当前位置: X-MOL首页全球导师 国内导师 › 李城龙

个人简介

教育背景 工学博士(计算机科学与技术),清华大学,中国,2012 工学学士(计算机科学与技术),清华大学,中国,2007 社会兼职 中国计算机学会区块链专委会委员 研究概况 作为课题负责人承担国家重点研发计划课题2项,广东省重点研发计划课题1项,部委委托课题5项。作为骨干参与国家863项目、973项目、科技支撑计划项目等多项。在国内外学术会议及学术期刊发表论文约20篇,获得国内授权发明专利6项(第一发明人),出版专著2本

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

出版专著 王丽宏,贺龙涛,刘培朋,李城龙,王啸,刘玮,匿名通信技术研究,人民邮电出版社,2020年 王丽宏,薛一波,贺龙涛,李城龙,王啸,王秀文,网络信息渗透技术—基础篇,国防工业出版社,2018年 期刊论文 Li, C., Liu, P., Yu, H., Ge M., Yu, X., Xin, Y., Wang, Y., & Zhang, D. (2020). Research on real-time high reliable network file distribution technology. Computers, Materials & Continua, 65(2), 1739-1752. (SCI,IF4.89) Sun, G., Chen, T., Su, Y., & Li, C*. (2018). Internet traffic classification based on incremental support vector machines. Mobile Networks and Applications, 23(4), 789-796. (SCI IF2.602) Li, C., Wang, Z., Cao, S., & He, L. (2018). WLRRS: A new recommendation system based on weighted linear regression models. Computers & Electrical Engineering, 66, 40-47. (SCI IF2.663) Wang, Z., Li, C., Yuan, Z., Guan, Y., & Xue, Y. (2016). DroidChain: A novel Android malware detection method based on behavior chains. Pervasive and Mobile Computing, 32, 3-14. (SCI IF2.725) 王兆国, 李城龙, 关毅, 等. 抗混淆的 Android 应用相似性检测方法[J]. 华中科技大学学报: 自然科学版, 2016, 44(3): 60-64. 王兆国, 李城龙, 张洛什, 等. 一种基于行为链的 Android 应用隐私窃取检测方法[J]. 电子学报, 2015, 43(9): 1750-1755. Li, C., Xue, Y., Dong, Y., & Wang, D. (2012). MCC: A Message and Command Correlation method for identifying new interactive protocols via session analyses. Tsinghua Science and Technology, 17(3), 344-353. 李城龙, 薛一波, 汪东升. 融合自动化逆向和聚类分析的协议识别方法[J]. 计算机科学与探索, 2012, 6(5): 397-408. 会议论文 Zhang, K., He, L., Li, C.*, Wang, S., & Zhang, X. Y. (2020, August). A Multi-source Self-adaptive Transfer Learning Model for Mining Social Links. In International Conference on Knowledge Science, Engineering and Management (pp. 202-209). Springer, Cham. Li, C., Wang, Z., Cao, S., & He, L. (2017, July). DLRRS: A New Recommendation System Based on Double Linear Regression Models. In International Conference on Advanced Hybrid Information Processing (pp. 242-249). Springer, Cham. Liu, P., Wang, X., He, X., Li, C., Cao, S., He, L., & Zhu, J. (2017, July). A Quantitative Model for Analysis and Evaluation of Tor Hidden Service Discovery. In International Conference on Advanced Hybrid Information Processing (pp. 70-77). Springer, Cham. Wang, Z., Li, C., Guan, Y., Xue, Y., & Dong, Y. (2016, August). Activityhijacker: Hijacking the android activity component for sensitive data. In 2016 25th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE. Wang, Z., Li, C., Guan, Y., & Xue, Y. (2015, September). Droidchain: A novel malware detection method for android based on behavior chain. In 2015 IEEE Conference on Communications and Network Security (CNS) (pp. 727-728). IEEE. Wang, L., Li, C., Tan, Q., & Wang, X. (2013, November). Generation and Distribution of Decoy Document System. In International Conference on Trustworthy Computing and Services (pp. 123-129). Springer, Berlin, Heidelberg. Li, C., Xue, Y., He, L., & Wang, L. (2012). TMT: A new Tunable Mechanism of Tor based on the path length. In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (Vol. 2, pp. 661-665). IEEE. Li, C., Xue, Y., Dong, Y., & Wang, D. (2012, December). Relay recommendation system (RRS) and selective anonymity for Tor. In 2012 IEEE Global Communications Conference (GLOBECOM) (pp. 833-838). IEEE. Li, C., Xue, Y., Dong, Y., & Wang, D. (2011, December). "Super nodes" in Tor: existence and security implication. In Proceedings of the 27th Annual Computer Security Applications Conference (pp. 217-226). (Student Award) Sun, G. L., Xue, Y., Dong, Y., Wang, D., & Li, C. (2010, December). An novel hybrid method for effectively classifying encrypted traffic. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-5). IEEE. Li, C., Xue, Y., Dong, Y., & Wang, D. (2010, December). HMC: a novel mechanism for identifying encrypted P2P thunder traffic. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-5). IEEE.

推荐链接
down
wechat
bug