Selected Publications

    • Conference Papers

      1. [S&P23] Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu. Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. In the Proceedings of the 44th IEEE Symposium on Security and Privacy (OAKLAND), San Francisco, CA, MAY 22-26, 2023.

      2. [CCS22] Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang. On the Privacy Risks of Cell-Based NAS Architectures. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Los Angeles, U.S.A, November 7-11, 2022.

      3. [SECURITY22] Xuewei Feng, Qi Li, Kun Sun, Zhiyuan Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu. Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. In the Proceedings of the 31st USENIX Security Symposium (USENIX Security), Boston, USA, August 10-12, 2022.

      4. [SECURITY22] Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li. RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. In the Proceedings of the 31st USENIX Security Symposium (Security), Boston, USA, August 10-12, 2022. [code]

      5. [RAID22] Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun. BinProv: Binary Code Provenance Identification without Disassembly. In the Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Limassol, Cyprus, October 26-28, 2022.

      6. [RAID22] Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan. Encrypted Malware Traffic Detection via Graph-based Network Analysis. In the Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Limassol, Cyprus, October 26-28, 2022.

      7. [ESORICS22] Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li. Verifying the Quality of Outsourced Training on Clouds. In the Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, September 26-30, 2022.

      8. [SIGMOD22] Sainan Li, Qilei Yin, Guoliang Li, Qi Li, Zhuotao Liu, Jinwei Zhu. Unsupervised Contextual Anomaly Detection for Database Systems. In the Proceedings of the ACM Special Interest Group in Management Of Data (SIGMOD), Philadelphia, PA, Jun 11-16, 2022.

      9. [NDSS22] Xuewei Feng, Qi Li, Kun Sun, Ku Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haidian Duan, Zhiyuan Qian. PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feburary 27-March 3, 2022.

      10. [ACSAC21] Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu. On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks. In the Proceedings of Annual Computer Security Applications Conference (ACSAC), Virtual Event, December 6-10, 2021.

      11. [ACSAC21] Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu. Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. In the Proceedings of Annual Computer Security Applications Conference (ACSAC), Virtual Event, December 6-10, 2021.

      12. [CCS21] Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang. Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, November 15-19, 2021.

      13. [CCS21] Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu. A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, November 15-19, 2021. [pdf] [code]

      14. [CCS21] Chuanpu Fu, Qi Li, Meng Shen, Ke Xu. Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, November 14-19, 2021. [pdf] [code]

      15. [MM21] Yunjie Ge, Qian Wang, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, and Cong Wang. Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. In the Proceedings of ACM Multimedia (Multimedia), Chengdu, China, October 20-24, 2021.

      16. [KDD21] Xiao Liang, Zheng Yang, Binghui Wang, Shaofeng Hu, Zijie Yang, Dong Yuan, Neil Zhenqiang Gong, Qi Li, Fang He. Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach. In the Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Applied Data Science track, Virtual Event, August 14-18, 2021.

      17. [ICML21] Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li. CARTL: Cooperative Adversarially-Robust Transfer Learning. In the Proceedings of International Conference on Machine Learning (ICML), Virtual Event, July 18-24, 2021.

      18. [DSN21] Xiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang. Fast IPv6 Network Periphery Discovery and Security Implications. In the Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN), Taipei, Taiwan, June 21-24, 2021. [pdf]

      19. [ASIACCS21] Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang. Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. In the Proceedings of the ACM Asia Conference on Computer and Communications Security (ACM ASIACCS), Hong Kong, China, June 7-11, 2021. [pdf]

      20. [ASIACCS21] Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, SongSong Liu, Yukun Liu, and Xiaoning Li. See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. In the Proceedings of the ACM Asia Conference on Computer and Communications Security (ACM ASIACCS), Hong Kong, China, June 7-11, 2021. [pdf]

      21. [INFOCOM21] Jingwen Fan, Yi He, Bo Tang, Qi Li, and Ravi Sandhu. Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Virtual Conference, May 10-13, 2021. [pdf]

      22. [INFOCOM21] Fengting Li, Xuankuai Liu, Xiaoli Zhang, Qi Li, Kun Sun, and Kang Li. Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Virtual Conference, May 10-13, 2021. [pdf][code]

      23. [NDSS21] Shangqi Lai, Xingliang Yuan, Joseph Liu, Xun Yi, Qi Li, Dongxi Liu, and Nepal Surya. OblivSketch: Oblivious Network Measurement as a Cloud Service. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feburary 21-24, 2021. [pdf]

      24. [NDSS21] Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, and Mingwei Xu. Data Poisoning Attacks to Deep Learning Based Recommender Systems. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feburary 21-24, 2021. [pdf]

      25. [CCS20] Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, and Ke Xu. Off-Path TCP Exploits of the Mixed IPID Assignment. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020. [pdf] (Distinguished Paper Award Nomination)

      26. [CCS20] Shu Wang, Jiahao Cao, Xu He, Kun Sun, and Qi Li. When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. In the Proceedings of ACM Conference on Computer and Communications Security (CCS 2020), Orlando, USA, November 9-13, 2020. [pdf]

      27. [RAID20] Shu Wang, Jiahao Cao, Kun Sun, Qi Li. Secure In-Vehicle Automatic Speech Recognition Systems. In the Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Donostia/San Sebastian, Spain, October 14-16, 2020. [pdf]

      28. [IJCAI20] Zihan Zhang, Mingxuan Liu, Chao Zhang, Yiming Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun. Argot: Generating Adversarial Readable Chinese Texts. In the Proceedings of International Joint Conference on Artificial Intelligence (IJCAI), Yokohama, Japan, July 11-17, 2020. [pdf]

      29. [INFOCOM20] Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu. Enabling Execution Assurance of Federated Learning at Untrusted Participants. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April 27-30, 2020. [pdf]

      30. [INFOCOM20] Ruming Tang, Zheng Yang, Zeyan Li, Weibin Meng, Haixin Wang, Qi Li, Yongqian Sun, Dan Pei, Tao Wei, Yanfei Xu, Yan Liu. ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Beijing, China, April 27-30, 2020. [pdf]

      31. [NDSS20] Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu and Jianping Wu. Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020. [pdf]

      32. [NDSS20] Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. In the Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 23-26, 2020. [pdf]

      33. [CCS19] Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, and Xiao Liang. Detecting Fake Accounts in Online Social Networks at the Time of Registrations. In the Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019. [pdf]

      34. [CCS19] Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang. Certificate Transparency in the Wild: Exploring the Reliability of Monitors. In the Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019. [pdf]

      35. [CIKM19] Qingyuan Gong, Jiayun Zhang, Yang Chen, Qi Li, Yu Xiao, Xin Wang, Pan Hui. Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. In the Proceedings of the 28th ACM International Conference on Information and Knowledge Management (CIKM), Beijing, China, November 3-7, 2019. [pdf]

      36. [RAID19] Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, and Peiyi Han. Fingerprinting SDN Applications via Encrypted Control Traffic. In the Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, China, September 23-25, 2019. [pdf]

      37. [SECURITY19] Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. In the Proceedings of the 28th USENIX Security Symposium (Security), Santa Clara, CA, August 14-16, 2019. [pdf]

      38. [KDD19] Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, and Dawn Song. Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study, In the Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), Applied Data Science track, Anchorage, Alaska, August, 4-8, 2019. [pdf]

      39. [ICDCS19] Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, and Shoushou Ren. SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. In the Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), Dallas, Texas, July 7-10, 2019. [pdf]

      40. [SACMAT19] Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, and Ravi Sandhu, IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT), Toronto, Canada, June 4-6, 2019. [pdf]

      41. [DSN19] Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, and Qi Li. SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. In the Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Portland, Oregon, June 24-27, 2019. [pdf]

      42. [INFOCOM19] Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu. Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019. [pdf]

      43. [INFOCOM19] Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Paris, France, April 29-May 2, 2019. [pdf]

      44. [ASPLOS19] Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen. Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. In the Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Providence, Rhode Island, USA, April 13-17, 2019. [pdf]

      45. [ICDE19] Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang. ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. In the Proceedings of the IEEE International Conference on Data Engineering (ICDE), Macau, April 8-11, 2019. [pdf]

      46. [ACSAC18] Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang. A Multi-tab Website Fingerprinting Attack. In the Proceedings of Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, December 3-7, 2018. [pdf]

      47. [CCS18] Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, and Xiaofeng Chen. PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. In the Proceedings of ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, October 15-19, 2018. [pdf]

      48. [ICDCS18] Peng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, and Chengchen Hu. FOCES: Detecting Forwarding Anomalies in Software Defined Networks. In the Proceedings of 37th IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, July 2-5, 2018. [pdf]

      49. [CIKM17] Dong Yuan, Guoliang Li, Qi Li, and Yudian Zheng. Sybil Defense in Crowdsourcing Platforms. In Proceedings of the 26th ACM International Conference on Information and Knowledge Management (CIKM), Singapore, November 6-10, 2017. [pdf]

      50. [CCS17] Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, and Jian Weng. Vulnerable Implicit Service: A Revisit. In the Proceedings of the 24nd ACM Conference on Computer and Communications Security (CCS), Dallas, Texas, October 30-November 3, 2017. [pdf]

      51. [DSN17] Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng, JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. In the Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, Colorado, June 26-29, 2017. [pdf]

      52. [FC17] Qian Wang, Kui Ren, Minxin Du, Qi Li, and Aziz Mohaisen, SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates, Financial Cryptography and Data Security (FC), Malta, April 3-7, 2017. [pdf]

      53. [RAID15] Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng, Xede: Practical Exploit Early Detection, The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015), Kyoto, Japan, November 2-4, 2015. [pdf]

    • Journal Papers

      1. [ToN] Chuanpu Fu, Qi Li, Meng Shen, Ke Xu. Frequency Domain Feature Based Robust Malicious Traffic Detection. IEEE/ACM Transactions on Networking, to appear.

      2. [TDSC] Chenhao Lin, Jingyi He, Chao Shen, Qi Li, Qian Wang. CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. IEEE Transactions on Dependable and Secure Computing, to appear.

      3. [TDSC] Peipei Jiang, Xiu Lin, Man Zhou, Qian Wang, Chao Shen, Qi Li, and Wenbing Ding. Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Transactions on Dependable and Secure Computing, to appear.

      4. [TDSC] Mingxuan Liu, Zihan Zhang, Yiming Zhang, Chao Zhang, Zhou Li, Qi Li, Haixin Duan, and Donghong Sun. Automatic Generation of Adversarial Readable Chinese Texts. IEEE Transactions on Dependable and Secure Computing, to appear.

      5. [ToN] Renjie Xie, Jiahao Cao, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang. Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. IEEE/ACM Transactions on Networking, to appear.

      6. [TDSC] Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, and Cong Wang. SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Transactions on Dependable and Secure Computing, to appear.

      7. [TDSC] Yi He, Yacong Gu, Purui Su, Kun Sun, Zhi Wang, Yajin Zhou, and Qi Li. A Systematic Study of Android Non-SDK (Hidden) Service API Security. IEEE Transactions on Dependable and Secure Computing, to appear.

      8. [TDSC] Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, and Cong Wang. PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Transactions on Dependable and Secure Computing, to appear.

      9. [TIFS] Zijie Yang, Jiahao Cao, Zhuotao Liu, Xiaoli Zhang, Sun Kun, Qi Li. Good Learning, Bad Performance: A Novel Attack against RL-based Congestion Control Systems. IEEE Transactions on Information Forensics and Security, to appear.

      10. [TIFS] Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Mingwei Xu, Jianping Wu. Dynamic Network Function Enforcement via Joint Flow and Function Scheduling. IEEE Transactions on Information Forensics and Security, to appear.

      11. [PIEEE] Peipei Jiang, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, Kui Ren. Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proceedings of the IEEE, 109(12):1558-2256, 2021.

      12. [ToN] Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, and Congli Wang. The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.IEEE/ACM Transactions on Networking, to appear.

      13. [ToN] Xuewei Feng, Qi Li, Kun Sun, Chuanpu Fu, Ke Xu. Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. IEEE/ACM Transactions on Networking, to appear.

      14. [TDSC] Pengfei Wu, Qi Li, Jianting Ning, Ximeng Liu, and Wei Wu. Differentially Oblivious Data Analysis with Intel SGX: Design, Optimization, and Evaluation. IEEE Transactions on Dependable and Secure Computing, to appear.

      15. [TDSC] Qilei Yin, Zhuotao Liu, Qi Li, Tao Wang, Qian Wang, Chao Shen, and Yixiao Xu. Automated Multi-Tab Website Fingerprinting Attack. IEEE Transactions on Dependable and Secure Computing, to appear.

      16. [TPDS] Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen. VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. IEEE Transactions on Parallel and Distributed Systems, to appear. [pdf]

      17. [TPDS] Qi Li, Yunpeng Liu, Zhuotao Liu, Peng Zhang, and Chunhun Pang. Efficient Forwarding Anomaly Detection in Software-Defined Networks. IEEE Transactions on Parallel and Distributed Systems, to appear. [pdf]

      18. [TKDE] Haoda Li, Qiyang Song, Guoliang Li, Qi Li, Rengui Wang. GPSC: A Grid-based Privacy-reserving Framework for Online Spatial Crowdsourcing. IEEE Transactions on Knowledge and Data Engineering, to appear. [pdf]

      19. [TIFS] Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, Cong Wang, SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption, IEEE Transactions on Information Forensics and Security, to appear. [pdf]

      20. [ToN] Peng Zhang, Fangzheng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, Chao Shen, Chengchen Hu, Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks, IEEE/ACM Transactions on Networking, to appear. [pdf]

      21. [TIFS] Qian Wang, Baolin Zheng, Qi Li, Chao Shen, and Zhongjie Ba. Towards Query-efficient Adversarial Attack against Automatic Speech Recognition Systems. IEEE Transactions on Information Forensics and Security, to appear. [pdf]

      22. [ToN] Xiaoli Zhang, Qi Li, Zeyu Zhang, Jianping Wu, and Jiahai Yang. vSFC: Generic and Agile Verification of Service Function Chains in Clouds, IEEE/ACM Transactions on Networking. to appear. [pdf]

      23. [TDSC] Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, and Yong Jiang. JNI Global References Are Still Vulnerable: Attacks and Defenses. IEEE Transactions on Dependable and Secure Computing, to appear. [pdf]

      24. [TNSM] Shu Yang, Laizhong Cui, Xinhao Deng, Qi Li, Yulei Wu, Mingwei Xu, Jianipng Wu. FISE: A Forwarding Table Structure for Enterprise Networks. IEEE Transactions on Network and Service Management, to appear. [pdf]

      25. [TDSC] Pengfei Wu, Ximeng Liu, Robert H.J. Deng, Qingni Shen, Qi Li, Zhonghai Wu. ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Transactions on Dependable and Secure Computing, to appear. [pdf]

      26. [TMC] Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Yanjiao Chen, and Peipei Jiang. Stealing Your Android Patterns via Acoustic Signals. IEEE Transactions on Mobile Computing, to appear. [pdf]

      27. [ToN] Peng Zhang, Hui Wu, Dan Zhang, and Qi Li. Verifying Rule Enforcement in Software Defined Networks with REV, IEEE/ACM Transactions on Networking, 28(2):917-929, 2020. [pdf]

      28. [NETWORK] Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Shoushou Ren, Zhichao Zhang, Towards Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Network Magazine, 34(2), 30-36, 2020. [pdf]

      29. [TNSM] Rémi Badonnel, Carol Fung, Qi Li, Sandra Scott-Hayward, Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. IEEE Transactions on Network and Service Management, 17(1):12-14, 2020. [pdf]

      30. [NETWORK] Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu, Towards Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Network Magazine, 34(1): 108-115, 2020. [pdf]

      31. [COMMUNICATIONS] Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo. SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Communications Magazine, 58(1): 47-53, 2020. [pdf]

      32. [TIFS] Dong Yuan, Qi Li, Guoliang Li, Qian Wang, and Kui Ren. PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing, IEEE Transactions on Information Forensics and Security, 15:299-314, 2020. [pdf]

      33. [TDSC] Qi Li, Xiaoyue Zou, Qun Huang, Jing Zheng, and Patrick P.C. Lee. Dynamic Packet Forwarding Verification in SDN, IEEE Transactions on Dependable and Secure Computing, 16(6):915-929, 2019. [pdf]

      34. [NETWORK] Qi Li, Jiajia Liu, Yih-Chun Hu, Mingwei Xu, Jianping Wu. BGP with BGPsec: Attacks and Countermeasures, IEEE Network, 33(4):194-200, 2019. [pdf]

      35. [IoT] Tao Lei, Zhan Qin, Zhibo Wang, Qi Li and Dengpan Ye. EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet of Things Journal, 6(4): 6668-6680 2019. [pdf]

      36. [TMC] Yanjiao Chen, Xin Tian, Qian Wang, Minghui Li, Minxin Du, and Qi Li. ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum. IEEE Transactions on Mobile Computing, 18(10): 2270-2284, 2019. [pdf]

      37. [ToN] Qi Li, Yanyu Chen, Patrick P. C. Lee, Mingwei Xu, and Kui Ren. Security Policy Violations in SDN Data Plane, IEEE/ACM Transactions on Networking, 26(4): 1715-1727, 2018. [pdf]

      38. [TPDS] Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, and Kui Ren. Enabling Generic, Verifiable, and Secure Data Search on Cloud, IEEE Transactions on Parallel and Distributed Systems, 29(8): 1721-1735, 2018. [pdf]

      39. [TIFS] Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K.Y. Yau, and Jianping Wu. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis, IEEE Transactions on Information Forensics and Security, 13(7): 1838-1853, 2018. [pdf]

      40. [NETWORK] Yuchao Zhang, Ke Xu, Haiyang Wang, Qi Li, Tong Li, and Xuan Cao. Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains, IEEE Network Magazine, 32(2): 138-143, 2018. [pdf]

      41. [TVT] Peng Zhang, Chengchen Hu, Di Chen, Hao Li, and Qi Li. ShiftRoute: Achieving Location Privacy for Map Services on Smartphones, IEEE Transactions on Vehicular Technology, 67(5): 4527-4538, 2018. [pdf]

      42. [ToN] Yuan Yang, Mingwei Xu, and Qi Li. Fast Rerouting against Multi-link Failures without Topology Constraint, IEEE/ACM Transactions on Networking, 26(1): 384-397, 2018. [pdf]

      43. [ToN] Qi Li, Patrick P. C. Lee, Peng Zhang, Purui Su, Liang He, and Kui Ren. Capability-Based Security Enforcement in Named Data Networking, IEEE/ACM Transactions on Networking, 25(5): 2719-2730, 2017. [pdf]

      44. [TDSC] Peng Zhang, Qi Li, and Patrick P. C. Lee, Achieving Content-Oriented Anonymity with CRISP, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(6): 578-590, 2017. [pdf]

      45. [TDSC] Qi Li, Ravi Sandhu, Xinwen Zhang, Mingwei Xu, Mandatory Content Access Control for Privacy Protection in Information Centric Networks, IEEE Transactions on Dependable and Secure Computing, IEEE, 14(5): 494-506, 2017. [pdf]

      46. [IC] Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng, Direct Resource Hijacking in Android, Internet Computing, IEEE, 20(5):46-56, 2016. [pdf]

      47. [CSUR] Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya, Ensuring Security and Privacy Preservation for Cloud Data Services, ACM Computing Surveys, ACM, 49(1):1-39, 2016. [pdf]

      48. [TDSC] Qi Li, Xinwen Zhang, Xin Zhang, and Purui Su. Invalidating Idealized BGP Security Proposals and Countermeasures, IEEE Transactions on Dependable and Secure Computing, IEEE, 12(3): 298-311, 2015. [pdf]

      49. [TIFS] Qi Li, Xinwen Zhang, Qingji Zheng, Ravi Sandhu, and Xiaoming Fu. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking, IEEE Transactions on Information Forensics and Security, IEEE, 10(2):308-320, 2015. [pdf]

      50. [ToN] Qi Li, Mingwei Xu, Yuan Yang, Lixin Gao, Yong Cui, and Jianping Wu. Safe and Practical Energy-Efficient Detour Routing in IP Networks, IEEE/ACM Transactions on Networking, IEEE, 22(6): 1925-1937, 2014. [pdf]