Recent Publications

JOURNAL PAPERS

  • 1.     Yanyu Chen, Yuan Yang, Xiaoyue Zou, Qi Li, Yong Jiang. Adaptive Distributed Software Defined Networking, Computer Communications, Elsevier, to appear.
  • 2.     Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu. TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code. Future Generation Computer Systems, to appear.
  • 3.     Peng Zhang, Qi Li, Patrick P.C. Lee. Achieving Content-Oriented Anonymity with CRISP. IEEE Transactions on Dependable & Secure Computing, to appear.
  • 4.     Qi Li, Ravi Sandhu, Xinwen Zhang, Mingwei Xu. Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Transactions on Dependable & Secure Computing, to appear.
  • 5.     Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng. Direct Resource Hijacking in Android. IEEE Internet Computing, IEEE, 20(5):46-56, 2016.
  • 6.     Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya. Ensuring Security and Privacy Preservation for Cloud Data Services. ACM Computing Surveys, ACM, 49(1):1-39, 2016.
  • 7.     Bo Tang, Ravi Sandhu, Qi Li. Multi-Tenant Authorization Models for Cloud Services, Concurrency and Computation: Practice & Experience, Wiley, 64(3):1068-1077, 2015.
  • 8.     Qi Li, Xinwen Zhang, Xin Zhang, and Purui Su. Invalidating Idealized BGP Security Proposals and Countermeasures, IEEE Transactions on Dependable and Secure Computing, IEEE, 12(3): 298-311, 2015.
  • 9.     Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, IEEE, 10(2):308-320, 2015.
  • 10.    Yuan Yang, Mingwei Xu, Qi Li. Towards Fast Rerouting-Based Energy Efficient Routing, Computer Networks, Elsevier, 70(1):1-15, 2014.
  • 11.    Qi Li, Mingwei Xu, Yuan Yang, Lixin Gao, Yong Cui, and Jianping Wu. Safe and Practical Energy-Efficient Detour Routing in IP Networks, IEEE/ACM Transactions on Networking, IEEE, 22(6): 1925-1937, 2014.
  • 12.    Qi Li, Dah Ming Chiu, Mingwei Xu, and Jianping Wu. An Economic Analysis of Routing Conflict and Its Resolution, Performance Evaluation, Elsevier, 71(1):25-43, 2014.
  • 13.    Mingwei Xu, Qi Li, Patrick P.C. Lee, Yanhai Peng, and Jianping Wu. VegaNet: A Virtualized Experimentation Platform for Production Networks with Connectivity Consistency, IEEE Network – Special Issue on Wired and Wireless Network Virtualization, IEEE, 26(5):155-168, 2012.
  • 14.    Mingwei Xu, Qing Li, Lingtao Pan, Qi Li, and Dan Wang. Minimum Protection Cost Tree: A Tunnel-based IP Fast Reroute Scheme, Computer Communications, Elsevier, 35(17): 2082-2092, 2012.
  • 15.    Qi Li, Mingwei Xu, Jianping Wu, Patrick P.C. Lee, Xingang Shi, Dah Ming Chiu, and Yuan Yang. A Unified Approach to Routing Protection in IP Networks, IEEE Transactions on Network and Service Management, IEEE, 9(3):306-319, 2012.
  • 16.    Qi Li, Mingwei Xu, Jiangping Wu, Xinwen Zhang, Patrick P.C. Lee, Ke Xu. Enhancing the Trust of Internet Routing with Lightweight Route Attestation, IEEE Transactions on Information Forensics and Security, IEEE, 7(2):691-703, 2012.
  • 17.    Mingwei Xu, Yuan Yang, Qi Li. Selecting Shorter Alternate Paths for Tunnel-based IP Fast Reroute in Linear Time, Computer Networks, Elsevier, 56(2):845-857, 2012.

CHINESE JOURNAL PAPERS

  • 1.    Shouyi Wang, Qi Li, Yun Zhang, LPV: Lightweight Packet Forwarding Verification in SDN (in Chinese), Chinese Journal of Computers, Science China Press, to appear .
  • 2.    Yun Zhang, Yong Jiang, Jing Zheng, Chunhui Pang, Qi Li, DDL: Detecting and Defending Against Controller-to-Switch Loop Attacks in SDN, Chinese Journal of Electrnoics, Acta Electronica Sinica, to appear.
  • 3.    Zheng Zheng, Mingwei Xu, Qi Li, Yun Zhang, Defending Against SDN Network Topology Poisoning Attacks (in Chinese), accepted by Journal of Computer Reasearch and Development, to appear.
  • 4.    Yuanyuan Zhang, Mingwei Xu, Qi Li. VegaNet Virtual Router (in Chinese), Chinese Journal of Computers, Science China Press, 37(11):2342-2352, 2014.
  • 5.    Qi Li, Mingwei Xu, Jiangping Wu. Stable Routing Selection in Internet Routing (in Chinese), Chinese Journal of Computers, Science China Press, 35(12):2668-2675, 2012.

CONFERENCE PAPERS

  • 1.     Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang, vSFC: Generic and Agile Service Function Chain Verification on Cloud, to appear in IEEE/ACM International Symposium on Quality of Service, Vilanova i la Geltrú, Spain, June 14-16, 2017
  • 2.     Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, and Qi Li, SPEAKER: Split-Phase Execution of Application Containers, to appear in the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Bonn, Germany, July 6-7,  2017
  • 3.     Zhongxing Ming, Mingwei Xu, Ning Wang, Binjie Gao, Qi Li, Truthful Auctions for User Data Allowance Trading in Mobile Networks, To appear in the 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), Atlanta, USA on June 5 – 8, 2017.
  • 4.    Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng, JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android, The 47th IEEE/IFIP International Conference on Dependable Systems andNetworks (DSN 2017), to appear.
  • 5.   Qian Wang, Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen, SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates, Financial Cryptography and Data Security (FC),Malta, April  3-7, 2017.
  • 6.     Yi He, Qi Li, Detecting and Defending against Inter-App Permission Leaks in Android Apps, in the Proceedings of the IEEE International Performance Computing and Communications Conference(IPCCC), Las Vegas, Nevada, December 2016.
  • 7.     Xiaomei Sun, Qi Li, Mingwei Xu, Yuan Yang, Achieving Stable iBGP with Only One Add-Path, in the Proceedings of the 40th IEEE Conference on Local Computer Networks (LCN), Dubai, UAE, November 2016.
  • 8.     Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, and Purui Su. Exploiting Android System Services Through Bypassing Service Helpers, in the Proceedings of International Conference on Security and Privacy in Communication Networks (SECURECOMM), Guangzhou China, October 2016.
  • 9.     Yuan Yang, Mingwei Xu, Qi Li, Tunneling On Demand: A Lightweight Approach for IP Fast Rerouting against Multi-link Failures (short paper), in the Proceedings of the IEEE/ACM International Symposium on Quality of Service(IWQoS), Beijing, China, June 2016.
  • 10.     Chunhui Pang, Yong Jiang, Qi Li. FADE: Detecting Forwarding Anomaly in Software-Defined Networks, in Proceeding of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, May 2016.
  • 11.     Qingji Zheng, Qi Li, Aytac Azgin, Syed Obaid Amin. Hey, I Know You Are Moving: Producer Movement Status Privacy in Information-Centric Networking, in the Proceedings of the 23th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, Nevada, January 2016.
  • 12.     Yanyu Chen, Qing Li, Yuan Yang, Qi Li, Yong Jiang, Xi Xiao. Towards adaptive elastic distributed Software Defined Networking, in the Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC), Nanjing, China, December 2015.
  • 13.     Sheng Guo, Shu Yang, Qi Li, Yong Jiang. Towards Controller Placement for Robust Software-Defined Networks, in the Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC), Nanjing, China, December 2015.
  • 14.     Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng. Xede: Practical Exploit Early Detection, in the Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Tokyo, Japan, November 2015.
  • 15.    Zhen Feng, Mingwei Xu, Yuan Yang, Qi Li, Yu Wang, Qing Li, Bo rje Ohlman, Meng Chen. Joint Optimization of Content Replication and Traffic Engineering in ICN, in the Proceedings of 40th IEEE Conference on Local Computer Networks (LCN 2015), Clearwater Beach, Florida, October 2015.
  • 16.    Yu Wang, Mingwei Xu, Zhen Feng, Qing Li, Qi Li. Session-based access control in information-centric networks: Design and analyses, in the Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC), Austin, Texas, December 2014.
  • 17.    Qi Li, Yih-Chun Hu, Xinwen Zhang. Even Rockets Cannot Make Pigs Fly Sustainably: Can BGP Be Secure with BGPsec? in the NDSS Workshop on Security of Emerging Networking Technologies (SENT), co-located with Network and Distributed System Security Symposium, San Diego, California, February 2014.
  • 18.    Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities, in the Proceedings of International Conference on Security and Privacy in Communication Networks (SECURECOMM), Sydney, Australia, September 2013.
  • 19.    Bo Tang, Qi Li, Ravi Sandhu. A Multi-Tenant RBAC Model for Collaborative Cloud Services, in the Proceedings of the IEEE Conference on Privacy, Security and Trust (PST), Tarragona, Spain, July 2013.
  • 20.    Bo Tang, Ravi Sandhu, Qi Li. Multi-Tenancy Authorization Models for Collaborative Cloud Services, in the Proceedings of the IEEE Conference on Collaboration Technologies and Systems (CTS), San Diego, California, May 2013.