Qi Shi is a Professor in Computer Security, and Director of the PROTECT Research Centre for Critical Infrastructure Computer Technology & Protection.
Qi Shi’s research is centred on the increasingly important theme of ubiquitous/distributed computing security and privacy with the long-term goal of developing general frameworks for the intelligent provision of security and privacy protection to various applications. Specifically, his main research interests include the following areas:
· System-of-systems security: Develop a software framework for the automated security monitoring, evaluation and control of a system of systems in ubiquitous and cloud computing settings at runtime.
· E-commerce security: Produce methods for privacy enhanced public-key certification and cryptographic protocols for the security and privacy protection of electronic transactions conducted over the Internet.
· Intrusion and denial-of-service detection: Design cost-effective solutions to the early detection and prevention of intrusion and denial-of-service attacks within the network routing infrastructure and in ubiquitous computing environments.
· Sensor network security: Develop resource-efficient algorithms, mechanisms and protocols for key establishment and secure communication among sensor nodes.
· Cloud computing security: Investigate efficient ways for data processing in cloud environments while protecting their security and privacy against unauthorized access.
· Identity management: Devise efficient and lightweight approaches to user-centric and situation-aware identity management for the privacy protection of mobile ad-hoc networks.
· Computer forensics: Propose more effective methods for targeted data collection, uniform data representation, forensic analysis and result visualisation.
Qi Shi has published over 180 research papers in international journals and conference proceedings.
Qi Shi is involved in the supervision of a number of research projects in the above research areas. For example, he is one of the investigators of a large EU FP7 project, ANIKETOS, which involves 17 partners in 10 EU countries with a total grant of €9.6 million, for the development of secure and trustworthy composite services.
Qi Shi is supervising a number of international and home research students working in some research areas listed above. He also welcomes prospective research students with interests in the above research areas or others to apply for studies here. Applications can be submitted online at http://www.ljmu.ac.uk/pgapplication/114150.htm.
Other Academic Activities:
Qi Shi is a member of editorial boards and a paper reviewer for a number of international journals and a member or chair of program committees for many international conferences. Qi also serves as an external research degree examiner, taught course examiner and a member of several advisory committees.
Raschella A, Bouhafs F, Mackay M, Shi Q, Ortín J, Gállego JR, Canales M. 2020. A Dynamic Access Point Allocation Algorithm for Dense Wireless LANs Using Potential Game Computer Networks, 167 DOI Public Url
G C D, Bouhafs F, Raschella A, Mackay M, Shi Q. 2019. Radio Resource Management Framework for Energy-Efficient Communications in the Internet-of-Things Transactions on Emerging Telecommunications Technologies, 30 DOI Author Url Public Url
Mac Dermott AM, Shamsa TB, Buck P, Iqbal F, Shi Q. 2019. The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics International Journal of Digital Crime and Forensics (IJDCF), 12 DOI Publisher Url Public Url
Adewuyi AA, Cheng H, Shi Q, Cao J, MacDermott A, Wang X. 2019. CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things IEEE Internet of Things Journal, 6 :5432-5445 DOI Author Url Public Url
Bouhafs F, Seyedebrahimi M, Raschella A, Mackay M, Shi Q. 2019. Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs IEEE Transactions on Mobile Computing, DOI Publisher Url Public Url
Eiza MH, Shi Q, Marnerides AK, Owens T, Ni Q. 2019. Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks IEEE Transactions on Vehicular Technology, 68 :19-33 DOI Author Url Publisher Url Public Url
Teh PS, Zhang N, Tan SY, Shi Q, Khoh WH, Nawaz R. 2019. Strengthen user authentication on mobile devices by using user’s touch dynamics pattern Journal of Ambient Intelligence and Humanized Computing, DOI
Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. 2018. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems, 5 :1174-1188 DOI Public Url
Bouhafs F, Mackay M, Raschellà A, Shi Q, den Hartog F, Saldana J, Munilla R, Ruiz-Mas J, Fernández-Navajas J, Almodovar J, van Adrichem N. 2018. Wi-5: A Programming Architecture for Unlicensed Frequency Bands IEEE Communications Magazine, DOI Author Url Publisher Url Public Url
Asim M, Yautsiukhin A, Brucker A, Baker T, Shi Q, Lempereur B. 2018. Security Policy Monitoring of BPMN-based Service Compositions Journal of Software: Evolution and Process, DOI Author Url Public Url
Moara-Nkwe K, Shi Q, Lee G, EIZA M. 2018. A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks IEEE Access, 6 :11374-11387 DOI Author Url Publisher Url Public Url
Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. 2018. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 :41-50 DOI Publisher Url Public Url
Brucker A, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, Validating, and Ranking of Secure Service Compositions Software: Practice and Experience, 47 :1923-1943 DOI Author Url Publisher Url Public Url
Raschella A, Bouhafs F, Seyedebrahimi M, Mackay M, Shi Q. 2017. Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks IEEE Transactions on Network and Service Management, 14 :441-455 DOI Author Url Publisher Url Public Url
Hashem Eiza M, Ni Q, Shi QI. 2016. Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G Enabled Vehicular Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 65 :7868-7881 DOI Author Url Public Url
Shi Q, Zhang N, Merabti M, Kifayat K. 2013. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 73 :235-249 DOI Author Url
Lempereur B, Merabti M, Shi Q. 2012. Pypette: A platform for the evaluation of live digital forensics International Journal of Digital Crime and Forensics, 4 :31-46 DOI
Haggerty J, Shi Q, Merabti M. 2005. Early detection and prevention of denial-of-service attacks: A novel mechanism with propagated traced-back attack blocking IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 23 :1994-2002 DOI Author Url