网络科学与网络空间研究院

Institute for Network Sciences and Cyberspace

姓名:李城龙

职称:副研究员

电话:13910110074

邮箱:lichenglong@tsinghua.edu.cn

教育背景

工学博士(计算机科学与技术),清华大学,中国,2012
工学学士(计算机科学与技术),清华大学,中国,2007

社会兼职

中国计算机学会区块链专委会委员

研究领域

网络测量
流量分类
移动智能终端安全
匿名通信系统与暗网
区块链安全

研究概况

作为课题负责人承担国家重点研发计划课题2项,广东省重点研发计划课题1项,部委委托课题5项。作为骨干参与国家863项目、973项目、科技支撑计划项目等多项。在国内外学术会议及学术期刊发表论文约20篇,获得国内授权发明专利6项(第一发明人),出版专著2本。

学术成果

出版专著:
[1] 王丽宏,贺龙涛,刘培朋,李城龙,王啸,刘玮,匿名通信技术研究,人民邮电出版社,2020年
[2] 王丽宏,薛一波,贺龙涛,李城龙,王啸,王秀文,网络信息渗透技术—基础篇,国防工业出版社,2018年
期刊论文:
[1] Li, C., Liu, P., Yu, H., Ge M., Yu, X., Xin, Y., Wang, Y., & Zhang, D. (2020). Research on real-time high reliable network file distribution technology. Computers, Materials & Continua, 65(2), 1739-1752. (SCI,IF4.89)
[2] Sun, G., Chen, T., Su, Y., & Li, C*. (2018). Internet traffic classification based on incremental support vector machines. Mobile Networks and Applications, 23(4), 789-796. (SCI IF2.602)
[3] Li, C., Wang, Z., Cao, S., & He, L. (2018). WLRRS: A new recommendation system based on weighted linear regression models. Computers & Electrical Engineering, 66, 40-47. (SCI IF2.663)
[4] Wang, Z., Li, C., Yuan, Z., Guan, Y., & Xue, Y. (2016). DroidChain: A novel Android malware detection method based on behavior chains. Pervasive and Mobile Computing, 32, 3-14. (SCI IF2.725)
[5] 王兆国, 李城龙, 关毅, 等. 抗混淆的 Android 应用相似性检测方法[J]. 华中科技大学学报: 自然科学版, 2016, 44(3): 60-64.
[6] 王兆国, 李城龙, 张洛什, 等. 一种基于行为链的 Android 应用隐私窃取检测方法[J]. 电子学报, 2015, 43(9): 1750-1755.
[7] Li, C., Xue, Y., Dong, Y., & Wang, D. (2012). MCC: A Message and Command Correlation method for identifying new interactive protocols via session analyses. Tsinghua Science and Technology, 17(3), 344-353.
[8] 李城龙, 薛一波, 汪东升. 融合自动化逆向和聚类分析的协议识别方法[J]. 计算机科学与探索, 2012, 6(5): 397-408.
会议论文:
[1] Zhang, K., He, L., Li, C.*, Wang, S., & Zhang, X. Y. (2020, August). A Multi-source Self-adaptive Transfer Learning Model for Mining Social Links. In International Conference on Knowledge Science, Engineering and Management (pp. 202-209). Springer, Cham.
[2] Li, C., Wang, Z., Cao, S., & He, L. (2017, July). DLRRS: A New Recommendation System Based on Double Linear Regression Models. In International Conference on Advanced Hybrid Information Processing (pp. 242-249). Springer, Cham.
[3] Liu, P., Wang, X., He, X., Li, C., Cao, S., He, L., & Zhu, J. (2017, July). A Quantitative Model for Analysis and Evaluation of Tor Hidden Service Discovery. In International Conference on Advanced Hybrid Information Processing (pp. 70-77). Springer, Cham.
[4] Wang, Z., Li, C., Guan, Y., Xue, Y., & Dong, Y. (2016, August). Activityhijacker: Hijacking the android activity component for sensitive data. In 2016 25th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE.
[5] Wang, Z., Li, C., Guan, Y., & Xue, Y. (2015, September). Droidchain: A novel malware detection method for android based on behavior chain. In 2015 IEEE Conference on Communications and Network Security (CNS) (pp. 727-728). IEEE.
[6] Wang, L., Li, C., Tan, Q., & Wang, X. (2013, November). Generation and Distribution of Decoy Document System. In International Conference on Trustworthy Computing and Services (pp. 123-129). Springer, Berlin, Heidelberg.
[7] Li, C., Xue, Y., He, L., & Wang, L. (2012). TMT: A new Tunable Mechanism of Tor based on the path length. In 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (Vol. 2, pp. 661-665). IEEE.
[8] Li, C., Xue, Y., Dong, Y., & Wang, D. (2012, December). Relay recommendation system (RRS) and selective anonymity for Tor. In 2012 IEEE Global Communications Conference (GLOBECOM) (pp. 833-838). IEEE.
[9] Li, C., Xue, Y., Dong, Y., & Wang, D. (2011, December). "Super nodes" in Tor: existence and security implication. In Proceedings of the 27th Annual Computer Security Applications Conference (pp. 217-226). (Student Award)
[10] Sun, G. L., Xue, Y., Dong, Y., Wang, D., & Li, C. (2010, December). An novel hybrid method for effectively classifying encrypted traffic. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-5). IEEE.
[11] Li, C., Xue, Y., Dong, Y., & Wang, D. (2010, December). HMC: a novel mechanism for identifying encrypted P2P thunder traffic. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010 (pp. 1-5). IEEE.