Qiang Li

Orcid: 0000-0001-7510-4718

Affiliations:
  • Jilin University, College of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering, Changchun, China


According to our database1, Qiang Li authored at least 52 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EPIDL: Towards efficient and privacy-preserving inference in deep learning.
Concurr. Comput. Pract. Exp., June, 2024

DeCoCDR: Deployable Cloud-Device Collaboration for Cross-Domain Recommendation.
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024

Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Injecting Revenue-awareness into Cold-start Recommendation: The Case of Online Insurance.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
BPT: A Blockchain-Based Privacy Information Preserving System for Trust Data Collection Over Distributed Mobile-Edge Network.
IEEE Internet Things J., 2022

BTS: A Blockchain-Based Trust System to Deter Malicious Data Reporting in Intelligent Internet of Things.
IEEE Internet Things J., 2022

Exploring the vulnerability in the inference phase of advanced persistent threats.
Int. J. Distributed Sens. Networks, 2022

LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning.
Comput. Secur., 2022

POSGen: Personalized Opening Sentence Generation for Online Insurance Sales.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Incentive Mechanism for Mobile Devices in Dynamic Crowd Sensing System.
IEEE Trans. Hum. Mach. Syst., 2021

Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing.
Peer-to-Peer Netw. Appl., 2021

Identifying compromised hosts under APT using DNS request sequences.
J. Parallel Distributed Comput., 2021

STMTO: A smart and trust multi-UAV task offloading system.
Inf. Sci., 2021

PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation.
Int. J. Distributed Sens. Networks, 2021

Practical Two-party Privacy-preserving Neural Network Based on Secret Sharing.
CoRR, 2021

Discovering unknown advanced persistent threat using shared features mined by neural networks.
Comput. Networks, 2021

RevMan: Revenue-aware Multi-task Online Insurance Recommendation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Discovering Suspicious APT Behaviors by Analyzing DNS Activities.
Sensors, 2020

Detecting mobile advanced persistent threats based on large-scale DNS logs.
Comput. Secur., 2020

2019
AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats.
Sensors, 2019

Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users.
Secur. Commun. Networks, 2019

QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks.
Peer-to-Peer Netw. Appl., 2019

Discovering Suspicious APT Families Through a Large-Scale Domain Graph in Information-Centric IoT.
IEEE Access, 2019

2018
Revealing Privacy Vulnerabilities of Anonymous Trajectories.
IEEE Trans. Veh. Technol., 2018

Towards fast and lightweight spam account detection in mobile social networks through fog computing.
Peer-to-Peer Netw. Appl., 2018

Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning.
IEEE Netw., 2018

SIoTFog: Byzantine-resilient IoT fog networking.
Frontiers Inf. Technol. Electron. Eng., 2018

Combating the evolving spammers in online social networks.
Comput. Secur., 2018

2017
Discovering hidden suspicious accounts in online social networks.
Inf. Sci., 2017

Understanding socialbot behavior on end hosts.
Int. J. Distributed Sens. Networks, 2017

GroupFound: An effective approach to detect suspicious accounts in online social networks.
Int. J. Distributed Sens. Networks, 2017

2016
Combating QR-Code-Based Compromised Accounts in Mobile Social Networks.
Sensors, 2016

Understanding a prospective approach to designing malicious social bots.
Secur. Commun. Networks, 2016

Detection of Forwarding-Based Malicious URLs in Online Social Networks.
Int. J. Parallel Program., 2016

Combating the evasion mechanisms of social bots.
Comput. Secur., 2016

2015
BotCatch: leveraging signature and behavior for bot detection.
Secur. Commun. Networks, 2015

Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection.
Int. J. Distributed Sens. Networks, 2015

Leveraging Behavior Diversity to Detect Spammers in Online Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches.
Proceedings of the Information Security Practice and Experience, 2014

Towards social botnet behavior detecting in the end host.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
BotInfer: A Bot Inference Approach by Correlating Host and Network Information.
Proceedings of the Network and Parallel Computing - 10th IFIP International Conference, 2013

BotCatch: A Behavior and Signature Correlated Bot Detection Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2011
Design and Realization of the Cloud Data Backup System Based on HDFS.
Proceedings of the Emerging Research in Web Information Systems and Mining, 2011

2009
Reconstruction of Worm Propagation Path by Causality.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

2008
Online Accumulation: Reconstruction of Worm Propagation Path.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

2007
Online Tracing Scanning Worm with Sliding Window.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Succinct Text Indexes on Large Alphabet.
Proceedings of the Theory and Applications of Models of Computation, 2006

2005
Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Fast Two Phrases PPM for IP Traceback.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Weighted Directed Word Graph.
Proceedings of the Combinatorial Pattern Matching, 16th Annual Symposium, 2005

Constructing Correlations in Attack Connection Chains Using Active Perturbation.
Proceedings of the Algorithmic Applications in Management, First International Conference, 2005


  Loading...