网格计算与网络安全
李强
基本情况
姓名: 李强
性别:
职称: 教授
最高学历: 研究生
最高学位: 博士
电话:
Email:
详细情况
所在学科专业: 计算机系统结构
所研究方向:

网络安全态势智能评估,恶意代码检测,人工智能安全,隐私保护,安全计算

讲授课程: Linux实践(课程链接
UNIX/Linux操作系统(本科生)(课程链接
网络与信息安全实验(硕士生)(课程链接
教育经历: 1994/09-1998/06,吉林大学,计算机科学系计算机及应用专业,学士学位
1998/09-2001/06,吉林大学,计算机科学与技术学院计算机系统结构专业,硕士学位(导师:鞠九滨教授)
2001/09-2005/06,吉林大学,计算机科学与技术学院计算机软件与理论专业,博士学位(导师:鞠九滨教授)
工作经历: 2001/06-2004/12,吉林大学,计算机科学与技术学院,助教
2004/12-2008/09,吉林大学,计算机科学与技术学院,讲师
2008/09-2018/02,吉林大学,计算机科学与技术学院,副教授

2017/08-2018/02,Muroran Institute of Technology(日本国立室蘭工業大学)访问学者,合作导师(董冕雄

2017/11-现在,吉林大学,计算机科学与技术学院,博士生导师

2018/02-现在,吉林大学,计算机科学与技术学院,教授

学术论文:


Bo Feng, Qiang Li, Yuede Ji, Dong Guo and Xiangyu Meng, Stopping the Cyber Attack in the Early Stage Assessing the Security Risks of Social Network Users , Security and Communication Networks, 2019. (CCF-C)

Xinyang Jiang, Qiang Li, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo. QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. Peer-to-Peer Networking and Applications, 2019. (CCF-C)

Zhen Ma, Qiang Li, Xiangyu Meng. Discovering Suspicious APT Families through A Large-scale Domain Graph in Information-centric IoT, IEEE Access, 2019.

Jianwen XU, Kaoru OTA, Mianxiong DONG, Anfeng LIU, Qiang LI. SIoTFog: Byzantine-resilient IoT fog networking. Frontiers of Information Technology & Electronic Engineering, 2018, 19(12), 1546-1557.

S. Chang, C. Li, H. Zhu, T. Lu and Q. Li. Revealing Privacy Vulnerabilities of Anonymous Trajectories, IEEE Transactions on Vehicular Technology, vol. 67, no. 12, pp. 12061-12071, Dec. 2018.

Bo Feng, Qiang Fu, Mianxiong Dong, Dong Guo and Qiang Li, Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning. IEEE Network, July/August 2018. (Section 1)

Jiahao Zhang, Qiang Li, Xiaoqi Wang, Bo Feng, Dong Guo. Towards fast and lightweight spam account detection in mobile social networks through fog computing, Peer-to-Peer Networking and Applications,11(4):778-792, 2018.(CCF-C)

Qiang Fu, Bo Feng, Dong Guo, Qiang Li. Combating the Evolving Spammers in Online Social Networks. Computers & Security, 2018(72C)60-73.(CCF-B)

Jian Cao, Qiang Fu, Qiang Li, Dong Guo. Discovering Hidden Suspicious Accounts in Online Social Networks. Information Sciences, 2017(394)123–140.(CCF-B)

王晓琪,李强,闫广华,玄光哲,郭东.高级持续性威胁中隐蔽可疑DNS行为的检测. 计算机研究与发展, 2017(10).

Bo Feng, Qiang Li, Xiaowen Pan, Jiahao Zhang, Dong Guo, GroupFound: An Effective Approach to Detect Suspicious Accounts in Online Social Networks, International Journal of Distributed Sensor Networks, 2017, 13(7).

Yukun He, Qiang Li, Jian Cao, Yuede Ji, Dong Guo, Understanding socialbot behavior on end hosts, International Journal of Distributed Sensor Networks, 2017, 13(2).

Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li: Combating the Evasion Mechanisms of Social Bots. Computers & Security. 2016(58)230-249. (CCF-B)

Yukun He, Guangyan Zhang, Jie Wu, Qiang Li: Understanding a Prospective Approach to Designing Malicious Social Bots. Security and Communication Networks, 9(13): 2157-2172, 2016. (CCF-C)

Jian Cao, Qiang Li, Yuede Ji, Yukun He, Dong Guo: Detection of Forwarding-Based Malicious URLs in Online Social Networks. International Journal of Parallel Programming 44(1): 163-180, 2016 (Best Paper Award of NPC 2014)

Dong Guo, Jian Cao, Xiaoqi Wang, Qiang Fu, Qiang Li: Combating QR-Code-Based Compromised Accounts in Mobile Social Networks. Sensors 2016, 16(9), 1522.

李祥楠, 张广艳, 李强, 郑纬民. 固态盘阵列构建方法研究综述. 计算机研究与发展. 2016, 53 (9):1893-1905.

Yuede Ji, Qiang Li, Yukun He, Dong Guo: BotCatch: leveraging signature and behavior for bot detection. Security and Communication Networks 8(6): 952-969, 2015 (CCF-C)

Yuede Ji, Qiang Li, Yukun He, Dong Guo: Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection, International Journal of Distributed Sensor Networks Volume 2015, Article ID 524627, 1-17.

Jian Cao, Qiang Fu, Qiang Li, Dong Guo: Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. 15th International Conference on Algorithms and Architectures for Parallel Processing, 2015: 323-336. LNCS 9530, Springer. (CCF-C)

Yuede Ji, Yukun He, Xinyang Jiang, Qiang Li: Towards social botnet behavior detecting in the end host. 20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014: 320-327, Hsinchu, Taiwan, December 16-19, 2014. (CCF-C)

Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo: A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. 10th International Conference on Information Security Practice and Experience, ISPEC 2014: 75-89, Fuzhou, China, May 5-8, 2014. LNCS 8434, Springer.

何毓锟,李强,嵇跃德,郭东.一种关联网络和主机行为的延迟僵尸检测方法.计算机学报,2014,37(1):50-61.

Yukun He, Qiang Li, Yuede Ji, Dong Guo: BotInfer: A Bot Inference Approach by Correlating Host and Network Information. 10th IFIP International Conference on Network and Parallel Computing, NPC 2013: 356-367, Guiyang, China, September 19-21, 2013. LNCS 8147, Springer. (CCF-C)

Yuede Ji, Yukun He, Qiang Li, Dong Guo: BotCatch: A Behavior and Signature Correlated Bot Detection Approach. 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2013 : 1634-1639, Zhangjiajie, China, November 13-15, 2013. (CCF-C)

李强,向阳. 推测网络蠕虫传播路径的在线聚积算法. 软件学报, 2010,21(4):802-815

Wei Shi, Qiang Li, Jian Kang, Dong Guo, Reconstruction of Worm Propagation Path by Causality, International Conference on Networking, Architecture, and Storage, NAS 2009:129-132, 9-11 July 2009, ZhangJiaJie, Hunan, China.

Yang Xiang, Qiang Li, Dong Guo, Online Accumulation: Reconstruction of Worm Propagation Path. NPC 2008:162-172, Springer-Verlag LNCS 5245, October 18-20, Shanghai, China. (CCF-C) (Outstanding Paper Award)

Yang Xiang, Qiang Li, Online Tracing Scanning Worm with Sliding Window, Proceeding of Inscrypt 2007, Revised Selected Papers: 482-496, 3rd SKLOIS Conference on Information Security and Cryptology, Springer-Verlag LNCS 4990, Xining, China.

Qiang Li, Yan Lin, Kun Liu, Jiubin Ju: Constructing Correlations in Attack Connection Chains Using Active Perturbation. Algorithmic Applications in Management, First International Conference, AAIM 2005: 252-260, Xian, China, June 22-25, 2005, Proceedings. LNCS 3521, Springer.

Qiang Li, Qinyuan Feng, Kun Liu, Jiubin Ju: Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder. Networking and Mobile Computing, Third International Conference, ICCNMC 2005: 642-651, Zhangjiajie, China, August 2-4, 2005, Proceedings. LNCS 3619, Springer.

Qiang Li, Hongzi Zhu, Meng Zhang, Jiubin Ju: Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2. Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005: 348-352, 5-8 December 2005, Dalian, China

Qiang Li, Qinyuan Feng, Liang Hu, Jiubin Ju: Fast Two Phrases PPM for IP Traceback. Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005: 386-389, 5-8 December 2005, Dalian, China


着作教材:

课题组已经毕业的研究生:

2011级,陈曦,论文题目:微博社交僵尸的设计与实现,现在PLA

2012级,嵇跃德,论文题目:主机内僵尸检测研究(国家奖学金),毕业后乔治华盛顿大学攻读博士

2012级,何毓锟,论文题目:社交网络僵尸研究(国家奖学金),毕业后交通银行上海

2013级,曹健,论文题目:在线社交网络恶意网址检测研究(国家奖学金),毕业后浦发银行上海

2013级,李祥楠,论文题目:一种固态盘存储阵列的实现及评价,毕业后微软中国

2013级,王家峥,论文题目:基于主机的实时可疑网址检测系统,毕业后盛大网络

2014级,姜鑫阳,论文题目:利用图计算检测大规模社交网络虚假账户,毕业后FreeWheel

2014级,魏嘉男,论文题目:基于海量互联网网页拓扑结构的作弊链接与恶意网页挖掘,毕业后成都华为

2015级,付强,论文题目:高级持续性威胁中隐蔽可疑DNS行为的检测(国家奖学金),毕业后乔治华盛顿大学攻读博士

2015级,王晓琪:利用动态模式检测在线社交网络中的恶意账户,毕业后工行数据中心

2016级,冯波,论文题目:在线社交网络恶意用户与恶意消息的检测和预防(国家奖学金,王湘浩奖学金),毕业后今日头条

2016级,潘孝闻,论文题目:高级持续性威胁中横向移动及数据回传阶段DNS隐蔽特征分析与行为检测,毕业后上海银联


课题组在读的研究生:

2017级,马震

2017级,闫广华

2017级,李明

2017级,向宗缘

2017级,赵宇航

2018级,柳欣雨

2019级,魏千钧

2019级,周智鹏

2019级,葛政强

2019级,赵杰

2019级,孙一丁

2019级,尚龙康

2019级,吴琦

2019级,魏超贤

2019级,张佳亮

获奖情况: 自2002年以来带领学生参加ACM-ICPC系列比赛,获得分区赛金奖6块、银奖34块、铜奖39块。参加2014和2015两次世界总决赛,分获19名和64名。


吉林大学计算机科学与技术学院 版权所有 © 2017

地址:吉林省长春市朝阳区前进大街2699号吉林大学前卫南区计算机楼 邮编:130012