Qi Li
Associate Professor
Institute for Network Sciences and Cyberspace, Tsinghua University
Department of Computer Science, Tsinghua University (partially affiliated)
Ph.D., Tsinghua University
Associate Professor
Institute for Network Sciences and Cyberspace, Tsinghua University
Department of Computer Science, Tsinghua University (partially affiliated)
Ph.D., Tsinghua University
[CCS2025] May 2025, our transfer-robust WFP paper accepted by CCS 2025. Congratulations, Meng!
[SIGCOMM25] Apr. 2025, our smart dataplane paper accepted by SIGCOMM 2025. Congratulations, Yinchao!
[NDSS PC] Apr. 2025, I am invited to serve on the TPC of ISOC NDSS 2026!
[ToN] Apr. 2025, our the accelerating federated learning paper accepted by ToN! Congratulations, Qi!
[CCS2025] Mar. 2025, our PMTUD paper paper accepted by ACM CCS 2025. Congratulations, Xuewei and Zhaoxi!
[CCS2025] Mar. 2025, our secure collaborative graph processing paper accepted by ACM CCS 2025. Congratulations, Zhenhua!
[TSE] Mar. 2025, our smart contract security paper accepted by IEEE TSE. Congratulations, Xiaoli!
[Distinguished Paper Award] Feb. 2025, our NAT DoS vulnerability paper won the Distinguished Paper Award from NDSS 2025!
[ToN] Feb. 2025, our information leakage defense paper accepted by ToN! Congratulations, Haibin!
[USENIX Security25] Feb. 2025, our security patch paper accepted by USENIX Security 2025. Congratulations, Shiyu and Yunlong!
[ToN] Feb. 2025, our P2P Traffic detection paper accepted by ToN! Congratulations, Songsong and Chuanpu!
[ICLR25] Jan. 2025, our LLM inference cost attack paper accepted by ICLR 2025. Congratulations, Jianshuo and Han!
[TIFS] Jan. 2025, our robust FL paper accepted by TIFS. Congratulations, Jingjing!
[USENIX Security25] Jan. 2025, our HTTP desync vulnerability paper accepted by USENIX Security 2025. Congratulations, Keran!
[ICNP Area Chair] Jan. 2025, I are invited to serve as an Area Chair of ICNP 2025!
[TDSC] Dec. 2024, our DDoS defense paper accepted by TDSC! Congratulations, Yi!
[ASIACCS25] Dec. 2024, our privacy-preserving CDN paper accepted by ASIACCS 2025! Congratulations, Viet and Shangqi!
[INFOCOM25] Dec. 2024, our FL security paper accepted by INFOCOM 2025! Congratulations, Xiaoyu!
[KDD25] Nov. 2024, our causal analysis based malicious traffic detection paper accepted by KDD 2025! Congratulations, Li, Chuanpu, and Xinhao!
[ToN] Nov. 2024, our SDN covert channel paper accepted by ToN! Congratulations, Yixiong!
[CSAW] Oct. 2024, our Null pointer dereference paper selected as one of the 15 finalists of CSAW 2024 Applied Research Competition! Congratulations, Yunlong and Shu!
[Best Paper Award] Oct. 2024, our LLM IP protection paper won the Best Paper Award of ACM LAMPS! Congratulations, Tianshuo!
[TheWebConf TPC] Oct. 2024, I am invited to serve on the Security, Privacy, and Trust Track TPC for TheWebConf 2025!
[Technological Innovation Award] Sep. 2024, our TCP/IP security research won the Technological Innovation Award of China Computer Federation (CCF). Congratulation!
[IWQoS PC Chair] Sep. 2024, I are invited to serve as TPC Co-chairs of IWQoS 2025!
[ToN] Sep. 2024, our stable Byzantine fault tolerance paper accepted by ToN! Congratulations, Sitong!
[S&P25] Sep. 2024, our pre-trained traffic analysis model paper accepted by IEEE S&P (Oakland) 2025! Congratulations, Guangmeng!
[ToN] Aug. 2024, our routing leak detection paper accepted by ToN! Congratulations, Jiang!
[CCS24] Aug. 2024, our wireless sensing attack paper accepted by CCS 2024! Congratulations, Chenghan!
[Distinguished Paper Award] Aug. 2024, our BGP anomaly detection paper won the Distinguished Paper Award from USENIX Security 2024!
[Internet Defense Prize] Aug. 2024, our BGP anomaly detection paper won the Internet Defense Prize from USENIX Security 2024!
[TIFS] Jul. 2024, our TCP traffic obfuscation paper accepted by TIFS! Congratulations, Renjie and Jiahao!
[Security TPC] Jul. 2024, I am invited to serve on the TPC of USENIX Security 2025!
[CCS24] Jul. 2024, our webpage fingerprinting paper accepted by CCS 2024! Congratulations, Xiyuan and Xinhao!
Internet Security
Network Protocol Security (Security19/22/23/24, Oakland23/24(2), NDSS22/23/24(2)/25(2), CCS19/20/25, NDSS20)
Learning and Non-Learning Based Intrusion Detection (Oakland24/25, Security23(3)/24, NDSS20/23/24, CCS21/23(2)/24(3), SIGCOMM25, NSDI24)
Machine Learning for Security
ML Security and Security Enhanced ML (Security23(2)/24(4), Oakland24, CCS21/22/24, ICLR25, ICML21)
Fraud and Anomaly Detection (SIGMOD22, NDSS21, KDD19/21, CCS19)
Cloud and IoT Security
IoT Security (NDSS24(3), Oakland23, Security22/23/24(3), CCS17/18/20/21/24, ASPLOS19)
Privacy-Preserving Computing (CCS23/24(2)/25, Security24, NDSS21/24(2), ICDE19)
Qi Li received his Ph.D. degree from Tsinghua University. Now he is an associate professor of Institute for Network Sciences and Cyberspace, Tsinghua University. He has ever worked at ETH Zurich and the University of Texas at San Antonio. His research interests include network and system security, particularly Internet security, IoT security, and machine learning security. He is currently an editorial board member of IEEE Transactions on Dependable and Secure Computing and ACM Transactions on Privacy and Security, and has served on the organization or program committees of various premier conferences.
[S&P23] Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, and Qi Li. GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. In the Proceedings of the 44th IEEE Symposium on Security and Privacy (OAKLAND), San Francisco, CA, MAY 22-26, 2023.
[S&P23] Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu. Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. In the Proceedings of the 44th IEEE Symposium on Security and Privacy (OAKLAND), San Francisco, CA, MAY 22-26, 2023.
[CCS22] Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang. On the Privacy Risks of Cell-Based NAS Architectures. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Los Angeles, U.S.A, November 7-11, 2022.
[SECURITY22] Xuewei Feng, Qi Li, Kun Sun, Zhiyuan Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu. Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. In the Proceedings of the 31st USENIX Security Symposium (USENIX Security), Boston, USA, August 10-12, 2022.
[SECURITY22] Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li. RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. In the Proceedings of the 31st USENIX Security Symposium (Security), Boston, USA, August 10-12, 2022. [code]
[RAID22] Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun. BinProv: Binary Code Provenance Identification without Disassembly. In the Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Limassol, Cyprus, October 26-28, 2022.
[RAID22] Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan. Encrypted Malware Traffic Detection via Graph-based Network Analysis. In the Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Limassol, Cyprus, October 26-28, 2022.
[ESORICS22] Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li. Verifying the Quality of Outsourced Training on Clouds. In the Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, September 26-30, 2022.
[SIGMOD22] Sainan Li, Qilei Yin, Guoliang Li, Qi Li, Zhuotao Liu, Jinwei Zhu. Unsupervised Contextual Anomaly Detection for Database Systems. In the Proceedings of the ACM Special Interest Group in Management Of Data (SIGMOD), Philadelphia, PA, Jun 11-16, 2022.
[NDSS22] Xuewei Feng, Qi Li, Kun Sun, Ku Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haidian Duan, Zhiyuan Qian. PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feburary 27-March 3, 2022.
[ACSAC21] Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu. On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks. In the Proceedings of Annual Computer Security Applications Conference (ACSAC), Virtual Event, December 6-10, 2021.
[ACSAC21] Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu. Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. In the Proceedings of Annual Computer Security Applications Conference (ACSAC), Virtual Event, December 6-10, 2021.
[CCS21] Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang. Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, November 15-19, 2021.
[CCS21] Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu. A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, November 15-19, 2021. [pdf] [code]
[CCS21] Chuanpu Fu, Qi Li, Meng Shen, Ke Xu. Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, November 14-19, 2021. [pdf] [code]
[MM21] Yunjie Ge, Qian Wang, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, and Cong Wang. Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. In the Proceedings of ACM Multimedia (Multimedia), Chengdu, China, October 20-24, 2021.
[KDD21] Xiao Liang, Zheng Yang, Binghui Wang, Shaofeng Hu, Zijie Yang, Dong Yuan, Neil Zhenqiang Gong, Qi Li, Fang He. Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach. In the Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Applied Data Science track, Virtual Event, August 14-18, 2021.
[ICML21] Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li. CARTL: Cooperative Adversarially-Robust Transfer Learning. In the Proceedings of International Conference on Machine Learning (ICML), Virtual Event, July 18-24, 2021.
[DSN21] Xiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang. Fast IPv6 Network Periphery Discovery and Security Implications. In the Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Taipei, Taiwan, June 21-24, 2021. [pdf]
[ASIACCS21] Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang. Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. In the Proceedings of the ACM Asia Conference on Computer and Communications Security (ACM ASIACCS), Hong Kong, China, June 7-11, 2021. [pdf]
[ASIACCS21] Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, SongSong Liu, Yukun Liu, and Xiaoning Li. See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. In the Proceedings of the ACM Asia Conference on Computer and Communications Security (ACM ASIACCS), Hong Kong, China, June 7-11, 2021. [pdf]
[NDSS21] Shangqi Lai, Xingliang Yuan, Joseph Liu, Xun Yi, Qi Li, Dongxi Liu, and Nepal Surya. OblivSketch: Oblivious Network Measurement as a Cloud Service. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feburary 21-24, 2021. [pdf]
[NDSS21] Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, and Mingwei Xu. Data Poisoning Attacks to Deep Learning Based Recommender Systems. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feburary 21-24, 2021. [pdf] [code]
[CCS20] Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu. Off-Path TCP Exploits of the Mixed IPID Assignment. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020. [pdf] (Distinguished Paper Award Nomination)
[CCS20] Shu Wang, Jiahao Cao, Xu He, Kun Sun, and Qi Li. When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. In the Proceedings of ACM Conference on Computer and Communications Security (CCS 2020), Orlando, USA, November 9-13, 2020. [pdf]
[RAID20] Shu Wang, Jiahao Cao, Kun Sun, Qi Li. Secure In-Vehicle Automatic Speech Recognition Systems. In the Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Donostia/San Sebastian, Spain, October 14-16, 2020. [pdf]
[NDSS20] Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu and Jianping Wu. Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020. [pdf]
[NDSS20] Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020. [pdf]
[CCS19] Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. In the Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019. [pdf]
[CCS19] Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang. Certificate Transparency in the Wild: Exploring the Reliability of Monitors. In the Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019. [pdf]
[RAID19] Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, and Peiyi Han. Fingerprinting SDN Applications via Encrypted Control Traffic. In the Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, China, September 23-25, 2019. [pdf]
[SECURITY19] Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. In the Proceedings of the 28th USENIX Security Symposium (Security), Santa Clara, CA, August 14-16, 2019. [pdf]
[KDD19] Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, and Dawn Song. Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study, In the Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Applied Data Science track, Anchorage, Alaska, August, 4-8, 2019. [pdf]
[DSN19] Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, and Qi Li. SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. In the Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Portland, Oregon, June 24-27, 2019. [pdf]
[ASPLOS19] Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen. Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. In the Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, Rhode Island, USA, April 13-17, 2019. [pdf]
[ICDE19] Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang. ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. In the Proceedings of the IEEE International Conference on Data Engineering (ICDE), Macau, April 8-11, 2019. [pdf]
[ACSAC18] Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang. A Multi-tab Website Fingerprinting Attack. In the Proceedings of Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 3-7, 2018. [pdf]
[CCS18] Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, October 15-19, 2018. [pdf]
[CCS17] Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng. Vulnerable Implicit Service: A Revisit. In the Proceedings of the 24nd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, October 30-November 3, 2017. [pdf]
[DSN17] Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng, JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. In the Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017. [pdf]
[RAID15] Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng, Xede: Practical Exploit Early Detection, The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015), Kyoto, Japan, November 2-4, 2015. [pdf]
Current Postdocs: Jiahao Cao (w/ Mingwei Xu)
Current PhD Students: Xinhao Deng, Peiyang Li, Ye Wang, Yi Xu, Yi He, Yuqi Qing, Yihan Chen (w/ Jianping Wu), Zhenhua Zou (w/ Zhuotao Liu), Yunpeng Liu, Yixiong Ji (w/ Jianping Wu), Chuanpu Fu (w/ Ke Xu), Xiang Li (w/ Haixin Duan)
Current MS Students: Xijia Che, Wei Geng, Li Gao
Past Postdocs: Qilei Yin (2020-2022, now at Zhongguancun Lab)
Past PhD Students:
Xuewei Feng (2022, w/ Ke Xu)
Man Zhou (2021, w/ Qian Wang, Assistant Professor, Huazhong University of Science and Technology)
Jiahao Cao (2020, w/ Mingwei Xu, Postdoc at Tsinghua University)
Xiaoli Zhang (2020, w/ Jianping Wu, Alibaba group)
Yacong Gu (2017, w/ Purui Su, Staff, Development and Reform Commission of Henan)
Past MS Students:
Zijie Yang (Ant Group, special offer), Sainan Li (now at Ant Group, first placement at Kuaishou), Jiaming Mu (w/ Mingwei Xu, Ant Group, special offer), Jialai Wang (w/ Chao Zhang, Tsinghua Univ., PhD student), Fengting Li (Ant Group, special offer), Zeyu Zhang (Ali Cloud, special offer), Hai Huang (CISPA, PhD student), Xuankai Liu (CITIC), Zheng Yang (Tencent), Haoran Li (Ali Cloud), Yunzhe Guo (QiAnXin), Qiyang Song (GMU, PhD student), Songrui Wu (MSRA), Xiaoyue Zou (CMB), Jun Wu (ByteDance), Zenghua Xia (w/ Yong Cui, Microsoft), Yixiao Xu (Baidu), Yuanli Miao (w/ Yong Jiang, WeChat), Jinwen Wang (w/ Yong Jiang, WUSTL, PhD student), Dong Yuan (Microsoft Redmond), Jie Zhu (Fresh Hema), Rengui Wang (NetEase), Lang Liu (ByteDance), Yun Zhang (w/ Yong Jiang, Huawei), Shouyi Wang (Huawei), Jing Zheng (Momenta), Chunhui Pang (ByteDance, first placement at Huawei), Yanyu Chen (Tencent), Zheng Zheng (w/Mingwei Xu, Huawei), Yi He (Tsinghua Univ., PhD student, first placement at NetEase)
Past Research Interns:
Guanlong Wu (PhD student at U. Virginia)
Ye Wang (MPhil student at ANU, now PhD student at Tsinghua)
Yuan Zang (Undergraduate student at Tsinghua, now PhD student at Brown)
Yi Xu (Undergraduate student at Tsinghua, now PhD student at Tsinghua)
Xijia Che (Undergraduate student at Tsinghua, now Master student at Tsinghua)
Xihan Zhang (Undergraduate student at BUPT, now Master student at PKU)
Kexin Li (Undergraduate student at Toronto, now PhD student at U. Toronto)
Yue Xiao (Undergraduate student Tsinghua, now Master student at WHU)
Han Zhang (Undergraduate student at Beijing Normal Univ., now Master student at WHU)
Zhenhua Zou (Undergraduate student at Tsinghua, now PhD student at Tsinghua)
Jialiang Huang (Undergraduate student at Tsinghua, now PhD student at Tsinghua)
Tsinghua University, Associate Professor (September 2014 - )
ETH Zurich, Scientific Specialist (March 2013 - August 2014)
The University of Texas at San Antonio, Postdoctoral Fellow (February 2012 - January 2013)
Tsinghua University, Graduate Student Researcher, Staff Researcher (March 2007 - January 2012)
The Chinese University of Hong Kong, Staff Researcher (Novermber 2009 - June 2010)
Intel Open Source Technology Center, Intel Corporation, Visiting Scholar (July 2007 - August 2007)
Vice Chair: ACM SIGSAC China
Journal Editorialship
Associate Editor: IEEE Transactions on Dependable and Secure Computing (2015-now)
Associate Editor: ACM Digital Threats: Research and Practice (2019-now)
Guest Editor: Chinese Journal of Electronics -- Explainability, Robustness, and Security in AI Systems
Guest Editor: IEEE Transactions on Network and Service Management -- Special Issue on Recent Advances in Network Security Management
Guest Editor: SCIENCE CHINA Information Sciences -- Special Issue on Cyber Security in the era of Artificial Intelligence
Guest Editor: IEEE Transactions on Network and Service Management -- Special Issue on Latest Developments for Security Management of Networks and Services
Guest Editor: IEEE Transactions on Network and Service Management -- Special Issue on Cybersecurity Techniques for Managing Networked Systems
Guest Editor: IEEE Transactions on Dependable and Secure Computing -- Special Issue on AI/ML for Secure Computing
Guest Editor: IEEE Communications Magazine -- Special Issue on Sustainable Incentive Mechanisms for Mobile Crowdsensing
Conference/Workshop Organization
TPC Vice Co-chairs: USENIX Security 2024
Travel Grants Co-chairs: ACM CCS 2024
TPC Co-chairs: ACM Workshop on Moving Target Defense (MTD) 2023
Track TPC Chair: ACM CCS 2022 Network Security Track
Symposium Co-chairs: IEEE GLOBECOM 2022 NGNI
Publication Chair: IEEE Conference on Communications and Network Security (CNS) 2021
TPC Co-Chairs: International Conference on Information and Communications Security (ICICS) 2021
Workshops Chair: EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM) 2020
Web Co-Chairs: IEEE International Conference on Computer Communications (INFOCOM) 2020
Vice General Co-Chairs: International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2019
Track Co-Chairs: International Conference on Computer Communications and Networks (ICCCN) 2018
Travel Grant Co-Chairs: ACM International Conference on Information-Centric Networking (ICN) 2016
Recent TPC Member
IEEE S&P: 2021, 2022, 2023, 2025
USENIX Security: 2021, 2022, 2023, 2025
ACM CCS: 2021, 2023, 2024
ISOC NDSS: 2020, 2021, 2022, 2023, 2024, 2025
TheWebConf: 2023, 2025
ACSAC: 2019, 2020, 2021, 2022, 2023, 2024
ACM ASIACCS: 2020, 2022, 2023, 2024
Distinguished Paper Award, ISOC NDSS 2025.
Best Paper Award, ACM LAMPS 2024.
Technology Innovation Award, China Computer Federation, 2024.
Distinguished Paper Award, USENIX Security 2024.
Internet Defense Prize, USENIX, 2024.
Distinguished Paper Award, USENIX Security 2023.
Frontiers of Science Awards, International Congress of Basic Science 2023.
Science and Technology Award, Zhejiang Province, 2022.
Science and Technology Award, Chinese Institute of Electronics, 2022.
Distinguished Paper Award Nomination, ACM CCS 2020.
Cheung Kong Young Scholar, Ministry of Education, 2019.
Best Paper Award, IEEE IDSC 2019.
Best Paper Award, IEEE ICPADS 2018.
Beijing Science and Technology Award, Beijing, 2017.
Best Paper Award, SECURECOMM 2017.
Most Cited Computers & Security Articles, 2014.
Outstanding Ph.D. Dissertation Award, Tsinghua University, 2012.
Outstanding Ph.D Graduate Aaward, Department of Computer Science, Tsinghua University, 2012.
Office in Beijing: Room 1-213, FIT, Tsinghua University
Haidian District, Beijing, 100084
E-mail: q{lastname}01 at tsinghua dot edu dot cn