Dr Tingting Li
BEng(Hons), MSc, PhD, FHEA
- Ar gael fel goruchwyliwr ôl-raddedig
Timau a rolau for Tingting Li
Darlithydd
Trosolwyg
NEWYDDION (09/2024): Rwyf wedi derbyn grant ymchwil gan Sefydliad Alan Turing i ymchwilio i ddiogelwch AI mewn amddiffyn seiber ymreolaethol.
Ar hyn o bryd mae Dr Tingting Li yn Ddarlithydd (Athro Cynorthwyol) mewn Seiberddiogelwch ym Mhrifysgol Caerdydd. Mae ei diddordebau ymchwil yn bennaf mewn AI ar gyfer strategaethau seiberddiogelwch, Seiberddiogelwch Awtomataidd ac Arallgyfeirio / Twyll. Mae ei harbenigedd yn ymestyn i amddiffyn Systemau Seiber-Ffisegol, ICS / SCADA a Systemau Ymreolaethol (cerbydau ymreolaethol, Robotiaid). Mae hi hefyd yn archwilio AI symbolaidd am gynrychiolaeth gwybodaeth a rhesymu.
Cyn ymuno â Chaerdydd, roedd hi'n Gydymaith Ymchwil Ôl-ddoethurol yn y Sefydliad Gwyddoniaeth a Thechnoleg Diogelwch, Coleg Imperial Llundain. Enillodd ei gradd PhD mewn Deallusrwydd Artiffisial o Brifysgol Caerfaddon. Derbyniodd ei gradd MSc mewn Cyfrifiadura (Coleg Imperial Llundain) a'i gradd baglor mewn Diogelwch Gwybodaeth (Prifysgol Xidian, Tsieina).
Ewch i'w tudalen bersonol am fwy o fanylion.
Cyhoeddiad
2024
- Shen, Y., Shepherd, C., Ahmed, C. M., Yu, S. and Li, T. 2024. Comparative DQN-improved algorithms for stochastic games-based automated edge intelligence-enabled IoT malware spread-suppression strategies. IEEE Internet of Things Journal 11(12), pp. 22550-22561. (10.1109/JIOT.2024.3381281)
2020
- Li, T., Feng, C. and Hankin, C. 2020. Scalable approach to enhancing ICS resilience by network diversity. Presented at: The 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), València, Spain, 29 June - 02 July 2020.
2017
- King, T. C., De Vos, M., Dignum, V., Jonker, C. M., Li, T., Padget, J. and van Riemsdijk, M. B. 2017. Automated multi-level governance compliance checking. Autonomous Agents and Multi-Agent Systems 31(6), pp. 1283-1343. (10.1007/s10458-017-9363-y)
- Li, T. and Hankin, C. 2017. Effective defence against zero-day exploits using Bayesian networks. Presented at: 11th International Conference, Critical Information Infrastructures Security, CRITIS, Paris, France, 10–12 Oct 2016Critical Information Infrastructures Security, Vol. 10242. Springer Verlag pp. 123-136., (10.1007/978-3-319-71368-7_11)
- Feng, C., Li, T. and Chana, D. 2017. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. Presented at: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Denver, CO, USA, 26-29 June 201747th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). pp. 261-272., (10.1109/DSN.2017.34)
2016
- Fielder, A., Li, T. and Hankin, C. 2016. Defense-in-depth vs. critical component defense for industrial control systems. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016), Belfast, Ireland, United Kingdom, 23-25 August 2016ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development Ltd. pp. 1-10., (10.14236/ewic/ICS2016.1)
- Fielder, A., Li, T. and Hankin, C. 2016. Modelling cost-effectiveness of defenses in industrial control systems. Presented at: International Conference on Computer Safety, Reliability, and Security (SafeComp 2016), Trondheim, Norway, 20-23 September 2016 Presented at Skavhaug, A., Guiochet, J. and Bitsch, F. eds.Computer Safety, Reliability, and Security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings, Vol. 9922. Lecture Notes in Computer Science series and Programming and Software Engineering series Springer Verlag pp. 187-200., (10.1007/978-3-319-45477-1_15)
- Padget, J., ElDeen Elakehal, E., Li, T. and De Vos, M. 2016. InstAL: An institutional action language. In: Social Coordination Frameworks for Social Technical Systems., Vol. 30. Law, Governance and Technology Series, pp. 101-124., (10.1007/978-3-319-33570-4_6)
2015
- King, T. C., Li, T., Vos, M. D., Dignum, V., Jonker, C. M., Padget, J. and van Riemsdijk, M. B. 2015. A framework for institutions governing institutions. Presented at: International Conference on Autonomous Agents and Multiagent Systems (AAMAS '15), Istanbul, Turkey, 4-8 May 2015AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Richmond, SC, USA: International Foundation for Autonomous Agents and Multiagent Systems pp. 473-481., (10.5555/2772879.2772940)
2013
- Lee, J., Li, T. and Padget, J. 2013. Towards polite virtual agents using social reasoning techniques. Computer Animation and Virtual Worlds 24(3-4), pp. 335-343. (10.1002/cav.1517)
- Li, T., Balke, T., De Vos, M., Padget, J. and Satoh, K. 2013. A model-based approach to the automatic revision of secondary legislation. Presented at: ICAIL 2013: XIV International Conference on Artificial Intelligence and Law, Rome, Italy, 10-14 June 2013ICAIL '13: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law. New York, NY, USA: ACM pp. 202-206., (10.1145/2514601.2514627)
- Li, T., Balke, T., De Vos, M., Satoh, K. and Padget, J. 2013. Detecting conflicts in legal systems. Presented at: JSAI-isAI 2012: New Frontiers in Artificial Intelligence, Miyazaki, Japan, 30 November - 1 December 2012New Frontiers in Artificial Intelligence. JSAI-isAI 2012, Vol. 7856. Lecture Notes in Computer Science Springer Verlag pp. 174-189., (10.1007/978-3-642-39931-2_13)
Articles
- Shen, Y., Shepherd, C., Ahmed, C. M., Yu, S. and Li, T. 2024. Comparative DQN-improved algorithms for stochastic games-based automated edge intelligence-enabled IoT malware spread-suppression strategies. IEEE Internet of Things Journal 11(12), pp. 22550-22561. (10.1109/JIOT.2024.3381281)
- King, T. C., De Vos, M., Dignum, V., Jonker, C. M., Li, T., Padget, J. and van Riemsdijk, M. B. 2017. Automated multi-level governance compliance checking. Autonomous Agents and Multi-Agent Systems 31(6), pp. 1283-1343. (10.1007/s10458-017-9363-y)
- Lee, J., Li, T. and Padget, J. 2013. Towards polite virtual agents using social reasoning techniques. Computer Animation and Virtual Worlds 24(3-4), pp. 335-343. (10.1002/cav.1517)
Book sections
- Padget, J., ElDeen Elakehal, E., Li, T. and De Vos, M. 2016. InstAL: An institutional action language. In: Social Coordination Frameworks for Social Technical Systems., Vol. 30. Law, Governance and Technology Series, pp. 101-124., (10.1007/978-3-319-33570-4_6)
Conferences
- Li, T., Feng, C. and Hankin, C. 2020. Scalable approach to enhancing ICS resilience by network diversity. Presented at: The 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), València, Spain, 29 June - 02 July 2020.
- Li, T. and Hankin, C. 2017. Effective defence against zero-day exploits using Bayesian networks. Presented at: 11th International Conference, Critical Information Infrastructures Security, CRITIS, Paris, France, 10–12 Oct 2016Critical Information Infrastructures Security, Vol. 10242. Springer Verlag pp. 123-136., (10.1007/978-3-319-71368-7_11)
- Feng, C., Li, T. and Chana, D. 2017. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. Presented at: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Denver, CO, USA, 26-29 June 201747th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). pp. 261-272., (10.1109/DSN.2017.34)
- Fielder, A., Li, T. and Hankin, C. 2016. Defense-in-depth vs. critical component defense for industrial control systems. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016), Belfast, Ireland, United Kingdom, 23-25 August 2016ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development Ltd. pp. 1-10., (10.14236/ewic/ICS2016.1)
- Fielder, A., Li, T. and Hankin, C. 2016. Modelling cost-effectiveness of defenses in industrial control systems. Presented at: International Conference on Computer Safety, Reliability, and Security (SafeComp 2016), Trondheim, Norway, 20-23 September 2016 Presented at Skavhaug, A., Guiochet, J. and Bitsch, F. eds.Computer Safety, Reliability, and Security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings, Vol. 9922. Lecture Notes in Computer Science series and Programming and Software Engineering series Springer Verlag pp. 187-200., (10.1007/978-3-319-45477-1_15)
- King, T. C., Li, T., Vos, M. D., Dignum, V., Jonker, C. M., Padget, J. and van Riemsdijk, M. B. 2015. A framework for institutions governing institutions. Presented at: International Conference on Autonomous Agents and Multiagent Systems (AAMAS '15), Istanbul, Turkey, 4-8 May 2015AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Richmond, SC, USA: International Foundation for Autonomous Agents and Multiagent Systems pp. 473-481., (10.5555/2772879.2772940)
- Li, T., Balke, T., De Vos, M., Padget, J. and Satoh, K. 2013. A model-based approach to the automatic revision of secondary legislation. Presented at: ICAIL 2013: XIV International Conference on Artificial Intelligence and Law, Rome, Italy, 10-14 June 2013ICAIL '13: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law. New York, NY, USA: ACM pp. 202-206., (10.1145/2514601.2514627)
- Li, T., Balke, T., De Vos, M., Satoh, K. and Padget, J. 2013. Detecting conflicts in legal systems. Presented at: JSAI-isAI 2012: New Frontiers in Artificial Intelligence, Miyazaki, Japan, 30 November - 1 December 2012New Frontiers in Artificial Intelligence. JSAI-isAI 2012, Vol. 7856. Lecture Notes in Computer Science Springer Verlag pp. 174-189., (10.1007/978-3-642-39931-2_13)
- King, T. C., De Vos, M., Dignum, V., Jonker, C. M., Li, T., Padget, J. and van Riemsdijk, M. B. 2017. Automated multi-level governance compliance checking. Autonomous Agents and Multi-Agent Systems 31(6), pp. 1283-1343. (10.1007/s10458-017-9363-y)
- Li, T. and Hankin, C. 2017. Effective defence against zero-day exploits using Bayesian networks. Presented at: 11th International Conference, Critical Information Infrastructures Security, CRITIS, Paris, France, 10–12 Oct 2016Critical Information Infrastructures Security, Vol. 10242. Springer Verlag pp. 123-136., (10.1007/978-3-319-71368-7_11)
- Feng, C., Li, T. and Chana, D. 2017. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. Presented at: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Denver, CO, USA, 26-29 June 201747th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). pp. 261-272., (10.1109/DSN.2017.34)
- Fielder, A., Li, T. and Hankin, C. 2016. Defense-in-depth vs. critical component defense for industrial control systems. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016), Belfast, Ireland, United Kingdom, 23-25 August 2016ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development Ltd. pp. 1-10., (10.14236/ewic/ICS2016.1)
- Padget, J., ElDeen Elakehal, E., Li, T. and De Vos, M. 2016. InstAL: An institutional action language. In: Social Coordination Frameworks for Social Technical Systems., Vol. 30. Law, Governance and Technology Series, pp. 101-124., (10.1007/978-3-319-33570-4_6)
- King, T. C., Li, T., Vos, M. D., Dignum, V., Jonker, C. M., Padget, J. and van Riemsdijk, M. B. 2015. A framework for institutions governing institutions. Presented at: International Conference on Autonomous Agents and Multiagent Systems (AAMAS '15), Istanbul, Turkey, 4-8 May 2015AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Richmond, SC, USA: International Foundation for Autonomous Agents and Multiagent Systems pp. 473-481., (10.5555/2772879.2772940)
- Lee, J., Li, T. and Padget, J. 2013. Towards polite virtual agents using social reasoning techniques. Computer Animation and Virtual Worlds 24(3-4), pp. 335-343. (10.1002/cav.1517)
- Li, T., Balke, T., De Vos, M., Padget, J. and Satoh, K. 2013. A model-based approach to the automatic revision of secondary legislation. Presented at: ICAIL 2013: XIV International Conference on Artificial Intelligence and Law, Rome, Italy, 10-14 June 2013ICAIL '13: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law. New York, NY, USA: ACM pp. 202-206., (10.1145/2514601.2514627)
- Li, T., Balke, T., De Vos, M., Satoh, K. and Padget, J. 2013. Detecting conflicts in legal systems. Presented at: JSAI-isAI 2012: New Frontiers in Artificial Intelligence, Miyazaki, Japan, 30 November - 1 December 2012New Frontiers in Artificial Intelligence. JSAI-isAI 2012, Vol. 7856. Lecture Notes in Computer Science Springer Verlag pp. 174-189., (10.1007/978-3-642-39931-2_13)
Ymchwil
Mae fy niddordebau ymchwil yn bennaf mewn AI ar gyfer strategaethau seiberddiogelwch, Seiberddiogelwch Awtomataidd ac Arallgyfeirio / Twyll. Mae fy arbenigedd yn ymestyn i amddiffyn Systemau Seiber-Ffisegol, ICS / SCADA a Systemau Ymreolaethol (cerbydau ymreolaethol, Robotiaid). Rwyf hefyd yn archwilio AI symbolaidd ar gyfer cynrychiolaeth a rhesymu gwybodaeth.
Am y rhestr o fy nghyhoeddiadau, ewch i'm tudalen Google Scholar .
Rwyf wedi bod yn rhan o nifer o grantiau o amrywiaeth o ffynonellau. Rhestrir grantiau dethol isod:
Tuag at Ddysgu Atgyfnerthu Diogel ar gyfer Amddiffyn Seiber Ymreolaethol
Ymchwilydd: Tingting Li (PI)
Llinell amser: 2024-2025
Gwerth y prosiect (cyllidwr): £80K (Sefydliad Alan Turing)
Amrywiaeth-wrth-ddylunio Meintioli bregusrwydd Tebygrwydd Rhwydweithiau Rhyng-gysylltiedig
Ymchwilydd: Tingting Li (PI) a Pete Burnap
Llinell amser: 2021-2022
Gwerth y prosiect (cyllidwr): £142K (RITICS/NCSC)
Mae'r prosiect Amrywiaeth yn cael ei ariannu gan NCSC fel un o'r prosiectau RITIC. Astudiwyd dulliau seiliedig ar amrywiaeth fel strategaeth effeithiol i wella diogelwch a gwytnwch systemau cymhleth. Nod y prosiect yw mesur amrywiaeth y system trwy nodi strwythurau cydrannau sydd yr un mor agored i niwed mewn systemau rhyng-gysylltiedig. Mae'n defnyddio Rhwydweithiau Nerfol Graff (GNN) a thechnegau dysgu peiriannau eraill yn bennaf i drosi data graff rhwydwaith yn gynrychiolaeth fector a chwilio am strwythurau sydd yr un mor agored i niwed. Yna gallwn werthuso strategaethau arallgyfeirio mewnbwn dynol yn effeithiol cyn eu defnyddio go iawn. Mae'r gwaith arfaethedig hefyd yn ffordd effeithiol o gynrychioli'r CNI a systemau rhyng-gysylltiedig eraill gan ganolbwyntio ar nodi pwyntiau agored i niwed tebyg o system, sy'n gallu rhoi cipolwg ar wytnwch y dibyniaethau yn erbyn ymosodiadau a atgynhyrchir ac osgoi methiant rhaeadru.
Fframwaith ar gyfer Cybersecurity wedi'i Gyfoethogi gan Risg Metrig-Gyfoethogi Seiberddiogelwch ar gyfer CNI Resilience
Ymchwilydd: Yulia Cherdantseva (PI), Tingting Li (Co-I), Pete Burnap a Barney Craggs (Bryste)
Llinell amser: 2021-2023
Gwerth y prosiect (cyllidwr): £503K (EPSRC EP/V038710/1)
Nod y prosiect yn y pen draw yw gwella gwytnwch CNI yn y DU trwy alluogi ymateb digwyddiadau amserol ac effeithlon. Er mwyn cyflawni hyn, bydd y prosiect hwn yn darparu Fframwaith ar gyfer creu Llyfrau Chwarae wedi'u cyfoethogi gan Metrics sy'n Wybodus ar gyfer Seilwaith Cenedlaethol Critigol (FRIMP4CNI). Rydym yn cynnig mynd at lyfrau chwarae ymateb i ddigwyddiadau mewn ffordd sylfaenol wahanol. Yn gyntaf, mae llyfrau chwarae yn y prosiect hwn wedi'u hintegreiddio i brosesau craidd CNI y mae digwyddiad yn effeithio arnynt, gan ddangos sut mae gweithredu ymateb penodol yn effeithio ar brosesau craidd yn ogystal â phrosesau rhyngddibynnol. Yn ail, mae ein llyfrau chwarae yn mynd i'r afael â mwy na chamau gweithredu technegol, maent yn edrych ar agweddau y tu hwnt i dechnoleg, e.e. ymateb gweithredol, materion sy'n ymwneud ag argaeledd a chostau staff, proses adrodd, ymateb gwleidyddol a chyfathrebu. Yn drydydd, mae llyfrau chwarae yn cael eu llywio gan risg oherwydd bod gan bob llyfr chwarae fodel risg cysylltiedig; Ac yn bedwerydd, maent yn cael eu cyfoethogi â metrigau amlochrog sy'n cael eu gyrru gan fusnes sy'n adlewyrchu'r newidiadau y mae digwyddiad yn eu creu ar broses graidd. Y bumed nodwedd yw bod ein llyfrau chwarae yn optimaidd: cymhwysir algorithm optimeiddio i set o strategaethau ymateb amgen i nodi'r llyfr chwarae ymateb gorau posibl ar gyfer pob achos. Mae cyfuniad o'r nodweddion a restrir uchod yn gwneud ein hymagwedd yn unigryw ac yn caniatáu i'n llyfrau chwarae wasanaethu fel canllaw gweithredu sy'n galluogi ymateb digwyddiadau seiberddiogelwch gwell ac fel offeryn cymorth penderfyniadau ar lefel y Bwrdd.
Addysgu
- Arweinydd Modiwl, Systemau Cronfa Ddata CM6125 / CM6625, Semester y Gwanwyn, 2019 - 2020, 2020-2021
- Arweinydd Modiwl, CM6224 / CM6724 Seiberddiogelwch, Semester yr Hydref, 2022 - presennol
Bywgraffiad
- Darlithydd, Prifysgol Caerdydd, Tachwedd 2019 -
- Cydymaith Ymchwil Ôl-ddoethurol, Coleg Imperial Llundain, 2014 - 2019
- PhD mewn Deallusrwydd Artiffisial, Prifysgol Caerfaddon
- MSc mewn Cyfrifiadura, Coleg Imperial Llundain
- BSc mewn Diogelwch Gwybodaeth, Prifysgol Xidian, Tsieina
Meysydd goruchwyliaeth
NEWYDDION (02/2023): Mae gen i swydd PhD wedi'i hariannu ar Seibergadernid Systemau Seiber-Ffisegol. Gweler y manylion yma: Gwella Cydnerthedd Seiber-Ffisegol Systemau trwy Arallgyfeirio Dynamig
Yn gyffredinol, mae gennyf ddiddordeb mewn goruchwylio myfyrwyr yn y meysydd canlynol:
- AI ar gyfer Seiberddiogelwch
- Amddiffyn Seiber yn erbyn ICS/SCADA, CPS a Seilwaith Critigol.
- Cybersecurity mewn Systemau Ymreolaethol
- Dysgu Peiriant Adversarial ar gyfer Cybersecurity
Myfyrwyr PhD cyfredol
Iryna Bernyk (2021- ) ar Bolisïau Seiberddiogelwch ar gyfer Cerbydau Ymreolaethol
Sanyam Vyas (2021- ) ar DRL ac Amddiffyn Seiber Awtomataidd.
Victoria Marcinkiewicz (2021) ar Adfer Ymddiriedaeth mewn Cerbydau Ymreolaethol ar ôl Ymosodiadau Seiber.
Stephen Morris (2023-)
Sam Braithwaite (2024)
Goruchwyliaeth gyfredol
Contact Details
+44 29208 79153
Abacws, Ystafell 5.23, Ffordd Senghennydd, Cathays, Caerdydd, CF24 4AG
Themâu ymchwil
Arbenigeddau
- Cybersecurity
- Deallusrwydd artiffisial
- Asiantau ymreolaethol a systemau multiagent