Follow
Qi Li
Title
Cited by
Cited by
Year
Ensuring security and privacy preservation for cloud data services
J Tang, Y Cui, Q Li, K Ren, J Liu, R Buyya
ACM Computing Surveys (CSUR) 49 (1), 1-39, 2016
2322016
Poseidon: Mitigating volumetric ddos attacks with programmable switches
M Zhang, G Li, S Wang, C Liu, A Chen, H Hu, G Gu, Q Li, M Xu, J Wu
the 27th Network and Distributed System Security Symposium (NDSS 2020), 2020
2072020
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu
IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018
2052018
Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones
Q Wang, X Lin, M Zhou, Y Chen, C Wang, Q Li, X Luo
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2062-2070, 2019
1222019
Data poisoning attacks to deep learning based recommender systems
H Huang, J Mu, NZ Gong, Q Li, B Liu, M Xu
arXiv preprint arXiv:2101.02644, 2021
1202021
Iot passport: A blockchain-based trust framework for collaborative internet-of-things
B Tang, H Kang, J Fan, Q Li, R Sandhu
Proceedings of the 24th ACM symposium on access control models and …, 2019
1202019
Realtime robust malicious traffic detection via frequency domain analysis
C Fu, Q Li, M Shen, K Xu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
1142021
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
T Lei, Z Qin, Z Wang, Q Li, D Ye
IEEE Internet of Things Journal 6 (4), 6668-6680, 2019
1092019
Multi‐tenancy authorization models for collaborative cloud services
B Tang, R Sandhu, Q Li
Concurrency and Computation: Practice and Experience 27 (11), 2851-2868, 2015
1072015
LIVE: Lightweight integrity verification and content access control for named data networking
Q Li, X Zhang, Q Zheng, R Sandhu, X Fu
IEEE Transactions on Information Forensics and Security 10 (2), 308-320, 2014
1032014
PriRadar: A privacy-preserving framework for spatial crowdsourcing
D Yuan, Q Li, G Li, Q Wang, K Ren
IEEE transactions on information forensics and security 15, 299-314, 2019
972019
Veriml: Enabling integrity assurances and fair payments for machine learning as a service
L Zhao, Q Wang, C Wang, Q Li, C Shen, B Feng
IEEE Transactions on Parallel and Distributed Systems 32 (10), 2524-2540, 2021
962021
Make web3. 0 connected
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu
IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021
932021
Patternlistener: Cracking android pattern lock using acoustic signals
M Zhou, Q Wang, J Yang, Q Li, F Xiao, Z Wang, X Chen
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
922018
Enabling generic, verifiable, and secure data search in cloud services
J Zhu, Q Li, C Wang, X Yuan, Q Wang, K Ren
IEEE Transactions on Parallel and Distributed Systems 29 (8), 1721-1735, 2018
912018
Detecting fake accounts in online social networks at the time of registrations
D Yuan, Y Miao, NZ Gong, Z Yang, Q Li, D Song, Q Wang, X Liang
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
862019
The {CrossPath} attack: Disrupting the {SDN} control channel via shared links
J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang
28th USENIX Security Symposium (USENIX Security 19), 19-36, 2019
852019
Speaker: Split-phase execution of application containers
L Lei, J Sun, K Sun, C Shenefiel, R Ma, Y Wang, Q Li
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
822017
A multi-tenant RBAC model for collaborative cloud services
B Tang, Q Li, R Sandhu
2013 eleventh annual conference on privacy, security and trust, 229-238, 2013
822013
Enabling execution assurance of federated learning at untrusted participants
X Zhang, F Li, Z Zhang, Q Li, C Wang, J Wu
IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1877-1886, 2020
782020
The system can't perform the operation now. Try again later.
Articles 1–20