Papers: |
Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li: Combating the Evasion Mechanisms of Social Bots. Computers & Security. 2016(58)230-249. (CCF-B)
Yukun He, Guangyan Zhang, Jie Wu, Qiang Li: Understanding a Prospective Approach to Designing Malicious Social Bots. Security and Communication Networks, 9(13): 2157-2172, 2016. (CCF-C)
Jian Cao, Qiang Li, Yuede Ji, Yukun He, Dong Guo: Detection of Forwarding-Based Malicious URLs in Online Social Networks. International Journal of Parallel Programming 44(1): 163-180, 2016 (Best Paper Award of NPC 2014)
Dong Guo, Jian Cao, Xiaoqi Wang, Qiang Fu, Qiang Li: Combating -Code-Based Compromised Accounts in Mobile Social Networks. Sensors 2016, 16(9), 1522.
李祥楠, 张广艳, 李强, 郑纬民. 固态盘阵列构建方法研究综述. 计算机研究与发展. 2016, 53 (9):1893-1905.
Yuede Ji, Qiang Li, Yukun He, Dong Guo: BotCatch: leveraging signature and behavior for bot detection. Security and Communication Networks 8(6): 952-969, 2015 (CCF-C)
Yuede Ji, Qiang Li, Yukun He, Dong Guo: Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection, International Journal of Distributed Sensor Networks Volume 2015, Article ID 524627, 1-17.
Jian Cao, Qiang Fu, Qiang Li, Dong Guo: Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. 15th International Conference on Algorithms and Architectures for Parallel Processing, 2015: 323-336. LNCS 9530, Springer. (CCF-C)
Yuede Ji, Yukun He, Xinyang Jiang, Qiang Li: Towards social botnet behavior detecting in the end host. 20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014: 320-327, Hsinchu, Taiwan, December 16-19, 2014. (CCF-C)
Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo: A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. 10th International Conference on Information Security Practice and Experience, ISPEC 2014: 75-89, Fuzhou, China, May 5-8, 2014. LNCS 8434, Springer.
何毓锟,李强,嵇跃德,郭东.一种关联网络和主机行为的延迟僵尸检测方法.计算机学报,2014,37(1):50-61.
Yukun He, Qiang Li, Yuede Ji, Dong Guo: BotInfer: A Bot Inference Approach by Correlating Host and Network Information. 10th IFIP International Conference on Network and Parallel Computing, NPC 2013: 356-367, Guiyang, China, September 19-21, 2013. LNCS 8147, Springer. (CCF-C)
Yuede Ji, Yukun He, Qiang Li, Dong Guo: BotCatch: A Behavior and Signature Correlated Bot Detection Approach. 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2013 : 1634-1639, Zhangjiajie, China, November 13-15, 2013. (CCF-C)
李强,向阳. 推测网络蠕虫传播路径的在线聚积算法. 软件学报, 2010,21(4):802-815
Wei Shi, Qiang Li, Jian Kang, Dong Guo, Reconstruction of Worm Propagation Path by Causality, International Conference on Networking, Architecture, and Storage, NAS 2009:129-132, 9-11 July 2009, ZhangJiaJie, Hunan, China.
Yang Xiang, Qiang Li, Dong Guo, Online Accumulation: Reconstruction of Worm Propagation Path. NPC 2008:162-172, Springer-Verlag LNCS 5245, October 18-20, Shanghai, China. (CCF-C) (Outstanding Paper Award)
Yang Xiang, Qiang Li, Online Tracing Scanning Worm with Sliding Window, Proceeding of Inscrypt 2007, Revised Selected Papers: 482-496, 3rd SKLOIS Conference on Information Security and Cryptology, Springer-Verlag LNCS 4990, Xining, China.
Qiang Li, Yan Lin, Kun Liu, Jiubin Ju: Constructing Correlations in Attack Connection Chains Using Active Perturbation. Algorithmic Applications in Management, First International Conference, AAIM 2005: 252-260, Xian, China, June 22-25, 2005, Proceedings. LNCS 3521, Springer.
Qiang Li, Qinyuan Feng, Kun Liu, Jiubin Ju: Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder. Networking and Mobile Computing, Third International Conference, ICCNMC 2005: 642-651, Zhangjiajie, China, August 2-4, 2005, Proceedings. LNCS 3619, Springer.
Qiang Li, Hongzi Zhu, Meng Zhang, Jiubin Ju: Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2. Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005: 348-352, 5-8 December 2005, Dalian, China
Qiang Li, Qinyuan Feng, Liang Hu, Jiubin Ju: Fast Two Phrases PPM for IP Traceback. Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005: 386-389, 5-8 December 2005, Dalian, China
|