您当前位置: 首页  >  师资队伍  >  教研室  >  网格计算与网络安全

网格计算与网络安全

李强

基本情况

姓名:

李强

性别:

职称:

教授

最高学历:

研究生

最高学位:

博士

办公电话:

0431-85168187

Email

/__local/A/7F/70/ABD79CB8B9EBF25C97A9CBBA59A_756F986B_ED.png?e=.png

 

详细情况

所在学科专业:

计算机系统结构

所研究方向:

隐私保护,安全计算,人工智能安全,网络攻击检测

讲授课程:

Linux实践(课程链接
UNIX/Linux
操作系统(本科生)(课程链接
网络与信息安全实验(硕士生)(课程链接

教育经历:

1994/091998/06,吉林大学,计算机科学系计算机及应用专业,学士学位
1998/09
2001/06,吉林大学,mgm美高梅79906|主頁(歡迎您)计算机系统结构专业,硕士学位(导师:鞠九滨教授)
2001/09-2005/06
,吉林大学,mgm美高梅79906|主頁(歡迎您)计算机软件与理论专业,博士学位(导师:鞠九滨教授)

工作经历:

2001/06-2004/12,吉林大学,mgm美高梅79906|主頁(歡迎您),助教

2004/12-2008/09,吉林大学,mgm美高梅79906|主頁(歡迎您),讲师

2008/09-2018/02,吉林大学,mgm美高梅79906|主頁(歡迎您),副教授

2017/08-2018/02,Muroran   Institute of Technology(日本国立室蘭工業大学)访问学者,合作导师(董冕雄

2017/11-现在,吉林大学,mgm美高梅79906|主頁(歡迎您),博士生导师

2018/02-现在,吉林大学,mgm美高梅79906|主頁(歡迎您),教授

学术论文:

Yu Li, Zhang Yi, Zimu Zhou, Qiang Li. DeCoCDR: Deployable Cloud-Device Collaboration for Cross-Domain Recommendation. SIGIR 2024.

Chenfei Nie,  Zhipeng Zhou,  Mianxiong Dong,  Kaoru Ota,  Qiang Li. EPIDL: Towards efficient and privacy-preserving inference in deep learning. Concurrency Computat Pract Exper. 2024;e8110.

Yu Li, Zhang Yi, He Chang, Qiang Li. Injecting Revenue-Awareness Into Cold-Start Recommendation: The Case of Online Insurance, ICPADS 2023.

Yu Li, Yi Zhang, Weijia Wu, Zimu Zhou, and Qiang Li. POSGen: Personalized Opening Sentence Generation for Online Insurance Sales, IEEE BigData 2022.

Zhipeng Zhou, Qiang Fu, Qianjun Wei and Qiang Li, LEGO: A Hybrid Toolkit for Efficient 2PC-based Privacy-Preserving Machine Learning, Computers & Security, 2022. (CCF-B)

Ming Li, Qiang Li, Guangzhe Xuan, Dong Guo, Identifying Compromised Hosts Under APT Using DNS Request Sequences, Journal of Parallel and Distributed Computing, 2021. (CCF-B)

Longkang Shang, Dong Guo, Yuede Ji, Qiang Li, Discovering unknown advanced persistent threat using shared features mined by neural networks, Computer Networks, 2021. (CCF-B)

Yu Li, Yi Zhang, Lu Gan, GengWei Hong, Zimu Zhou, Qiang Li, RevMan: Revenue-aware Multi-task Online Insurance Recommendation, AAAI, 2021. (CCF-A)

Qianjun Wei, Qiang Li, Zhipeng Zhou, ZhengQiang Ge and Yonggang Zhang, Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing, Peer-to-Peer Networking and Applications, 2021. (CCF-C)

Chaoxian Wei, Qiang Li, Dong Guo, Xiangyu Meng, Toward Identifying APT Malware through API System Calls, Security and Communication Networks, vol. 2021. (CCF-C)

Zhengqiang Ge, Xinyu Liu, Qiang Li, Yu Li, Dong Guo, PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation, International Journal of Distributed Sensor Networks, 2021.

Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng, Exploring the vulnerability in the inference phase of advanced persistent threats, International Journal of Distributed Sensor Networks, 2022.

Zongyuan Xiang, Dong Guo, Qiang Li, Detecting Mobile Advanced Persistent Threats Based on Large-scale DNS Logs. Computers & Security, Volume 96, 2020.(CCF-B)

Guanghua Yan, Qiang Li, Dong Guo, Xiangyu Meng, Discovering Suspicious APT Behaviors by Analyzing DNS Activities. Sensors 20(3), 2020.

Bo Feng, Qiang Li, Yuede Ji, Dong Guo and Xiangyu Meng, Stopping the Cyber Attack in the Early Stage Assessing the Security Risks of Social Network Users , Security and Communication Networks, 2019. (CCF-C)

Guanghua Yan, Qiang Li, Dong Guo and Bing Li, AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats, Sensors, 19(14), 2019.

Xinyang Jiang, Qiang Li, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo. QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. Peer-to-Peer Networking and   Applications, 12(5): 1385-1402, 2019. (CCF-C)

Zhen Ma, Qiang Li, Xiangyu Meng. Discovering Suspicious APT Families through A Large-scale Domain Graph in Information-centric IoT, IEEE Access, vol. 7, pp. 13917-13926, 2019.

Jianwen XU, Kaoru OTA, Mianxiong DONG, Anfeng LIU, Qiang LI. SIoTFog: Byzantine-resilient IoT fog networking. Frontiers of Information Technology & Electronic Engineering, 2018, 19(12), 1546-1557.

S. Chang, C. Li, H. Zhu, T. Lu and Q. Li. Revealing Privacy Vulnerabilities of Anonymous Trajectories, IEEE Transactions on Vehicular Technology, vol. 67, no. 12, pp. 12061-12071, Dec. 2018.

Bo Feng, Qiang Fu, Mianxiong Dong, Dong Guo and Qiang Li, Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning. IEEE Network, July/August 2018.

Jiahao Zhang, Qiang Li, Xiaoqi Wang, Bo Feng, Dong Guo. Towards fast and lightweight spam account detection in mobile social networks through fog computing, Peer-to-Peer Networking and Applications,11(4):778-792, 2018.(CCF-C)

Qiang Fu, Bo Feng, Dong Guo, Qiang Li. Combating the Evolving Spammers in Online Social Networks. Computers & Security, 2018(72C)60-73.(CCF-B)

Jian Cao, Qiang Fu, Qiang Li, Dong Guo. Discovering Hidden Suspicious Accounts in Online Social Networks. Information Sciences, 2017(394)123–140.(CCF-B)

王晓琪,李强,闫广华,玄光哲,郭东.高级持续性威胁中隐蔽可疑DNS行为的检测. 计算机研究与发展, 2017(10).

Bo Feng, Qiang Li, Xiaowen Pan, Jiahao Zhang, Dong Guo, GroupFound: An Effective Approach to Detect Suspicious Accounts in Online Social Networks, International Journal of Distributed Sensor Networks, 2017, 13(7).

Yukun He, Qiang Li, Jian Cao, Yuede Ji, Dong Guo, Understanding socialbot behavior on end hosts, International Journal of Distributed Sensor Networks, 2017, 13(2).

Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li: Combating the Evasion Mechanisms of Social Bots. Computers & Security. 2016(58)230-249. (CCF-B)

Yukun He, Guangyan Zhang, Jie Wu, Qiang Li: Understanding a Prospective Approach to Designing Malicious Social Bots. Security and Communication Networks, 9(13): 2157-2172, 2016. (CCF-C)

Jian Cao, Qiang Li, Yuede Ji, Yukun He, Dong Guo: Detection of Forwarding-Based Malicious URLs in Online Social Networks. International Journal of Parallel Programming 44(1): 163-180, 2016 (Best Paper Award of NPC 2014)

Dong Guo, Jian Cao, Xiaoqi Wang, Qiang Fu, Qiang Li: Combating Code-Based Compromised Accounts in Mobile Social Networks. Sensors 2016, 16(9), 1522.

李祥楠, 张广艳, 李强, 郑纬民. 固态盘阵列构建方法研究综述. 计算机研究与发展. 2016, 53 (9):1893-1905.

Yuede Ji, Qiang Li, Yukun He, Dong Guo: BotCatch: leveraging signature and behavior for bot detection. Security and Communication Networks 8(6): 952-969, 2015 (CCF-C)

Yuede Ji, Qiang Li, Yukun He, Dong Guo: Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection, International Journal of Distributed Sensor Networks Volume 2015, Article ID 524627, 1-17.

Jian Cao, Qiang Fu, Qiang Li, Dong Guo: Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. 15th International Conference on Algorithms and Architectures for Parallel Processing, 2015: 323-336. LNCS 9530, Springer. (CCF-C)

Yuede Ji, Yukun He, Xinyang Jiang, Qiang Li: Towards social botnet behavior detecting in the end host. 20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014: 320-327, Hsinchu, Taiwan, December 16-19, 2014. (CCF-C)

Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo: A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. 10th International Conference on Information Security Practice and Experience, ISPEC 2014: 75-89, Fuzhou, China, May 5-8, 2014. LNCS 8434, Springer.

何毓锟,李强,嵇跃德,郭东.一种关联网络和主机行为的延迟僵尸检测方法.计算机学报,2014,37(1):50-61.

Yukun He, Qiang Li, Yuede Ji, Dong Guo: BotInfer: A Bot Inference Approach by Correlating Host and Network Information. 10th IFIP International Conference on Network and Parallel Computing, NPC 2013: 356-367, Guiyang, China, September 19-21, 2013. LNCS 8147, Springer. (CCF-C)

Yuede Ji, Yukun He, Qiang Li, Dong Guo: BotCatch: A Behavior and Signature Correlated Bot Detection Approach. 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2013 : 1634-1639, Zhangjiajie, China, November 13-15, 2013. (CCF-C)

李强,向阳. 推测网络蠕虫传播路径的在线聚积算法. 软件学报, 2010,21(4):802-815