Conference (IPCCC) 2017

Publicity Co-Chairs: ACM TURC 2017 (SIGSAC China) 2017

Travel Grant Co-Chairs: ACM International Conference on Information-Centric Networking (ICN) 2016

Web and Publicity Chair: ACM Workshop on Scalable Trusted Computing (STC) 2012

程序委员会委员

2020: NDSS, IEEE DSN, ACM ASIACCS, ACM CODASPY, ACNS, IFIP Networking

2019: ACSAC, IEEE ICDCS, IFIP Networking, ACM CODASPY, ACM CPSS, ACM SCC, IEEE MASS, IEEE/ACM IWQoS

2018: IEEE ICDCS, ACM CODASPY, IEEE/ACM IWQoS, IEEE MASS, ACM SCC, ACM CPSS

2017: IEEE ICDCS, IEEE/ACM IWQoS, ACM CODASPY, ISC

2016: IEEE/ACM IWQoS, ACM CDOASPY,

2015: ICPP, ACM CODASPY

2014: ACM CODASPY

研究领域

互联网和云安全、移动安全

机器学习与安全、大数据安全

区块链与安全

奖励与荣誉

教育部青年长江学者, 2019.

Best Paper Award, IEEE DSC 2019.

Best Paper Award, IEEE ICPADS 2018.

北京市科技进步二等奖, 2017.

Best Paper Award, SECURECOMM 2017.

Alibaba Innovative Research Award, Alibaba, 2017.

学术成果

Conference Papers

[1] Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. To appear in the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020.

[2] Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu. Enabling Execution Assurance of Federated Learning at Untrusted Participants. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April 27-30, 2020.

[3] Ruming Tang, Zheng Yang, Zeyan Li, Weibin Meng, Haixin Wang, Qi Li, Yongqian Sun, Dan Pei, Tao Wei, Yanfei Xu, Yan Liu. ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April 27-30, 2020.

[4] Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. To appear in the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019.

[5] Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang. Certificate Transparency in the Wild: Exploring the Reliability of Monitors. To appear in the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019.

[6] Qingyuan Gong, Jiayun Zhang, Yang Chen, Qi Li, Yu Xiao, Xin Wang, Pan Hui. Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. To appear in the 28th ACM International Conference on Information and Knowledge Management (CIKM), Beijing, China, November 3-7, 2019.

[7] Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. To appear in 28th USENIX Security Symposium (USENIX Security), Santa Clara, CA, August 14-16, 2019.

[8] Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, and Dawn Song. Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study, To appear in ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Applied Data Science track, Anchorage, Alaska, August, 4-8, 2019.

[9] Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren. SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. To appear in the Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), Dallas, Texas, July 7-10, 2019.

[10] Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu. Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019.

[11] Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019.

[12] Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen. Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. To appear in the Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, Rhode Island, USA, April 13-17, 2019.

[13] Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang. ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. To appear in the Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2019.

[14] Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang. A Multi-tab Website Fingerprinting Attack. To appear in the Proceedings of Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 3-7, 2018.

[15] Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, October 15-19, 2018.

[16] Peng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, and Chengchen Hu. FOCES: Detecting Forwarding Anomalies in Software Defined Networks. In the Proceedings of 37th IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, July 2-5, 2018.

[17] Dong Yuan, Guoliang Li, Qi Li, and Yudian Zheng. Sybil Defense in Crowdsourcing Platforms. In Proceedings of the 26th ACM International Conference on Information and Knowledge Management (CIKM), Singapore, November 6-10, 2017.

[18] Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng. Vulnerable Implicit Service: A Revisit. In the Proceedings of the 24nd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, October 30-November 3, 2017.

[19] Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng, JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. In the Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017.

[20] Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng, Xede: Practical Exploit Early Detection, The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, November 2-4, 2015.

Book Chapter

[1] Qi Li, Jiahao Cao, Mingwei Xu, and Kun Sun, Flow Table Overflow Attacks. In Encyclopedia of Wireless Networks. Xuemin (Sherman) Shen, Xiaodong Lin, and Kuan Zhang (Eds.), Springer, 2019, 978-3-319-32903-1.

Journal Papers

[1] Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Yanjiao Chen, Peipei Jiang. Stealing Your Android Patterns via Acoustic Signals. IEEE Transactions on Mobile Computing, to appear.

[2] Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo. SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Communications Magazine, to appear.

[3] Pengfei Wu, Ximeng Liu, Robert H.J. Deng, Qingni Shen, Qi Li, Zhonghai Wu. ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Transactions on Dependable and Secure Computing, to appear.

[4] Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu, Towards Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Network Magazine, to appear.

[5] Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Shoushou Ren, Zhichao Zhang, Towards Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Network Magazine, to appear.

[6] Qi Li, Xiaoyue Zou, Qun Huang, Jing Zheng, and Patrick P.C. Lee. Dynamic Packet Forwarding Verification in SDN, IEEE Transactions on Dependable and Secure Computing, to appear.

[7] Qi Li, Yanyu Chen, Patrick P. C. Lee, Mingwei Xu, and Kui Ren. Security Policy Violations in SDN Data Plane, IEEE/ACM Transactions on Networking, 26(4): 1715-1727, 2018.

[8] Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, and Kui Ren. Enabling Generic, Verifiable, and Secure Data Search on Cloud, IEEE Transactions on Parallel and Distributed Systems, 29(8): 1721-1735, 2018.

[9] Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K.Y. Yau, and Jianping Wu. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis, IEEE Transactions on Information Forensics and Security, 13(7): 1838-1853, 2018.

[10] Yuan Yang, Mingwei Xu, and Qi Li. Fast Rerouting against Multi-link Failures without Topology Constraint, IEEE/ACM Transactions on Networking, 26(1): 384-397, 2018.

[11] Qi Li, Patrick P. C. Lee, Peng Zhang, Purui Su, Liang He, and Kui Ren. Capability-Based Security Enforcement in Named Data Networking, IEEE/ACM Transactions on Networking, 25(5): 2719-2730, 2017.

[12] Peng Zhang, Qi Li, and Patrick P. C. Lee, Achieving Content-Oriented Anonymity with CRISP, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(6): 578-590, 2017.

[13] Qi Li, Ravi Sandhu, Xinwen Zhang, Mingwei Xu, Mandatory Content Access Control for Privacy Protection in Information Centric Networks, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(5): 494-506, 2017.

[14] Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng, Direct Resource Hijacking in Android, Internet Computing, IEEE, 20(5):46-56, 2016.

[15] Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya, Ensuring Security and Privacy Preservation for Cloud Data Services, ACM Computing Surveys, ACM, 49(1):1-39, 2016.

[16] Qi Li, Xinwen Zhang, Xin Zhang, and Purui Su. Invalidating Idealized BGP Security Proposals and Countermeasures, IEEE Transactions on Dependable and Secure Computing, IEEE, 12(3): 298-311, 2015.

[17] Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, IEEE, 10(2):308-320, 2015.

[18] Qi Li, Mingwei Xu, Yuan Yang, Lixin Gao, Yong Cui, and Jianping Wu. Safe and Practical Energy-Efficient Detour Routing in IP Networks, IEEE/ACM Transactions on Networking, IEEE, 22(6): 1925-1937, 2014.

上一篇:樊海宁

下一篇:裴丹

关闭