Publications

  1. Zhao, Q., He, Y., Wang, P., Jiang, C., Qi, M. Integration of Link and Semantic Relations for Information Recommendation, Computing and Informatics, (accepted)
  2. Qi, M. (2014), Big Data Management in Digital Forensics, The 17th IEEE International Conference on Computational Science and Engineering ~ CSE2014~ , Dec 2014, Chengdu, China
  3. Qi, M. (2014) Digital forensics and NoSQL Databases , The10th IEEE International Conference on Natural Computation (ICNC'14) and 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'14) held in August 2014, in Xiamen, China.
  4. Qi M. (2014), Employing Neural Networks for DDoS Detection, The 7th International Conference on
  5. Cybercrime Forensics Education and Training CFET 2014, 10 and 11 July 2014, Canterbury, UK
  6. Liu Y., Li M., Khan M. and Qi M., "A MapReduce based Distributed LSI for Scalable Information
  7. Retrieval", Computing and Informatics (to be published).
  8. Qi M. (2013), Clear Up Grey Areas: Cybercrime Legislation Progress in China, The 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013), 10th-11th June 2013, Cardiff, UK.
  9. Alham N. K., Li M., Liu Y. and Qi M. (2013), A Distributed SVM Ensemble for Large Scale Image Classification and Annotation, Computers and Mathematics with Applications, vol. 66, no. 10, pp. 1920-1934, December 2013, Elsevier Science
  10. Qi M. (2012), Social Media in Law Enforcement: the Role and Issues, Proceedings of the 6th International Conference on Cybercrime Forensics Education and Training CFET 2012, 6-7 Sept 2012, Canterbury, UK.
  11. Cherry D., Li M., Qi M. (2012), A Distributed Storage System for Archiving Broadcast Media Content, in Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications, IGI publishing, April, 2012, DOI: 10.4018/978-1-4666-0879-5.ch307.
  12. Qi M., Edgar-Nevill D. (2011), Social networking searching and privacy issues, Information Security
  13. Technical Report, vol.16, no. 2, pp.74-78, ISSN: 1363-4127, DOI: 10.1016/j.istr.2011.09.005.
  14. Wang Y Q, Qi M. (2011), Computer forensics in communication networks, 2011 IET International
  15. Communication Conference on Wireless Mobile & Computing, November 14-16, 2011, Shanghai,
  16. China, 379-383, DOI: 10.1049/cp.2011.0914.
  17. Qi M. (2011), Cyber Safety in Schools. Proceedings of the 5th International Conference on Cybercrime Forensics Education and Training CFET 2011, 1st and 2nd Sept 2011, Canterbury, UK.
  18. Qi M. (2010), Machine Learning based Spam Filtering: Advantages and Challenges, Proceedings of the 4th International Conference on Cybercrime Forensics Education and Training CFET 2010, 2nd and 3rd Sept 2010, Canterbury, UK.
  19. Qi M, Wang Y (2010), Protecting Intellectual Property and Computer Software: Legislation in China. Proceedings of the 4th International Conference on Cybercrime Forensics Education and Training CFET 2010, 2nd and 3rd Sept 2010, Canterbury, UK.
  20. Qi, M. Mousoli R. (2010) Semantic Analysis for Spam Filtering, Proceedings of Sixth IEEE International
  21. Conference on Natural Computation (ICNC'10) and the 2010 Seventh International Conference on
  22. Fuzzy Systems and Knowledge Discovery (FSKD'10) held in August 2010, in Yantai, China.
  23. Wu T, Li M, Qi, M, (2010) Optimizing peer selection in BitTorrent networks with genetic algorithms,
  24. Future Generation Computer System (FGCS), Elsevier Science, vol. 26, no. 8, pp. 1151-1156, October
  25. 2010.
  26. Wang Y, Qi M, etc. (2010) Cybercrime and Relevant Legislation in China, in Pauline Reich (ed.), Cybercrime & Security, Oxford University Press, May 2010.
  27. Wang, Y., Qi, M. (2010) Cyber Security and Computer Forensics, Peking University Press, 2010.
  28. Qi M., Edgar-Nevill D~ (2009) ’Lessons Learned from Beijing for the London 2012 Olympics’,
  29. Proceedings of the 3nd International Conference on Cybercrime Forensics Education and Training
  30. CFET 2009, 1st and 2nd Sept 2009, Canterbury, UK.
  31. Qi, M. Mousoli R~ (2009) ’Phishing and E-Trust’, Proceedings of the 3nd International Conference on Cybercrime Forensics Education and Training CFET 2009, 1st and 2nd Sept 2009, Canterbury, UK.
  32. Qi, M~ (2009) ‘P2P Network-Targeted DDoS ttacks’, The Second International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2009), IEEE Publication, 4-6 August, 2009, London, UK.
  33. Qi, M. (2009) ‘Spam and Social Effects’, Proceedings of IEEE 6th International Conference on Autonomic and Trusted Computing (ATC-09), IEEE Computer Society Press, 7-9 July, 2009 Brisbane, Australia.
  34. Qi, M~, Wang, Y~ and Xu, R~ (2009) ‘Fighting cybercrime: legislation in China’, Int. J. Electronic Security and Digital Forensics, Vol. 2, No. 2, pp.219–227.
  35. Qi, M. (2009) ‘P2P DDoS: Challenges and Countermeasures’, Proceedings of IEEE 6th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'09) , IEEE Computer Society Press, 14-16 August, 2009, Tianjin, China .
  36. Li, M., Qi, M~ (2009) ‘Facilitating Resource Discovery in Grid Environments with Peer-to-Peer Structured Tuple Spaces’, Peer-to-Peer Networking and Applications, vol.2, no.4, pp.283-297, December 2009. Springer, ISSN: 1936-6442.
  37. Li, M, Yu, B., Qi, M~ (2009) ‘Service Composition with I Planning’, in Junwei Cao (Ed~),
  38. Cyberinfrastructure Technologies and Applications, Nova Science Publishers, March 2009.
  39. Li M.,Yu B., Sahota V. and Qi, M~ (2009) ‘Web Services Discovery with Rough Sets’, Journal of Web
  40. Services Research, vol.6, no.1, pp.69-86, February 2009, IGI Global, ISSN: 1545-7362.
  41. Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. (2008) ‘Tracking online trails’, Int~ J~ Electronic Security and Digital Forensics, Vol. 1, No. 4, pp.353–361.
  42. Qi M., Wang Y~, Xu R~ (2008) ‘Cybercrime Legislation in China’, Proceedings of the 2nd International Conference on Cybercrime Forensics Education and Training CFET 2008, 1st and 2nd Sept 2008, Canterbury, UK, ISBN 1899253-19x.
  43. Qi M., Mousoli R., Edgar-Nevill D~ (2008) ’The Social Effects of Spams’, Proceedings of the 2nd International Conference on Cybercrime Forensics Education and Training CFET 2008, 1st and 2nd Sept 2008, Canterbury, UK.
  44. Yang Z., Xu R., Qi M. (2008) ‘ Case-Based Reasoning Model for Digital Intrusion Forensics’, Proceedings of the 2nd International Conference on Cybercrime Forensics Education and Training CFET 2008, 1st and 2nd Sept 2008, Canterbury, UK.
  45. Qi M~, Li M~, Willis P~ (2008) ‘Fast Implementation of Cel-based nimation’, CM International
  46. Conference on Advanced Infocomm Technology 2008 (ICAIT 2008), Shenzhen, China, 28-31 July 2008.
  47. Li M., Yu B., Qi M., Antonopoulos N. (2008) ‘Automatically Wrapping Legacy Software into Services: A
  48. Grid Case Study’, Journal of P2P Networking and pplications, Vol~ 1, No. 2, pp. 139-147, Sept. 2008,
  49. Springer. ISSN: 1936-6442.
  50. Qi M., Edgar-Nevill D~ (2008) ‘Tracking Online Trails’, 4th International Conference on Global e - Security (ICGeS-08), London, 23-25 June 2008, Lecture Notes in Computer Science (LNCS), Springerpp48-53,ISSN 1865-0929 (Print) 1865-0937 (Online), ISBN 978-3-540-69402-1 (Print) 978-3-540-69403-8 (Online).
  51. Qi, M. and Edgar-Nevill D~ (2007) ‘Footprints of Cyber Criminals”, Proceedings of the 1st International
  52. Conference on Cybercrime Forensics Education and Training (CFET 2007), 6-7 September, 2007, Canterbury, UK. ISBN 1899253-041.
  53. Qi, M. and Edgar-Nevill, D~ (2007) ‘Tracking Email Offenders’, Proceedings of ETHICOMP Working Conference 2007, 2-3 April, 2007, Kunming, China, ISBN: 9780955529306.
  54. Li M., Yu B., Qi M. (2006) ‘PGG:  Predictable and Grouped Genetic lgorithm for Job Scheduling’, Future Generation Comp. Syst. 22(5), 2006, pp588-599, ISSN: 0167-739X
  55. Li M., Qi M. (2005) ‘ WSRF based Shopping Cart System’, EGC 2005, Lecture Notes in Computer Science. Springer-Verlag.
  56. Li M., Qi M. (2004) ‘Leveraging legacy codes to distributed problem-solving environments: a Web services approach’. Software: Practice and Experience (13): 1297-1309.
  57. Li M., Qi M~ (2003) ‘MPBOT:  Web Based Map Information Retrieval System’, Information and Software Technology, Elsevier, ISSN 0950-5849, 45(10), 2003.
  58. Qi M., Willis P~ (2003) ‘Quasi3D Cel-based nimation’, Proc. of Vision, Video and Graphics Conference 2003, UK.
  59. Li M., Qi M. (2002) ‘n Interactive Web Based Map Information Retrieval System using Software gents’, Proceedins of the APCHI2002, Beijing, China, Nov 2002.
  60. Azad A., Virk G S, Qi M. (2001) ‘ROBOVOLC: Remote Inspection for Volcanos’, Workshop on Autonomous Artificial Systems Exploring Hostile Environment. Mar. 2001, Dubai.
  61. Qi M. (2000) ‘Real-Time Computer Generated Image (CGI) Techniques for Low Cost Virtual Reality’, PhD Thesis, Chinese Academy of Sciences, June 2000.
  62. Qi M~, Zhang H~ (2000) ‘ Fast Backface Culling Method in Real-Time Image Generation’. The 11th National CAD&CG Conference of China, 2000.
  63. Qi M., Pan L~, Xu B~, Zhang H~ (2001) ‘Multilevel Hidden Surface Removal for PCVR Real-Time Image Generation’, Journal of System Simulation, 13(1) 2001.
  64. Qi M. Zhang H~ (2000) ‘Frame Coherence Application to Real-Time Visual Simulation’, nnual Conference on System Simulation and pplication’, 2000.
  65. Qi M., Zhang H., Zhang G., Qi Y. (2000) ‘Study on Similarity Thoery llication on PCVR’, The Third World Congress on Intelligent Control and Automation. IEEE No. 00EX393, July 2000.
  66. Qi M., Zhang H~ (1997) ‘Overview on Dataglove’, Computer Simulation, 13(4) 1997.
  67. Qi M. (1998) ‘Building a Linux Internet Server’, Tsinghua University Press, 1998

Man Qi(Mandy)

Senior Lecturer

 


  • DEPARTMENTDepartment of Computing
    Canterbury Christ Church University
  • COUNTRY UK