基本信息

李梅梅 女 硕导 中国科学院信息工程研究所
电子邮件: limeimei@iie.ac.cn
通信地址: 海淀区树村路12号
邮政编码:
研究领域
信息管控、数据分析、安全防护标准
招生信息
招收硕士研究生1名
招生专业
083900-网络空间安全
招生方向
信息防护,标识技术,数据分析
教育背景
2004-09--2007-07 北京大学 工学硕士
2000-09--2004-07 中国人民大学 工学学士
2000-09--2004-07 中国人民大学 工学学士
工作经历
工作简历
2012-01~现在, 中国科学院信息工程研究所, 高级工程师
2007-08~2011-12,国家保密科学技术研究所, 工程师
2007-08~2011-12,国家保密科学技术研究所, 工程师
出版信息
发表论文
[1] 李梅梅, 李雨涵, 李楠, 金钟峰, 刘继国, 刘超. Intrusion Detection Method for SCADA System Based on Spatio-Temporal Characteristics. CSCWD. 2023, 第 1 作者
[2] 刘鹏程, 韩臻, 石志鑫, 李梅梅, 刘美辰. Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention. ISCC. 2022, 第 4 作者
[3] 李梅梅, 许艺严, 李楠, 金忠峰. Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification. TrustCom2022. 2022, 第 1 作者
[4] 孙德刚, 刘美辰, 李梅梅, 石志鑫. DeepMIT:一种新的基于RNN的内部恶意威胁检测框架. CSCWD 2021. 2021, 第 3 作者
[5] 李梅梅, 孙德刚, 刘美辰, 石志鑫, 刘鹏程. 内部威胁分析与防御. 信息安全学报[J]. 2021, 第 1 作者
[6] 姜建国, 李博权, 魏宝乐, 李罡, 刘超, 黄伟庆, 李梅梅, 喻民. FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. Journal of Computer Security[J]. 2021, 第 7 作者null(29): 403-421,
[7] Sun, Degang, Liu, Meichen, Li, Meimei, Shi, Zhixin, Liu, Pengcheng, Wang, Xu, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD). 2021, 第 3 作者335-341,
[8] 黄伟庆. A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks. HPCC/DSS/SmartCity 2020. 2020,
[9] 李梅梅, 郎宸, 喻民, 姜建国, 黄伟庆. SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection. KSEM. 2020, 第 1 作者
[10] Liu, Meichen, Li, Meimei, Sun, Degang, Shi, Zhixin, Lv, Bin, Liu, Pengcheng, ACM. Terminator: A Data-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. 17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020). 2020, 第 2 作者 通讯作者 142-149, http://dx.doi.org/10.1145/3387902.3392329.
[11] Sun Degang. Terminator: A File-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. International Conference on Computing Frontiers. 2020,
[12] 李梅梅. Machine Tools Fingerprinting for Distributed Numerical Control Sytems. IEEE conference on Local Computer Networks. 2019, 第 1 作者
[13] 姜建国, 殷其雷, 石志鑫, 李梅梅, 吕彬. 一种集成启发式规则和迁移学习的C&C信道检测框架. IPCCC2019. 2019, 第 4 作者
[14] Jiang, Jianguo, Yin, Qilei, Shi, Zhixin, Li, Meimei, IEEE. Comprehensive Behavior Profiling Model for Malware Classification. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC). 2018, 第 4 作者129-135,
[15] 姜建国, 殷其雷, 石志鑫, 李梅梅. 基于行为画像的恶意代码分类. ISCC2018. 2018, 第 4 作者
[16] 金忠峰, 李楠, 刘超, 李梅梅, 吕彬. 工业控制系统入侵检测技术研究综述. 保密科学技术[J]. 2018, 第 4 作者18-25, http://lib.cqvip.com/Qikan/Article/Detail?id=676053060.
[17] 姜建国. MPP:面向恶意程序分类的综合行为画像模型. 2018 IEEE Symposium on Computers and Communications. 2018,
[18] Kong, Bin, Yang, Kun, Sun, Degang, Li, Meimei, Shi, Zhixin. Distinguishing Flooding Distributed Denial of Service from Flash Crowds Using Four Data Mining Approaches. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2017, 第 4 作者 通讯作者 14(3): 839-856, https://www.webofscience.com/wos/woscc/full-record/WOS:000413777600019.
[19] 孔斌, 杨琨, 孙德刚, 李梅梅, 石志鑫. 采用四种数据挖掘方法区分FC和Flooding DDOS攻击. Computer Science and Information Systems. 2017, 第 4 作者
[20] Jiang Jianguo, Jing Xiang, Lv Bin, Li Meimei, IEEE. A novel multi-classification intrusion detection model based on relevance vector machine. 2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS). 2015, 第 4 作者303-307, http://dx.doi.org/10.1109/CIS.2015.81.
[21] Jianguo Jiang, Xiang Jing, Meimei Li, Bin Lv. Research on the performance of relevance vector machine for regression and classification. 2015, 第 3 作者http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=IEEE201512001156&DbName=IPFDLAST2016&DbCode=IPFD&yx=&pr=&URLID=&bsm=.
[22] 李梅梅. 电子文件密级标志相关技术浅析. 保密科学技术[J]. 2011, 第 1 作者31-34, http://lib.cqvip.com/Qikan/Article/Detail?id=1003480012.
[23] 张化强, 李红燕, 李梅梅, 周斌, 王磊. Web信息系统中即席流程的并发控制策略. 计算机研究与发展[J]. 2007, 第 3 作者18-22, http://lib.cqvip.com/Qikan/Article/Detail?id=1001097173.
[24] Li, Meimei, Li, Hongyan, Tang, Lvan, Qiu, Baojun, Aberer, K, Peng, Z, Rundensteiner, EA, Zhang, Y, Li, X. DOPA: A data-driven and ontology-based method for ad hoc process awareness in Web information systems. WEB INFORMATION SYSTEMS - WISE 2006, PROCEEDINGS[J]. 2006, 第 1 作者 通讯作者 4255: 114-125, https://www.webofscience.com/wos/woscc/full-record/WOS:000241624200011.
[25] Zhou, Xinbiao, Li, Hongyan, Liu, Haibin, Li, Meimei, Tang, Lvan, Fan, Yu, Hu, Zijing, Zheng, N, Jiang, X, lan, X. Monitoring abnormal patterns with complex semantics over ICU data streams. ADVANCES IN MACHINE VISION, IMAGE PROCESSING, AND PATTERN ANALYSIS[J]. 2006, 第 4 作者4153: 185-194, https://www.webofscience.com/wos/woscc/full-record/WOS:000240262900020.
[2] 刘鹏程, 韩臻, 石志鑫, 李梅梅, 刘美辰. Frequency Hopping Signal Recognition Based on Horizontal Spatial Attention. ISCC. 2022, 第 4 作者
[3] 李梅梅, 许艺严, 李楠, 金忠峰. Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification. TrustCom2022. 2022, 第 1 作者
[4] 孙德刚, 刘美辰, 李梅梅, 石志鑫. DeepMIT:一种新的基于RNN的内部恶意威胁检测框架. CSCWD 2021. 2021, 第 3 作者
[5] 李梅梅, 孙德刚, 刘美辰, 石志鑫, 刘鹏程. 内部威胁分析与防御. 信息安全学报[J]. 2021, 第 1 作者
[6] 姜建国, 李博权, 魏宝乐, 李罡, 刘超, 黄伟庆, 李梅梅, 喻民. FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. Journal of Computer Security[J]. 2021, 第 7 作者null(29): 403-421,
[7] Sun, Degang, Liu, Meichen, Li, Meimei, Shi, Zhixin, Liu, Pengcheng, Wang, Xu, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. DeepMIT: A Novel Malicious Insider Threat Detection Framework based on Recurrent Neural Network. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD). 2021, 第 3 作者335-341,
[8] 黄伟庆. A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks. HPCC/DSS/SmartCity 2020. 2020,
[9] 李梅梅, 郎宸, 喻民, 姜建国, 黄伟庆. SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection. KSEM. 2020, 第 1 作者
[10] Liu, Meichen, Li, Meimei, Sun, Degang, Shi, Zhixin, Lv, Bin, Liu, Pengcheng, ACM. Terminator: A Data-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. 17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020). 2020, 第 2 作者 通讯作者 142-149, http://dx.doi.org/10.1145/3387902.3392329.
[11] Sun Degang. Terminator: A File-level Hybrid Framework for Intellectual Property Theft Detection and Prevention. International Conference on Computing Frontiers. 2020,
[12] 李梅梅. Machine Tools Fingerprinting for Distributed Numerical Control Sytems. IEEE conference on Local Computer Networks. 2019, 第 1 作者
[13] 姜建国, 殷其雷, 石志鑫, 李梅梅, 吕彬. 一种集成启发式规则和迁移学习的C&C信道检测框架. IPCCC2019. 2019, 第 4 作者
[14] Jiang, Jianguo, Yin, Qilei, Shi, Zhixin, Li, Meimei, IEEE. Comprehensive Behavior Profiling Model for Malware Classification. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC). 2018, 第 4 作者129-135,
[15] 姜建国, 殷其雷, 石志鑫, 李梅梅. 基于行为画像的恶意代码分类. ISCC2018. 2018, 第 4 作者
[16] 金忠峰, 李楠, 刘超, 李梅梅, 吕彬. 工业控制系统入侵检测技术研究综述. 保密科学技术[J]. 2018, 第 4 作者18-25, http://lib.cqvip.com/Qikan/Article/Detail?id=676053060.
[17] 姜建国. MPP:面向恶意程序分类的综合行为画像模型. 2018 IEEE Symposium on Computers and Communications. 2018,
[18] Kong, Bin, Yang, Kun, Sun, Degang, Li, Meimei, Shi, Zhixin. Distinguishing Flooding Distributed Denial of Service from Flash Crowds Using Four Data Mining Approaches. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2017, 第 4 作者 通讯作者 14(3): 839-856, https://www.webofscience.com/wos/woscc/full-record/WOS:000413777600019.
[19] 孔斌, 杨琨, 孙德刚, 李梅梅, 石志鑫. 采用四种数据挖掘方法区分FC和Flooding DDOS攻击. Computer Science and Information Systems. 2017, 第 4 作者
[20] Jiang Jianguo, Jing Xiang, Lv Bin, Li Meimei, IEEE. A novel multi-classification intrusion detection model based on relevance vector machine. 2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS). 2015, 第 4 作者303-307, http://dx.doi.org/10.1109/CIS.2015.81.
[21] Jianguo Jiang, Xiang Jing, Meimei Li, Bin Lv. Research on the performance of relevance vector machine for regression and classification. 2015, 第 3 作者http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=IEEE201512001156&DbName=IPFDLAST2016&DbCode=IPFD&yx=&pr=&URLID=&bsm=.
[22] 李梅梅. 电子文件密级标志相关技术浅析. 保密科学技术[J]. 2011, 第 1 作者31-34, http://lib.cqvip.com/Qikan/Article/Detail?id=1003480012.
[23] 张化强, 李红燕, 李梅梅, 周斌, 王磊. Web信息系统中即席流程的并发控制策略. 计算机研究与发展[J]. 2007, 第 3 作者18-22, http://lib.cqvip.com/Qikan/Article/Detail?id=1001097173.
[24] Li, Meimei, Li, Hongyan, Tang, Lvan, Qiu, Baojun, Aberer, K, Peng, Z, Rundensteiner, EA, Zhang, Y, Li, X. DOPA: A data-driven and ontology-based method for ad hoc process awareness in Web information systems. WEB INFORMATION SYSTEMS - WISE 2006, PROCEEDINGS[J]. 2006, 第 1 作者 通讯作者 4255: 114-125, https://www.webofscience.com/wos/woscc/full-record/WOS:000241624200011.
[25] Zhou, Xinbiao, Li, Hongyan, Liu, Haibin, Li, Meimei, Tang, Lvan, Fan, Yu, Hu, Zijing, Zheng, N, Jiang, X, lan, X. Monitoring abnormal patterns with complex semantics over ICU data streams. ADVANCES IN MACHINE VISION, IMAGE PROCESSING, AND PATTERN ANALYSIS[J]. 2006, 第 4 作者4153: 185-194, https://www.webofscience.com/wos/woscc/full-record/WOS:000240262900020.