Qi Shi is a Professor in Computer Security, and Director of the PROTECT Research Centre for Critical Infrastructure Computer Technology & Protection.
Qi Shi’s research is centred on the increasingly important theme of ubiquitous/distributed computing security and privacy with the long-term goal of developing general frameworks for the intelligent provision of security and privacy protection to various applications. Specifically, his main research interests include the following areas:
· System-of-systems security: Develop a software framework for the automated security monitoring, evaluation and control of a system of systems in ubiquitous and cloud computing settings at runtime.
· E-commerce security: Produce methods for privacy enhanced public-key certification and cryptographic protocols for the security and privacy protection of electronic transactions conducted over the Internet.
· Intrusion and denial-of-service detection: Design cost-effective solutions to the early detection and prevention of intrusion and denial-of-service attacks within the network routing infrastructure and in ubiquitous computing environments.
· Sensor network security: Develop resource-efficient algorithms, mechanisms and protocols for key establishment and secure communication among sensor nodes.
· Cloud computing security: Investigate efficient ways for data processing in cloud environments while protecting their security and privacy against unauthorized access.
· Identity management: Devise efficient and lightweight approaches to user-centric and situation-aware identity management for the privacy protection of mobile ad-hoc networks.
· Computer forensics: Propose more effective methods for targeted data collection, uniform data representation, forensic analysis and result visualisation.
Qi Shi has published over 250 research papers in international journals and conference proceedings.
Qi Shi is involved in the supervision of a number of research projects in the above research areas. For example, he is one of the investigators of a large EU FP7 project, ANIKETOS, which involves 17 partners in 10 EU countries with a total grant of €9.6 million, for the development of secure and trustworthy composite services.
Qi Shi is supervising a number of international and home research students working in some research areas listed above. He also welcomes prospective research students with interests in the above research areas or others to apply for studies here. Applications can be submitted online at http://www.ljmu.ac.uk/pgapplication/114150.htm.
Other Academic Activities:
Qi Shi is a member of editorial boards and a paper reviewer for a number of international journals and a member or chair of program committees for many international conferences. Qi also serves as an external research degree examiner, taught course examiner and a member of several advisory committees.
Raschella A, Aldhaibani OA, Pizzi S, MacKay M, Bouhafs F, Araniti G, Shi Q, Lucas-Estañ MDC. 2021. A Centralized Win-Win Cooperative Framework for Wi-Fi and 5G Radio Access Networks Wireless Communications and Mobile Computing, 2021 DOI Author Url Publisher Url Public Url
Adewuyi AA, Cheng H, Shi Q, Cao J, Wang X, Zhou B. 2021. SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url
Teh PS, Zhang N, Tan SY, Shi Q, Khoh WH, Nawaz R. 2019. Strengthen user authentication on mobile devices by using user’s touch dynamics pattern Journal of Ambient Intelligence and Humanized Computing, DOI Author Url Publisher Url Public Url
Raschella A, Bouhafs F, MacKay M, Shi Q, Ortín J, Gállego JR, Canales M. 2019. A Dynamic Access Point Allocation Algorithm for Dense Wireless LANs Using Potential Game Computer Networks, DOI Author Url Publisher Url Public Url
G C D, Bouhafs F, Raschella A, MacKay M, Shi Q. 2019. Radio Resource Management Framework for Energy-Efficient Communications in the Internet-of-Things Transactions on Emerging Telecommunications Technologies, 30 DOI Author Url Publisher Url Public Url
Mac Dermott AM, Baker T, Buck P, Iqbal F, Shi Q. 2019. The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics International Journal of Digital Crime and Forensics (IJDCF), 12 DOI Publisher Url Public Url
Bouhafs F, Seyedebrahimi M, Raschella A, MacKay M, Shi Q. 2019. Per-Flow Radio Resource Management to Mitigate Interference in Dense IEEE 802.11 Wireless LANs IEEE Transactions on Mobile Computing, DOI Author Url Publisher Url Public Url
Adewuyi AA, Cheng H, Shi Q, Cao J, MacDermott Á, Wang X. 2019. CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url
Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. 2018. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems, 5 :1174-1188 DOI Author Url Publisher Url Public Url
Bouhafs F, MacKay M, Raschella A, Shi Q, den Hartog F, Saldana J, Munilla R, Ruiz-Mas J, Fernández-Navajas J, Almodovar J, van Adrichem N. 2018. Wi-5: A Programming Architecture for Unlicensed Frequency Bands IEEE Communications Magazine, 56 :178-185 DOI Author Url Publisher Url Public Url
Eiza MH, Shi Q, Marnerides AK, Owens T, Ni Q. 2018. Efficient, Secure and Privacy-Preserving PMIPv6 Protocol for V2G Networks IEEE Transactions on Vehicular Technology, DOI Author Url Publisher Url Public Url
Jayasinghe U, Lee GM, Um TW, Shi Q. 2018. Machine Learning based Trust Computational Model for IoT Services IEEE Transactions on Sustainable Computing, 4 :39-52 DOI Author Url Publisher Url Public Url
Asim M, Yautsiukhin A, Brucker A, Baker T, Shi Q, Lempereur B. 2018. Security Policy Monitoring of BPMN-based Service Compositions Journal of Software: Evolution and Process, DOI Author Url Publisher Url Public Url
Moara-Nkwe K, Shi Q, Lee GM, Eiza MH. 2018. A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks IEEE Access, 6 :11374-11387 DOI Author Url Publisher Url Public Url
Shone N, Tran Nguyen N, Vu Dinh P, Shi Q. 2018. A Deep Learning Approach to Network Intrusion Detection IEEE Transactions on Emerging Topics in Computational Intelligence, 2 DOI Author Url Publisher Url Public Url
Raschella A, Bouhafs F, Seyedebrahimi M, MacKay M, Shi Q. 2017. Quality of Service Oriented Access Point Selection Framework for Large Wi-Fi Networks IEEE Transactions on Network and Service Management, 14 :441-455 DOI Author Url Publisher Url Public Url
Hashem Eiza M, Owens T, Ni Q, Shi Q. 2015. Situation-Aware QoS Routing Algorithm for Vehicular Ad hoc Networks IEEE Transactions on Vehicular Technology, 64 :5520-5535 DOI
Shi Q, Zhang N, Merabti M, Kifayat K. 2013. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 73 :235-249 DOI Author Url
Lempereur B, Merabti M, Shi Q. 2012. Pypette: A platform for the evaluation of live digital forensics International Journal of Digital Crime and Forensics, 4 :31-46 DOI
Haggerty J, Shi Q, Merabti M. 2005. Early detection and prevention of denial-of-service attacks: A novel mechanism with propagated traced-back attack blocking IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 23 :1994-2002 DOI Author Url
Mohi-Ud-din G, Marnerides A, Shi Q, Dobbins C, Mac Dermott AM. Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems IEEE Transactions on Emerging Topics in Computational Intelligence, DOI Author Url Public Url
Bouhafs F, den Hartog F, Raschella A, Mackay M, Shi Q, Sinanovic S. 2020. Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability 2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), IEEE Global Communications Conference (GLOBECOM) on Advanced Technology for 5G Plus DOI Author Url
Seyedebrahimi M, Raschella A, Bouhafs F, MacKay M, Shi Q, Eiza MH. 2016. A Centralised Wi-Fi Management Framework for D2D Communications in Dense Wi-Fi Networks 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), IEEE Conference on Standards for Communications and Networking (CSCN) DOI Author Url Publisher Url Public Url
Seyedebrahimi M, Bouhafs F, Raschella A, MacKay M, Shi Q. 2016. SDN-Based Channel Assignment Algorithm for Interference Management in Dense Wi-Fi Networks 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), European Conference on Networks and Communications (EuCNC) DOI Author Url Publisher Url Public Url
Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications DOI Public Url
Hashem Eiza M, Shi Q, Marnerides A, Owens T. 2016. Secure and Privacy-Aware Proxy Mobile IPv6 Protocol for Vehicle-to-Grid Networks 2016 IEEE International Conference on Communications (ICC), IEEE International Conference on Communications :1-6 DOI Author Url Publisher Url Public Url
Abdlhamed M, Kifayat K, Shi Q, Hurst W. 2016. A system for intrusion prediction in cloud computing ACM International Conference Proceeding Series, 22-23-March-2016 DOI
Shone N, Dobbins C, Hurst W, Shi Q. 2016. Digital Memories Based Mobile User Authentication for IoT 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15), 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) DOI Author Url Publisher Url Public Url
Shone N, Dobbins C, Hurst W, Shi Q. 2015. Digital Memories Based Mobile User Authentication for IoT 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) :1796-1802 Publisher Url Public Url
Shone N, Shi Q, Merabti M, Kifayat K. 2013. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, IEEE 10th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 10th International Conference on Autonomic and Trusted Computing (ATC) :438-443 DOI Author Url Publisher Url
Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 DOI Author Url
Muhammad A, Arabo A, Merabti M, Shi Q, Askwith B. 2010. A secure gateway service for accessing networked appliances Proceedings - 5th International Conference on Systems and Networks Communications, ICSNC 2010, :183-188 DOI
Llewellyn-Jones D, Merabti M, Shi Q, Askwith B. 2004. A security framework for executables in a ubiquitous computing environment GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2158-2163 Author Url
Seyedebrahimi M, Bouhafs F, Raschella A, MacKay M, Shi Q. Fine-Grained Radio Resource Management to Control Interference in Dense Wi-Fi Networks IEEE Wireless Communications and Networking Conference (WCNC), IEEE Wireless Communications and Networking Conference (WCNC) DOI Author Url Public Url
Shone N, Dobbins C, Hurst W, Shi Q. Digital Memories Based Mobile User Authentication for IoT 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15) Public Url