基本信息
刘庆云 男 博导 中国科学院信息工程研究所
电子邮件: liuqingyun@iie.ac.cn
通信地址: 海淀区闵庄路89号
现任信工所正高级工程师,博士生导师,信息智能处理技术研究室(第二研究室)副主任、处理架构组组长,主要研究方向为信息内容安全,网络空间测绘,侧重网络安全系统体系架构、网络内容深度分析与检测理论与技术。作为主要负责人,先后承担国家863计划重大项目、国家242信息安全计划项目以及工信部、发改委等多项国家级重大信息安全科研项目。主持研发的多个系统在国家重要部门实际应用效果显著。曾获国家科技进步二等奖1次,省部级科技进步一等奖1次,二等奖1次。近三年发表论文20余篇,申请专利12篇,软著6项,培养研究生10余名。
团队网站 www.mesalab.cn
研究领域
信息内容安全、网络安全、网络空间测绘、高性能处理架构
教育背景
2010-09--2015-07 中国科学院计算技术研究所 博士2002-09--2005-04 北京航空航天大学 硕士
工作经历
工作简历
2017-10~现在, 中国科学院信息工程研究所, 正高级工程师2012-09~2017-09,中国科学院信息工程研究所, 高级工程师2012-01~2012-09,中国科学院信息工程研究所, 工程师2005-04~2011-12,中国科学院计算技术研究所, 工程师
教授课程
网络空间测绘与安全应用网络测量与行为分析
专利与奖励
奖励信息
(1) 高速网络流处理平台关键技术, 二等奖, 部委级, 2017(2) 网络行为分析技术, 一等奖, 研究所(学校), 2017(3) 音视频项目, 二等奖, 国家级, 2016(4) 区域网络安全管理, 一等奖, 研究所(学校), 2013(5) 新疆科技进步一等奖, 一等奖, 省级, 2010
代表论著
发表论文
[1] 李白杨, 朱宇佳, 刘庆云, 孙永, 张跃冬, 郭莉. From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures.. ESORICS. 2024, 第 3 作者null(null): [2] 张晓欧, 高扬, 刘洋, 朱宇佳, 张鹏, 周川, 刘庆云, 陈红阳. Meta Structure Search for Link Weight Prediction In Heterogeneous Graphs. ICASSP. 2024, 第 7 作者null(null): [3] 仇渝琪, 李白杨, 李志谦, 焦亮, 朱宇佳, 刘庆云. Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk. IEEE SymPosium On Computers and Communications. 2023, 第 6 作者[4] 张麟康, 秦云杨, 朱宇佳, 程逸飞, 揭真, 刘庆云. SeeStar: an Efficient Starlink Asset Detection Framework. International Conference on Science ofCyber Security. 2023, 第 6 作者[5] Zhao Li, Jiangchao Chen, Xiaoqing Ma, Meijie Du, Zhongyi Zhang, Qingyun Liu. A Robust and Accurate Encrypted Video Traffic Identification Method via Graph Neural Network. The 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2023, 第 6 作者[6] Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen. Detecting Fake-Normal Pornographic and Gambling Websites through one MultiAttention HGNN. The 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2023, 第 5 作者[7] 李欣燕, 朱宇佳, 张晓欧, 揭真, 刘庆云. SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph. CSCWD. 2023, 第 5 作者[8] 焦亮, 朱宇佳, 傅兴玉, 周毅, 秦丰林, 刘庆云. CCSv6:A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6. IEEE Symposium on Computers and Communications. 2023, 第 6 作者[9] 李白杨, 朱宇佳, 刘庆云, 孙永, 张跃冬, 郭莉. Wrapping DNS Into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications. IFIP Networking. 2023, 第 3 作者[10] Chenxu Wang, Zhao Li, Jiangyi Yin, Zhenni Liu, Zhongyi Zhang, Qingyun Liu. IDTracker: Discovering Illicit Website Communities via Third-party Service IDs. The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network (DSN). 2023, 第 6 作者[11] 莫迪凯, 朱宇佳, 揭真, 孙永, 刘庆云, 方滨兴. Identify Hidden Cache Structures in DNS Infrastructure viaWatermark Records. IEEE Symposium on Computers andCommunications. 2023, 第 5 作者[12] 韩丁康, 朱宇佳, 焦亮, 莫迪凯, 孙永, 张跃东, 刘庆云. DualDNSMiner: A Dual-stack Resolver Discovery Method Based onAlias Resolution. International Conference on CollaborativeComputing:Networking, Applications andWorksharing. 2023, 第 7 作者[13] Mingyu Zhang, Fang Fang, Hao Li, Qingyun Liu, Yangchun Li, Hailong Wang. MHGEE: Event Extraction via Multi-Granularity Heterogeneous Graph. International Conference on Computational Science 2022(ICCS 2022). 2022, 第 4 作者[14] 仇渝淇, 李白杨, 朱宇佳, 焦亮, 刘庆云. Detection of DoH Tunnels with Dual-Tier Classifier. MSN. 2022, 第 5 作者[15] 李白杨, 朱宇佳, 刘庆云, 孙永, 张跃冬, 郭莉. 加密DNS:协议、研究现状与未来展望. 信息安全学报[J]. 2022, 第 3 作者[16] Yubing Li, Wei Yang, Zhou Zhou, Qingyun Liu, Zhao Li, Shu Li. P4-NSAF: defending IPv6 networks against ICMPv6 DoS and DDoS attacks with P4. International Conference on Communications (ICC). 2022, 第 4 作者[17] Zhao Li, Shijun Zhang, Jiangyi Yin, Meijie Du, Zhongyi Zhang, Qingyun Liu. Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-party Services. The 27th IEEE Symposium on Computers and Communications (ISCC). 2022, 第 6 作者[18] Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen. A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets. The 21th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCo). 2022, 第 5 作者[19] 吴佳挺, 朱宇佳, 李白杨, 刘庆云, 方滨兴. Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers. trustcom. 2021, 第 4 作者[20] Zhang, Shuai, Zhou, Zhou, Li, Da, Zhong, Youbing, Liu, Qingyun, Yang, Wei, Li, Shu, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Attributed Heterogeneous Graph Neural Network for Malicious Domain Detection. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD). 2021, 第 5 作者397-403, [21] Xiaoqing Ma, Chao Zheng, Zhao Li, Qingyun Liu, Xunxun Chen. CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised Classification. The 26th IEEE Symposium on Computers and Communications (ISCC). 2021, 第 4 作者[22] Li, Shu, Zaidi, Nayyar A, Liu, Qingyun, Li, Gang, Karlapalem, K, Cheng, H, Ramakrishnan, N, Agrawal, RK, Reddy, PK, Srivastava, J, Chakraborty, T. Neighbours and Kinsmen: Hateful Users Detection with Graph Neural Network. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2021, PT I. 2021, 第 3 作者12712: 434-446, [23] Li, Renjie, Zhou, Zhou, Liu, Xuan, Li, Da, Yang, Wei, Li, Shu, Liu, Qingyun. GTF: An Adaptive Network Anomaly Detection Method at the Network Edge. SECURITY AND COMMUNICATION NETWORKS. 2021, 第 7 作者2021: http://dx.doi.org/10.1155/2021/3017797.[24] Shu Li, Yishuo Zhang, Penghui Jiang, Chengwei Zhang, Zhao Li, Qingyun Liu. Predicting User Influence in the Propagation of Toxic Information. International Conference on Knowledge Science, Engineering and Management (KSEM). 2020, 第 6 作者[25] 尚菁菁, 朱宇佳, 刘庆云. 电子邮件安全扩展协议应用分析. 网络与信息安全学报[J]. 2020, 第 3 作者6(6): 11, http://lib.cqvip.com/Qikan/Article/Detail?id=7103475672.[26] Yu, Lingjing, Luo, Bo, Ma, Jun, Zhou, Zhaoyu, Liu, Qingyun, USENIX Assoc. You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM. 2020, 第 5 作者55-72, [27] Youting Liu, Shu Li, Chengwei Zhang, Chao Zheng, Yong Sun, Qingyun Liu. ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification. COMPUTATIONALSCIENCEICCS2020. 2020, 第 6 作者12138: 279-293, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7302816/.[28] Xiaoou Zhang, Zhao Li, Yujia Zhu, Qingyun Liu, Chao Zheng. Traceback: Learning to Identify Website’s Landing URLs via Noisy Web Traces Passively. The 27th International Conference on Telecommunications (ICT). 2020, 第 4 作者[29] Tian, Xiang, Zhu, Yujia, Li, Zhao, Zheng, Chao, Liu, Qingyun, Sun, Yong. MeshTrust: A CDN-Centric Trust Model for Reputation Management on Video Traffic. 19th Annual International Conference on Computational Science (ICCS). 2019, 第 5 作者11537: 318-331, [30] Li, Baiyang, Zhu, Yujia, Liu, Qingyun, Zhou, Zhou, Guo, Li, IEEE. Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 3 作者[31] 陈志鹏, 张鹏, 黄彩云, 刘庆云, 邢丽超. 一种基于多维特征分析的网页代理服务发现方法. 信息安全学报[J]. 2018, 第 4 作者3(4): 41-53, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20180404&flag=1.[32] Zhou Zhou, Zhang Xi, Liu Qingyun, Zhu Yujia, Li Da, Guo Li, IEEE. SASD: A Self-Adaptive Stateful Decompression Architecture. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2018, 第 3 作者[33] Yu Lingjing, Liu Tao, Zhou Zhaoyu, Zhu Yujia, Liu Qingyun, Tan Jialong, IEEE. WDMTI: Wireless Device Manufacturer and Type Identification using Hierarchical Dirichlet Process. 2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS). 2018, 第 5 作者19-27, [34] Zhang Peng, Xing Lichao, Yang Ninggou, Tan Guolin, Liu Qingyun, Zhang Chuang, Chen JJ, Yang LT. Redis plus plus :A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index. 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS. 2018, 第 5 作者840-847, [35] Tan Guolin, Zhang Peng, Liu Qingyun, Liu Xinran, Zhu Chunge, Dou Fenghu, IEEE. Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE). 2018, 第 3 作者737-743, [36] Zheng Chao, Tang Qi, Lu Qiuwen, Li Jie, Zhou Zhou, Liu Qinyun, IEEE. Janus: A User-Level TCP Stack for Processing 40 Million Concurrent TCP Connections. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2018, [37] Zheng Chao, Lu Qiuwen, Li Jia, Liu Qinyun, Fang Binxing, Assoc Comp Machinery. A Flexible and Efficient Container-based NFV Platform for Middlebox Networking. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING. 2018, 989-995, http://dx.doi.org/10.1145/3167132.3167240.[38] Tan Guolin, Zhang Peng, Liu Qingyun, Liu Xinran, Zhu Chunge, Guo Li, Chen JJ, Yang LT. MalFilter: A Lightweight Real-time Malicious URL Filtering System in Large-scale Networks. 2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS. 2018, 第 3 作者565-571, [39] Liu Qingyun. SFH: Hashing Unordered and Incomplete Network Streams on the Fl. In Proceedings of Fourteenth Annual IFIP WG 11.9 International Conference. 2017, 第 1 作者[40] 丁嘉宁, 张鹏, 杨嵘, 刘俊朋, 刘庆云, 熊刚. 支持多租户的网络测试床模拟流量标记和溯源模型. 电子学报[J]. 2017, 第 5 作者45(8): 1947-1956, http://lib.cqvip.com/Qikan/Article/Detail?id=673054443.[41] 王鹏, 张良, 周舟, 刘庆云, 方滨兴. 一种高并发网络环境下快速流表查找方法. 电子学报[J]. 2017, 第 4 作者45(4): 974-981, http://lib.cqvip.com/Qikan/Article/Detail?id=672085129.[42] 沙泓州, 刘庆云, 柳厅文, 周舟, 郭莉, 方滨兴. 恶意网页识别研究综述. 计算机学报[J]. 2016, 第 2 作者39(3): 529-542, http://lib.cqvip.com/Qikan/Article/Detail?id=668051765.[43] 邹学强, 张鹏, 黄彩云, 陈志鹏, 孙永, 刘庆云. 基于页面布局相似性的钓鱼网页发现方法. 通信学报[J]. 2016, 第 6 作者116-124, http://lib.cqvip.com/Qikan/Article/Detail?id=84888866504849548349484956.[44] Chen, Zhipeng, Zhang, Peng, Zheng, Chao, Liu, Qingyun, IEEE. CookieMiner: Towards Real-Time Reconstruction of Web-Downloading Chains from Network Traces. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2016, 第 4 作者724-729, http://dx.doi.org/10.1109/ICC.2016.7510778.[45] 张鹏, 丁嘉宁, 杨嵘, 刘庆云. 基于可达路径保障的服务组合方法. 高技术通讯[J]. 2015, 第 4 作者38-45, http://lib.cqvip.com/Qikan/Article/Detail?id=664380040.[46] 张鹏, 刘庆云, 徐克付, 林海伦, 孙永, 谭建龙. Mashup运行时的性能优化方法. 软件学报[J]. 2015, 第 2 作者26(8): 2138-2154, http://lib.cqvip.com/Qikan/Article/Detail?id=665619646.[47] Zhang Peng, Li Yan, Liu Qingyun, Lin Hailun, IEEE. A Scalable Distributed Private Stream Search System. 2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW). 2015, 第 3 作者128-135, [48] 周舟, 付文亮, 嵩天, 刘庆云. 一种基于并行Bloom Filter的高速URL查找算法. 电子学报[J]. 2015, 第 4 作者43(9): 1833-1840, http://lib.cqvip.com/Qikan/Article/Detail?id=666434191.[49] 张鹏, 刘庆云, 谭建龙, 李焱, 杜华明. 流水行云:支持可扩展的并行分布式流处理系统. 电子学报[J]. 2015, 第 2 作者43(4): 639-646, http://lib.cqvip.com/Qikan/Article/Detail?id=664985748.[50] 张鹏, 刘庆云, 熊翠文, 李保珲, 林海轮, 易立. 基于内存的分布式隐私流查询系统. 计算机研究与发展[J]. 2014, 第 2 作者48-56, http://lib.cqvip.com/Qikan/Article/Detail?id=74708990504849528350484855.[51] 路炜, 刘燕兵, 王春露, 刘庆云, 郭莉. 压缩的全文自索引算法研究. 计算机应用与软件[J]. 2014, 第 4 作者31(3): 11-15,35, http://lib.cqvip.com/Qikan/Article/Detail?id=49001136.[52] 沙泓州, 周舟, 刘庆云, 秦鹏. 轻量级的自学习网页分类方法. 通信学报[J]. 2014, 第 3 作者35(9): 32-39, http://lib.cqvip.com/Qikan/Article/Detail?id=662542243.[53] 刘庆云, 沙泓州, 李世明, 杨嵘. 一种基于量化用户和服务的大规模网络访问控制方法. 计算机学报[J]. 2014, 第 1 作者37(5): 1195-1205, http://lib.cqvip.com/Qikan/Article/Detail?id=49658534.[54] 刘燕兵, 邵妍, 王勇, 刘庆云, 郭莉. 一种面向大规模URL过滤的多模式串匹配算法. 计算机学报[J]. 2014, 第 4 作者37(5): 1159-1169, http://lib.cqvip.com/Qikan/Article/Detail?id=49658531.[55] 陶建喜, 周立, 周舟, 杨威, 刘庆云, 杨嵘. 非对称路由环境下SYN flood攻击防御方法. 通信学报[J]. 2013, 第 5 作者285-291, http://lib.cqvip.com/Qikan/Article/Detail?id=1005612988.[56] 刘庆云, 张冬艳, 谭建龙, 杨嵘. 基于多维属性的网络行为控制策略. 清华大学学报. 自然科学版[J]. 2013, 第 1 作者53(12): 1682-1687, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=5068631&detailType=1.[57] 刘庆云. 一种适用于DPI的乱序包动态缓存策略. ISCTCS 2012. 2012, 第 1 作者[58] 刘庆云, 杨超峰, 刘利军. 多类型安全系统协同机制的研究与实现. 计算机工程[J]. 2006, 第 1 作者32(14): 166-168, http://lib.cqvip.com/Qikan/Article/Detail?id=22345475.[59] 杨超峰, 刘庆云, 刘利军. 多层次网络安全强审计模型BrosaAudit. 计算机工程[J]. 2006, 第 2 作者32(10): 159-160,163, http://lib.cqvip.com/Qikan/Article/Detail?id=21851451.[60] 刘庆云, 杨超峰, 刘利军. 基于协议分析的WWW安全监控系统研究与实现. 微机发展[J]. 2005, 第 1 作者15(11): 4-6,10, http://lib.cqvip.com/Qikan/Article/Detail?id=20386685.