近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
出版专著
王丽宏,贺龙涛,刘培朋,李城龙,王啸,刘玮,匿名通信技术研究,人民邮电出版社,2020年
王丽宏,薛一波,贺龙涛,李城龙,王啸,王秀文,网络信息渗透技术—基础篇,国防工业出版社,2018年
期刊论文
Li, C., Liu, P., Yu, H., Ge M., Yu, X., Xin, Y., Wang, Y., & Zhang, D. (2020). Research on real-time high reliable network file distribution technology. Computers, Materials & Continua, 65(2), 1739-1752. (SCI,IF4.89)
Sun, G., Chen, T., Su, Y., & Li, C*. (2018). Internet traffic classification based on incremental support vector machines. Mobile Networks and Applications, 23(4), 789-796. (SCI IF2.602)
Li, C., Wang, Z., Cao, S., & He, L. (2018). WLRRS: A new recommendation system based on weighted linear regression models. Computers & Electrical Engineering, 66, 40-47. (SCI IF2.663)
Wang, Z., Li, C., Yuan, Z., Guan, Y., & Xue, Y. (2016). DroidChain: A novel Android malware detection method based on behavior chains. Pervasive and Mobile Computing, 32, 3-14. (SCI IF2.725)
王兆国, 李城龙, 关毅, 等. 抗混淆的 Android 应用相似性检测方法[J]. 华中科技大学学报: 自然科学版, 2016, 44(3): 60-64.
王兆国, 李城龙, 张洛什, 等. 一种基于行为链的 Android 应用隐私窃取检测方法[J]. 电子学报, 2015, 43(9): 1750-1755.
Li, C., Xue, Y., Dong, Y., & Wang, D. (2012). MCC: A Message and Command Correlation method for identifying new interactive protocols via session analyses. Tsinghua Science and Technology, 17(3), 344-353.
李城龙, 薛一波, 汪东升. 融合自动化逆向和聚类分析的协议识别方法[J]. 计算机科学与探索, 2012, 6(5): 397-408.
会议论文
Zhang, K., He, L., Li, C.*, Wang, S., & Zhang, X. Y. (2020, August). A Multi-source Self-adaptive Transfer Learning Model for Mining Social Links. In International Conference on Knowledge Science, Engineering and Management (pp. 202-209). Springer, Cham.
Li, C., Wang, Z., Cao, S., & He, L. (2017, July). DLRRS: A New Recommendation System Based on Double Linear Regression Models. In International Conference on Advanced Hybrid Information Processing (pp. 242-249). Springer, Cham.
Liu, P., Wang, X., He, X., Li, C., Cao, S., He, L., & Zhu, J. (2017, July). A Quantitative Model for Analysis and Evaluation of Tor Hidden Service Discovery. In International Conference on Advanced Hybrid Information Processing (pp. 70-77). Springer, Cham.
Wang, Z., Li, C., Guan, Y., Xue, Y., & Dong, Y. (2016, August). Activityhijacker: Hijacking the android activity component for sensitive data. In 2016 25th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE.
Wang, Z., Li, C., Guan, Y., & Xue, Y. (2015, September). Droidchain: A novel malware detection method for android based on behavior chain. In 2015 IEEE Conference on Communications and Network Security (CNS) (pp. 727-728). IEEE.
Wang, L., Li, C., Tan, Q., & Wang, X. (2013, November). Generation and Distribution of Decoy Document System. In International Conference on Trustworthy Computing and Services (pp. 123-129). Springer, Berlin, Heidelberg.
Li, C., Xue, Y., He, L., & Wang, L. (2012). TMT: A new Tunable Mechanism of Tor based on the path length. In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (Vol. 2, pp. 661-665). IEEE.
Li, C., Xue, Y., Dong, Y., & Wang, D. (2012, December). Relay recommendation system (RRS) and selective anonymity for Tor. In 2012 IEEE Global Communications Conference (GLOBECOM) (pp. 833-838). IEEE.
Li, C., Xue, Y., Dong, Y., & Wang, D. (2011, December). "Super nodes" in Tor: existence and security implication. In Proceedings of the 27th Annual Computer Security Applications Conference (pp. 217-226). (Student Award)
Sun, G. L., Xue, Y., Dong, Y., Wang, D., & Li, C. (2010, December). An novel hybrid method for effectively classifying encrypted traffic. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-5). IEEE.
Li, C., Xue, Y., Dong, Y., & Wang, D. (2010, December). HMC: a novel mechanism for identifying encrypted P2P thunder traffic. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-5). IEEE.