Qiang Li

Orcid: 0000-0001-7510-4718

Affiliations:
  • Jilin University, College of Computer Science and Technology, Changchun, China


According to our database1, Qiang Li authored at least 47 papers between 2005 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
BPT: A Blockchain-Based Privacy Information Preserving System for Trust Data Collection Over Distributed Mobile-Edge Network.
IEEE Internet Things J., 2022

BTS: A Blockchain-Based Trust System to Deter Malicious Data Reporting in Intelligent Internet of Things.
IEEE Internet Things J., 2022

Exploring the vulnerability in the inference phase of advanced persistent threats.
Int. J. Distributed Sens. Networks, 2022

LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning.
Comput. Secur., 2022

POSGen: Personalized Opening Sentence Generation for Online Insurance Sales.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Incentive Mechanism for Mobile Devices in Dynamic Crowd Sensing System.
IEEE Trans. Hum. Mach. Syst., 2021

Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing.
Peer-to-Peer Netw. Appl., 2021

Identifying compromised hosts under APT using DNS request sequences.
J. Parallel Distributed Comput., 2021

STMTO: A smart and trust multi-UAV task offloading system.
Inf. Sci., 2021

PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation.
Int. J. Distributed Sens. Networks, 2021

Practical Two-party Privacy-preserving Neural Network Based on Secret Sharing.
CoRR, 2021

Discovering unknown advanced persistent threat using shared features mined by neural networks.
Comput. Networks, 2021

2020
Discovering Suspicious APT Behaviors by Analyzing DNS Activities.
Sensors, 2020

Detecting mobile advanced persistent threats based on large-scale DNS logs.
Comput. Secur., 2020

2019
AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats.
Sensors, 2019

Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users.
Secur. Commun. Networks, 2019

QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks.
Peer-to-Peer Netw. Appl., 2019

Discovering Suspicious APT Families Through a Large-Scale Domain Graph in Information-Centric IoT.
IEEE Access, 2019

2018
Revealing Privacy Vulnerabilities of Anonymous Trajectories.
IEEE Trans. Veh. Technol., 2018

Towards fast and lightweight spam account detection in mobile social networks through fog computing.
Peer-to-Peer Netw. Appl., 2018

Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning.
IEEE Netw., 2018

SIoTFog: Byzantine-resilient IoT fog networking.
Frontiers Inf. Technol. Electron. Eng., 2018

Combating the evolving spammers in online social networks.
Comput. Secur., 2018

2017
Discovering hidden suspicious accounts in online social networks.
Inf. Sci., 2017

Understanding socialbot behavior on end hosts.
Int. J. Distributed Sens. Networks, 2017

GroupFound: An effective approach to detect suspicious accounts in online social networks.
Int. J. Distributed Sens. Networks, 2017

2016
Combating QR-Code-Based Compromised Accounts in Mobile Social Networks.
Sensors, 2016

Understanding a prospective approach to designing malicious social bots.
Secur. Commun. Networks, 2016

Detection of Forwarding-Based Malicious URLs in Online Social Networks.
Int. J. Parallel Program., 2016

Combating the evasion mechanisms of social bots.
Comput. Secur., 2016

2015
BotCatch: leveraging signature and behavior for bot detection.
Secur. Commun. Networks, 2015

Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection.
Int. J. Distributed Sens. Networks, 2015

Leveraging Behavior Diversity to Detect Spammers in Online Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches.
Proceedings of the Information Security Practice and Experience, 2014

Towards social botnet behavior detecting in the end host.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
BotInfer: A Bot Inference Approach by Correlating Host and Network Information.
Proceedings of the Network and Parallel Computing - 10th IFIP International Conference, 2013

BotCatch: A Behavior and Signature Correlated Bot Detection Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2011
Design and Realization of the Cloud Data Backup System Based on HDFS.
Proceedings of the Emerging Research in Web Information Systems and Mining, 2011

2009
Reconstruction of Worm Propagation Path by Causality.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

2008
Online Accumulation: Reconstruction of Worm Propagation Path.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

2007
Online Tracing Scanning Worm with Sliding Window.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Succinct Text Indexes on Large Alphabet.
Proceedings of the Theory and Applications of Models of Computation, 2006

2005
Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Fast Two Phrases PPM for IP Traceback.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Weighted Directed Word Graph.
Proceedings of the Combinatorial Pattern Matching, 16th Annual Symposium, 2005

Constructing Correlations in Attack Connection Chains Using Active Perturbation.
Proceedings of the Algorithmic Applications in Management, First International Conference, 2005


  Loading...