李城龙副研究员
个人介绍

姓名:李城龙

职称:副研究员

电话:(010)62603217

邮箱:lichenglong@tsinghua.edu.cn

教育背景

工学博士(计算机科学与技术),清华大学,中国,2012

工学学士(计算机科学与技术),清华大学,中国,2007

社会兼职

中关村实验室双聘科研人员

中国计算机学会区块链专委会执行委员

中国指控学会网络空间测绘专业专委会委员

研究领域

网络测量

态势感知

流量分类

匿名通信系统与暗网

区块链安全

研究概况

       作为课题负责人承担国家重点研发计划课题2项,广东省重点研发计划课题1项,部委委托课题5项。作为骨干参与国家863项目、973项目、科技支撑计划项目等多项。在NDSS、TDSC、软件学报等国内外学术会议及学术期刊发表论文约40篇,获得国内授权发明专利约10项(第一发明人),出版专著3本。

学术成果

出版专著:

[1] 杨家海,何林,李城龙. 网络空间测绘——原理、技术与应用. 人民邮电出版社. 2023. 获得国家科学技术学术著作出版基金(NFAPST)、工信学术出版基金支持.

[2] 王丽宏,贺龙涛,刘培朋,李城龙,王啸,刘玮. 匿名通信技术研究. 人民邮电出版社,2020.

[3] 王丽宏,薛一波,贺龙涛,李城龙,王啸,王秀文. 网络信息渗透技术—基础篇. 国防工业出版社,2018.

学术论文:

1. Luo Y, Li C, Wang Z, et al. IPREDS: Efficient prediction system for Internet-wide port and service scanning[C]//ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2024). (TH-CPL A,CCF B)

2. Wang S, Wang Z, Li C, et al. TrafficSiam: More Realistic Few-shot Website Fingerprinting Attack with Contrastive Learning[C]//IEEE/IFIP Network Operations and Management Symposium (NOMS 2024). (TH-CPL B)

3. Lin H, Li C, Yang J, et al. CP-IoT: A Cross-Platform Monitoring System for Smart Home[C]// Network and Distributed System Security (NDSS) Symposium 2024. (TH-CPL A,CCF A)

4. 樊琳娜,李城龙,吴毅超,段晨鑫,王之梁,林海,杨家海. 物联网设备识别及异常检测研究综述[J]. 软件学报,2024,35(1):288-308 (TH-CPL B,CCF T1)

5. Duan C, Li S, Lin H, et al. IoTa: Fine-grained Traffic Monitoring for IoT Devices via Fully Packet-level Models[J]. IEEE Transactions on Dependable and Secure Computing (TDSC) 2023. (TH-CPL A,CCF A)

6. Han D, Wang S, He Z, et al. Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild[C]//2023 IFIP Networking Conference (IFIP Networking). IEEE, 2023: 1-9. (TH-CPL B,CCF C)

7. Song G, He L, Zhao T, et al. Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning[C]//2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS). IEEE, 2023: 1-10. (TH-CPL B,CCF B)

8. Yu R, Xiao F, Wang Z, et al. Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring Tasks[C]//2023 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2023: 1280-1286. (TH-CPL B,CCF C)

9. 李维, 李城龙, 杨家海. As-Stream: 一种针对波动数据流的算子智能并行化策略[J]. 清华大学学报 (自然科学版), 2022, 62(12): 1851-1863. (TH-CPL B)

10. Jia C, Li C, Li Y, et al. FACL: A Flexible and High-Performance ACL engine on FPGA-based SmartNIC[C]//2022 IFIP Networking Conference (IFIP Networking). IEEE, 2022: 1-9. (TH-CPL B,CCF C)

11. Jia C, Li C, Li Y, et al. An Observation of Packet Classification: Most Rules are at the Top[C]//IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2022: 1-6.

12. Liu Y, Pan L, Li C, et al. PerfTrace: A New Multi-Metric Network Performance Monitoring Tool[C]//2022 International Conference on Network and Service Management (CNSM). 2022: 1-7. (TH-CPL B)

13. Nie L, He L, Song G, et al. Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers[C]//2022 18th International Conference on Network and Service Management (CNSM). IEEE, 2022: 303-309. (TH-CPL B)

14. Liu Y, Wang Z, Yang J, et al. Both efficient and accurate: A large-scale one-way delay measurement scheme[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference. IEEE, 2022: 395-400. (TH-CPL B,CCF C)

15. Fan L, He L, Dong E, et al. EvoIoT: An evolutionary IoT and non-IoT classification model in open environments[J]. Computer Networks, 2022, 219: 109450. (TH-CPL B,CCF B)

16. Wu Y, Li C, Yang J, et al. WebIoT: Classifying Internet of Things Devices at Internet Scale through Web Characteristics[C]//2022 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2022: 1-7. (CCF C)

17. Gao Y, Shi J, Wang X, et al. A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes[C]//2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys). IEEE, 2021: 543-550. (CCF C)

18. Li, C., Liu, P., Yu, H.,et al. Research on real-time high reliable network file distribution technology[J]. Computers, Materials & Continua,2020,65(2),1739-1752.(SCI)

19. Zhang K, He L, Li C, et al. A Multi-source Self-adaptive Transfer Learning Model for Mining Social Links[C]//Knowledge Science, Engineering and Management: 13th International Conference, KSEM 2020, Hangzhou, China, August 28–30, 2020, Proceedings, Part II 13. Springer International Publishing, 2020: 202-209. (CCF C)

20. Sun, G., Chen, T., Su, Y., & Li, C*. (2018). Internet traffic classification based on incremental support vector machines. Mobile Networks and Applications, 23(4), 789-796. (SCI)

21. 王兆国, 李城龙, 张洛什, 等. 一种基于行为链的 Android 应用隐私窃取检测方法[J]. 电子学报, 2015, 43(9): 1750-1755. (TH-CPL B,CCF T1)

22. Li, C., Xue, Y., Dong, Y., & Wang, D. MCC: A Message and Command Correlation method for identifying new interactive protocols via session analyses[J]. Tsinghua Science and Technology,2012,17(3), 344-353. (TH-CPL B)

23. Li, C., Xue, Y., Dong, Y., & Wang, D. (2012, December). Relay recommendation system (RRS) and selective anonymity for Tor. In 2012 IEEE Global Communications Conference (GLOBECOM) (pp. 833-838). IEEE. (TH-CPL B,CCF C)

24. Li, C., Xue, Y., Dong, Y., & Wang, D. (2011, December). "Super nodes" in Tor: existence and security implication. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC) (pp. 217-226). (Student Award)(TH-CPL B,CCF B)

25. Li, C., Xue, Y., Dong, Y., & Wang, D. (2010, December). HMC: a novel mechanism for identifying encrypted P2P thunder traffic. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-5). IEEE. (TH-CPL B,CCF C)