Skip to main content



  • Tao Zhang and Qi Liao. Dynamic link anomaly analysis for network security management. Springer Journal of Network and Systems Management, 27(3):600-624, July 2019
  • Xiaoying Yu and Qi Liao. Understanding user passwords through password prefix and postfix (p3) graph analysis and visualization. Springer International Journal of Information Security, 18(5):647-663, October 2019
  • Qi Liao, Ting Li, and Benjamin A. Blakely. Anomaly analysis and visualization for dynamic networks through spatiotemporal graph segmentations. Elsevier Journal of Network and Computer Applications, 124:63-79, December 2018
  • Zhen Li and Qi Liao. Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets. Government Information Quarterly, 35(1):151-160, January 2018
  • Xiaoying Yu and Qi Liao. User password repetitive patterns analysis and visualization. Information and Computer Security, 24(1):93-115, 2016. EMERALD PUBLISHING 2017 AWARD FOR EXCELLENCE - OUTSTANDING PAPER
  • Lei Shi, Chen Wang, Zhen Wen, Huamin Qu, Chuang Lin, and Qi Liao. 1.5D egocentric dynamic network visualization. IEEE Transactions on Visualization and Computer Graphics (TVCG), 21(5):624-637, May 2015
  • Ting Li and Qi Liao. Dynamic networks analysis and visualization through spatiotemporal link segmentation. In Proceedings of the IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pages 209-214, Chengdu, China, July 5-7 2016. BEST SESSION PAPER
  • Qi Liao, Lei Shi, and Chen Wang. Visual analysis of large-scale network anomalies. IBM Journal of Research and Development, 7(3/4):13:1-13:12, May-July 2013
  • Lei Shi, Qi Liao, and Chunxin Yang. Investigating network tra c through compressed graph visualization. In Proceedings of the IEEE Conference on Visual Analytics Science and Technology (VAST 2012) Challenge Workshop, VisWeek'12, Seattle, WA, October 14-19 2012. AWARD: GOOD ADAPTATION OF GRAPH ANALYSIS TECHNIQUES
  • Qi Liao, Andrew Blaich, Aaron Striegel, and Douglas Thain. ENAVis: Enterprise network activities visualization. In Proceedings of the USENIX 22nd Large Installation System Administration Conference (LISA '08), pages 59{74, San Diego, CA, November 9-14 2008. USENIX BEST PAPER AWARD
  • Mano, A. Blaich, Q. Liao, Y. Jiang, D. Cieslak, D. Salyers, and A. Striegel. RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning. ACM Transactions on Information and System Security (TISSEC), 11(2):1-23, May 2008.
  • Ph.D., Computer Science and Engineering, University of Notre Dame, 2011
  • M.S., Computer Science and Engineering, University of Notre Dame, 2008
  • B.S., Computer Science, Hartwick College, 2005
  • Computer and Network Security
  • Artificial Intelligence and Machine Learning
  • Visual Analytics
  • Economics and Game Theory of Networks and Cybersecurity