基本信息

李梅梅  女  硕导  中国科学院信息工程研究所
电子邮件: limeimei@iie.ac.cn
通信地址: 海淀区树村路12号
邮政编码:

研究领域

信息管控、数据分析、安全防护标准

招生信息

招收硕士研究生1名

招生专业
083900-网络空间安全
招生方向
信息保密技术,数据分析

教育背景

2004-09--2007-07   北京大学   工学硕士
2000-09--2004-07   中国人民大学   工学学士

工作经历

   
工作简历
2012-01~现在, 中国科学院信息工程研究所, 高级工程师
2007-08~2011-12,国家保密科学技术研究所, 工程师

出版信息

   
发表论文
[1] 李梅梅, 李雨涵, 李楠, 金钟峰, 刘继国, 刘超. Intrusion Detection Method for SCADA System Based on Spatio-Temporal Characteristics. CSCWDnull. 2023, [2] 刘鹏程, 韩臻, 石志鑫, 李梅梅, 刘美辰. Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention. ISCCnull. 2022, [3] 李梅梅, 许艺严, 李楠, 金忠峰. Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification. TrustCom2022null. 2022, [4] 李梅梅, 孙德刚, 刘美辰, 石志鑫, 刘鹏程. 内部威胁分析与防御. 信息安全学报[J]. 2021, [5] 姜建国, 李博权, 魏宝乐, 李罡, 刘超, 黄伟庆, 李梅梅, 喻民. FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. Journal of Computer Security[J]. 2021, 403-421, [6] Sun, Degang, Liu, Meichen, Li, Meimei, Shi, Zhixin, Liu, Pengcheng, Wang, Xu, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 335-341, [7] 孙德刚, 刘美辰, 李梅梅, 石志鑫. DeepMIT:一种新的基于RNN的内部恶意威胁检测框架. CSCWD 2021null. 2021, [8] 黄伟庆. A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks. HPCC/DSS/SmartCity 2020. 2020, [9] 李梅梅, 郎宸, 喻民, 姜建国, 黄伟庆. SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection. KSEMnull. 2020, [10] Liu, Meichen, Li, Meimei, Sun, Degang, Shi, Zhixin, Lv, Bin, Liu, Pengcheng, ACM. Terminator: A Data-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. 17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020)null. 2020, 142-149, http://dx.doi.org/10.1145/3387902.3392329.
[11] Sun Degang. Terminator: A File-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. International Conference on Computing Frontiers. 2020, [12] 李梅梅. Machine Tools Fingerprinting for Distributed Numerical Control Sytems. IEEE conference on Local Computer Networks. 2019, [13] 姜建国, 殷其雷, 石志鑫, 李梅梅, 吕彬. 一种集成启发式规则和迁移学习的C&C信道检测框架. IPCCC2019null. 2019, [14] Jiang, Jianguo, Yin, Qilei, Shi, Zhixin, Li, Meimei, IEEE. Comprehensive Behavior Profiling Model for Malware Classification. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)null. 2018, 129-135, [15] 姜建国, 殷其雷, 石志鑫, 李梅梅. 基于行为画像的恶意代码分类. ISCC2018null. 2018, [16] 金忠峰, 李楠, 刘超, 李梅梅, 吕彬. 工业控制系统入侵检测技术研究综述. 保密科学技术[J]. 2018, 18-25, http://lib.cqvip.com/Qikan/Article/Detail?id=676053060.
[17] 姜建国. MPP:面向恶意程序分类的综合行为画像模型. 2018 IEEE Symposium on Computers and Communications. 2018, [18] Kong, Bin, Yang, Kun, Sun, Degang, Li, Meimei, Shi, Zhixin. Distinguishing Flooding Distributed Denial of Service from Flash Crowds Using Four Data Mining Approaches. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2017, 14(3): 839-856, https://www.webofscience.com/wos/woscc/full-record/WOS:000413777600019.
[19] 孔斌, 杨琨, 孙德刚, 李梅梅, 石志鑫. 采用四种数据挖掘方法区分FC和Flooding DDOS攻击. Computer Science and Information Systemsnull. 2017, [20] Jiang Jianguo, Jing Xiang, Lv Bin, Li Meimei, IEEE. A novel multi-classification intrusion detection model based on relevance vector machine. 2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS)null. 2015, 303-307, http://dx.doi.org/10.1109/CIS.2015.81.
[21] Jianguo Jiang, Xiang Jing, Meimei Li, Bin Lv. Research on the performance of relevance vector machine for regression and classification. 2015, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=IEEE201512001156&DbName=IPFDLAST2016&DbCode=IPFD&yx=&pr=&URLID=&bsm=.
[22] 李梅梅. 电子文件密级标志相关技术浅析. 保密科学技术[J]. 2011, 31-34, http://lib.cqvip.com/Qikan/Article/Detail?id=1003480012.
[23] 张化强, 李红燕, 李梅梅, 周斌, 王磊. Web信息系统中即席流程的并发控制策略. 计算机研究与发展[J]. 2007, 18-22, http://lib.cqvip.com/Qikan/Article/Detail?id=1001097173.
[24] Li, Meimei, Li, Hongyan, Tang, Lvan, Qiu, Baojun, Aberer, K, Peng, Z, Rundensteiner, EA, Zhang, Y, Li, X. DOPA: A data-driven and ontology-based method for ad hoc process awareness in Web information systems. WEB INFORMATION SYSTEMS - WISE 2006, PROCEEDINGS[J]. 2006, 4255: 114-125, https://www.webofscience.com/wos/woscc/full-record/WOS:000241624200011.
[25] Zhou, Xinbiao, Li, Hongyan, Liu, Haibin, Li, Meimei, Tang, Lvan, Fan, Yu, Hu, Zijing, Zheng, N, Jiang, X, lan, X. Monitoring abnormal patterns with complex semantics over ICU data streams. ADVANCES IN MACHINE VISION, IMAGE PROCESSING, AND PATTERN ANALYSIS[J]. 2006, 4153: 185-194, https://www.webofscience.com/wos/woscc/full-record/WOS:000240262900020.

科研活动