Dr Tingting Li
(she/her)
Lecturer
School of Computer Science and Informatics
- LiT29@cardiff.ac.uk
- +44 29208 79153
- Abacws, Room Room 5.23, Senghennydd Road, Cathays, Cardiff, CF24 4AG
- Available for postgraduate supervision
Overview
NEWS (02/2023): I have a funded PhD position on Cyber Resilience of Cyber-Physical Systems. Please see details here: Improving Cyber Resilience of Cyber-Physical Systems by Dynamic Diversification
NEWS (04/2021): I have a funded PhD position on Cybersecurity for Autonomous Vehicle. Please see details here: Decision Support System on Cybersecurity Policies for Autonomous Vehicles
Dr Tingting Li is currently a Lecturer (Assistant Professor) in Cyber Security at Cardiff University. Her research interests primarily lie in AI for cyber security, knowledge representation and reasoning.
Prior to joining Cardiff, she was a Postdoctoral Research Associate at the Institute for Security Science & Technology, Imperial College London. She obtained her PhD degree in Artificial Intelligence from the University of Bath. She also received her MSc degree in Computing (Imperial College London) and her bachelor's degree in Information Security (Xidian University, China).
Please visit her Personal Page for more details.
Publication
2020
- Li, T., Feng, C. and Hankin, C. 2020. Scalable approach to enhancing ICS resilience by network diversity. Presented at: The 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), València, Spain, 29 June - 02 July 2020.
2017
- King, T. C., De Vos, M., Dignum, V., Jonker, C. M., Li, T., Padget, J. and van Riemsdijk, M. B. 2017. Automated multi-level governance compliance checking. Autonomous Agents and Multi-Agent Systems 31(6), pp. 1283-1343. (10.1007/s10458-017-9363-y)
- Li, T. and Hankin, C. 2017. Effective defence against zero-day exploits using Bayesian networks. Presented at: 11th International Conference, Critical Information Infrastructures Security, CRITIS, Paris, France, 10–12 Oct 2016Critical Information Infrastructures Security, Vol. 10242. Springer Verlag pp. 123-136., (10.1007/978-3-319-71368-7_11)
- Feng, C., Li, T. and Chana, D. 2017. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. Presented at: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Denver, CO, USA, 26-29 June 201747th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). pp. 261-272., (10.1109/DSN.2017.34)
2016
- Fielder, A., Li, T. and Hankin, C. 2016. Defense-in-depth vs. critical component defense for industrial control systems. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016), Belfast, Ireland, United Kingdom, 23-25 August 2016ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development Ltd. pp. 1-10., (10.14236/ewic/ICS2016.1)
- Fielder, A., Li, T. and Hankin, C. 2016. Modelling cost-effectiveness of defenses in industrial control systems. Presented at: International Conference on Computer Safety, Reliability, and Security (SafeComp 2016), Trondheim, Norway, 20-23 September 2016 Presented at Skavhaug, A., Guiochet, J. and Bitsch, F. eds.Computer Safety, Reliability, and Security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings, Vol. 9922. Lecture Notes in Computer Science series and Programming and Software Engineering series Springer Verlag pp. 187-200., (10.1007/978-3-319-45477-1_15)
- Padget, J., ElDeen Elakehal, E., Li, T. and De Vos, M. 2016. InstAL: An institutional action language. In: Social Coordination Frameworks for Social Technical Systems., Vol. 30. Law, Governance and Technology Series, pp. 101-124., (10.1007/978-3-319-33570-4_6)
2015
- King, T. C., Li, T., Vos, M. D., Dignum, V., Jonker, C. M., Padget, J. and van Riemsdijk, M. B. 2015. A framework for institutions governing institutions. Presented at: International Conference on Autonomous Agents and Multiagent Systems (AAMAS '15), Istanbul, Turkey, 4-8 May 2015AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Richmond, SC, USA: International Foundation for Autonomous Agents and Multiagent Systems pp. 473-481., (10.5555/2772879.2772940)
2013
- Lee, J., Li, T. and Padget, J. 2013. Towards polite virtual agents using social reasoning techniques. Computer Animation and Virtual Worlds 24(3-4), pp. 335-343. (10.1002/cav.1517)
- Li, T., Balke, T., De Vos, M., Padget, J. and Satoh, K. 2013. A model-based approach to the automatic revision of secondary legislation. Presented at: ICAIL 2013: XIV International Conference on Artificial Intelligence and Law, Rome, Italy, 10-14 June 2013ICAIL '13: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law. New York, NY, USA: ACM pp. 202-206., (10.1145/2514601.2514627)
- Li, T., Balke, T., De Vos, M., Satoh, K. and Padget, J. 2013. Detecting conflicts in legal systems. Presented at: JSAI-isAI 2012: New Frontiers in Artificial Intelligence, Miyazaki, Japan, 30 November - 1 December 2012New Frontiers in Artificial Intelligence. JSAI-isAI 2012, Vol. 7856. Lecture Notes in Computer Science Springer Verlag pp. 174-189., (10.1007/978-3-642-39931-2_13)
Articles
- King, T. C., De Vos, M., Dignum, V., Jonker, C. M., Li, T., Padget, J. and van Riemsdijk, M. B. 2017. Automated multi-level governance compliance checking. Autonomous Agents and Multi-Agent Systems 31(6), pp. 1283-1343. (10.1007/s10458-017-9363-y)
- Lee, J., Li, T. and Padget, J. 2013. Towards polite virtual agents using social reasoning techniques. Computer Animation and Virtual Worlds 24(3-4), pp. 335-343. (10.1002/cav.1517)
Book sections
- Padget, J., ElDeen Elakehal, E., Li, T. and De Vos, M. 2016. InstAL: An institutional action language. In: Social Coordination Frameworks for Social Technical Systems., Vol. 30. Law, Governance and Technology Series, pp. 101-124., (10.1007/978-3-319-33570-4_6)
Conferences
- Li, T., Feng, C. and Hankin, C. 2020. Scalable approach to enhancing ICS resilience by network diversity. Presented at: The 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), València, Spain, 29 June - 02 July 2020.
- Li, T. and Hankin, C. 2017. Effective defence against zero-day exploits using Bayesian networks. Presented at: 11th International Conference, Critical Information Infrastructures Security, CRITIS, Paris, France, 10–12 Oct 2016Critical Information Infrastructures Security, Vol. 10242. Springer Verlag pp. 123-136., (10.1007/978-3-319-71368-7_11)
- Feng, C., Li, T. and Chana, D. 2017. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. Presented at: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Denver, CO, USA, 26-29 June 201747th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). pp. 261-272., (10.1109/DSN.2017.34)
- Fielder, A., Li, T. and Hankin, C. 2016. Defense-in-depth vs. critical component defense for industrial control systems. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016), Belfast, Ireland, United Kingdom, 23-25 August 2016ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development Ltd. pp. 1-10., (10.14236/ewic/ICS2016.1)
- Fielder, A., Li, T. and Hankin, C. 2016. Modelling cost-effectiveness of defenses in industrial control systems. Presented at: International Conference on Computer Safety, Reliability, and Security (SafeComp 2016), Trondheim, Norway, 20-23 September 2016 Presented at Skavhaug, A., Guiochet, J. and Bitsch, F. eds.Computer Safety, Reliability, and Security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings, Vol. 9922. Lecture Notes in Computer Science series and Programming and Software Engineering series Springer Verlag pp. 187-200., (10.1007/978-3-319-45477-1_15)
- King, T. C., Li, T., Vos, M. D., Dignum, V., Jonker, C. M., Padget, J. and van Riemsdijk, M. B. 2015. A framework for institutions governing institutions. Presented at: International Conference on Autonomous Agents and Multiagent Systems (AAMAS '15), Istanbul, Turkey, 4-8 May 2015AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Richmond, SC, USA: International Foundation for Autonomous Agents and Multiagent Systems pp. 473-481., (10.5555/2772879.2772940)
- Li, T., Balke, T., De Vos, M., Padget, J. and Satoh, K. 2013. A model-based approach to the automatic revision of secondary legislation. Presented at: ICAIL 2013: XIV International Conference on Artificial Intelligence and Law, Rome, Italy, 10-14 June 2013ICAIL '13: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law. New York, NY, USA: ACM pp. 202-206., (10.1145/2514601.2514627)
- Li, T., Balke, T., De Vos, M., Satoh, K. and Padget, J. 2013. Detecting conflicts in legal systems. Presented at: JSAI-isAI 2012: New Frontiers in Artificial Intelligence, Miyazaki, Japan, 30 November - 1 December 2012New Frontiers in Artificial Intelligence. JSAI-isAI 2012, Vol. 7856. Lecture Notes in Computer Science Springer Verlag pp. 174-189., (10.1007/978-3-642-39931-2_13)
- King, T. C., De Vos, M., Dignum, V., Jonker, C. M., Li, T., Padget, J. and van Riemsdijk, M. B. 2017. Automated multi-level governance compliance checking. Autonomous Agents and Multi-Agent Systems 31(6), pp. 1283-1343. (10.1007/s10458-017-9363-y)
- Li, T. and Hankin, C. 2017. Effective defence against zero-day exploits using Bayesian networks. Presented at: 11th International Conference, Critical Information Infrastructures Security, CRITIS, Paris, France, 10–12 Oct 2016Critical Information Infrastructures Security, Vol. 10242. Springer Verlag pp. 123-136., (10.1007/978-3-319-71368-7_11)
- Feng, C., Li, T. and Chana, D. 2017. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. Presented at: 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Denver, CO, USA, 26-29 June 201747th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). pp. 261-272., (10.1109/DSN.2017.34)
- Fielder, A., Li, T. and Hankin, C. 2016. Defense-in-depth vs. critical component defense for industrial control systems. Presented at: 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016), Belfast, Ireland, United Kingdom, 23-25 August 2016ICS-CSR '16: Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development Ltd. pp. 1-10., (10.14236/ewic/ICS2016.1)
- Padget, J., ElDeen Elakehal, E., Li, T. and De Vos, M. 2016. InstAL: An institutional action language. In: Social Coordination Frameworks for Social Technical Systems., Vol. 30. Law, Governance and Technology Series, pp. 101-124., (10.1007/978-3-319-33570-4_6)
- King, T. C., Li, T., Vos, M. D., Dignum, V., Jonker, C. M., Padget, J. and van Riemsdijk, M. B. 2015. A framework for institutions governing institutions. Presented at: International Conference on Autonomous Agents and Multiagent Systems (AAMAS '15), Istanbul, Turkey, 4-8 May 2015AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. Richmond, SC, USA: International Foundation for Autonomous Agents and Multiagent Systems pp. 473-481., (10.5555/2772879.2772940)
- Lee, J., Li, T. and Padget, J. 2013. Towards polite virtual agents using social reasoning techniques. Computer Animation and Virtual Worlds 24(3-4), pp. 335-343. (10.1002/cav.1517)
- Li, T., Balke, T., De Vos, M., Padget, J. and Satoh, K. 2013. A model-based approach to the automatic revision of secondary legislation. Presented at: ICAIL 2013: XIV International Conference on Artificial Intelligence and Law, Rome, Italy, 10-14 June 2013ICAIL '13: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law. New York, NY, USA: ACM pp. 202-206., (10.1145/2514601.2514627)
- Li, T., Balke, T., De Vos, M., Satoh, K. and Padget, J. 2013. Detecting conflicts in legal systems. Presented at: JSAI-isAI 2012: New Frontiers in Artificial Intelligence, Miyazaki, Japan, 30 November - 1 December 2012New Frontiers in Artificial Intelligence. JSAI-isAI 2012, Vol. 7856. Lecture Notes in Computer Science Springer Verlag pp. 174-189., (10.1007/978-3-642-39931-2_13)
Research
My research interests are Artificial Intelligence and its applications in Cyber Security. The research goals I have been pursuing are to develop AI techniques and adapt them to provide an intelligent defence to protect critical industrial control systems(ICS), cyber-physical systems and IoT systems from cyber attacks. In order to achieve that, I have applied traditional AI techniques to implement smart risk assessment and optimal network hardening, as well as using the latest deep learning techniques to realise fast and accurate intrusion detection and AI-enhanced stealthy attacks.
For the list of my publication, please visit my Google Scholar page.
I have been involved in several grants from a variety of sources. Selective grants are listed below:
Diversity-by-design Quantifying vulnerability similarity of Interconnected Networks Investigator: Tingting Li (PI) and Pete Burnap The Diversity-by-design project is funded by NCSC as one of the RITICS projects. Diversity-based approaches have been studied as an effective strategy to enhance the security and resilience of complex systems. The project aims to quantify the system diversity by identifying similarly vulnerable structures of components in interconnected systems. It mainly uses Graph Neural Networks (GNN) and other machine learning techniques to convert network graph data into vector representation and search for similarly vulnerable structures. We can then effectively evaluate human-input diversification strategies prior to actual deployment. The proposed work also provides an effective way to represent the CNI and other interconnected systems with the focus of identifying similarly vulnerable points of a system, which is able to provide insights into the resilience of the dependencies against replicated attacks and avoiding cascading failure. |
A Framework for Risk-Informed Metrics-Enriched Cybersecurity Playbooks for CNI Resilience Investigator: Yulia Cherdantseva (PI), Tingting Li (Co-I) , Pete Burnap and Barney Craggs (Bristol) The ultimate goal of the project is to improve CNI resilience in the UK by enabling timely and efficient incident response. To achieve this, this project will deliver a Framework for creating Risk-Informed Metrics-enriched Playbooks for Critical National Infrastructure (FRIMP4CNI). We propose to approach incident response playbooks in a fundamentally different way. First, playbooks in this project are integrated into core CNI processes affected by an incident, showing how enacting a particular response affects core processes as well as interdependent processes. Second, our playbooks address more than technical actions, they look at aspects beyond technology, e.g. operational response, issues related to staff availability and costs, reporting process, political and communication response. Third, playbooks are risk-informed because each playbook has an associated risk model; and fourth, they are enriched with business-driven multifaceted metrics which reflect the changes that an incident inflicts on a core process. Fifth feature is that our playbooks are optimal: an optimisation algorithm is applied to a set of alternative response strategies to identify the optimal response playbook for each case. A combination of the features listed above makes our approach unique and allows our playbooks to serve both as an action guide enabling improved cybersecurity incident response and as a decision support tool at the Board level. |
Teaching
- Module Lead, CM6125/CM6625 Database Systems, Spring Semester, 2019 - 2020, 2020-2021
- Module Lead, CM6224/CM6724 Cyber Security, Autumn Semester, 2022 - present
Biography
- Lecturer, Cardiff University, 2019 -
- Postdoctoral Research Associate, Imperial College London, 2014 - 2019
- PhD in Artificial Intelligence, University of Bath
- MSc in Computing, Imperial College London
- BSc in Information Security, Xidian University, China
Supervisions
NEWS (02/2023): I have a funded PhD position on Cyber Resilience of Cyber-Physical Systems. Please see details here: Improving Cyber Resilience of Cyber-Physical Systems by Dynamic Diversification
NEWS (04/2020): I have a funded PhD position for explainable AI and cyber security. Drop me an email if you are interested!
In general, I am interested in supervising students in the areas of:
- AI for Cyber Security
- Explanable AI for Cyber Security
- Cyber Security for Industrial Control Systems and other critical infrastructure.
- Adversarial Machine Learning for Cyber Security
- Multi-agent systems
- Knowledge Representation and Reasoning
Current PhD Students
Iryna Bernyk (2021- ) on Cybersecurity Policies for Autonomous Vehicles
Sanyam Vyas (2021- ) on Automated Cyber Defence.
Victoria Marcinkiewicz (2021- ) on Restore Trust in Autonomous Vehicles after Cyber Attacks.
Stephen Morris (2023- )