扫码加入训练营

牢记核心词

学习得礼盒

2019考研吉林大学计算机科学与技术学院导师简介:李强

2018-09-21 14:32:41来源:网络

  对考生而言,充分了解高校、专业以及师资情况是一项最基础、最关键的工作。以下是新东方在线为大家整理的“2019考研吉林大学计算机科学与技术学院导师简介:李强”的相关信息,希望对同学们有所帮助。

  姓名:李强

  性别:男

  职称:教授

  最高学历:研究生

  最高学位:博士

  详细情况

  所在学科专业:计算机系统结构

  所研究方向:网络攻击与防御,恶意代码检测

  讲授课程:Linux实践(课程链接)

  UNIX/Linux操作系统(本科生)(课程链接)

  网络与信息安全实验(硕士生)(课程链接)

  教育经历:1994/09-1998/06,吉林大学,计算机科学系计算机及应用专业,学士学位

  1998/09-2001/06,吉林大学,计算机科学与技术学院计算机系统结构专业,硕士学位(导师:鞠九滨教授)

  2001/09-2005/06,吉林大学,计算机科学与技术学院计算机软件与理论专业,博士学位(导师:鞠九滨教授)

  工作经历:2001/06-2004/12,吉林大学,计算机科学与技术学院,助教

  2004/12-2008/09,吉林大学,计算机科学与技术学院,讲师

  2008/09-2018/02,吉林大学,计算机科学与技术学院,副教授

  2017/08-2018/02,Muroran Institute of Technology(日本国立室蘭工業大学)访问学者,合作导师(董冕雄)

  2017/11-现在,吉林大学,计算机科学与技术学院,博士生导师

  2018/02-现在,吉林大学,计算机科学与技术学院,教授

  科研项目:已承担完成项目:

  1.2012/01-2015/12,国家自然科学基金面上项目,“基于局域网协作的僵尸主机检测技术研究(61170265)”

  2.2008/01-2010/12,国家自然科学基金青年基金,“网络蠕虫的在线追踪(60703023)”

  3.2008/09-2010/12,吉林省青年科研基金项目,“大规模网络蠕虫传播路径推测与抑制(20080108)”

  4、2010/11-2012/11,基本科研业务费项目,“混杂网络中的P2P僵尸网络流量检测(20100305)”

  学术论文:

  Bo Feng, Qiang Fu, Dong Guo and Qiang Li, Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning. IEEE Network, July/August 2018. (JCR 1)

  Jiahao Zhang, Qiang Li, Xiaoqi Wang, Bo Feng, Dong Guo, Towards fast and lightweight spam account detection in mobile social networks through fog computing, Peer-to-Peer Networking and Applications,11(4):778-792, 2018.(CCF-C)

  Qiang Fu, Bo Feng, Dong Guo, Qiang Li. Combating the Evolving Spammers in Online Social Networks. Computers & Security, 2018(72C)60-73.(CCF-B)

  Jian Cao, Qiang Fu, Qiang Li, Dong Guo. Discovering Hidden Suspicious Accounts in Online Social Networks. Information Sciences, 2017(394)123–140.(CCF-B)

  王晓琪,李强,闫广华,玄光哲,郭东.高级持续性威胁中隐蔽可疑DNS行为的检测. 计算机研究与发展, 2017(10).

  Bo Feng, Qiang Li, Xiaowen Pan, Jiahao Zhang, Dong Guo, GroupFound: An Effective Approach to Detect Suspicious Accounts in Online Social Networks, International Journal of Distributed Sensor Networks, 2017, 13(7).

  Yukun He, Qiang Li, Jian Cao, Yuede Ji, Dong Guo, Understanding socialbot behavior on end hosts, International Journal of Distributed Sensor Networks, 2017, 13(2).

  Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li: Combating the Evasion Mechanisms of Social Bots. Computers & Security. 2016(58)230-249. (CCF-B)

  Yukun He, Guangyan Zhang, Jie Wu, Qiang Li: Understanding a Prospective Approach to Designing Malicious Social Bots. Security and Communication Networks, 9(13): 2157-2172, 2016. (CCF-C)

  Jian Cao, Qiang Li, Yuede Ji, Yukun He, Dong Guo: Detection of Forwarding-Based Malicious URLs in Online Social Networks. International Journal of Parallel Programming 44(1): 163-180, 2016 (Best Paper Award of NPC 2014)

  Dong Guo, Jian Cao, Xiaoqi Wang, Qiang Fu, Qiang Li: Combating QR-Code-Based Compromised Accounts in Mobile Social Networks. Sensors 2016, 16(9), 1522.

  李祥楠, 张广艳, 李强, 郑纬民. 固态盘阵列构建方法研究综述. 计算机研究与发展. 2016, 53 (9):1893-1905.

  Yuede Ji, Qiang Li, Yukun He, Dong Guo: BotCatch: leveraging signature and behavior for bot detection. Security and Communication Networks 8(6): 952-969, 2015 (CCF-C)

  Yuede Ji, Qiang Li, Yukun He, Dong Guo: Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection, International Journal of Distributed Sensor Networks Volume 2015, Article ID 524627, 1-17.

  Jian Cao, Qiang Fu, Qiang Li, Dong Guo: Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. 15th International Conference on Algorithms and Architectures for Parallel Processing, 2015: 323-336. LNCS 9530, Springer. (CCF-C)

  Yuede Ji, Yukun He, Xinyang Jiang, Qiang Li: Towards social botnet behavior detecting in the end host. 20th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2014: 320-327, Hsinchu, Taiwan, December 16-19, 2014. (CCF-C)

  Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo: A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. 10th International Conference on Information Security Practice and Experience, ISPEC 2014: 75-89, Fuzhou, China, May 5-8, 2014. LNCS 8434, Springer.

  何毓锟,李强,嵇跃德,郭东.一种关联网络和主机行为的延迟僵尸检测方法.计算机学报,2014,37(1):50-61.

  Yukun He, Qiang Li, Yuede Ji, Dong Guo: BotInfer: A Bot Inference Approach by Correlating Host and Network Information. 10th IFIP International Conference on Network and Parallel Computing, NPC 2013: 356-367, Guiyang, China, September 19-21, 2013. LNCS 8147, Springer. (CCF-C)

  Yuede Ji, Yukun He, Qiang Li, Dong Guo: BotCatch: A Behavior and Signature Correlated Bot Detection Approach. 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2013 : 1634-1639, Zhangjiajie, China, November 13-15, 2013. (CCF-C)

  李强,向阳. 推测网络蠕虫传播路径的在线聚积算法. 软件学报, 2010,21(4):802-815

  Wei Shi, Qiang Li, Jian Kang, Dong Guo, Reconstruction of Worm Propagation Path by Causality, International Conference on Networking, Architecture, and Storage, NAS 2009:129-132, 9-11 July 2009, ZhangJiaJie, Hunan, China.

  Yang Xiang, Qiang Li, Dong Guo, Online Accumulation: Reconstruction of Worm Propagation Path. NPC 2008:162-172, Springer-Verlag LNCS 5245, October 18-20, Shanghai, China. (CCF-C) (Outstanding Paper Award)

  Yang Xiang, Qiang Li, Online Tracing Scanning Worm with Sliding Window, Proceeding of Inscrypt 2007, Revised Selected Papers: 482-496, 3rd SKLOIS Conference on Information Security and Cryptology, Springer-Verlag LNCS 4990, Xining, China.

  Qiang Li, Yan Lin, Kun Liu, Jiubin Ju: Constructing Correlations in Attack Connection Chains Using Active Perturbation. Algorithmic Applications in Management, First International Conference, AAIM 2005: 252-260, Xian, China, June 22-25, 2005, Proceedings. LNCS 3521, Springer.

  Qiang Li, Qinyuan Feng, Kun Liu, Jiubin Ju: Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder. Networking and Mobile Computing, Third International Conference, ICCNMC 2005: 642-651, Zhangjiajie, China, August 2-4, 2005, Proceedings. LNCS 3619, Springer.

  Qiang Li, Hongzi Zhu, Meng Zhang, Jiubin Ju: Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2. Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005: 348-352, 5-8 December 2005, Dalian, China

  Qiang Li, Qinyuan Feng, Liang Hu, Jiubin Ju: Fast Two Phrases PPM for IP Traceback. Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005: 386-389, 5-8 December 2005, Dalian, China

  着作教材:指导研究生

  已经毕业:

  2011级,陈曦,论文题目:微博社交僵尸的设计与实现,现在PLA

  2012级,嵇跃德,论文题目:主机内僵尸检测研究(国家奖学金),现在乔治华盛顿大学攻读博士

  2012级,何毓锟,论文题目:社交网络僵尸研究(国家奖学金),现在交通银行上海

  2013级,曹健,论文题目:在线社交网络恶意网址检测研究(国家奖学金),现在浦发银行上海

  2013级,李祥楠,论文题目:一种固态盘存储阵列的实现及评价,现在微软中国

  2013级,王家峥,论文题目:基于主机的实时可疑网址检测系统,现在盛大网络

  2014级,姜鑫阳,论文题目:利用图计算检测大规模社交网络虚假账户,现在FreeWheel

  2014级,魏嘉男,论文题目:基于海量互联网网页拓扑结构的作弊链接与恶意网页挖掘,现在成都华为

  2015级,付强,论文题目:高级持续性威胁中隐蔽可疑DNS行为的检测(国家奖学金),现在乔治华盛顿大学攻读博士

  2015级,王晓琪:利用动态模式检测在线社交网络中的恶意账户,现在工行数据中心

  在读:

  2016级,冯波

  2016级,潘孝闻

  2017级,马震

  2017级,闫广华

  2017级,李明

  2017级,向宗缘

  2017级,赵宇航

  2018级,柳欣雨

  2018级,孙成宇

  指导参加科研论文的本科生

  2002级,冯沁原,北京大学博士毕业,创业硅谷公司BitTiger

  2004级,向阳,清华大学博士毕业,云杉网络

  2005级,石伟,清华大学博士毕业,网易杭州

  2013级,章佳豪,香港理工大学研究助理

  获奖情况:自2002年以来带领学生参加ACM-ICPC系列比赛,获得分区赛金奖6块、银奖34块、铜奖39块。参加2014和2015两次世界总决赛,分获19名和64名。


本文关键字: 2019考研计算机

考研英语核心词汇营

背词+听课+练习+督学,学习得礼盒

更多资料
更多>>
更多内容

关注新东方在线考研服务号

获得21考研真题及答案解析

1. 打开手机微信【扫一扫】,识别上方二维码;
2.点击【关注公众号】,获取资料大礼包。

考研资料大礼包
近10年考研真题及答案免费下载
更多>>
更多公开课>>
更多>>
更多资料