Bo Feng, Qiang Li, Yuede Ji, Dong Guo and Xiangyu Meng, Stopping the Cyber Attack in the Early Stage Assessing the Security Risks of Social Network Users , Security and Communication Networks, 2019. (CCF-C)
Xinyang Jiang, Qiang Li, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo. QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. Peer-to-Peer Networking and Applications, 2019. (CCF-C)
Zhen Ma, Qiang Li, Xiangyu Meng. Discovering Suspicious APT Families through A Large-scale Domain Graph in Information-centric IoT, IEEE Access, 2019.
Jianwen XU, Kaoru OTA, Mianxiong DONG, Anfeng LIU, Qiang LI. SIoTFog: Byzantine-resilient IoT fog networking. Frontiers of Information Technology & Electronic Engineering, 2018, 19(12), 1546-1557.
S. Chang, C. Li, H. Zhu, T. Lu and Q. Li. Revealing Privacy Vulnerabilities of Anonymous Trajectories, IEEE Transactions on Vehicular Technology, vol. 67, no. 12, pp. 12061-12071, Dec. 2018.
Bo Feng, Qiang Fu, Mianxiong Dong, Dong Guo and Qiang Li, Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning. IEEE Network, July/August 2018. (Section 1)
Jiahao Zhang, Qiang Li, Xiaoqi Wang, Bo Feng, Dong Guo. Towards fast and lightweight spam account detection in mobile social networks through fog computing, Peer-to-Peer Networking and Applications,11(4):778-792, 2018.(CCF-C)
Qiang Fu, Bo Feng, Dong Guo, Qiang Li. Combating the Evolving Spammers in Online Social Networks. Computers & Security, 2018(72C)60-73.(CCF-B)
Jian Cao, Qiang Fu, Qiang Li, Dong Guo. Discovering Hidden Suspicious Accounts in Online Social Networks. Information Sciences, 2017(394)123–140.(CCF-B)
王晓琪,李强,闫广华,玄光哲,郭东.高级持续性威胁中隐蔽可疑DNS行为的检测. 计算机研究与发展, 2017(10).
Bo Feng, Qiang Li, Xiaowen Pan, Jiahao Zhang, Dong Guo, GroupFound: An Effective Approach to Detect Suspicious Accounts in Online Social Networks, International Journal of Distributed Sensor Networks, 2017, 13(7).
Yukun He, Qiang Li, Jian Cao, Yuede Ji, Dong Guo, Understanding socialbot behavior on end hosts, International Journal of Distributed Sensor Networks, 2017, 13(2).
Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li: Combating the Evasion Mechanisms of Social Bots. Computers & Security. 2016(58)230-249. (CCF-B)
Yukun He, Guangyan Zhang, Jie Wu, Qiang Li: Understanding a Prospective Approach to Designing Malicious Social Bots. Security and Communication Networks, 9(13): 2157-2172, 2016. (CCF-C)
Jian Cao, Qiang Li, Yuede Ji, Yukun He, Dong Guo: Detection of Forwarding-Based Malicious URLs in Online Social Networks. International Journal of Parallel Programming 44(1): 163-180, 2016 (Best Paper Award of NPC 2014)
Dong Guo, Jian Cao, Xiaoqi Wang, Qiang Fu, Qiang Li: Combating QR-Code-Based Compromised Accounts in Mobile Social Networks. Sensors 2016, 16(9), 1522.
李祥楠, 张广艳, 李强, 郑纬民. 固态盘阵列构建方法研究综述. 计算机研究与发展. 2016, 53 (9):1893-1905.
Yuede Ji, Qiang Li, Yukun He, Dong Guo: BotCatch: leveraging signature and behavior for bot detection. Security and Communication Networks 8(6): 952-969, 2015 (CCF-C)
Yuede Ji, Qiang Li, Yukun He, Dong Guo: Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection, International Journal of Distributed Sensor Networks Volume 2015, Article ID 524627, 1-17.
Jian Cao, Qiang Fu, Qiang Li, Dong Guo: Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. 15th International Conference on Algorithms and Architectures for Parallel Processing, 2015: 323-336. LNCS 9530, Springer. (CCF-C)
Yuede Ji, Yukun He, Xinyang Jiang, Qiang Li: Towards social botnet behavior detecting in the end host. 20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014: 320-327, Hsinchu, Taiwan, December 16-19, 2014. (CCF-C)
Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo: A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. 10th International Conference on Information Security Practice and Experience, ISPEC 2014: 75-89, Fuzhou, China, May 5-8, 2014. LNCS 8434, Springer.
Yukun He, Qiang Li, Yuede Ji, Dong Guo: BotInfer: A Bot Inference Approach by Correlating Host and Network Information. 10th IFIP International Conference on Network and Parallel Computing, NPC 2013: 356-367, Guiyang, China, September 19-21, 2013. LNCS 8147, Springer. (CCF-C)
Yuede Ji, Yukun He, Qiang Li, Dong Guo: BotCatch: A Behavior and Signature Correlated Bot Detection Approach. 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2013 : 1634-1639, Zhangjiajie, China, November 13-15, 2013. (CCF-C)
李强,向阳. 推测网络蠕虫传播路径的在线聚积算法. 软件学报, 2010,21(4):802-815
Wei Shi, Qiang Li, Jian Kang, Dong Guo, Reconstruction of Worm Propagation Path by Causality, International Conference on Networking, Architecture, and Storage, NAS 2009:129-132, 9-11 July 2009, ZhangJiaJie, Hunan, China.
Yang Xiang, Qiang Li, Dong Guo, Online Accumulation: Reconstruction of Worm Propagation Path. NPC 2008:162-172, Springer-Verlag LNCS 5245, October 18-20, Shanghai, China. (CCF-C) (Outstanding Paper Award)
Yang Xiang, Qiang Li, Online Tracing Scanning Worm with Sliding Window, Proceeding of Inscrypt 2007, Revised Selected Papers: 482-496, 3rd SKLOIS Conference on Information Security and Cryptology, Springer-Verlag LNCS 4990, Xining, China.
Qiang Li, Yan Lin, Kun Liu, Jiubin Ju: Constructing Correlations in Attack Connection Chains Using Active Perturbation. Algorithmic Applications in Management, First International Conference, AAIM 2005: 252-260, Xian, China, June 22-25, 2005, Proceedings. LNCS 3521, Springer.
Qiang Li, Qinyuan Feng, Kun Liu, Jiubin Ju: Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder. Networking and Mobile Computing, Third International Conference, ICCNMC 2005: 642-651, Zhangjiajie, China, August 2-4, 2005, Proceedings. LNCS 3619, Springer.
Qiang Li, Hongzi Zhu, Meng Zhang, Jiubin Ju: Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2. Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005: 348-352, 5-8 December 2005, Dalian, China
Qiang Li, Qinyuan Feng, Liang Hu, Jiubin Ju: Fast Two Phrases PPM for IP Traceback. Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005: 386-389, 5-8 December 2005, Dalian, China