Qi Li (李琦)

Associate Professor, Tsinghua University
FIT 1-213 Tsinghua University, Beijing, China 100084

Hiring

Our group always looks for highly-motivated Postdocs, students, and interns to join us! Please feel free to contact me if interested.

Research Interests

  • Internet and cloud security, mobile security, big data security and privacy
  • Machine learning for security and privacy, secure machine learning
  • Blockchain security, blockchain for security

Education

  • Ph.D., Tsinghua University, January 2012

Professional Experience

  • Tsinghua University, Associate Professor (September 2014 - )
  • ETH Zurich, Scientific Specialist (March 2013 - August 2014)
  • The University of Texas at San Antonio, Postdoctoral Fellow (February 2012 - January 2013)

Awards

  • Distinguished Paper Award Nomination, ACM CCS 2020.
  • The Young Scholar of the Cheung Kong Scholar Program of the Year 2018, 2019.
  • Best Paper Award, IEEE DSC, 2019.
  • Best Paper Award, IEEE ICPADS, 2018.
  • Beijing Science and Technology Award, Beijing, 2017.
  • Best Paper Award, SECURECOMM 2017.
  • Alibaba Innovative Research Award, Alibaba, 2017.
  • Cisco Research Award, Cisco, 2013.

Selected Publications

Conference

  1. Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu. Off-Path TCP Exploits of the Mixed IPID Assignment. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020. (Distinguished Paper Award Nomination)
  2. Shu Wang, Jiahao Cao, Xu He, Kun Sun, and Qi Li. When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020.
  3. Shu Wang, Jiahao Cao, Kun Sun, Qi Li. Secure In-Vehicle Automatic Speech Recognition Systems. In the Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Donostia/San Sebastian, Spain, October 14-16, 2020.
  4. Ruming Tang, Cheng Huang, Yanti Zhou, Haoxian Wu, Xianglin Lu, Yongqian Sun, Qi Li, Jinjin Li, Weiyao Huang, Siyuan Sun, Dan Pei. A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in Enterprises. In the Proceedings of the International Conference on Security and Privacy in Communication Networks (SECURECOMM), Washington DC, United States, October 21-23, 2020.
  5. Zihan Zhang, Mingxuan Liu, Chao Zhang, Yiming Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun. Argot: Generating Adversarial Readable Chinese Textsi. In the Proceedings of International Joint Conference on Artificial Intelligence (IJCAI), Yokohama, Japan, July 11-17, 2020.
  6. Yunzhe Guo, Dan Wang, Arun Vishwanath, Cheng Xu, Qi Li. Towards Federated Learning for HVAC Analytics: A Measurement Study. In the Proceedings of ACM International Conference on Future Energy Systems (e-Energy), Notes Papers, Melbourne, Australia, June 22-26, 2020.
  7. Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu. Enabling Execution Assurance of Federated Learning at Untrusted Participants. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April 27-30, 2020.
  8. Ruming Tang, Zheng Yang, Zeyan Li, Weibin Meng, Haixin Wang, Qi Li, Yongqian Sun, Dan Pei, Tao Wei, Yanfei Xu, Yan Liu. ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April 27-30, 2020.
  9. Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu and Jianping Wu. Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020.
  10. Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020.
  11. Xingliang Yuan, Chengjun Cai, Qian Wang, Qi Li. Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. IEEE Conference on Dependable and Secure Computing (DSC), November 18-20, 2019, 2019. (Best Paper Award)
  12. Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. In the Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019.
  13. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang. Certificate Transparency in the Wild: Exploring the Reliability of Monitors. In the Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019.
  14. Qingyuan Gong, Jiayun Zhang, Yang Chen, Qi Li, Yu Xiao, Xin Wang, Pan Hui. Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. In the Proceedings of the 28th ACM International Conference on Information and Knowledge Management (CIKM), Beijing, China, November 3-7, 2019.
  15. Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason Li. Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. In the Proceedings of the International Conference on Security and Privacy in Communication Networks (SECURECOMM), Orlando, October 23-25, 2019.
  16. Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, and Peiyi Han. Fingerprinting SDN Applications via Encrypted Control Traffic. In the Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, China, September 23-25, 2019.
  17. Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. In the Proceedings of the 28th USENIX Security Symposium (USENIX Security), Santa Clara, CA, August 14-16, 2019.
  18. Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, and Dawn Song. Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study, In the Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Applied Data Science track, Anchorage, Alaska, August, 4-8, 2019.
  19. Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren. SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. In the Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), Dallas, Texas, July 7-10, 2019.
  20. Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, and Ravi Sandhu, IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT), Toronto, Canada, June 4-6, 2019.
  21. Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, and Qi Li. SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. In the Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Portland, Oregon, June 24-27, 2019.
  22. Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu. Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019.
  23. Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019.
  24. Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen. Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. In the Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, Rhode Island, USA, April 13-17, 2019.
  25. Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang. ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. In the Proceedings of the IEEE International Conference on Data Engineering (ICDE), Macau SAR, April 8-12, 2019.
  26. Helei Cui, Yajin Zhou, Cong Wang, Qi Li, Kui Ren. Towards Privacy-Preserving Malware Detection Systems for Android. In the Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Singapore, December 11-13, 2018. (Best Paper Award)
  27. Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang. A Multi-tab Website Fingerprinting Attack. In the Proceedings of Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 3-7, 2018.
  28. Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Toronto, ON, Canada, October 15-19, 2018.
  29. Bo Wu, Qi Li, Ke Xu, Ruoyu Li, Zhuotao Liu. SmartRetro: Blockchain-based Incentives for Distributed IoT Retrospective Detection, In Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Chengdu, China, October 9-12, 2018. (Invited Paper)
  30. Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, and Fang Yang. Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. In the Proceedings of IEEE/ACM International Symposium on Quality of Service (IWQoS), Banff, AB, Canada, June 4-6, 2018.
  31. Peng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, and Chengchen Hu. FOCES: Detecting Forwarding Anomalies in Software Defined Networks. In the Proceedings of 37th IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, July 2-5, 2018.
  32. Jun Wu, Patrick P.C. Lee, Qi Li, Lujia Pan, Jianfeng Zhang. CellPAD: Detecting Performance Anomalies in Cellular Networks via Regression Analysis. In the Proceedings of IFIP Networking (Networking), Zurich, Switzerland, May 14-16, 2018.
  33. Dong Yuan, Guoliang Li, Qi Li, and Yudian Zheng. Sybil Defense in Crowdsourcing Platforms. In Proceedings of the 26th ACM International Conference on Information and Knowledge Management (CIKM), Singapore, November 6-10, 2017.
  34. Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng. Vulnerable Implicit Service: A Revisit. In the Proceedings of the 24nd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, October 30-November 3, 2017.
  35. Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang, vSFC: Generic and Agile Service Function Chain Verification on Cloud. In the Proceedings of IEEE/ACM International Symposium on Quality of Service (IWQos), Vilanova i la Geltrú, Spain, June 14-16, 2017.
  36. Yi He, Qi Li, and Kun Sun. LinkFlow: Efficient Large-Scale Inter-App Privacy Leakage Detectionx. In the Proceedings of International Conference on Security and Privacy in Communication Networks (SECURECOMM), Niagara Falls, Canada, October 22-25, 2017.
  37. Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang and Jing Zheng. Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. In the Proceedings of International Conference on Security and Privacy in Communication Networks (SECURECOMM), Niagara Falls, Canada, October 22-25, 2017. (Best Paper Award)
  38. Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, and Qi Li, SPEAKER: Split-Phase Execution of Application Containers. In the Proceedings of the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Bonn, Germany, July 6-7, 2017.
  39. Zhongxing Ming, Mingwei Xu, Ning Wang, Binjie Gao, Qi Li, Truthful Auctions for User Data Allowance Trading in Mobile Networks. In the Proceedins of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS), Atlanta, USA, June 5-8, 2017.
  40. Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng, JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. In the Proceeding of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, USA, June 26-29, 2017.
  41. Qian Wang, Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen, SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. In the Proceedings of Internnational Conference on Financial Cryptography and Data Security (FC), Malta, April 3-7, 2017.
  42. Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, and Purui Su. Exploiting Android System Services Through Bypassing Service Helpers. In the Proceedings of International Conference on Security and Privacy in Communication Networks (SECURECOMM), Guangzhou China, October 10-12, 2016.
  43. Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng, Xede: Practical Exploit Early Detection, The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, November 2-4, 2015.

Journal

  1. Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, Yong Jiang. JNI Global References Are Still Vulnerable: Attacks and Defenses. IEEE Transactions on Dependable and Secure Computing, to appear.
  2. Xiaoliang Wang, Ke Xu, Wenlong Chen, Qi Li, Meng Shen, Bo Wu. ID-Based SDN for Internet of Things, IEEE Network Magazine, to appear.
  3. Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Yanjiao Chen, Peipei Jiang. Stealing Your Android Patterns via Acoustic Signals. IEEE Transactions on Mobile Computing, to appear.
  4. Shu Yang, Laizhong Cui, Xinhao Deng, Qi Li, Yulei Wu, Mingwei Xu, Jianipng Wu. FISE: A Forwarding Table Structure for Enterprise Networks. IEEE Transactions on Network and Service Management, to appear.
  5. Pengfei Wu, Ximeng Liu, Robert H.J. Deng, Qingni Shen, Qi Li, Zhonghai Wu. ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Transactions on Dependable and Secure Computing, to appear.
  6. Meng Zhang, Chao Shen, Ning He, Sicong Han, Qi Li, Qian Wang, Xiaohong Guan, False Data Injection Attacks against Smart Grid State Estimation: Construction, Detection and Defense. Science China Technological Sciences, to appear.
  7. Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Shoushou Ren, Zhichao Zhang, Towards Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Network Magazine, 34(2), 30-36, 2020.
  8. Peng Zhang, Hui Wu, Dan Zhang, Qi Li. Verifying Rule Enforcement in Software Defined Networks with REV, IEEE/ACM Transactions on Networking, 28(2):917-929, 2020.
  9. Rémi Badonnel, Carol Fung, Qi Li, Sandra Scott-Hayward, Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. IEEE Transactions on Network and Service Management, 17(1): 12-14, 2020.
  10. Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu, Towards Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Network Magazine, 34(1): 108-115, 2020.
  11. Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo. SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Communications Magazine, 58(1): 47-53, 2020.
  12. Dong Yuan, Qi Li, Guoliang Li, Qian Wang, and Kui Ren. PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. IEEE Transactions on Information Forensics and Security, 15:299-314, 2020.
  13. Qi Li, Xiaoyue Zou, Qun Huang, Jing Zheng, and Patrick P.C. Lee. Dynamic Packet Forwarding Verification in SDN, IEEE Transactions on Dependable and Secure Computing - Special issue: Security in Emerging Networking Technologies, 16(6):915-929, 2019.
  14. Qi Li, Jiajia Liu, Yih-Chun Hu, Mingwei Xu, Jianping Wu. BGP with BGPsec: Attacks and Countermeasures, IEEE Network Magazine, 33(4):194-200, 2019.
  15. Tao Lei, Zhan Qin, Zhibo Wang, Qi Li, and Dengpan Ye. EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet of Things Journal, 6(4): 6668-6680 2019.
  16. Yanjiao Chen, Xin Tian, Qian Wang, Minghui Li, Minxin Du, and Qi Li. ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum. IEEE Transactions on Mobile Computing, 18(10): 2270-2284, 2019.
  17. Qi Li, Yanyu Chen, Patrick P. C. Lee, Mingwei Xu, and Kui Ren. Security Policy Violations in SDN Data Plane, IEEE/ACM Transactions on Networking, 26(4): 1715-1727, 2018.
  18. Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, and Kui Ren. Enabling Generic, Verifiable, and Secure Data Search on Cloud, IEEE Transactions on Parallel and Distributed Systems, 29(8): 1721-1735, 2018.
  19. Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K.Y. Yau, and Jianping Wu. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis, IEEE Transactions on Information Forensics and Security, 13(7): 1838-1853, 2018.
  20. Yuchao Zhang, Ke Xu, Haiyang Wang, Qi Li, Tong Li, and Xuan Cao. Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains, IEEE Network Magazine, 32(2): 138-143, 2018.
  21. Peng Zhang, Chengchen Hu, Di Chen, Hao Li, and Qi Li. ShiftRoute: Achieving Location Privacy for Map Services on Smartphones, IEEE Transactions on Vehicular Technology, 67(5): 4527-4538, 2018.
  22. Yuan Yang, Mingwei Xu, and Qi Li. Fast Rerouting against Multi-link Failures without Topology Constraint, IEEE/ACM Transactions on Networking, 26(1): 384-397, 2018.
  23. Qi Li, Patrick P. C. Lee, Peng Zhang, Purui Su, Liang He, and Kui Ren. Capability-Based Security Enforcement in Named Data Networking, IEEE/ACM Transactions on Networking, 25(5): 2719-2730, 2017.
  24. Peng Zhang, Qi Li, Patrick P.C. Lee. Achieving Content-Oriented Anonymity with CRISP, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(6): 578-590, 2017.
  25. Qi Li, Ravi Sandhu, Xinwen Zhang, Mingwei Xu. Mandatory Content Access Control for Privacy Protection in Information Centric Networks, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(5): 494-506, 2017.
  26. Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura. Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1 [Guest Editorial], IEEE Communications Magazine, IEEE, 55(3):60-61, 2017.
  27. Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura. Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2 [Guest Editorial], IEEE Communications Magazine, IEEE, 55(6):118-119, 2017.
  28. Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya. Ensuring Security and Privacy Preservation for Cloud Data Services, ACM Computing Surveys, ACM, 49(1):1-39, 2016.
  29. Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng. Direct Resource Hijacking in Android, Internet Computing, 20(5):46-56, 2016.
  30. Qi Li, Xinwen Zhang, Xin Zhang, and Purui Su. Invalidating Idealized BGP Security Proposals and Countermeasures, IEEE Transactions on Dependable and Secure Computing, IEEE, 12(3): 298-311, 2015.
  31. Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, IEEE, 10(2):308-320, 2015.
  32. Qi Li, Mingwei Xu, Yuan Yang, Lixin Gao, Yong Cui, and Jianping Wu. Safe and Practical Energy-Efficient Detour Routing in IP Networks, IEEE/ACM Transactions on Networking, IEEE, 22(6): 1925-1937, 2014.

Chinese Journals

  1. Yufei Chen, Chao Shen, Qian Wang, Qi Li, Cong Wang, Shouling Ji, Kang Li, Xiaohong Guan. Security and Privacy Risks in Artifical Intelligence Systems, Journal of Computer Research and Development, Science China Press, 56(10): 2135-2150, 2019. 陈宇飞、沈超、王骞、李琦、王聪、纪守领、李康、管晓宏. 人工智能系统安全与隐私风险. 《计算机研究与发展》, 56(10): 2135-2150, 2019.
  2. Jinwen Wang, Xiaoli Zhang, Qi Li, Jianping Wu, Yong Jiang, NFV Technology: A Survey (in Chinese), Chinese Journal of Computers, Science China Press, 42(2): 415-436, 2019. 王进文、张晓丽、李琦、吴建平、江勇. 网络功能虚拟化技术研究进展. 《计算机学报》, 42(2): 415-436, 2019.
  3. Shouyi Wang, Qi Li, Yun Zhang, LPV: Lightweight Packet Forwarding Verification in SDN (in Chinese), Chinese Journal of Computers, Science China Press, 42(1): 176-189, 2019. 王首一、李琦、张云. 轻量级的软件定义网络数据包转发验证. 《计算机学报》, 42(1): 176-189, 2019.
  4. Yun Zhang, Yong Jiang, Jing Zheng, Chunhui Pang, Qi Li, DDL: Detecting and Defending Against Controller-to-Switch Loop Attacks in SDN (in Chinese), Chinese Journal of Electrnoics, Acta Electronica Sinica, 47(5):1146-1151, 2019. 张云、江勇、郑靖、庞春辉、李琦. SDN跨层回环攻击的检测与防御. 《电子学报》,47(5):1146-1151, 2019.
  5. Zheng Zheng, Mingwei Xu, Qi Li, Yun Zhang. Throttling Topology Poisoning Attacks in SDN, Journal of Computer Research and Development, Science China Press, 55(1):207-215, 2018. 郑正、徐明伟、李琦、张云. SDN网络拓扑污染攻击防御机制研究. 《计算机研究与发展》, 55(1):207-215, 2018.
  6. Yuanyuan Zhang, Mingwei Xu, Qi Li. VegaNet Virtual Router (in Chinese), Chinese Journal of Computers, Science China Press, 37(11):2342-2352, 2014. 张媛媛、徐明伟、李琦. VegaNet网络虚拟路由器. 《计算机学报》, 37(11): 2342-2352, 2014.

Professional Service

ACM SIGSAC Chair, Vice Chair (since 2020)

Journal Editorialship

  • Associate Editor: IEEE Transactions on Dependable and Secure Computing (2015-now)
  • Associate Editor: ACM Digital Threats: Research and Practice (2019-now)
  • Guest Editor: IEEE Transactions on Network and Service Management – Special Issue on Latest Developments for Security Management of Networks and Services
  • Guest Editor: IEEE Transactions on Network and Service Management – Special Issue on Cybersecurity Techniques for Managing Networked Systems
  • Guest Editor: CCF Transactions on Networking – Special Issue on AI Security in Emerging Networking Contexts
  • Guest Editor: IEEE Transactions on Dependable and Secure Computing – Special Issue on AI/ML for Secure Computing
  • Guest Editor: IEEE Communications Magazine – Special Issue on Sustainable Incentive Mechanisms for Mobile Crowdsensing

Conference/Workshop Organization

  • TPC Co-Chairs: International Conference on Information and Communications Security (ICICS) 2021
  • Workshops Chair: EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM) 2020
  • Web Co-Chairs: IEEE International Conference on Computer Communications (INFOCOM) 2020
  • Vice General Co-Chairs: International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2019
  • TPC Co-Chairs: International Workshop on Security issues in Cyber-Physical System (SecCPS) 2019
  • Track Co-Chairs: International Conference on Computer Communications and Networks (ICCCN) 2018
  • Publicity Co-Chairs: International Performance Computing and Communications Conference (IPCCC) 2017
  • Publicity Co-Chairs: ACM TURC 2017 (SIGSAC China) 2017
  • Publicity Co-Chairs: IEEE Workshop on Security for Embedded and Mobile Systems (SEMS) 2017
  • Travel Grant Co-Chairs: ACM International Conference on Information-Centric Networking (ICN) 2016
  • Web and Publicity Chair: ACM Workshop on Scalable Trusted Computing (STC) 2012

TPC Member

  • 2021: IEEE S&P, ISOC NDSS, ACNS
  • 2020: ISOC NDSS, ACSAC, IEEE DSN, ACNS, ACM CODASPY
  • 2019: ACSAC, IEEE ICDCS, IFIP Networking, ACM CODASPY, ACM CPSS, ACM SCC, IEEE MASS, IEEE/ACM IWQoS
  • 2018: IEEE ICDCS, ACM CODASPY, IEEE/ACM IWQoS, IEEE MASS, ACM SCC, ACM CPSS
  • 2017: IEEE ICDCS, IEEE/ACM IWQoS, ACM CODASPY, ISC
  • 2016: IEEE/ACM IWQoS, ACM CDOASPY,
  • 2015: ICPP, ACM CODASPY
  • 2014: ACM CODASPY