Qi Li

Orcid: 0000-0003-3078-3600

Affiliations:
  • Beijing University of Technology, Information and Communication Engineering, China
  • Beijing University of Posts and Telecommunications, Key Laboratory of Universal Wireless Communication, China (PhD 2022)


According to our database1, Qi Li authored at least 51 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Machine Learning-Based Reliable Transmission for UAV Networks With Hybrid Multiple Access.
IEEE Trans. Netw. Serv. Manag., February, 2025

ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation Correction.
IEEE Trans. Inf. Forensics Secur., 2025

F2Attack: Two-Factors Scoring Method for Query-Efficient Hard-Label Black-Box Textual Adversarial Attacks.
IEEE Trans. Inf. Forensics Secur., 2025

Graph Learning on Instruction Stream-Augmented CFG for Malware Variant Detection.
IEEE Trans. Inf. Forensics Secur., 2025

Performance Optimization and Improvement of ISAC-Enabled Industrial IoT Based on Intelligent Sharding Blockchain.
Proceedings of the IEEE International Conference on Communications, 2025

2024
Energy-Efficient Communication and Computing Scheduling in UAV-Aided Industrial IoT.
IEEE Internet Things J., September, 2024

ISAC-Aided UAV Swarms: From Networked Perception to Capability Evolution.
IEEE Commun. Mag., September, 2024

Toward Throughput Maximization of Integrated Sensing and Communications Enabled Predictive Beamforming for 6G.
IEEE Netw., July, 2024

Joint Communication, Sensing, and Computing in Space-Air-Ground Integrated Networks: System Architecture and Handover Procedure.
IEEE Veh. Technol. Mag., June, 2024

UAV Altitude, Relay Selection, and User Association Optimization for Cooperative Relay-Transmission in UAV-IRS-Based THz Networks.
IEEE Trans. Green Commun. Netw., June, 2024

MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning.
IEEE Trans. Netw. Serv. Manag., April, 2024

A Security Evaluation Framework for Intelligent Connected Vehicles Based on Attack Chains.
IEEE Netw., March, 2024

Graph Mining for Cybersecurity: A Survey.
ACM Trans. Knowl. Discov. Data, February, 2024

Efficient IoT Device Identification via Network Behavior Analysis Based on Time Series Dictionary.
IEEE Internet Things J., February, 2024

UCP2-ACGAN: An adaptive condition GAN guided by U-shaped context perceptual processor for PET/CT images fusion.
Biomed. Signal Process. Control., 2024

Dynamic Resource Allocation for ISAC enabled Internet of Vehicles.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

2023
GMRE-iUnet: Isomorphic Unet fusion model for PET and CT lung tumor images.
Comput. Biol. Medicine, November, 2023

Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features.
Inf. Sci., October, 2023

Deep learning methods for medical image fusion: A review.
Comput. Biol. Medicine, June, 2023

A Cooperative Recharging-Transmission Strategy in Powered UAV-Aided Terahertz Downlink Networks.
IEEE Trans. Veh. Technol., April, 2023

Reliable Transmission for NOMA Systems With Randomly Deployed Receivers.
IEEE Trans. Commun., February, 2023

Physical Layer Security for Full Duplex Relay System.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Collaborative D2D Cache System Based on SDN Network.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

Spear-Phishing Detection Method Based on Few-Shot Learning.
Proceedings of the Advanced Parallel Processing Technologies, 2023

2022
A Collaborative Caching-Transmission Method for Heterogeneous Video Services in Cache-Enabled Terahertz Heterogeneous Networks.
IEEE Trans. Veh. Technol., 2022

LSTM Based Phishing Detection for Big Email Data.
IEEE Trans. Big Data, 2022

2021
Analysis of a Cooperative Caching-Multicast Strategy in D2D-Aided Networks.
IEEE Wirel. Commun. Lett., 2021

CNN-Based Malware Variants Detection Method for Internet of Things.
IEEE Internet Things J., 2021

Performance analysis of the collaborative caching strategy in an UAV-RAN.
EURASIP J. Wirel. Commun. Netw., 2021

An IRL-based malware adversarial generation method to evade anti-malware engines.
Comput. Secur., 2021

A Cooperative Caching and Computing-Offloading Method for 3C Trade-Off in VR Video Services.
IEEE Access, 2021

Attention-based Feature Fusion Network for Fake Reviews Detection.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021

2019
LSTM-Based SQL Injection Detection Method for Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2019

A novel method to find important apps base on the analysis of components relationship.
Clust. Comput., 2019

A SQL Injection Detection Method Based on Adaptive Deep Forest.
IEEE Access, 2019

2018
Mining Association Rules Based on Deep Pruning Strategies.
Wirel. Pers. Commun., 2018

Defect Prediction in Android Binary Executables Using Deep Neural Network.
Wirel. Pers. Commun., 2018

Research on SQL Injection Vulnerability Attack model.
Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018

2017
CRSPR: PageRank for Android Apps.
IEEE Access, 2017

An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs.
IEEE Access, 2017

Research on machine learning algorithms and feature extraction for time series.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

2016
A control flow obfuscation method for Android applications.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Defect trigger model: Analysis method of mobile application defect.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A method to detect Android ad plugins based on decompiled digital sequence.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Combination attack of android applications analysis scheme based on privacy leak.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2014
Green heterogeneous network with load balancing in LTE-A systems.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Privacy Information Security Classification Study in Internet of Things.
Proceedings of the International Conference on Identification, 2014

2013
A Novel Element Detection Method in Audio Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Joint Power Reduction and Time-Domain Scheduling for Interference Mitigation in Macro-Pico Heterogeneous Networks with Differential Evolution.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

The study of load balancing based on the network flow theory in LTE-A systems.
Proceedings of the IEEE 24th International Symposium on Personal, 2013

Dynamic enhanced Inter-Cell Interference Coordination using reinforcement learning approach in Heterogeneous Network.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013


  Loading...