Monographs
1.Yang Jiahai, He Lin, Li Chenglong.Cyberspace Mapping: Principles, Technologies, and Applications. People’s Posts and Telecommunications Press, 2023. (Supported by the National Academic Publication Fund for Science & Technology and MIIT Academic Publication Fund)
2.Wang Lihong, He Longtao, Liu Peipeng, Li Chenglong, Wang Xiao, Liu Wei.Research on Anonymous Communication Technologies. People’s Posts and Telecommunications Press, 2020.
3.Wang Lihong, Xue Yibo, He Longtao, Li Chenglong, Wang Xiao, Wang Xiuwen.Network Information Infiltration Techniques: Fundamentals. National Defense Industry Press, 2018.
Selected Journal & Conference Papers
1.Lin H, Li C, Yang J, et al. CP-IoT: A Cross-Platform Monitoring System for Smart Home[C]// Network and Distributed System Security (NDSS) Symposium 2024. (TH-CPL A,CCF A)
2.Lin J, Li C, Gong W, et al. ProbeGeo: A Comprehensive Landmark Mining Framework Based on Web Content[J]. IEEE/ACM Transactions on Networking(TON), 2024.(TH-CPL A,CCF A)
3.Duan C, Li S, Lin H, et al. IoTa: Fine-grained Traffic Monitoring for IoT Devices via Fully Packet-level Models[J]. IEEE Transactions on Dependable and Secure Computing (TDSC)2024. (TH-CPL A,CCF A)
4.Song G, He L, Zhu F, et al. AddrMiner : A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System[J]. IEEE/ACM Transactions on Networking(TON), 2024.(TH-CPL A,CCF A)
5.Luo Y, Li C,Wang Z,et al.IPREDS: Efficient prediction system for Internet-wide port and service scanning[C]//ACM International Conference on Emerging Networking Experiments and Technologies(CoNEXT 2024). (TH-CPLA,CCF B)
6.Dong C, Yang J, Li Y, et al. E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet[J].CyberSecurity, 2024. (CCF T1)
7.林金磊,李城龙,宋光磊,樊琳娜,王之梁,杨家海.客户端独立的IP地理定位研究综述.软件学报,2025,36(1):321-340(TH-CPL B,CCFT1)
8.樊琳娜,李城龙,吴毅超,段晨鑫,王之梁,林海,杨家海.物联网设备识别及异常检测研究综述[J].软件学报,2024,35(1):288-308(TH-CPL B,CCFT1)
9.Zhang W, Song G, He L, et al. 6vision: Image-encoding-based ipv6 target generation in few-seed scenarios[C]//2024 IEEE 32nd International Conference on Network Protocols (ICNP). IEEE, 2024: 1-12.(TH-CPLA,CCF B)
10.Wang S, Wang Z, Li C,et al.TrafficSiam: More Realistic Few-shot Website Fingerprinting Attack with Contrastive Learning[C]//IEEE/IFIP Network Operations and Management Symposium (NOMS 2024). (TH-CPL B)
11.Han D, Wang S, He Z, et al. Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild[C]//2023 IFIP Networking Conference (IFIP Networking). IEEE, 2023: 1-9. (TH-CPL B,CCF C)
12.Song G, He L, Zhao T, et al. Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning[C]//2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS). IEEE, 2023: 1-10. (TH-CPL B,CCF B)
13.Yu R, Xiao F, Wang Z, et al. Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring Tasks[C]//2023 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2023: 1280-1286. (TH-CPL B,CCF C)
14.李维, 李城龙, 杨家海. As-Stream: 一种针对波动数据流的算子智能并行化策略[J].清华大学学报(自然科学版), 2022, 62(12): 1851-1863. (TH-CPL B)
15.Jia C, Li C, Li Y, et al. FACL: A Flexible and High-Performance ACL engine on FPGA-based SmartNIC[C]//2022 IFIP Networking Conference (IFIP Networking). IEEE, 2022: 1-9. (TH-CPL B,CCF C)
16.Jia C, Li C, Li Y, et al. An Observation of Packet Classification: Most Rules are at the Top[C]//IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2022: 1-6.
17.Liu Y, Pan L, Li C, et al. PerfTrace: A New Multi-Metric Network Performance Monitoring Tool[C]//2022 International Conference on Network and Service Management (CNSM). 2022: 1-7. (TH-CPL B)
18.Nie L, He L, Song G, et al. Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers[C]//2022 18th International Conference on Network and Service Management (CNSM). IEEE, 2022: 303-309.(TH-CPL B)
19.Liu Y, Wang Z, Yang J, et al. Both efficient and accurate: A large-scale one-way delay measurement scheme[C]//GLOBECOM 2022-2022 IEEE Global Communications Conference. IEEE, 2022: 395-400.(TH-CPL B,CCFC)
20.Fan L, He L, Dong E, et al. EvoIoT: An evolutionary IoT and non-IoT classification model in open environments[J].Computer Networks, 2022, 219: 109450.(TH-CPL B,CCFB, SCI)
21.Wu Y, Li C, Yang J, et al. WebIoT: Classifying Internet of Things Devices at Internet Scale through Web Characteristics[C]//2022 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2022: 1-7. (CCF C)
22.Gao Y, Shi J, Wang X, et al. A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes[C]//2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys). IEEE, 2021: 543-550.(CCFC)
23.Li, C., Liu, P., Yu, H.,et al. Research on real-time high reliable network file distribution technology[J].Computers, Materials & Continua,2020,65(2),1739-1752.(SCI)
24.Zhang K, He L, Li C, et al. A Multi-source Self-adaptive Transfer Learning Model for Mining Social Links[C]//Knowledge Science, Engineering and Management: 13th International Conference,KSEM 2020, Hangzhou, China, August 28–30, 2020, Proceedings, Part II 13. Springer International Publishing, 2020: 202-209.(CCF C)
25.Sun, G., Chen, T., Su, Y., & Li, C. (2018). Internet traffic classification based on incremental support vector machines.Mobile Networks and Applications, 23(4), 789-796. (SCI)
26.王兆国, 李城龙, 张洛什, 等. 一种基于行为链的 Android 应用隐私窃取检测方法[J].电子学报, 2015, 43(9): 1750-1755.(TH-CPL B,CCFT1)
27.Li, C., Xue, Y., Dong, Y., & Wang, D. MCC: A Message and Command Correlation method for identifying new interactive protocols via session analyses[J].Tsinghua Science and Technology,2012,17(3), 344-353.(TH-CPL B)
28.Li, C., Xue, Y., Dong, Y., & Wang, D. (2012, December). Relay recommendation system (RRS) and selective anonymity for Tor. In 2012 IEEE Global Communications Conference (GLOBECOM) (pp. 833-838). IEEE.(TH-CPL B,CCFC)
29.Li, C., Xue, Y., Dong, Y., & Wang, D. (2011, December). "Super nodes" in Tor: existence and security implication. In Proceedings of the 27th Annual Computer Security Applications Conference(ACSAC)(pp. 217-226). (Student Award)(TH-CPL B,CCFB)
30.Li, C., Xue, Y., Dong, Y., & Wang, D. (2010, December). HMC: a novel mechanism for identifying encrypted P2P thunder traffic. In 2010 IEEE Global Telecommunications ConferenceGLOBECOM 2010(pp. 1-5). IEEE.(TH-CPL B,CCFC)