Qi Li (李琦)

Associate Professor
FIT 1-213 Tsinghua University, Beijing, China 100084
qli01 # tsinghua dot edu dot cn

Research Interests

  • Internet and cloud security, mobile security, big data security and privacy
  • Machine learning for security and privacy, secure machine learning
  • Blockchain security, blockchain for security

Awards

  • Beijing Science and Technology Award, Beijing, 2017.
  • Best Paper Award, IEEE ICPADS 2018.
  • Best Paper Award, SECURECOMM 2017.
  • Alibaba Innovative Research Award, Alibaba, 2017.
  • Cisco Research Award, Cisco, 2013.

Publications

  1. Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. To appear in 28th USENIX Security Symposium (USENIX Security), Santa Clara, CA, August 14-16, 2019.

  2. Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu. Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019.

  3. Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. To appear in the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019.

  4. Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen. Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. To appear in the Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, Rhode Island, USA, April 13-17, 2019.

  5. Yanjiao Chen, Xin Tian, Qian Wang, Minghui Li, Minxin Du, and Qi Li. ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum. IEEE Transactions on Mobile Computing, to appear.

  6. Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang. ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. To appear in the Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2019.

  7. Qi Li, Xiaoyue Zou, Qun Huang, Jing Zheng, and Patrick P.C. Lee. Dynamic Packet Forwarding Verification in SDN, IEEE Transactions on Dependable and Secure Computing, to appear.

  8. Qi Li, Jiajia Liu, Yih-Chun Hu, Mingwei Xu, Jianping Wu. BGP with BGPsec: Attacks and Countermeasures, IEEE Network, to appear.

  9. Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang. A Multi-tab Website Fingerprinting Attack. To appear in the Proceedings of Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 3-7, 2018.

  10. Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, October 15-19, 2018.

  11. Qi Li, Yanyu Chen, Patrick P. C. Lee, Mingwei Xu, and Kui Ren. Security Policy Violations in SDN Data Plane, IEEE/ACM Transactions on Networking, 26(4): 1715-1727.

  12. Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, and Kui Ren. Enabling Generic, Verifiable, and Secure Data Search on Cloud, IEEE Transactions on Parallel and Distributed Systems, 29(8): 1721-1735, 2018.

  13. Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K.Y. Yau, and Jianping Wu. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis, IEEE Transactions on Information Forensics and Security, 13(7): 1838-1853, 2018.

  14. Yuchao Zhang, Ke Xu, Haiyang Wang, Qi Li, Tong Li, and Xuan Cao. Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains, IEEE Network Magazine, 32(2): 138-143, 2018.

  15. Peng Zhang, Chengchen Hu, Di Chen, Hao Li, and Qi Li. ShiftRoute: Achieving Location Privacy for Map Services on Smartphones, IEEE Transactions on Vehicular Technology, 67(5): 4527-4538, 2018.

  16. Yuan Yang, Mingwei Xu, and Qi Li. Fast Rerouting against Multi-link Failures without Topology Constraint, IEEE/ACM Transactions on Networking, 26(1): 384-397, 2018.

  17. Peng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, and Chengchen Hu. FOCES: Detecting Forwarding Anomalies in Software Defined Networks. In the Proceedings of 37th IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, July 2-5, 2018.

  18. Qi Li, Patrick P. C. Lee, Peng Zhang, Purui Su, Liang He, and Kui Ren. Capability-Based Security Enforcement in Named Data Networking, IEEE/ACM Transactions on Networking, 25(5): 2719-2730, 2017.

  19. Dong Yuan, Guoliang Li, Qi Li, and Yudian Zheng. Sybil Defense in Crowdsourcing Platforms. In Proceedings of the 26th ACM International Conference on Information and Knowledge Management (CIKM), Singapore, November 6-10, 2017.

  20. Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng. “Vulnerable Implicit Service: A Revisit”. In the Proceedings of the 24nd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, October 30-November 3, 2017.

  21. Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng, JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. In the Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017.

  22. Qian Wang, Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen, SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates, Financial Cryptography and Data Security (FC), Malta, April 3-7, 2017.

  23. Peng Zhang, Qi Li, and Patrick P. C. Lee, Achieving Content-Oriented Anonymity with CRISP, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(6): 578-590, 2017.

  24. Qi Li, Ravi Sandhu, Xinwen Zhang, Mingwei Xu, Mandatory Content Access Control for Privacy Protection in Information Centric Networks, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(5): 494-506, 2017.

  25. Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng, Direct Resource Hijacking in Android, Internet Computing, IEEE, 20(5):46-56, 2016.

  26. Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya, Ensuring Security and Privacy Preservation for Cloud Data Services, ACM Computing Surveys, ACM, 49(1):1-39, 2016.

  27. Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng, Xede: Practical Exploit Early Detection, The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015), Kyoto, Japan, November 2-4, 2015.

  28. Qi Li, Xinwen Zhang, Xin Zhang, and Purui Su. Invalidating Idealized BGP Security Proposals and Countermeasures, IEEE Transactions on Dependable and Secure Computing, IEEE, 12(3): 298-311, 2015.

  29. Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, IEEE, 10(2):308-320, 2015.

  30. Qi Li, Mingwei Xu, Yuan Yang, Lixin Gao, Yong Cui, and Jianping Wu. Safe and Practical Energy-Efficient Detour Routing in IP Networks, IEEE/ACM Transactions on Networking, IEEE, 22(6): 1925-1937, 2014.

Professional Experience

  • Tsinghua University, Associate Professor (September 2014 - )
  • ETH Zurich, Scientific Specialist (March 2013 - August 2014)
  • The University of Texas at San Antonio, Postdoctoral Fellow (February 2012 - January 2013)
  • Tsinghua University, Graduate Student Researcher, Staff Researcher (March 2007 - January 2012)
  • The Chinese University of Hong Kong, Staff Researcher (Novermber 2009 - June 2010)
  • Intel Open Source Technology Center, Intel Corporation, Visiting Scholar (July 2007 - August 2007)
  • Institute of Software, Chinese Academy of Sciences, Staff Researcher (July 2003 - February 2007)

Professional Service

Journal Editorialship

  • Associate Editor: IEEE Transactions on Dependable and Secure Computing (2015-now)
  • Associate Editor: ACM Digital Threats: Research and Practice (2019-now)
  • Guest Editor: IEEE Transactions on Network and Service Management – Special Issue on Cybersecurity Techniques for Managing Networked Systems
  • Guest Editor: CCF Transactions on Networking – Special Issue on AI Security in Emerging Networking Contexts
  • Guest Editor: IEEE Transactions on Dependable and Secure Computing – Special Issue on AI/ML for Secure Computing
  • Guest Editor: IEEE Communications Magazine – Special Issue on Sustainable Incentive Mechanisms for Mobile Crowdsensing

Conference/Workshop Organization

  • Vice General Co-Chairs: International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2019
  • TPC Co-Chairs: International Workshop on Security issues in Cyber-Physical System (SecCPS) 2019
  • Track Co-Chairs: International Conference on Computer Communications and Networks (ICCCN) 2018
  • Publicity Co-Chairs: International Performance Computing and Communications Conference (IPCCC) 2017
  • Publicity Co-Chairs: ACM TURC 2017 (SIGSAC China) 2017
  • Publicity Co-Chairs: IEEE Workshop on Security for Embedded and Mobile Systems (SEMS) 2017
  • Travel Grant Co-Chairs: ACM International Conference on Information-Centric Networking (ICN) 2016
  • Web and Publicity Chair: ACM Workshop on Scalable Trusted Computing (STC) 2012

TPC Member

  • 2019: ACSAC, IEEE ICDCS, IFIP Networking, ACM CODASPY, ACM CPSS, ACM SCC, IEEE MASS, IEEE/ACM IWQoS
  • 2018: IEEE ICDCS, ACM CODASPY, IEEE/ACM IWQoS, IEEE MASS, ACM SCC, ACM CPSS
  • 2017: IEEE ICDCS, IEEE/ACM IWQoS, ACM CODASPY, ISC
  • 2016: IEEE/ACM IWQoS, ACM CDOASPY,
  • 2015: ICPP, ACM CODASPY
  • 2014: ACM CODASPY