Current location - Education and Training Encyclopedia - University ranking - What does Li do?
What does Li do?
plum

Li, male, 195 1 born, doctor of engineering, professor and vice president of School of Computer Science and Technology, Huazhong University of Science and Technology. Member of CERNET Expert Committee of China, Director of Huazhong Network Center and Computing Center of Huazhong University of Science and Technology, Member of the 6th National Microcomputer Committee and Director of Hubei Computer Society.

Chinese name: Li

Date of birth: 195 1 year

Occupation: teacher

Graduate school: Huazhong University of Science and Technology

Main achievements: the third prize of scientific and technological progress in Hubei Province.

Representative Works: Information System Engineering

Title: Professor

Study resume

1987, graduated from Huazhong university of science and technology with a master's degree in computer system structure and obtained a master's degree in engineering;

1986- 1988, studying at Tokyo Joint Software Research Center;

1992, graduated from Huazhong university of science and technology with a doctorate in computer system architecture.

Research fields and achievements

primary

Military science-military command science

research direction

Computer system structure, computer network, database computer, disk array, military command simulation, VLSI design and information system engineering.

Representative papers

1: blind signature and offline electronic cash protocol based on elliptic curve 2: fuzzy intrusion detection model

Has been engaged in computer architecture, computer network, database computer, disk array, military command simulation, VLSI design, information system engineering and other aspects of research. He applied for and presided over three research projects: National Natural Science Foundation, Returned Overseas Students Fund of Ministry of Education, 863 High Performance Computing Fund, CERNET Network Research Fund and Hubei Natural Science Fund.

win a prize

Won the third prize of scientific and technological progress in Hubei Province.

The second prize of Wuhan Excellent Paper,

Published more than 0/00 academic papers/kloc. Now he is mainly engaged in the research of computer network and information security, optical interconnection of computer parallel systems and other fields. Has been engaged in modern computer system structure, computer network, computer system performance evaluation, computer system optical interconnection and other graduate courses and information system engineering and other undergraduate courses teaching. Write a monograph on information system engineering.

Undertake this project

Published papers

2008

4 1 Li, Wang Lihe. Research on a new online attack intention identification method. Microcomputer system, 29, 2008 (07):1347-1352.

Huang Qingfeng, Li, Lu Chuiwei. Cost analysis of DHT jitter processing. Computer Research and Development, 2008, (S 1):

Huang Qingfeng, Li, Lu Chuiwei. Cost analysis of DHT jitter processing. Computer Research and Development, 2008, (S 1):

Huang Qingfeng, Li, Lu Chuiwei, Cost analysis of DHT jitter processing. Computer research and development, 2008, (0 1):

Ber Ber. Tree chain hybrid multicast source authentication protocol. Computer Science, 2008, 35(06):99- 102.

2007

Li, a man. A garbage collection and scheduling method based on neural network. Microcomputer system, 28, 2007 (07):1173-1176.

35 Li Liuling. IPSec-compatible TCP performance optimization mechanism based on wired/wireless hybrid network. Microcomputer system, 28, 2007 (10):1760-1763.

Zeng Bin, Li, Xu. TCP proxy for satellite network. Journal of Software, 2007,18 (07):1695-1704.

Tang Zhi 33 Li. Analysis of a new VPN system model supporting multicast tunnel. Microcomputer System, 2007,28 (05): 774-778

No.32, Songmei Street, Tangzhi, Li Xiaoling. Research on WindowsVPN architecture based on virtual network card. Miniature Microcomputer System, 2007,28 (09):1586-1590.

3 1 Zeng Wang. Research on QoS monitoring algorithm of space-based real-time system. Computer Science, 2007,34 (01): 74-77

30 Lin Huaiqing, Li, Huang Qingfeng. Trust relationship management protocol in P2P system. Computer Engineering, 2007,33 (18): 20-22

Li. Research on a new VPN communication based on IPSecoverHttp protocol. Miniature Microcomputer System, 2007,28 (06):1021-1025.

Lin Huaiqing and Li. Research progress on key technologies of P2P trust model. Miniature Microcomputer System, 2007,28 (09):1599-1603.

27 Li Li Zhanchun. BitTorrent traffic measurement method based on Netfilter. Computer Science, 2007,34 (04): 38-41.

2006

Li. Model analysis of a new high performance VPN system. Microcomputer System, 2006,27 (05): 793-797.

25 Li Lijia Chunmei. Unified network security monitoring system model based on heterogeneous system. Small Microcomputer System, 2006,27 (09):1682-1686.

24 and Li. Research on LO-KO attack of Y-00 protocol. Small Microcomputer System, 2006,27 (12): 2276-2279.

2005

Li and Guo Wei. Research on a self-organizing secure routing protocol with two-way authentication. Microcomputer system, 26, 2005 (09):1507-1509.

2004

22 Li Jia Chun Li. Correlation analysis of distributed intrusion alarm. Computer research and development, April 20041(11):191923.

2 1 Shishi. A new security protocol analysis logic. Microcomputer system, 25, 2004 (12): 2182-2185.

2003

Li, Tan Yunmeng and Wu Shizhong. Joint signature and its application in electronic cash. Microcomputer system, 2003,24 (08):1542-1545.

19 Zeng Bin Xing Jifeng Li. Adaptive network service quality support framework. Computer Engineering, 2003,29 (22):124-126.

2002

Li Lijiachun. Application of fuzzy neural network in intrusion detection. Microcomputer system, 2002,23 (10):1235-1238.

17 plum. A VPN model based on IP encapsulation directly. Computer Research and Development, 2002,39 (07): 775-780.

16 Li Heng. Theoretical research on VPN group policy. Microcomputer System, 2002,23 (05): 532-535

Jiang 15. Design and implementation of firewall SNMP agent. Small Microcomputer System, 2002,23 (06): 679-682

14 Li Shu. Survivability model of two systems based on information redundancy and dispersion. Computer Research and Development, 2002,39 (07): 769-774.

200 1

13 Li Huang Huilong. Parallel PC: a new PC architecture design centered on switching network. Microcomputer system, 200 1, 22 (12):1421-1424.

12 Li Huang Huilong. Research on operating system model based on parallel PC structure. Computer Science, 200 1, 28(04):42-46.

Li Zheng. Research on an optimized billing model IAS. Microcomputer system, 200 1, 22(03):355-357.

2000

10 market. Traffic analysis of multimedia server based on gigabit network. Computer Engineering, 2000, (01);

9 Tu Hao, Li, Xiao Ling. Research on the Implementation of News System Based on IPv6. Computer Engineering, 2000, (0 1):

1998

8 Li and Chen Huamin. Parallel search algorithm for game tree. Small microcomputer system, 1998, 19 (10): 53-56.

1997

7 Li Tangzhi. Structure design of multi-level optical interconnection multi-computer system. Microcomputer system, 1997, 18 (02): 2 1-25.

6 Li Tangzhi. Structural design of optical dynamic direct full interconnection multi-computer system. Computer research and development,1997,34 (03):166-171.

1995

Five Jiangling plums. Research on mixed access of long and short data in striped disk array. Chinese journal of computers, China, 1995, 18 (10): 789-793.

4 Li Li Hanju. Performance analysis of distributed disk display. Computer research and development, 1995, (11);

3 Li Li Hanju A.D. Performance analysis of centralized disk array. Computer research and development,1995,32 (11): 55-60.

Li Hanju, Li Chengpeng and Tang Zhi. Hash bit array deduplication algorithm and its performance analysis. Computer engineering, 1995, (01);

1993

1 Li Li Hanju. Two kinds of problems applicable to functional disk system. Computer research and development,1993,30 (08):13-18.