default search action
Qiang Li 0008
Person information
- affiliation: Jilin University, College of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering, Changchun, China
Other persons with the same name
- Qiang Li — disambiguation page
- Qiang Li 0001 — Shenzhen Technology University, China (and 2 more)
- Qiang Li 0002 — University of Technology of Compiègne, France
- Qiang Li 0003 — University of New South Wales, Canberra, Australia
- Qiang Li 0004 — Texas A&M University, College Station, TX, USA
- Qiang Li 0005 — University of Nottingham, UK
- Qiang Li 0006 — Georgia Institute of Technology, Atlanta, GA, USA
- Qiang Li 0007 — Beijing Jiaotong University, School of Computer and Information Technology, China (and 1 more)
- Qiang Li 0009 — Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China (and 1 more)
- Qiang Li 0010 — Hong Kong University of Science and Technology, Hong Kong
- Qiang Li 0011 — Jinan University, Institute of Physical Internet, Zhuhai, China (and 1 more)
- Qiang Li 0012 — Chinese Academy of Sciences, Institute of Modern Physics, Lanzhou, China
- Qiang Li 0013 — Northwest Normal University, Department of Mathematics, Lanzhou, China
- Qiang Li 0014 — Harbin Engineering University, China
- Qiang Li 0015 — University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China (and 3 more)
- Qiang Li 0016 — Chongqing University, School of Electrical Engineering, State Key Laboratory of Power Transmission Equipment & System Security and New Technology, China (and 1 more)
- Qiang Li 0017 — University of Electronic Science and Technology of China, School of Communication and Information Engineering, Chengdu, China (and 1 more)
- Qiang Li 0018 — Huazhong University of Science and Technology, School of Engineering Sciences, Collaborative Innovation Center for Biomedical Engineering, MoE Key Laboratory for Biomedical Photonics, Wuhan, China (and 5 more)
- Qiang Li 0019 — Shenzhen University, China
- Qiang Li 0020 — Jinan University, College of Information Science and Technology, Guangzhou, China (and 1 more)
- Qiang Li 0021 — University of Electronic Science and Technology of China, School of Electronic Science and Engineering, Institute of Integrated Circuits and Systems, Chengdu, China (and 2 more)
- Qiang Li 0022 — Alibaba Group China, Hangzhou, China (and 1 more)
- Qiang Li 0023 — University of Victoria, Department of Civil Engineering, VIC, Australia (and 1 more)
- Qiang Li 0024 — Kuaishou Technology, Y-tech, Beijing, China (and 1 more)
- Qiang Li 0025 — University of Virginia, UVA Center for Wireless Health, Charlottesville, VA, USA
- Qiang Li 0026 — Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, China
- Qiang Li 0027 — Virginia Polytechnic Institute and State University, Center for Power Electronics Systems, Blacksburg, VA, USA
- Qiang Li 0028 — Henan Polytechnic University, School of Mathematics and Information Science, Jiaozuo, China (and 1 more)
- Qiang Li 0029 — Northwestern Polytechnical University, Department of Applied Physics, Xi'an, China (and 2 more)
- Qiang Li 0030 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Qiang Li 0031 — Xi'an Jiaotong University, School of Information and Communications Engineering, China
- Qiang Li 0032 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Qiang Li 0033 — Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Qiang Li 0034 — Southwest University of Science and Technology, School of Information Engineering, Mianyang, China (and 1 more)
- Qiang Li 0035 — Tsinghua University, National Research Center for Information Science and Technology / Beijing Innovation Center for Future Chip, China
- Qiang Li 0036 — Zhejiang University City College, School of Business, Hangzhou, China
- Qiang Li 0037 — Shandong Normal University, School of Information Science and Engineering / Institute of Data Science and Technology, Jinan, China
- Qiang Li 0038 — Civil Aviation University of China, College of Science, Tianjin, China
- Qiang Li 0039 (aka: Tom Li 0001, Qiang (Tom) Li) — Broadcom Corporation, Irvine, CA, USA (and 1 more)
- Joshua Qiang Li (aka: Qiang Li 0040) — Oklahoma State University, School of Civil and Environmental Engineering, Stillwater, OK, USA (and 1 more)
- Qiang Li 0041 — Shenyang Aerospace University, China
- Qiang Li 0042 — Xidian University, School of Electronic Engineering, Xi'an, China (and 1 more)
- Qiang Li 0043 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (and 1 more)
- Qiang Li 0044 — Hikvision Research Institute, Hangzhou, China (and 1 more)
- Qiang Li 0045 — Anhui Agricultural University, School of Information and Artificial Intelligence, Hefei, China (and 3 more)
- Qiang Li 0046 — Tri-Institutional Center for Translational Research in Neuroimaging and Data Science (TReNDS), Georgia State University, Georgia Institute of Technology, and Emory University, Atlanta, GA, USA (and 1 more)
- Qiang Li 0047 — Tianjin University of Technology, Engineering College for the Deaf, Tianjin, Chian
- Qiang Li 0048 — Tianjin University, School of Microelectronics, Intelligent Information Processing Laboratory, Tianjin, China
- Qiang Li 0049 — Beijing Institute of Technology, School of Computer Science and Technology, Beijing, China
- Qiang Li 0050 — Jiangsu University, School of Management, Jiangsu, China (and 1 more)
- Qiang Li 0051 — Shandong University of Science and Technology, College of Geodesy and Geomatics, Qingdao, China
- Eric Q. Li (aka: Eric Li 0002, Qiang Li 0052) — Intel China Research Center, Beijing, China (and 1 more)
- Qiang Li 0053 — Peng Cheng Laboratory, Department of Broadband Communication, Shenzhen, China (and 2 more)
- Qiang Li 0054 — Zhejiang University of Technology, College of Computer Science and Technology, Hangzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Chenfei Nie, Zhipeng Zhou, Mianxiong Dong, Kaoru Ota, Qiang Li:
EPIDL: Towards efficient and privacy-preserving inference in deep learning. Concurr. Comput. Pract. Exp. 36(14) (2024) - [c20]Yuxin Yang, Qiang Li, Chenfei Nie, Yuan Hong, Binghui Wang:
Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework. CIKM 2024: 2930-2939 - [c19]Yu Li, Yi Zhang, Zimu Zhou, Qiang Li:
DeCoCDR: Deployable Cloud-Device Collaboration for Cross-Domain Recommendation. SIGIR 2024: 2114-2123 - 2023
- [c18]Yu Li, Yi Zhang, Helen He Chang, Qiang Li:
Injecting Revenue-awareness into Cold-start Recommendation: The Case of Online Insurance. ICPADS 2023: 1397-1404 - [i2]Yu Li, Yi Zhang, Weijia Wu, Zimu Zhou, Qiang Li:
POSGen: Personalized Opening Sentence Generation for Online Insurance Sales. CoRR abs/2302.06470 (2023) - 2022
- [j30]Zhipeng Zhou, Qiang Fu, Qianjun Wei, Qiang Li:
LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning. Comput. Secur. 120: 102782 (2022) - [j29]Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng:
Exploring the vulnerability in the inference phase of advanced persistent threats. Int. J. Distributed Sens. Networks 18(3): 155013292210804 (2022) - [j28]Ting Li, Wei Liu, Shangsheng Xie, Mianxiong Dong, Kaoru Ota, Neal N. Xiong, Qiang Li:
BPT: A Blockchain-Based Privacy Information Preserving System for Trust Data Collection Over Distributed Mobile-Edge Network. IEEE Internet Things J. 9(11): 8036-8052 (2022) - [j27]Ting Li, Wei Liu, Anfeng Liu, Mianxiong Dong, Kaoru Ota, Neal N. Xiong, Qiang Li:
BTS: A Blockchain-Based Trust System to Deter Malicious Data Reporting in Intelligent Internet of Things. IEEE Internet Things J. 9(22): 22327-22342 (2022) - [c17]Yu Li, Yi Zhang, Weijia Wu, Zimu Zhou, Qiang Li:
POSGen: Personalized Opening Sentence Generation for Online Insurance Sales. IEEE Big Data 2022: 1874-1879 - 2021
- [j26]Longkang Shang, Dong Guo, Yuede Ji, Qiang Li:
Discovering unknown advanced persistent threat using shared features mined by neural networks. Comput. Networks 189: 107937 (2021) - [j25]Zhengqiang Ge, Xinyu Liu, Qiang Li, Yu Li, Dong Guo:
PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation. Int. J. Distributed Sens. Networks 17(12): 155014772110612 (2021) - [j24]Jialin Guo, Guosheng Huang, Qiang Li, Neal N. Xiong, Shaobo Zhang, Tian Wang:
STMTO: A smart and trust multi-UAV task offloading system. Inf. Sci. 573: 519-540 (2021) - [j23]Ming Li, Qiang Li, Guangzhe Xuan, Dong Guo:
Identifying compromised hosts under APT using DNS request sequences. J. Parallel Distributed Comput. 152: 67-78 (2021) - [j22]Qianjun Wei, Qiang Li, Zhipeng Zhou, Zhengqiang Ge, Yonggang Zhang:
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing. Peer-to-Peer Netw. Appl. 14(3): 1379-1387 (2021) - [j21]Hengzhi Wang, Yongjian Yang, En Wang, Liang Wang, Qiang Li, Zhiyong Yu:
Incentive Mechanism for Mobile Devices in Dynamic Crowd Sensing System. IEEE Trans. Hum. Mach. Syst. 51(4): 365-375 (2021) - [c16]Yu Li, Yi Zhang, Lu Gan, Gengwei Hong, Zimu Zhou, Qiang Li:
RevMan: Revenue-aware Multi-task Online Insurance Recommendation. AAAI 2021: 303-310 - [i1]Zhengqiang Ge, Zhipeng Zhou, Dong Guo, Qiang Li:
Practical Two-party Privacy-preserving Neural Network Based on Secret Sharing. CoRR abs/2104.04709 (2021) - 2020
- [j20]Zongyuan Xiang, Dong Guo, Qiang Li:
Detecting mobile advanced persistent threats based on large-scale DNS logs. Comput. Secur. 96: 101933 (2020) - [j19]Guanghua Yan, Qiang Li, Dong Guo, Xiangyu Meng:
Discovering Suspicious APT Behaviors by Analyzing DNS Activities. Sensors 20(3): 731 (2020)
2010 – 2019
- 2019
- [j18]Zhen Ma, Qiang Li, Xiangyu Meng:
Discovering Suspicious APT Families Through a Large-Scale Domain Graph in Information-Centric IoT. IEEE Access 7: 13917-13926 (2019) - [j17]Xinyang Jiang, Qiang Li, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo:
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. Peer-to-Peer Netw. Appl. 12(5): 1385-1402 (2019) - [j16]Bo Feng, Qiang Li, Yuede Ji, Dong Guo, Xiangyu Meng:
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users. Secur. Commun. Networks 2019: 3053418:1-3053418:14 (2019) - [j15]Guanghua Yan, Qiang Li, Dong Guo, Bing Li:
AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats. Sensors 19(14): 3180 (2019) - 2018
- [j14]Qiang Fu, Bo Feng, Dong Guo, Qiang Li:
Combating the evolving spammers in online social networks. Comput. Secur. 72: 60-73 (2018) - [j13]Jianwen Xu, Kaoru Ota, Mianxiong Dong, Anfeng Liu, Qiang Li:
SIoTFog: Byzantine-resilient IoT fog networking. Frontiers Inf. Technol. Electron. Eng. 19(12): 1546-1557 (2018) - [j12]Bo Feng, Qiang Fu, Mianxiong Dong, Dong Guo, Qiang Li:
Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning. IEEE Netw. 32(4): 15-21 (2018) - [j11]Jiahao Zhang, Qiang Li, Xiaoqi Wang, Bo Feng, Dong Guo:
Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Netw. Appl. 11(4): 778-792 (2018) - [j10]Shan Chang, Chao Li, Hongzi Zhu, Ting Lu, Qiang Li:
Revealing Privacy Vulnerabilities of Anonymous Trajectories. IEEE Trans. Veh. Technol. 67(12): 12061-12071 (2018) - 2017
- [j9]Yukun He, Qiang Li, Jian Cao, Yuede Ji, Dong Guo:
Understanding socialbot behavior on end hosts. Int. J. Distributed Sens. Networks 13(2) (2017) - [j8]Bo Feng, Qiang Li, Xiaowen Pan, Jiahao Zhang, Dong Guo:
GroupFound: An effective approach to detect suspicious accounts in online social networks. Int. J. Distributed Sens. Networks 13(7) (2017) - [j7]Jian Cao, Qiang Fu, Qiang Li, Dong Guo:
Discovering hidden suspicious accounts in online social networks. Inf. Sci. 394: 123-140 (2017) - 2016
- [j6]Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li:
Combating the evasion mechanisms of social bots. Comput. Secur. 58: 230-249 (2016) - [j5]Jian Cao, Qiang Li, Yuede Ji, Yukun He, Dong Guo:
Detection of Forwarding-Based Malicious URLs in Online Social Networks. Int. J. Parallel Program. 44(1): 163-180 (2016) - [j4]Yukun He, Guangyan Zhang, Jie Wu, Qiang Li:
Understanding a prospective approach to designing malicious social bots. Secur. Commun. Networks 9(13): 2157-2172 (2016) - [j3]Dong Guo, Jian Cao, Xiaoqi Wang, Qiang Fu, Qiang Li:
Combating QR-Code-Based Compromised Accounts in Mobile Social Networks. Sensors 16(9): 1522 (2016) - 2015
- [j2]Yuede Ji, Qiang Li, Yukun He, Dong Guo:
Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection. Int. J. Distributed Sens. Networks 11: 524627:1-524627:17 (2015) - [j1]Yuede Ji, Qiang Li, Yukun He, Dong Guo:
BotCatch: leveraging signature and behavior for bot detection. Secur. Commun. Networks 8(6): 952-969 (2015) - [c15]Jian Cao, Qiang Fu, Qiang Li, Dong Guo:
Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. ICA3PP (3) 2015: 323-336 - 2014
- [c14]Yuede Ji, Yukun He, Xinyang Jiang, Qiang Li:
Towards social botnet behavior detecting in the end host. ICPADS 2014: 320-327 - [c13]Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo:
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. ISPEC 2014: 75-89 - 2013
- [c12]Yuede Ji, Yukun He, Qiang Li, Dong Guo:
BotCatch: A Behavior and Signature Correlated Bot Detection Approach. HPCC/EUC 2013: 1634-1639 - [c11]Yukun He, Qiang Li, Yuede Ji, Dong Guo:
BotInfer: A Bot Inference Approach by Correlating Host and Network Information. NPC 2013: 356-367 - 2011
- [c10]Dong Guo, Yong Du, Qiang Li, Liang Hu:
Design and Realization of the Cloud Data Backup System Based on HDFS. WISM (3) 2011: 396-403
2000 – 2009
- 2009
- [c9]Wei Shi, Qiang Li, Jian Kang, Dong Guo:
Reconstruction of Worm Propagation Path by Causality. NAS 2009: 129-132 - 2008
- [c8]Yang Xiang, Qiang Li, Dong Guo:
Online Accumulation: Reconstruction of Worm Propagation Path. NPC 2008: 162-172 - 2007
- [c7]Yang Xiang, Qiang Li:
Online Tracing Scanning Worm with Sliding Window. Inscrypt 2007: 482-496 - 2006
- [c6]Meng Zhang, Jijun Tang, Dong Guo, Liang Hu, Qiang Li:
Succinct Text Indexes on Large Alphabet. TAMC 2006: 528-537 - 2005
- [c5]Qiang Li, Yan Lin, Kun Liu, Jiubin Ju:
Constructing Correlations in Attack Connection Chains Using Active Perturbation. AAIM 2005: 252-260 - [c4]Meng Zhang, Liang Hu, Qiang Li, Jiubin Ju:
Weighted Directed Word Graph. CPM 2005: 156-167 - [c3]Qiang Li, Qinyuan Feng, Kun Liu, Jiubin Ju:
Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder. ICCNMC 2005: 642-651 - [c2]Qiang Li, Hongzi Zhu, Meng Zhang, Jiubin Ju:
Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2. PDCAT 2005: 348-352 - [c1]Qiang Li, Qinyuan Feng, Liang Hu, Jiubin Ju:
Fast Two Phrases PPM for IP Traceback. PDCAT 2005: 386-389
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint