default search action
BibTeX records: Xiaohong Li 0001
@article{DBLP:journals/ijisec/FanZL25,
author = {Xubo Fan and
Jie Zhang and
Xiaohong Li},
title = {A blockchain-based trust and reputation model resilient to forgery
attacks for data sharing scenarios {(RWS-BTRM)}},
journal = {Int. J. Inf. Sec.},
volume = {24},
number = {5},
pages = {205},
year = {2025},
url = {https://doi.org/10.1007/s10207-025-01050-y},
doi = {10.1007/S10207-025-01050-Y},
timestamp = {Sat, 18 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijisec/FanZL25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LvLCHBF25,
author = {Yongyang Lv and
Xiaohong Li and
Kui Chen and
Zhe Hou and
Guangdong Bai and
Ruitao Feng},
title = {MedExChain: Enabling Secure and Efficient {PHR} Sharing Across Heterogeneous
Blockchains},
journal = {{IEEE} Internet Things J.},
volume = {12},
number = {16},
pages = {32932--32950},
year = {2025},
url = {https://doi.org/10.1109/JIOT.2025.3579266},
doi = {10.1109/JIOT.2025.3579266},
timestamp = {Thu, 11 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/LvLCHBF25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ploscb/ShaoSXQWMMYZL25,
author = {Wen{-}Wei Shao and
Qi Shao and
Hai{-}Huan Xu and
Guan{-}Ji Qiao and
Run{-}Xuan Wang and
Zhi{-}Yun Ma and
Wei{-}Wei Meng and
Zhuo{-}Bin Yang and
Yun{-}Liang Zang and
Xiao{-}Hong Li},
title = {Repetitive training enhances the pattern recognition capability of
cultured neural networks},
journal = {PLoS Comput. Biol.},
volume = {21},
number = {4},
pages = {1013043},
year = {2025},
url = {https://doi.org/10.1371/journal.pcbi.1013043},
doi = {10.1371/JOURNAL.PCBI.1013043},
timestamp = {Wed, 18 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ploscb/ShaoSXQWMMYZL25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/ZhangLZHBF25,
author = {Mengke Zhang and
Xiaohong Li and
Jie Zhang and
Zhe Hou and
Guangdong Bai and
Ruitao Feng},
editor = {Weiming Shen and
Marie{-}H{\'{e}}l{\`{e}}ne Abel and
Nada Matta and
Jean{-}Paul A. Barth{\`{e}}s and
Junzhou Luo and
Jinghui Zhang and
Haibin Zhu and
Kunkun Peng},
title = {SwiftGuard: Enhanced Privacy and Efficiency in Blockchain-Based Fine-Grained
Access Control for Cross-Domain Healthcare Collaboration},
booktitle = {28th International Conference on Computer Supported Cooperative Work
in Design, {CSCWD} 2025, Compiegne, France, May 5-7, 2025},
pages = {1863--1868},
publisher = {{IEEE}},
year = {2025},
url = {https://doi.org/10.1109/CSCWD64889.2025.11033363},
doi = {10.1109/CSCWD64889.2025.11033363},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cscwd/ZhangLZHBF25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GuoXL00B25,
author = {Qi Guo and
Xiaofei Xie and
Shangqing Liu and
Ming Hu and
Xiaohong Li and
Lei Bu},
title = {Intention is All you Need: Refining your Code from your Intention},
booktitle = {47th {IEEE/ACM} International Conference on Software Engineering,
{ICSE} 2025, Ottawa, ON, Canada, April 26 - May 6, 2025},
pages = {1127--1139},
publisher = {{IEEE}},
year = {2025},
url = {https://doi.org/10.1109/ICSE55347.2025.00191},
doi = {10.1109/ICSE55347.2025.00191},
timestamp = {Mon, 30 Jun 2025 11:40:51 +0200},
biburl = {https://dblp.org/rec/conf/icse/GuoXL00B25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/QuanLXCCJL25,
author = {Lili Quan and
Tianlin Li and
Xiaofei Xie and
Zhenpeng Chen and
Sen Chen and
Lingxiao Jiang and
Xiaohong Li},
title = {Dissecting Global Search: {A} Simple Yet Effective Method to Boost
Individual Discrimination Testing and Repair},
booktitle = {47th {IEEE/ACM} International Conference on Software Engineering,
{ICSE} 2025, Ottawa, ON, Canada, April 26 - May 6, 2025},
pages = {1908--1920},
publisher = {{IEEE}},
year = {2025},
url = {https://doi.org/10.1109/ICSE55347.2025.00235},
doi = {10.1109/ICSE55347.2025.00235},
timestamp = {Sat, 06 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icse/QuanLXCCJL25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/MaoZZL25,
author = {Honglin Mao and
Jie Zhang and
Yao Zhang and
Xiaohong Li},
editor = {Philipp R{\"{u}}mmer and
Zhilin Wu},
title = {A Cross-Domain Data Sharing Scheme Based on Federated Blockchain},
booktitle = {Theoretical Aspects of Software Engineering - 19th International Symposium,
{TASE} 2025, Limassol, Cyprus, July 14-16, 2025, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {15841},
pages = {285--302},
publisher = {Springer},
year = {2025},
url = {https://doi.org/10.1007/978-3-031-98208-8\_17},
doi = {10.1007/978-3-031-98208-8\_17},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/tase/MaoZZL25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/QuanXGJ00025,
author = {Lili Quan and
Xiaofei Xie and
Qianyu Guo and
Lingxiao Jiang and
Sen Chen and
Junjie Wang and
Xiaohong Li},
editor = {Guodong Long and
Michale Blumestein and
Yi Chang and
Liane Lewin{-}Eytan and
Zi Helen Huang and
Elad Yom{-}Tov},
title = {TensorJSFuzz: Effective Testing of Web-Based Deep Learning Frameworks
via Input-Constraint Extraction},
booktitle = {Proceedings of the {ACM} on Web Conference 2025, {WWW} 2025, Sydney,
NSW, Australia, 28 April 2025- 2 May 2025},
pages = {3405--3414},
publisher = {{ACM}},
year = {2025},
url = {https://doi.org/10.1145/3696410.3714649},
doi = {10.1145/3696410.3714649},
timestamp = {Sun, 02 Nov 2025 21:27:17 +0100},
biburl = {https://dblp.org/rec/conf/www/QuanXGJ00025.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2502-08172,
author = {Qi Guo and
Xiaofei Xie and
Shangqing Liu and
Ming Hu and
Xiaohong Li and
Lei Bu},
title = {Intention is All You Need: Refining Your Code from Your Intention},
journal = {CoRR},
volume = {abs/2502.08172},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2502.08172},
doi = {10.48550/ARXIV.2502.08172},
eprinttype = {arXiv},
eprint = {2502.08172},
timestamp = {Fri, 14 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2502-08172.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2502-13412,
author = {Yanbang Sun and
Qing Huang and
Xiaoxue Ren and
Zhenchang Xing and
Xiaohong Li and
Junjie Wang},
title = {Explore-Construct-Filter: An Automated Framework for Rich and Reliable
{API} Knowledge Graph Construction},
journal = {CoRR},
volume = {abs/2502.13412},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2502.13412},
doi = {10.48550/ARXIV.2502.13412},
eprinttype = {arXiv},
eprint = {2502.13412},
timestamp = {Mon, 07 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2502-13412.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2506-23461,
author = {Yun Xing and
Qing Guo and
Xiaohong Li and
Yihao Huang and
Xiaofeng Cao and
Di Lin and
Ivor W. Tsang and
Lei Ma},
title = {Time-variant Image Inpainting via Interactive Distribution Transition
Estimation},
journal = {CoRR},
volume = {abs/2506.23461},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2506.23461},
doi = {10.48550/ARXIV.2506.23461},
eprinttype = {arXiv},
eprint = {2506.23461},
timestamp = {Sat, 12 Jul 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2506-23461.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2507-09529,
author = {Yunqian Wang and
Xiaohong Li and
Yao Zhang and
Yuekang Li and
Zhiping Zhou and
Ruitao Feng},
title = {It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from
a Practical Perspective},
journal = {CoRR},
volume = {abs/2507.09529},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2507.09529},
doi = {10.48550/ARXIV.2507.09529},
eprinttype = {arXiv},
eprint = {2507.09529},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2507-09529.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2507-10927,
author = {Jie Zhang and
Xiaohong Li and
Man Zheng and
Zhe Hou and
Guangdong Bai and
Ruitao Feng},
title = {{DVFS:} {A} Dynamic Verifiable Fuzzy Search Service for Encrypted
Cloud Data},
journal = {CoRR},
volume = {abs/2507.10927},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2507.10927},
doi = {10.48550/ARXIV.2507.10927},
eprinttype = {arXiv},
eprint = {2507.10927},
timestamp = {Wed, 27 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2507-10927.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2507-14969,
author = {Sai Zhang and
Zhenchang Xing and
Jieshan Chen and
Dehai Zhao and
Zizhong Zhu and
Xiaowang Zhang and
Zhiyong Feng and
Xiaohong Li},
title = {Think Like an Engineer: {A} Neuro-Symbolic Collaboration Agent for
Generative Software Requirements Elicitation and Self-Review},
journal = {CoRR},
volume = {abs/2507.14969},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2507.14969},
doi = {10.48550/ARXIV.2507.14969},
eprinttype = {arXiv},
eprint = {2507.14969},
timestamp = {Mon, 18 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2507-14969.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2510-19615,
author = {Zhiping Zhou and
Xiaohong Li and
Ruitao Feng and
Yao Zhang and
Yuekang Li and
Wenbu Feng and
Yunqian Wang and
Yuqing Li},
title = {FidelityGPT: Correcting Decompilation Distortions with Retrieval Augmented
Generation},
journal = {CoRR},
volume = {abs/2510.19615},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2510.19615},
doi = {10.48550/ARXIV.2510.19615},
eprinttype = {arXiv},
eprint = {2510.19615},
timestamp = {Sun, 16 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2510-19615.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2510-21124,
author = {Jie Zhang and
Xiaohong Li and
Mengke Zhang and
Ruitao Feng and
Shanshan Xu and
Zhe Hou and
Guangdong Bai},
title = {{QAE-BAC:} Achieving Quantifiable Anonymity and Efficiency in Blockchain-Based
Access Control with Attribute},
journal = {CoRR},
volume = {abs/2510.21124},
year = {2025},
url = {https://doi.org/10.48550/arXiv.2510.21124},
doi = {10.48550/ARXIV.2510.21124},
eprinttype = {arXiv},
eprint = {2510.21124},
timestamp = {Sun, 16 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2510-21124.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/YinFLCWH24,
author = {Qiaoyun Yin and
Zhiyong Feng and
Xiaohong Li and
Shizhan Chen and
Hongyue Wu and
Gaoyong Han},
title = {Tackling data-heterogeneity variations in federated learning via adaptive
aggregate weights},
journal = {Knowl. Based Syst.},
volume = {304},
pages = {112484},
year = {2024},
url = {https://doi.org/10.1016/j.knosys.2024.112484},
doi = {10.1016/J.KNOSYS.2024.112484},
timestamp = {Fri, 20 Sep 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/kbs/YinFLCWH24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/ZhangLCF24,
author = {Hua Zhang and
Xiaohong Li and
Xiaochun Cao and
Hassan Foroosh},
title = {Multiple Adverse Weather Conditions Adaptation for Object Detection
via Causal Intervention},
journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
volume = {46},
number = {3},
pages = {1742--1756},
year = {2024},
url = {https://doi.org/10.1109/TPAMI.2022.3166765},
doi = {10.1109/TPAMI.2022.3166765},
timestamp = {Thu, 29 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/pami/ZhangLCF24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LvFMZWL24,
author = {Yongyang Lv and
Ruitao Feng and
Maode Ma and
Manqing Zhu and
Hanwei Wu and
Xiaohong Li},
title = {Reinventing Multi-User Authentication Security From Cross-Chain Perspective},
journal = {{IEEE} Trans. Inf. Forensics Secur.},
volume = {19},
pages = {8908--8923},
year = {2024},
url = {https://doi.org/10.1109/TIFS.2024.3463533},
doi = {10.1109/TIFS.2024.3463533},
timestamp = {Tue, 22 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tifs/LvFMZWL24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZhuW024,
author = {Manqing Zhu and
Lingxiao Wang and
Xiaohong Li},
title = {Design and Optimization of Smart Contracts for Cross-Domain Sharing
of Sensitive Data},
booktitle = {30th {IEEE} International Conference on Parallel and Distributed Systems,
{ICPADS} 2024, Belgrade, Serbia, October 10-14, 2024},
pages = {633--640},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/ICPADS63350.2024.00088},
doi = {10.1109/ICPADS63350.2024.00088},
timestamp = {Mon, 23 Dec 2024 14:09:07 +0100},
biburl = {https://dblp.org/rec/conf/icpads/ZhuW024.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GuoCXLL0024,
author = {Qi Guo and
Junming Cao and
Xiaofei Xie and
Shangqing Liu and
Xiaohong Li and
Bihuan Chen and
Xin Peng},
title = {Exploring the Potential of ChatGPT in Automated Code Refinement: An
Empirical Study},
booktitle = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
pages = {34:1--34:13},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3597503.3623306},
doi = {10.1145/3597503.3623306},
timestamp = {Mon, 24 Jun 2024 15:20:25 +0200},
biburl = {https://dblp.org/rec/conf/icse/GuoCXLL0024.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/Guo0XLTFWGB24,
author = {Qi Guo and
Xiaohong Li and
Xiaofei Xie and
Shangqing Liu and
Ze Tang and
Ruitao Feng and
Junjie Wang and
Jidong Ge and
Lei Bu},
editor = {Maria Christakis and
Michael Pradel},
title = {FT2Ra: {A} Fine-Tuning-Inspired Approach to Retrieval-Augmented Code
Completion},
booktitle = {Proceedings of the 33rd {ACM} {SIGSOFT} International Symposium on
Software Testing and Analysis, {ISSTA} 2024, Vienna, Austria, September
16-20, 2024},
pages = {313--324},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3650212.3652130},
doi = {10.1145/3650212.3652130},
timestamp = {Wed, 25 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/issta/Guo0XLTFWGB24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/FengL0GL024,
author = {Ruitao Feng and
Sen Li and
Sen Chen and
Mengmeng Ge and
Xuewei Li and
Xiaohong Li},
editor = {Aviral Shrivastava and
Yulei Sui},
title = {Unmasking the Lurking: Malicious Behavior Detection for IoT Malware
with Multi-label Classification},
booktitle = {Proceedings of the 25th {ACM} {SIGPLAN/SIGBED} International Conference
on Languages, Compilers, and Tools for Embedded Systems, {LCTES} 2024,
Copenhagen, Denmark, 24 June 2024},
pages = {95--106},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3652032.3657577},
doi = {10.1145/3652032.3657577},
timestamp = {Wed, 22 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/lctrts/FengL0GL024.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangL0F24,
author = {Fei Zhang and
Xiaohong Li and
Sen Chen and
Ruitao Feng},
title = {Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family
Classification},
booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2024, Sanya, China, December
17-21, 2024},
pages = {166--175},
publisher = {{IEEE}},
year = {2024},
url = {https://doi.org/10.1109/TrustCom63139.2024.00048},
doi = {10.1109/TRUSTCOM63139.2024.00048},
timestamp = {Sat, 15 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/ZhangL0F24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-01554,
author = {Qi Guo and
Xiaohong Li and
Xiaofei Xie and
Shangqing Liu and
Ze Tang and
Ruitao Feng and
Junjie Wang and
Jidong Ge and
Lei Bu},
title = {FT2Ra: {A} Fine-Tuning-Inspired Approach to Retrieval-Augmented Code
Completion},
journal = {CoRR},
volume = {abs/2404.01554},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2404.01554},
doi = {10.48550/ARXIV.2404.01554},
eprinttype = {arXiv},
eprint = {2404.01554},
timestamp = {Wed, 25 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2404-01554.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2410-06444,
author = {Qijing Qiao and
Ruitao Feng and
Sen Chen and
Fei Zhang and
Xiaohong Li},
title = {Multi-label Classification for Android Malware Based on Active Learning},
journal = {CoRR},
volume = {abs/2410.06444},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2410.06444},
doi = {10.48550/ARXIV.2410.06444},
eprinttype = {arXiv},
eprint = {2410.06444},
timestamp = {Mon, 18 Nov 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2410-06444.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/BaiCXL23,
author = {Yude Bai and
Sen Chen and
Zhenchang Xing and
Xiaohong Li},
title = {ArgusDroid: detecting Android malware variants by mining permission-API
knowledge graph},
journal = {Sci. China Inf. Sci.},
volume = {66},
number = {9},
year = {2023},
url = {https://doi.org/10.1007/s11432-021-3414-7},
doi = {10.1007/S11432-021-3414-7},
timestamp = {Fri, 15 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/chinaf/BaiCXL23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuFLX23,
author = {Anbin Wu and
Zhiyong Feng and
Xiaohong Li and
Jianmao Xiao},
title = {ZTWeb: Cross site scripting detection based on zero trust},
journal = {Comput. Secur.},
volume = {134},
pages = {103434},
year = {2023},
url = {https://doi.org/10.1016/j.cose.2023.103434},
doi = {10.1016/J.COSE.2023.103434},
timestamp = {Mon, 13 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/WuFLX23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ZhangFSLFXAZC23,
author = {Chengwei Zhang and
Dina Fang and
Sandip Sen and
Xiaohong Li and
Zhiyong Feng and
Wanli Xue and
Dou An and
Xintian Zhao and
Rong Chen},
title = {Opinion Dynamics in Gossiper-Media Networks Based on Multiagent Reinforcement
Learning},
journal = {{IEEE} Trans. Netw. Sci. Eng.},
volume = {10},
number = {2},
pages = {1143--1156},
year = {2023},
url = {https://doi.org/10.1109/TNSE.2022.3229770},
doi = {10.1109/TNSE.2022.3229770},
timestamp = {Sat, 11 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tnse/ZhangFSLFXAZC23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/YitagesuXZFLH23,
author = {Sofonias Yitagesu and
Zhenchang Xing and
Xiaowang Zhang and
Zhiyong Feng and
Xiaohong Li and
Linyi Han},
title = {Extraction of Phrase-based Concepts in Vulnerability Descriptions
through Unsupervised Labeling},
journal = {{ACM} Trans. Softw. Eng. Methodol.},
volume = {32},
number = {5},
pages = {112:1--112:45},
year = {2023},
url = {https://doi.org/10.1145/3579638},
doi = {10.1145/3579638},
timestamp = {Sun, 22 Oct 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tosem/YitagesuXZFLH23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhangXLLCLL23,
author = {Yao Zhang and
Xiaofei Xie and
Yi Li and
Yun Lin and
Sen Chen and
Yang Liu and
Xiaohong Li},
title = {Demystifying Performance Regressions in String Solvers},
journal = {{IEEE} Trans. Software Eng.},
volume = {49},
number = {3},
pages = {947--961},
year = {2023},
url = {https://doi.org/10.1109/TSE.2022.3168373},
doi = {10.1109/TSE.2022.3168373},
timestamp = {Wed, 17 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tse/ZhangXLLCLL23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/LiGF0L23,
author = {Sen Li and
Mengmeng Ge and
Ruitao Feng and
Xiaohong Li and
Kwok{-}Yan Lam},
editor = {Jihe Wang and
Yi He and
Thang N. Dinh and
Christan Grant and
Meikang Qiu and
Witold Pedrycz},
title = {Automatic Detection and Analysis towards Malicious Behavior in IoT
Malware},
booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops,
Shanghai, China, December 4, 2023},
pages = {1332--1341},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/ICDMW60847.2023.00171},
doi = {10.1109/ICDMW60847.2023.00171},
timestamp = {Wed, 22 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icdm/LiGF0L23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/ZhangFXLS23,
author = {Fei Zhang and
Ruitao Feng and
Xiaofei Xie and
Xiaohong Li and
Lianshuan Shi},
editor = {Jihe Wang and
Yi He and
Thang N. Dinh and
Christan Grant and
Meikang Qiu and
Witold Pedrycz},
title = {SeqAdver: Automatic Payload Construction and Injection in Sequence-based
Android Adversarial Attack},
booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops,
Shanghai, China, December 4, 2023},
pages = {1342--1351},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/ICDMW60847.2023.00172},
doi = {10.1109/ICDMW60847.2023.00172},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icdm/ZhangFXLS23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ZhangXLCZL23,
author = {Yao Zhang and
Xiaofei Xie and
Yi Li and
Sen Chen and
Cen Zhang and
Xiaohong Li},
title = {EndWatch: {A} Practical Method for Detecting Non-Termination in Real-World
Software},
booktitle = {38th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2023, Luxembourg, September 11-15, 2023},
pages = {686--697},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/ASE56229.2023.00061},
doi = {10.1109/ASE56229.2023.00061},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/kbse/ZhangXLCZL23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZhangC0C023,
author = {Yuxin Zhang and
Sen Chen and
Lingling Fan and
Chunyang Chen and
Xiaohong Li},
editor = {Satish Chandra and
Kelly Blincoe and
Paolo Tonella},
title = {Automated and Context-Aware Repair of Color-Related Accessibility
Issues for Android Apps},
booktitle = {Proceedings of the 31st {ACM} Joint European Software Engineering
Conference and Symposium on the Foundations of Software Engineering,
{ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023},
pages = {1255--1267},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3611643.3616329},
doi = {10.1145/3611643.3616329},
timestamp = {Mon, 30 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sigsoft/ZhangC0C023.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-09029,
author = {Yuxin Zhang and
Sen Chen and
Lingling Fan and
Chunyang Chen and
Xiaohong Li},
title = {Automated and Context-Aware Repair of Color-Related Accessibility
Issues for Android Apps},
journal = {CoRR},
volume = {abs/2308.09029},
year = {2023},
url = {https://doi.org/10.48550/arXiv.2308.09029},
doi = {10.48550/ARXIV.2308.09029},
eprinttype = {arXiv},
eprint = {2308.09029},
timestamp = {Mon, 30 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2308-09029.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-08221,
author = {Qi Guo and
Junming Cao and
Xiaofei Xie and
Shangqing Liu and
Xiaohong Li and
Bihuan Chen and
Xin Peng},
title = {Exploring the Potential of ChatGPT in Automated Code Refinement: An
Empirical Study},
journal = {CoRR},
volume = {abs/2309.08221},
year = {2023},
url = {https://doi.org/10.48550/arXiv.2309.08221},
doi = {10.48550/ARXIV.2309.08221},
eprinttype = {arXiv},
eprint = {2309.08221},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2309-08221.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-03335,
author = {Yao Zhang and
Xiaofei Xie and
Yi Li and
Sen Chen and
Cen Zhang and
Xiaohong Li},
title = {EndWatch: {A} Practical Method for Detecting Non-Termination in Real-World
Software},
journal = {CoRR},
volume = {abs/2312.03335},
year = {2023},
url = {https://doi.org/10.48550/arXiv.2312.03335},
doi = {10.48550/ARXIV.2312.03335},
eprinttype = {arXiv},
eprint = {2312.03335},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2312-03335.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/ZhangHLXHLAC22,
author = {Chengwei Zhang and
Zhuobing Han and
Bingfu Liu and
Wanli Xue and
Jianye Hao and
Xiaohong Li and
Dou An and
Rong Chen},
title = {SCC-rFMQ: a multiagent reinforcement learning method in cooperative
Markov games with continuous actions},
journal = {Int. J. Mach. Learn. Cybern.},
volume = {13},
number = {7},
pages = {1927--1944},
year = {2022},
url = {https://doi.org/10.1007/s13042-021-01497-0},
doi = {10.1007/S13042-021-01497-0},
timestamp = {Wed, 25 Jan 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/mlc/ZhangHLXHLAC22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/GuoCXLBS22,
author = {Hao Guo and
Sen Chen and
Zhenchang Xing and
Xiaohong Li and
Yude Bai and
Jiamou Sun},
title = {Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions},
journal = {{ACM} Trans. Softw. Eng. Methodol.},
volume = {31},
number = {3},
pages = {49:1--49:27},
year = {2022},
url = {https://doi.org/10.1145/3498537},
doi = {10.1145/3498537},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tosem/GuoCXLBS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YanCBL22,
author = {Guoqing Yan and
Sen Chen and
Yude Bai and
Xiaohong Li},
editor = {Hong Va Leong and
Sahra Sedigh Sarvestani and
Yuuichi Teranishi and
Alfredo Cuzzocrea and
Hiroki Kashiwazaki and
Dave Towey and
Ji{-}Jiang Yang and
Hossain Shahriar},
title = {Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability
Detection?},
booktitle = {46th {IEEE} Annual Computers, Software, and Applications Conferenc,
{COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022},
pages = {904--913},
publisher = {{IEEE}},
year = {2022},
url = {https://doi.org/10.1109/COMPSAC54236.2022.00142},
doi = {10.1109/COMPSAC54236.2022.00142},
timestamp = {Fri, 15 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/compsac/YanCBL22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/QuanGXCLL22,
author = {Lili Quan and
Qianyu Guo and
Xiaofei Xie and
Sen Chen and
Xiaohong Li and
Yang Liu},
title = {Towards Understanding the Faults of JavaScript-Based Deep Learning
Systems},
booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
pages = {105:1--105:13},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3551349.3560427},
doi = {10.1145/3551349.3560427},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/kbse/QuanGXCLL22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ShiXLZCL22,
author = {Xiuhan Shi and
Xiaofei Xie and
Yi Li and
Yao Zhang and
Sen Chen and
Xiaohong Li},
editor = {Abhik Roychoudhury and
Cristian Cadar and
Miryung Kim},
title = {Large-scale analysis of non-termination bugs in real-world {OSS} projects},
booktitle = {Proceedings of the 30th {ACM} Joint European Software Engineering
Conference and Symposium on the Foundations of Software Engineering,
{ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022},
pages = {256--268},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3540250.3549129},
doi = {10.1145/3540250.3549129},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sigsoft/ShiXLZCL22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-04791,
author = {Lili Quan and
Qianyu Guo and
Xiaofei Xie and
Sen Chen and
Xiaohong Li and
Yang Liu},
title = {Towards Understanding the Faults of JavaScript-Based Deep Learning
Systems},
journal = {CoRR},
volume = {abs/2209.04791},
year = {2022},
url = {https://doi.org/10.48550/arXiv.2209.04791},
doi = {10.48550/ARXIV.2209.04791},
eprinttype = {arXiv},
eprint = {2209.04791},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2209-04791.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BaiXMLF21,
author = {Yude Bai and
Zhenchang Xing and
Duoyuan Ma and
Xiaohong Li and
Zhiyong Feng},
title = {Comparative analysis of feature representations and machine learning
methods in Android family classification},
journal = {Comput. Networks},
volume = {184},
pages = {107639},
year = {2021},
url = {https://doi.org/10.1016/j.comnet.2020.107639},
doi = {10.1016/J.COMNET.2020.107639},
timestamp = {Sat, 09 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/cn/BaiXMLF21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/LiFCGFL21,
author = {Yuxuan Li and
Ruitao Feng and
Sen Chen and
Qianyu Guo and
Lingling Fan and
Xiaohong Li},
title = {IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps},
booktitle = {28th Asia-Pacific Software Engineering Conference, {APSEC} 2021, Taipei,
Taiwan, December 6-9, 2021},
pages = {202--212},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/APSEC53868.2021.00028},
doi = {10.1109/APSEC53868.2021.00028},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/apsec/LiFCGFL21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinGZLD21,
author = {Hui Jin and
Weimin Ge and
Yao Zhang and
Xiaohong Li and
Zhidong Deng},
editor = {Honghao Gao and
Xinheng Wang},
title = {Loopster++: Termination Analysis for Multi-path Linear Loop},
booktitle = {Collaborative Computing: Networking, Applications and Worksharing
- 17th {EAI} International Conference, CollaborateCom 2021, Virtual
Event, October 16-18, 2021, Proceedings, Part {I}},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {406},
pages = {479--497},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-92635-9\_28},
doi = {10.1007/978-3-030-92635-9\_28},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/colcom/JinGZLD21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YuanBXC0D21,
author = {Liu Yuan and
Yude Bai and
Zhenchang Xing and
Sen Chen and
Xiaohong Li and
Zhidong Deng},
title = {Predicting Entity Relations across Different Security Databases by
Using Graph Attention Network},
booktitle = {{IEEE} 45th Annual Computers, Software, and Applications Conference,
{COMPSAC} 2021, Madrid, Spain, July 12-16, 2021},
pages = {834--843},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/COMPSAC51774.2021.00116},
doi = {10.1109/COMPSAC51774.2021.00116},
timestamp = {Fri, 15 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/compsac/YuanBXC0D21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/GuoXCLBZ21,
author = {Hao Guo and
Zhenchang Xing and
Sen Chen and
Xiaohong Li and
Yude Bai and
Hu Zhang},
title = {Key Aspects Augmentation of Vulnerability Description based on Multiple
Security Databases},
booktitle = {{IEEE} 45th Annual Computers, Software, and Applications Conference,
{COMPSAC} 2021, Madrid, Spain, July 12-16, 2021},
pages = {1020--1025},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/COMPSAC51774.2021.00138},
doi = {10.1109/COMPSAC51774.2021.00138},
timestamp = {Fri, 15 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/compsac/GuoXCLBZ21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/YuM021,
author = {Fengye Yu and
Maode Ma and
Xiaohong Li},
title = {A Blockchain-Assisted Seamless Handover Authentication for {V2I} Communication
in 5G Wireless Networks},
booktitle = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal,
QC, Canada, June 14-23, 2021},
pages = {1--6},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/ICC42927.2021.9500334},
doi = {10.1109/ICC42927.2021.9500334},
timestamp = {Mon, 09 Aug 2021 11:13:44 +0200},
biburl = {https://dblp.org/rec/conf/icc/YuM021.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/Tian0JCC0XQ21,
author = {Binyu Tian and
Qing Guo and
Felix Juefei{-}Xu and
Wen Le Chan and
Yupeng Cheng and
Xiaohong Li and
Xiaofei Xie and
Shengchao Qin},
title = {Bias Field Poses a Threat to DNN-Based X-Ray Recognition},
booktitle = {2021 {IEEE} International Conference on Multimedia and Expo, {ICME}
2021, Shenzhen, China, July 5-9, 2021},
pages = {1--6},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/ICME51207.2021.9428437},
doi = {10.1109/ICME51207.2021.9428437},
timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icmcs/Tian0JCC0XQ21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/ZhangLLZ021,
author = {Shouli Zhang and
Chen Liu and
Han Li and
Zhuofeng Zhao and
Xiaohong Li},
editor = {Hakim Hacid and
Odej Kao and
Massimo Mecella and
Naouel Moha and
Hye{-}young Paik},
title = {Service Deployment with Predictive Ability for Data Stream Processing
in a Cloud-Edge Environment},
booktitle = {Service-Oriented Computing - 19th International Conference, {ICSOC}
2021, Virtual Event, November 22-25, 2021, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {13121},
pages = {781--789},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-91431-8\_55},
doi = {10.1007/978-3-030-91431-8\_55},
timestamp = {Thu, 18 Jul 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icsoc/ZhangLLZ021.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/TianJ0XLL21,
author = {Binyu Tian and
Felix Juefei{-}Xu and
Qing Guo and
Xiaofei Xie and
Xiaohong Li and
Yang Liu},
editor = {Zhi{-}Hua Zhou},
title = {{AVA:} Adversarial Vignetting Attack against Visual Recognition},
booktitle = {Proceedings of the Thirtieth International Joint Conference on Artificial
Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27
August 2021},
pages = {1046--1053},
publisher = {ijcai.org},
year = {2021},
url = {https://doi.org/10.24963/ijcai.2021/145},
doi = {10.24963/IJCAI.2021/145},
timestamp = {Tue, 15 Oct 2024 16:43:28 +0200},
biburl = {https://dblp.org/rec/conf/ijcai/TianJ0XLL21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/YitagesuXZ00H21,
author = {Sofonias Yitagesu and
Zhenchang Xing and
Xiaowang Zhang and
Zhiyong Feng and
Xiaohong Li and
Linyi Han},
title = {Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability
Descriptions},
booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2021, Melbourne, Australia, November 15-19, 2021},
pages = {943--954},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/ASE51524.2021.9678638},
doi = {10.1109/ASE51524.2021.9678638},
timestamp = {Fri, 04 Jul 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/kbse/YitagesuXZ00H21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/LiLXLLGLD21,
author = {Siqi Li and
Yun Lin and
Xiaofei Xie and
Yuekang Li and
Xiaohong Li and
Weimin Ge and
Yang Liu and
Jin Song Dong},
title = {A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing},
booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2021, Melbourne, Australia, November 15-19, 2021},
pages = {1186--1189},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/ASE51524.2021.9678794},
doi = {10.1109/ASE51524.2021.9678794},
timestamp = {Mon, 15 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/kbse/LiLXLLGLD21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msr/YitagesuZ00X21,
author = {Sofonias Yitagesu and
Xiaowang Zhang and
Zhiyong Feng and
Xiaohong Li and
Zhenchang Xing},
title = {Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions},
booktitle = {18th {IEEE/ACM} International Conference on Mining Software Repositories,
{MSR} 2021, Madrid, Spain, May 17-19, 2021},
pages = {29--40},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/MSR52588.2021.00016},
doi = {10.1109/MSR52588.2021.00016},
timestamp = {Fri, 04 Jul 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/msr/YitagesuZ00X21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/ZhangZLW21,
author = {Qianqian Zhang and
Yao Zhang and
Xiao{-}Hong Li and
Bin Wu},
title = {Discovering Properties about Arrays via Path Dependence Analysis},
booktitle = {International Symposium on Theoretical Aspects of Software Engineering,
{TASE} 2021, Shanghai, China, August 25-27, 2021},
pages = {55--62},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/TASE52547.2021.00022},
doi = {10.1109/TASE52547.2021.00022},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/tase/ZhangZLW21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/LinZCSXLS21,
author = {Yingwen Lin and
Yao Zhang and
Sen Chen and
Fu Song and
Xiaofei Xie and
Xiaohong Li and
Lintan Sun},
title = {Inferring Loop Invariants for Multi-Path Loops},
booktitle = {International Symposium on Theoretical Aspects of Software Engineering,
{TASE} 2021, Shanghai, China, August 25-27, 2021},
pages = {63--70},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/TASE52547.2021.00030},
doi = {10.1109/TASE52547.2021.00030},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/tase/LinZCSXLS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/LyuBXLG21,
author = {Jinghui Lyu and
Yude Bai and
Zhenchang Xing and
Xiaohong Li and
Weimin Ge},
title = {A Character-Level Convolutional Neural Network for Predicting Exploitability
of Vulnerability},
booktitle = {International Symposium on Theoretical Aspects of Software Engineering,
{TASE} 2021, Shanghai, China, August 25-27, 2021},
pages = {119--126},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/TASE52547.2021.00014},
doi = {10.1109/TASE52547.2021.00014},
timestamp = {Mon, 11 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/tase/LyuBXLG21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/TanSL21,
author = {Mingxi Tan and
Dazhi Sun and
Xiaohong Li},
title = {A Secure and Efficient Blockchain-based Key Management Scheme for
LoRaWAN},
booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021,
Nanjing, China, March 29 - April 1, 2021},
pages = {1--7},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/WCNC49053.2021.9417304},
doi = {10.1109/WCNC49053.2021.9417304},
timestamp = {Thu, 18 Nov 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wcnc/TanSL21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-01431,
author = {Jiamou Sun and
Zhenchang Xing and
Hao Guo and
Deheng Ye and
Xiaohong Li and
Xiwei Xu and
Liming Zhu},
title = {Generating Informative {CVE} Description From ExploitDB Posts by Extractive
Summarization},
journal = {CoRR},
volume = {abs/2101.01431},
year = {2021},
url = {https://arxiv.org/abs/2101.01431},
eprinttype = {arXiv},
eprint = {2101.01431},
timestamp = {Sat, 27 May 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2101-01431.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-05558,
author = {Binyu Tian and
Felix Juefei{-}Xu and
Qing Guo and
Xiaofei Xie and
Xiaohong Li and
Yang Liu},
title = {{AVA:} Adversarial Vignetting Attack against Visual Recognition},
journal = {CoRR},
volume = {abs/2105.05558},
year = {2021},
url = {https://arxiv.org/abs/2105.05558},
eprinttype = {arXiv},
eprint = {2105.05558},
timestamp = {Tue, 18 May 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2105-05558.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangHL20a,
author = {Haodi Zhang and
Jianye Hao and
Xiaohong Li},
title = {A Method for Deploying Distributed Denial of Service Attack Defense
Strategies on Edge Servers Using Reinforcement Learning},
journal = {{IEEE} Access},
volume = {8},
pages = {78482--78491},
year = {2020},
url = {https://doi.org/10.1109/ACCESS.2020.2989353},
doi = {10.1109/ACCESS.2020.2989353},
timestamp = {Tue, 16 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/ZhangHL20a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HanLXXMS20,
author = {Zhuobing Han and
Xiaohong Li and
Guangquan Xu and
Naixue Xiong and
Ettore Merlo and
Eleni Stroulia},
title = {An Effective Evolutionary Analysis Scheme for Industrial Software
Access Control Models},
journal = {{IEEE} Trans. Ind. Informatics},
volume = {16},
number = {2},
pages = {1024--1034},
year = {2020},
url = {https://doi.org/10.1109/TII.2019.2925422},
doi = {10.1109/TII.2019.2925422},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tii/HanLXXMS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/ShangML20,
author = {Zhengyi Shang and
Maode Ma and
Xiaohong Li},
title = {A Secure Group-Oriented Device-to-Device Authentication Protocol for
5G Wireless Networks},
journal = {{IEEE} Trans. Wirel. Commun.},
volume = {19},
number = {11},
pages = {7021--7032},
year = {2020},
url = {https://doi.org/10.1109/TWC.2020.3007702},
doi = {10.1109/TWC.2020.3007702},
timestamp = {Thu, 31 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/twc/ShangML20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/MaBXS020,
author = {Duoyuan Ma and
Yude Bai and
Zhenchang Xing and
Lintan Sun and
Xiaohong Li},
title = {A Knowledge Graph-based Sensitive Feature Selection for Android Malware
Classification},
booktitle = {27th Asia-Pacific Software Engineering Conference, {APSEC} 2020, Singapore,
December 1-4, 2020},
pages = {188--197},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/APSEC51365.2020.00027},
doi = {10.1109/APSEC51365.2020.00027},
timestamp = {Sat, 20 Mar 2021 14:55:58 +0100},
biburl = {https://dblp.org/rec/conf/apsec/MaBXS020.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/ZhouYBXLZL20,
author = {Lingjun Zhou and
Bing Yu and
David Berend and
Xiaofei Xie and
Xiaohong Li and
Jianjun Zhao and
Xusheng Liu},
title = {An Empirical Study on Robustness of DNNs with Out-of-Distribution
Awareness},
booktitle = {27th Asia-Pacific Software Engineering Conference, {APSEC} 2020, Singapore,
December 1-4, 2020},
pages = {266--275},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/APSEC51365.2020.00035},
doi = {10.1109/APSEC51365.2020.00035},
timestamp = {Wed, 24 May 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/apsec/ZhouYBXLZL20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/AnZZLLM20,
author = {Xingwei An and
Xiangtong Zhou and
Wenxiao Zhong and
Shuang Liu and
Xiaohong Li and
Dong Ming},
title = {Weighted Subject-Semi-Independent ERP-based Brain-Computer Interface},
booktitle = {42nd Annual International Conference of the {IEEE} Engineering in
Medicine {\&} Biology Society, {EMBC} 2020, Montreal, QC, Canada,
July 20-24, 2020},
pages = {2969--2972},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/EMBC44109.2020.9176683},
doi = {10.1109/EMBC44109.2020.9176683},
timestamp = {Wed, 20 Jul 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/embc/AnZZLLM20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BaiX00M20,
author = {Yude Bai and
Zhenchang Xing and
Xiaohong Li and
Zhiyong Feng and
Duoyuan Ma},
editor = {Gregg Rothermel and
Doo{-}Hwan Bae},
title = {Unsuccessful story about few shot malware family classification and
siamese network to the rescue},
booktitle = {{ICSE} '20: 42nd International Conference on Software Engineering,
Seoul, South Korea, 27 June - 19 July, 2020},
pages = {1560--1571},
publisher = {{ACM}},
year = {2020},
url = {https://doi.org/10.1145/3377811.3380354},
doi = {10.1145/3377811.3380354},
timestamp = {Fri, 08 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icse/BaiX00M20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/WangMW0G020,
author = {Wei Wang and
Guozhu Meng and
Haoyu Wang and
Kai Chen and
Weimin Ge and
Xiaohong Li},
title = {A\({}^{\mbox{3}}\)Ident: {A} Two-phased Approach to Identify the Leading
Authors of Android Apps},
booktitle = {{IEEE} International Conference on Software Maintenance and Evolution,
{ICSME} 2020, Adelaide, Australia, September 28 - October 2, 2020},
pages = {617--628},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/ICSME46990.2020.00064},
doi = {10.1109/ICSME46990.2020.00064},
timestamp = {Thu, 24 Jul 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icsm/WangMW0G020.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/GuoXLZLLS20,
author = {Qianyu Guo and
Xiaofei Xie and
Yi Li and
Xiaoyu Zhang and
Yang Liu and
Xiaohong Li and
Chao Shen},
title = {Audee: Automated Testing for Deep Learning Frameworks},
booktitle = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2020, Melbourne, Australia, September 21-25, 2020},
pages = {486--498},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1145/3324884.3416571},
doi = {10.1145/3324884.3416571},
timestamp = {Wed, 19 Feb 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/kbse/GuoXLZLLS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/QuanGCXLLH20,
author = {Lili Quan and
Qianyu Guo and
Hongxu Chen and
Xiaofei Xie and
Xiaohong Li and
Yang Liu and
Jing Hu},
title = {{SADT:} Syntax-Aware Differential Testing of Certificate Validation
in {SSL/TLS} Implementations},
booktitle = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2020, Melbourne, Australia, September 21-25, 2020},
pages = {524--535},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1145/3324884.3416552},
doi = {10.1145/3324884.3416552},
timestamp = {Fri, 24 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/kbse/QuanGCXLLH20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/Jiang0XZ20,
author = {Mengmeng Jiang and
Xiaohong Li and
Xiaofei Xie and
Yao Zhang},
editor = {Toshiaki Aoki and
Qin Li},
title = {An Empirical Study in Software Verification Tools},
booktitle = {International Symposium on Theoretical Aspects of Software Engineering,
{TASE} 2020, Hangzhou, China, December 11-13, 2020},
pages = {201--208},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/TASE49443.2020.00035},
doi = {10.1109/TASE49443.2020.00035},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/tase/Jiang0XZ20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/ZhangL20,
author = {Yu Zhang and
Xiaohong Li},
editor = {Toshiaki Aoki and
Qin Li},
title = {The Scheme of Security Requirement Acquisition Based on Knowledge
Graph},
booktitle = {International Symposium on Theoretical Aspects of Software Engineering,
{TASE} 2020, Hangzhou, China, December 11-13, 2020},
pages = {225--231},
publisher = {{IEEE}},
year = {2020},
url = {https://doi.org/10.1109/TASE49443.2020.00038},
doi = {10.1109/TASE49443.2020.00038},
timestamp = {Sun, 19 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/tase/ZhangL20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/GuoXL20,
author = {Hao Guo and
Zhenchang Xing and
Xiaohong Li},
editor = {Amal El Fallah Seghrouchni and
Gita Sukthankar and
Tie{-}Yan Liu and
Maarten van Steen},
title = {Predicting Missing Information of Vulnerability Reports},
booktitle = {Companion of The 2020 Web Conference 2020, Taipei, Taiwan, April 20-24,
2020},
pages = {81--82},
publisher = {{ACM} / {IW3C2}},
year = {2020},
url = {https://doi.org/10.1145/3366424.3382707},
doi = {10.1145/3366424.3382707},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/www/GuoXL20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-02456,
author = {Hao Guo and
Zhenchang Xing and
Xiaohong Li},
title = {Predicting Missing Information of Key Aspects in Vulnerability Reports},
journal = {CoRR},
volume = {abs/2008.02456},
year = {2020},
url = {https://arxiv.org/abs/2008.02456},
eprinttype = {arXiv},
eprint = {2008.02456},
timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2008-02456.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-13768,
author = {Wei Wang and
Guozhu Meng and
Haoyu Wang and
Kai Chen and
Weimin Ge and
Xiaohong Li},
title = {A3Ident: {A} Two-phased Approach to Identify the Leading Authors of
Android Apps},
journal = {CoRR},
volume = {abs/2008.13768},
year = {2020},
url = {https://arxiv.org/abs/2008.13768},
eprinttype = {arXiv},
eprint = {2008.13768},
timestamp = {Thu, 24 Jul 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2008-13768.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-09247,
author = {Binyu Tian and
Qing Guo and
Felix Juefei{-}Xu and
Wen Le Chan and
Yupeng Cheng and
Xiaohong Li and
Xiaofei Xie and
Shengchao Qin},
title = {Bias Field Poses a Threat to DNN-based X-Ray Recognition},
journal = {CoRR},
volume = {abs/2009.09247},
year = {2020},
url = {https://arxiv.org/abs/2009.09247},
eprinttype = {arXiv},
eprint = {2009.09247},
timestamp = {Thu, 03 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2009-09247.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aamas/ZhangLHCTXF19,
author = {Chengwei Zhang and
Xiaohong Li and
Jianye Hao and
Siqi Chen and
Karl Tuyls and
Wanli Xue and
Zhiyong Feng},
title = {{SA-IGA:} a multiagent reinforcement learning method towards socially
optimal outcomes},
journal = {Auton. Agents Multi Agent Syst.},
volume = {33},
number = {4},
pages = {403--429},
year = {2019},
url = {https://doi.org/10.1007/s10458-019-09411-3},
doi = {10.1007/S10458-019-09411-3},
timestamp = {Wed, 20 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/aamas/ZhangLHCTXF19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangLLHLD19,
author = {Zhongmei Zhang and
Chen Liu and
Xiaohong Li and
Yanbo Han and
Chen Lv and
Weilong Ding},
title = {A Declarative Service-Based Method for Adaptive Aggregation of Sensor
Streams},
journal = {{IEEE} Access},
volume = {7},
pages = {89--98},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2018.2884924},
doi = {10.1109/ACCESS.2018.2884924},
timestamp = {Thu, 06 Nov 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/access/ZhangLLHLD19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SongLFX19,
author = {Tingyu Song and
Xiaohong Li and
Zhiyong Feng and
Guangquan Xu},
title = {Inferring Patterns for Taint-Style Vulnerabilities With Security Patches},
journal = {{IEEE} Access},
volume = {7},
pages = {52339--52349},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2911592},
doi = {10.1109/ACCESS.2019.2911592},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/SongLFX19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XuZSLCZ19,
author = {Guangquan Xu and
Yao Zhang and
Arun Kumar Sangaiah and
Xiaohong Li and
Aniello Castiglione and
Xi Zheng},
title = {CSP-E\({}^{\mbox{2}}\): An abuse-free contract signing protocol with
low-storage {TTP} for energy-efficient electronic transaction ecosystems},
journal = {Inf. Sci.},
volume = {476},
pages = {505--515},
year = {2019},
url = {https://doi.org/10.1016/j.ins.2018.05.022},
doi = {10.1016/J.INS.2018.05.022},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/XuZSLCZ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GaoLM19,
author = {Shu{-}Yang Gao and
Xiao{-}Hong Li and
Maode Ma},
title = {A Malicious Behavior Awareness and Defense Countermeasure Based on
LoRaWAN Protocol},
journal = {Sensors},
volume = {19},
number = {23},
pages = {5122},
year = {2019},
url = {https://doi.org/10.3390/s19235122},
doi = {10.3390/S19235122},
timestamp = {Tue, 21 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sensors/GaoLM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/XieCZLLL19,
author = {Xiaofei Xie and
Bihuan Chen and
Liang Zou and
Yang Liu and
Wei Le and
Xiaohong Li},
title = {Automatic Loop Summarization via Path Dependency Analysis},
journal = {{IEEE} Trans. Software Eng.},
volume = {45},
number = {6},
pages = {537--557},
year = {2019},
url = {https://doi.org/10.1109/TSE.2017.2788018},
doi = {10.1109/TSE.2017.2788018},
timestamp = {Tue, 17 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tse/XieCZLLL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/WangHLF19,
author = {Ying Wang and
Jing Hu and
Xiaohong Li and
Zhiyong Feng},
editor = {Xinheng Wang and
Honghao Gao and
Muddesar Iqbal and
Geyong Min},
title = {An Efficient Mutual Authentication Framework with Conditional Privacy
Protection in {VANET}},
booktitle = {Collaborative Computing: Networking, Applications and Worksharing
- 15th {EAI} International Conference, CollaborateCom 2019, London,
UK, August 19-22, 2019, Proceedings},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {292},
pages = {799--815},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-30146-0\_53},
doi = {10.1007/978-3-030-30146-0\_53},
timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/colcom/WangHLF19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ShangML19,
author = {Zhengyi Shang and
Maode Ma and
Xiaohong Li},
title = {A Certificateless Authentication Protocol for {D2D} Group Communications
in 5G Cellular Networks},
booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
HI, USA, December 9-13, 2019},
pages = {1--7},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/GLOBECOM38437.2019.9014047},
doi = {10.1109/GLOBECOM38437.2019.9014047},
timestamp = {Tue, 14 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/globecom/ShangML19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/WangGLF19,
author = {Chunyan Wang and
Weimin Ge and
Xiaohong Li and
Zhiyong Feng},
editor = {Igor V. Tetko and
Vera Kurkov{\'{a}} and
Pavel Karpov and
Fabian J. Theis},
title = {{DCT:} Differential Combination Testing of Deep Learning Systems},
booktitle = {Artificial Neural Networks and Machine Learning - {ICANN} 2019: Image
Processing - 28th International Conference on Artificial Neural Networks,
Munich, Germany, September 17-19, 2019, Proceedings, Part {III}},
series = {Lecture Notes in Computer Science},
volume = {11729},
pages = {697--710},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-30508-6\_55},
doi = {10.1007/978-3-030-30508-6\_55},
timestamp = {Tue, 17 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icann/WangGLF19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/GongXLFH19,
author = {Xi Gong and
Zhenchang Xing and
Xiaohong Li and
Zhiyong Feng and
Zhuobing Han},
editor = {Jun Pang and
Jing Sun},
title = {Joint Prediction of Multiple Vulnerability Characteristics Through
Multi-Task Learning},
booktitle = {24th International Conference on Engineering of Complex Computer Systems,
{ICECCS} 2019, Guangzhou, China, November 10-13, 2019},
pages = {31--40},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ICECCS.2019.00011},
doi = {10.1109/ICECCS.2019.00011},
timestamp = {Tue, 24 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iceccs/GongXLFH19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/XiaoXLG19,
author = {Hongbo Xiao and
Zhenchang Xing and
Xiaohong Li and
Hao Guo},
editor = {Tom Gedeon and
Kok Wai Wong and
Minho Lee},
title = {Embedding and Predicting Software Security Entity Relationships: {A}
Knowledge Graph Based Approach},
booktitle = {Neural Information Processing - 26th International Conference, {ICONIP}
2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part
{III}},
series = {Lecture Notes in Computer Science},
volume = {11955},
pages = {50--63},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-36718-3\_5},
doi = {10.1007/978-3-030-36718-3\_5},
timestamp = {Thu, 05 Aug 2021 17:55:45 +0200},
biburl = {https://dblp.org/rec/conf/iconip/XiaoXLG19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/Zhang0WYHL19,
author = {Shouli Zhang and
Chen Liu and
Jianwu Wang and
Zhongguo Yang and
Yanbo Han and
Xiaohong Li},
editor = {Sami Yangui and
Ismael Bouassida Rodriguez and
Khalil Drira and
Zahir Tari},
title = {Latency-Aware Deployment of IoT Services in a Cloud-Edge Environment},
booktitle = {Service-Oriented Computing - 17th International Conference, {ICSOC}
2019, Toulouse, France, October 28-31, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11895},
pages = {231--236},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-33702-5\_17},
doi = {10.1007/978-3-030-33702-5\_17},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icsoc/Zhang0WYHL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/WuD0YLFZ19,
author = {Hongyue Wu and
Shuiguang Deng and
Wei Li and
Jianwei Yin and
Xiaohong Li and
Zhiyong Feng and
Albert Y. Zomaya},
editor = {Elisa Bertino and
Carl K. Chang and
Peter Chen and
Ernesto Damiani and
Michael Goul and
Katsunori Oyama},
title = {Mobility-Aware Service Selection in Mobile Edge Computing Systems},
booktitle = {2019 {IEEE} International Conference on Web Services, {ICWS} 2019,
Milan, Italy, July 8-13, 2019},
pages = {201--208},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ICWS.2019.00042},
doi = {10.1109/ICWS.2019.00042},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icws/WuD0YLFZ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/ZhangYLLHM19,
author = {Zhongmei Zhang and
Jian Yu and
Xiaohong Li and
Chen Liu and
Yanbo Han and
Yunan Ma},
editor = {Elisa Bertino and
Carl K. Chang and
Peter Chen and
Ernesto Damiani and
Michael Goul and
Katsunori Oyama},
title = {A Data-Driven Service Creation Approach for Effectively Capturing
Events from Multiple Sensor Streams},
booktitle = {2019 {IEEE} International Conference on Web Services, {ICWS} 2019,
Milan, Italy, July 8-13, 2019},
pages = {346--354},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ICWS.2019.00063},
doi = {10.1109/ICWS.2019.00063},
timestamp = {Tue, 01 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icws/ZhangYLLHM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/XieMWLLL19,
author = {Xiaofei Xie and
Lei Ma and
Haijun Wang and
Yuekang Li and
Yang Liu and
Xiaohong Li},
editor = {Sarit Kraus},
title = {DiffChaser: Detecting Disagreements for Deep Neural Networks},
booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on
Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
2019},
pages = {5772--5778},
publisher = {ijcai.org},
year = {2019},
url = {https://doi.org/10.24963/ijcai.2019/800},
doi = {10.24963/IJCAI.2019/800},
timestamp = {Sun, 02 Nov 2025 21:27:16 +0100},
biburl = {https://dblp.org/rec/conf/ijcai/XieMWLLL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/LiLCXMF19,
author = {Hao Li and
Xiaohong Li and
Xiang Chen and
Xiaofei Xie and
Yanzhou Mu and
Zhiyong Feng},
title = {Cross-project Defect Prediction via ASTToken2Vec and BLSTM-based Neural
Network},
booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
Hungary, July 14-19, 2019},
pages = {1--8},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/IJCNN.2019.8852135},
doi = {10.1109/IJCNN.2019.8852135},
timestamp = {Thu, 23 Jun 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ijcnn/LiLCXMF19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/GuoCXMHLLZL19,
author = {Qianyu Guo and
Sen Chen and
Xiaofei Xie and
Lei Ma and
Qiang Hu and
Hongtao Liu and
Yang Liu and
Jianjun Zhao and
Xiaohong Li},
title = {An Empirical Study Towards Characterizing Deep Learning Development
and Deployment Across Different Frameworks and Platforms},
booktitle = {34th {IEEE/ACM} International Conference on Automated Software Engineering,
{ASE} 2019, San Diego, CA, USA, November 11-15, 2019},
pages = {810--822},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ASE.2019.00080},
doi = {10.1109/ASE.2019.00080},
timestamp = {Fri, 15 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/kbse/GuoCXMHLLZL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/XuGLFXB19,
author = {Yilin Xu and
Weimin Ge and
Xiaohong Li and
Zhiyong Feng and
Xiaofei Xie and
Yude Bai},
editor = {Dominique M{\'{e}}ry and
Shengchao Qin},
title = {A Co-Occurrence Recommendation Model of Software Security Requirement},
booktitle = {2019 International Symposium on Theoretical Aspects of Software Engineering,
{TASE} 2019, Guilin, China, July 29-31, 2019},
pages = {41--48},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/TASE.2019.00-21},
doi = {10.1109/TASE.2019.00-21},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/tase/XuGLFXB19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/HanMLFH19,
author = {Kaihong Han and
Maode Ma and
Xiaohong Li and
Zhiyong Feng and
Jianye Hao},
title = {An Efficient Handover Authentication Mechanism for 5G Wireless Network},
booktitle = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC}
2019, Marrakesh, Morocco, April 15-18, 2019},
pages = {1--8},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/WCNC.2019.8885915},
doi = {10.1109/WCNC.2019.8885915},
timestamp = {Tue, 17 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wcnc/HanMLFH19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-06727,
author = {Qianyu Guo and
Sen Chen and
Xiaofei Xie and
Lei Ma and
Qiang Hu and
Hongtao Liu and
Yang Liu and
Jianjun Zhao and
Xiaohong Li},
title = {An Empirical Study towards Characterizing Deep Learning Development
and Deployment across Different Frameworks and Platforms},
journal = {CoRR},
volume = {abs/1909.06727},
year = {2019},
url = {http://arxiv.org/abs/1909.06727},
eprinttype = {arXiv},
eprint = {1909.06727},
timestamp = {Fri, 15 Mar 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1909-06727.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LiCH18,
author = {Xiaohong Li and
Ru Cao and
Jianye Hao},
title = {An Adaptive Learning Based Network Selection Approach for 5G Dynamic
Environments},
journal = {Entropy},
volume = {20},
number = {4},
pages = {236},
year = {2018},
url = {https://doi.org/10.3390/e20040236},
doi = {10.3390/E20040236},
timestamp = {Fri, 25 Dec 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/entropy/LiCH18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiLFXF18,
author = {Xiaohong Li and
Feng Liu and
Zhiyong Feng and
Guangquan Xu and
Zhangjie Fu},
title = {A novel optimized vertical handover framework for seamless networking
integration in cyber-enabled systems},
journal = {Future Gener. Comput. Syst.},
volume = {79},
pages = {417--430},
year = {2018},
url = {https://doi.org/10.1016/j.future.2017.03.031},
doi = {10.1016/J.FUTURE.2017.03.031},
timestamp = {Wed, 18 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/fgcs/LiLFXF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangLSHL18,
author = {Shouli Zhang and
Chen Liu and
Shen Su and
Yanbo Han and
Xiaohong Li},
title = {A feature extraction method for predictive maintenance with time-lagged
correlation-based curve-registration model},
journal = {Int. J. Netw. Manag.},
volume = {28},
number = {5},
year = {2018},
url = {https://doi.org/10.1002/nem.2025},
doi = {10.1002/NEM.2025},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijnm/ZhangLSHL18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HanLHF18,
author = {Zhuobing Han and
Xiaohong Li and
Keman Huang and
Zhiyong Feng},
title = {A Software Defined Network-Based Security Assessment Framework for
CloudIoT},
journal = {{IEEE} Internet Things J.},
volume = {5},
number = {3},
pages = {1424--1434},
year = {2018},
url = {https://doi.org/10.1109/JIOT.2018.2801944},
doi = {10.1109/JIOT.2018.2801944},
timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iotj/HanLHF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/WangXZLF18,
author = {Ran Wang and
Guangquan Xu and
Xianjiao Zeng and
Xiaohong Li and
Zhiyong Feng},
title = {{TT-XSS:} {A} novel taint tracking based dynamic detection framework
for {DOM} Cross-Site Scripting},
journal = {J. Parallel Distributed Comput.},
volume = {118},
number = {Part},
pages = {100--106},
year = {2018},
url = {https://doi.org/10.1016/j.jpdc.2017.07.006},
doi = {10.1016/J.JPDC.2017.07.006},
timestamp = {Tue, 23 Mar 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jpdc/WangXZLF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/HaoKSWMLM18,
author = {Jianye Hao and
Eunsuk Kang and
Jun Sun and
Zan Wang and
Zhaopeng Meng and
Xiaohong Li and
Zhong Ming},
title = {An Adaptive Markov Strategy for Defending Smart Grid False Data Injection
From Malicious Attackers},
journal = {{IEEE} Trans. Smart Grid},
volume = {9},
number = {4},
pages = {2398--2408},
year = {2018},
url = {https://doi.org/10.1109/TSG.2016.2610582},
doi = {10.1109/TSG.2016.2610582},
timestamp = {Tue, 17 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tsg/HaoKSWMLM18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhangLZLH18,
author = {Zhongmei Zhang and
Chen Liu and
Shouli Zhang and
Xiaohong Li and
Yanbo Han},
title = {A Service-Based Method for Multiple Sensor Streams Aggregation in
Fog Computing},
journal = {Wirel. Commun. Mob. Comput.},
volume = {2018},
pages = {8475604:1--8475604:11},
year = {2018},
url = {https://doi.org/10.1155/2018/8475604},
doi = {10.1155/2018/8475604},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/wicomm/ZhangLZLH18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/ZhangLHSXF18,
author = {Chengwei Zhang and
Xiaohong Li and
Jianye Hao and
Sandip Sen and
Wanli Xue and
Zhiyong Feng},
editor = {Elisabeth Andr{\'{e}} and
Sven Koenig and
Mehdi Dastani and
Gita Sukthankar},
title = {The Dynamics of Opinion Evolution in Gossiper-Media Model with WoLS-CALA
Learning},
booktitle = {Proceedings of the 17th International Conference on Autonomous Agents
and MultiAgent Systems, {AAMAS} 2018, Stockholm, Sweden, July 10-15,
2018},
pages = {2159--2161},
publisher = {International Foundation for Autonomous Agents and Multiagent Systems
Richland, SC, {USA} / {ACM}},
year = {2018},
url = {http://dl.acm.org/citation.cfm?id=3238105},
timestamp = {Sat, 30 Sep 2023 09:34:53 +0200},
biburl = {https://dblp.org/rec/conf/atal/ZhangLHSXF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/ZhangLHCTF18,
author = {Chengwei Zhang and
Xiaohong Li and
Jianye Hao and
Siqi Chen and
Karl Tuyls and
Zhiyong Feng},
editor = {Elisabeth Andr{\'{e}} and
Sven Koenig and
Mehdi Dastani and
Gita Sukthankar},
title = {SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions},
booktitle = {Proceedings of the 17th International Conference on Autonomous Agents
and MultiAgent Systems, {AAMAS} 2018, Stockholm, Sweden, July 10-15,
2018},
pages = {2162--2164},
publisher = {International Foundation for Autonomous Agents and Multiagent Systems
Richland, SC, {USA} / {ACM}},
year = {2018},
url = {http://dl.acm.org/citation.cfm?id=3238106},
timestamp = {Wed, 20 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/atal/ZhangLHCTF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Zhang0LCXL18,
author = {Haitao Zhang and
Guoqiang Li and
Xiaohong Li and
Zhuo Cheng and
Jinyun Xue and
Shaoying Liu},
editor = {Michel Chaudron and
Ivica Crnkovic and
Marsha Chechik and
Mark Harman},
title = {An efficient approach for verifying automobile distributed application
systems on timing property},
booktitle = {Proceedings of the 40th International Conference on Software Engineering:
Companion Proceeedings, {ICSE} 2018, Gothenburg, Sweden, May 27 -
June 03, 2018},
pages = {230--231},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3183440.3194945},
doi = {10.1145/3183440.3194945},
timestamp = {Tue, 10 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icse/Zhang0LCXL18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/ZhangLLH18,
author = {Zhongmei Zhang and
Chen Liu and
Xiaohong Li and
Yanbo Han},
editor = {Claus Pahl and
Maja Vukovic and
Jianwei Yin and
Qi Yu},
title = {A Service-Based Declarative Approach for Capturing Events from Multiple
Sensor Streams},
booktitle = {Service-Oriented Computing - 16th International Conference, {ICSOC}
2018, Hangzhou, China, November 12-15, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11236},
pages = {255--263},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-03596-9\_17},
doi = {10.1007/978-3-030-03596-9\_17},
timestamp = {Mon, 26 Jun 2023 20:44:14 +0200},
biburl = {https://dblp.org/rec/conf/icsoc/ZhangLLH18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/ZhangLHL18,
author = {Shouli Zhang and
Chen Liu and
Yanbo Han and
Xiaohong Li},
title = {Seamless Integration of Cloud and Edge with a Service-Based Approach},
booktitle = {2018 {IEEE} International Conference on Web Services, {ICWS} 2018,
San Francisco, CA, USA, July 2-7, 2018},
pages = {155--162},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/ICWS.2018.00027},
doi = {10.1109/ICWS.2018.00027},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icws/ZhangLHL18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pricai/LiuZYHLB18,
author = {Wanshu Liu and
Chengwei Zhang and
Tianpei Yang and
Jianye Hao and
Xiaohong Li and
Zhijie Bao},
editor = {Xin Geng and
Byeong{-}Ho Kang},
title = {Achieving Multiagent Coordination Through CALA-rFMQ Learning in Continuous
Action Space},
booktitle = {{PRICAI} 2018: Trends in Artificial Intelligence - 15th Pacific Rim
International Conference on Artificial Intelligence, Nanjing, China,
August 28-31, 2018, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {11013},
pages = {132--139},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-97310-4\_15},
doi = {10.1007/978-3-319-97310-4\_15},
timestamp = {Tue, 05 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/pricai/LiuZYHLB18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWLHF18,
author = {Gaosheng Liu and
Xin Wang and
Xiaohong Li and
Jianye Hao and
Zhiyong Feng},
title = {{ESRQ:} An Efficient Secure Routing Method in Wireless Sensor Networks
Based on Q-Learning},
booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy
In Computing And Communications / 12th {IEEE} International Conference
On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
York, NY, USA, August 1-3, 2018},
pages = {149--155},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00032},
doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00032},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/LiuWLHF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HanLLXF18,
author = {Zhuobing Han and
Xiaohong Li and
Hongtao Liu and
Zhenchang Xing and
Zhiyong Feng},
editor = {Rocco Oliveto and
Massimiliano Di Penta and
David C. Shepherd},
title = {DeepWeak: Reasoning common software weaknesses via knowledge graph
embedding},
booktitle = {25th International Conference on Software Analysis, Evolution and
Reengineering, {SANER} 2018, Campobasso, Italy, March 20-23, 2018},
pages = {456--466},
publisher = {{IEEE} Computer Society},
year = {2018},
url = {https://doi.org/10.1109/SANER.2018.8330232},
doi = {10.1109/SANER.2018.8330232},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/wcre/HanLLXF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-03021,
author = {Chengwei Zhang and
Xiaohong Li and
Jianye Hao and
Siqi Chen and
Karl Tuyls and
Wanli Xue},
title = {{SA-IGA:} {A} Multiagent Reinforcement Learning Method Towards Socially
Optimal Outcomes},
journal = {CoRR},
volume = {abs/1803.03021},
year = {2018},
url = {http://arxiv.org/abs/1803.03021},
eprinttype = {arXiv},
eprint = {1803.03021},
timestamp = {Wed, 20 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1803-03021.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-06625,
author = {Chengwei Zhang and
Xiaohong Li and
Jianye Hao and
Siqi Chen and
Karl Tuyls and
Zhiyong Feng and
Wanli Xue and
Rong Chen},
title = {SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions},
journal = {CoRR},
volume = {abs/1809.06625},
year = {2018},
url = {http://arxiv.org/abs/1809.06625},
eprinttype = {arXiv},
eprint = {1809.06625},
timestamp = {Wed, 25 Jan 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-1809-06625.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-05187,
author = {Qianyu Guo and
Xiaofei Xie and
Lei Ma and
Qiang Hu and
Ruitao Feng and
Li Li and
Yang Liu and
Jianjun Zhao and
Xiaohong Li},
title = {An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms},
journal = {CoRR},
volume = {abs/1811.05187},
year = {2018},
url = {http://arxiv.org/abs/1811.05187},
eprinttype = {arXiv},
eprint = {1811.05187},
timestamp = {Wed, 24 May 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1811-05187.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XuCRLF17,
author = {Guangquan Xu and
Yan Cao and
Yuanyuan Ren and
Xiaohong Li and
Zhiyong Feng},
title = {Network Security Situation Awareness Based on Semantic Ontology and
User-Defined Rules for Internet of Things},
journal = {{IEEE} Access},
volume = {5},
pages = {21046--21056},
year = {2017},
url = {https://doi.org/10.1109/ACCESS.2017.2734681},
doi = {10.1109/ACCESS.2017.2734681},
timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/access/XuCRLF17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/biomedsem/ZhangLLF17,
author = {Chengwei Zhang and
Xiaohong Li and
Shuxin Li and
Zhiyong Feng},
title = {Dynamically analyzing cell interactions in biological environments
using multiagent social learning framework},
journal = {J. Biomed. Semant.},
volume = {8-S},
number = {1},
pages = {43--52},
year = {2017},
url = {https://doi.org/10.1186/s13326-017-0142-0},
doi = {10.1186/S13326-017-0142-0},
timestamp = {Tue, 10 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/biomedsem/ZhangLLF17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GuoLXF17,
author = {Qi Guo and
Xiaohong Li and
Guangquan Xu and
Zhiyong Feng},
title = {{MP-MID:} Multi-Protocol Oriented Middleware-level Intrusion Detection
method for wireless sensor networks},
journal = {Future Gener. Comput. Syst.},
volume = {70},
pages = {42--47},
year = {2017},
url = {https://doi.org/10.1016/j.future.2016.06.010},
doi = {10.1016/J.FUTURE.2016.06.010},
timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/fgcs/GuoLXF17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/WangXLCL17,
author = {Ran Wang and
Guangquan Xu and
Bin Liu and
Yan Cao and
Xiaohong Li},
title = {Flow Watermarking for Antinoise and Multistream Tracing in Anonymous
Networks},
journal = {{IEEE} Multim.},
volume = {24},
number = {4},
pages = {38--47},
year = {2017},
url = {https://doi.org/10.1109/MMUL.2017.4031314},
doi = {10.1109/MMUL.2017.4031314},
timestamp = {Mon, 20 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieeemm/WangXLCL17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XuZXLLRLFZ17,
author = {Guangquan Xu and
Gaoxu Zhang and
Chao Xu and
Bin Liu and
Mingquan Li and
Yan Ren and
Xiaohong Li and
Zhiyong Feng and
Degan Zhang},
title = {A multi-attribute rating based trust model: improving the personalized
trust modeling framework},
journal = {Multim. Tools Appl.},
volume = {76},
number = {4},
pages = {5833--5849},
year = {2017},
url = {https://doi.org/10.1007/s11042-015-2539-z},
doi = {10.1007/S11042-015-2539-Z},
timestamp = {Wed, 14 Aug 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/mta/XuZXLLRLFZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/LinFCHTL17,
author = {Jianrui Lin and
Zhiyong Feng and
Shizhan Chen and
Keman Huang and
Wei Tan and
Xiaohong Li},
editor = {Xiaoqing (Frank) Liu and
Umesh Bellur},
title = {{ATM:} {A} Framework to Support Application State Migration in Multiple
Terminals Environment},
booktitle = {2017 {IEEE} International Conference on Services Computing, {SCC}
2017, Honolulu, HI, USA, June 25-30, 2017},
pages = {188--195},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/SCC.2017.31},
doi = {10.1109/SCC.2017.31},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEscc/LinFCHTL17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/LiLHFA17,
author = {Xiaohong Li and
Shuxin Li and
Jianye Hao and
Zhiyong Feng and
Bo An},
editor = {Satinder Singh and
Shaul Markovitch},
title = {Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack},
booktitle = {Proceedings of the Thirty-First {AAAI} Conference on Artificial Intelligence,
February 4-9, 2017, San Francisco, California, {USA}},
pages = {593--599},
publisher = {{AAAI} Press},
year = {2017},
url = {https://doi.org/10.1609/aaai.v31i1.10565},
doi = {10.1609/AAAI.V31I1.10565},
timestamp = {Tue, 10 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/aaai/LiLHFA17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhangLWS17,
author = {Shouli Zhang and
Xiaohong Li and
Jianwu Wang and
Shen Su},
editor = {Imed Romdhani and
Lei Shu and
Takahiro Hara and
Zhangbing Zhou and
Timothy J. Gordon and
Deze Zeng},
title = {Curve-Registration-Based Feature Extraction for Predictive Maintenance
of Industrial Equipment},
booktitle = {Collaborative Computing: Networking, Applications and Worksharing
- 13th International Conference, CollaborateCom 2017, Edinburgh, UK,
December 11-13, 2017, Proceedings},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {252},
pages = {253--263},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-030-00916-8\_24},
doi = {10.1007/978-3-030-00916-8\_24},
timestamp = {Tue, 03 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/colcom/ZhangLWS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/LiCHF17,
author = {Xiaohong Li and
Ru Cao and
Jianye Hao and
Zhiyong Feng},
editor = {Alessandra Lintas and
Stefano Rovetta and
Paul F. M. J. Verschure and
Alessandro E. P. Villa},
title = {A Prediction and Learning Based Approach to Network Selection in Dynamic
Environments},
booktitle = {Artificial Neural Networks and Machine Learning - {ICANN} 2017 - 26th
International Conference on Artificial Neural Networks, Alghero, Italy,
September 11-14, 2017, Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
volume = {10613},
pages = {92--100},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-68600-4\_12},
doi = {10.1007/978-3-319-68600-4\_12},
timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icann/LiCHF17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/YangLFH17,
author = {Wei Yang and
Xiaohong Li and
Zhiyong Feng and
Jianye Hao},
title = {TLSsem: {A} {TLS} Security-Enhanced Mechanism against {MITM} Attacks
in Public WiFis},
booktitle = {22nd International Conference on Engineering of Complex Computer Systems,
{ICECCS} 2017, Fukuoka, Japan, November 5-8, 2017},
pages = {30--39},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/ICECCS.2017.24},
doi = {10.1109/ICECCS.2017.24},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iceccs/YangLFH17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/LiuLFH17,
author = {Yunhao Liu and
Xiaohong Li and
Zhiyong Feng and
Jianye Hao},
editor = {Zhenhua Duan and
Luke Ong},
title = {An Improved Android Collusion Attack Detection Method Based on Program
Slicing},
booktitle = {Formal Methods and Software Engineering - 19th International Conference
on Formal Engineering Methods, {ICFEM} 2017, Xi'an, China, November
13-17, 2017, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10610},
pages = {315--331},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-68690-5\_19},
doi = {10.1007/978-3-319-68690-5\_19},
timestamp = {Tue, 20 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icfem/LiuLFH17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/HanLXLF17,
author = {Zhuobing Han and
Xiaohong Li and
Zhenchang Xing and
Hongtao Liu and
Zhiyong Feng},
title = {Learning to Predict Severity of Software Vulnerability Using Only
Vulnerability Description},
booktitle = {2017 {IEEE} International Conference on Software Maintenance and Evolution,
{ICSME} 2017, Shanghai, China, September 17-22, 2017},
pages = {125--136},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/ICSME.2017.52},
doi = {10.1109/ICSME.2017.52},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icsm/HanLXLF17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/ZhangLLSH17,
author = {Zhongmei Zhang and
Xiaohong Li and
Chen Liu and
Shen Su and
Yanbo Han},
editor = {Ilkay Altintas and
Shiping Chen},
title = {A Service-Based Approach to Situational Correlation and Analyses of
Stream Sensor Data},
booktitle = {2017 {IEEE} International Conference on Web Services, {ICWS} 2017,
Honolulu, HI, USA, June 25-30, 2017},
pages = {572--579},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/ICWS.2017.67},
doi = {10.1109/ICWS.2017.67},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icws/ZhangLLSH17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/LiLHAFCZ17,
author = {Shuxin Li and
Xiaohong Li and
Jianye Hao and
Bo An and
Zhiyong Feng and
Kangjie Chen and
Chengwei Zhang},
editor = {Carles Sierra},
title = {Defending Against Man-In-The-Middle Attack in Repeated Games},
booktitle = {Proceedings of the Twenty-Sixth International Joint Conference on
Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
19-25, 2017},
pages = {3742--3748},
publisher = {ijcai.org},
year = {2017},
url = {https://doi.org/10.24963/ijcai.2017/523},
doi = {10.24963/IJCAI.2017/523},
timestamp = {Tue, 10 Jun 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ijcai/LiLHAFCZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/HeLFHWZ17,
author = {Huijuan He and
Xiaohong Li and
Zhiyong Feng and
Jianye Hao and
Xiaofei Wang and
Haijun Zhang},
title = {An Adaptive Handover Trigger Strategy for 5G {C/U} Plane Split Heterogeneous
Network},
booktitle = {14th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems,
{MASS} 2017, Orlando, FL, USA, October 22-25, 2017},
pages = {476--480},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/MASS.2017.28},
doi = {10.1109/MASS.2017.28},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/mass/HeLFHWZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiLHXFX17,
author = {Hongbo Li and
Xiaohong Li and
Jianye Hao and
Guangquan Xu and
Zhiyong Feng and
Xiaofei Xie},
title = {{FESR:} {A} Framework for Eliciting Security Requirements Based on
Integration of Common Criteria and Weakness Detection Formal Model},
booktitle = {2017 {IEEE} International Conference on Software Quality, Reliability
and Security, {QRS} 2017, Prague, Czech Republic, July 25-29, 2017},
pages = {352--363},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/QRS.2017.45},
doi = {10.1109/QRS.2017.45},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/qrs/LiLHXFX17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/WangLFHXH17,
author = {Jiangjuan Wang and
Xiaohong Li and
Zhiyong Feng and
Jianye Hao and
Guangquan Xu and
Zhuobing Han},
editor = {Xudong He},
title = {Automated Software Security Requirements Recommendation Based on {FT-SR}
Model},
booktitle = {The 29th International Conference on Software Engineering and Knowledge
Engineering, Wyndham Pittsburgh University Center, Pittsburgh, PA,
USA, July 5-7, 2017},
pages = {382--385},
publisher = {{KSI} Research Inc. and Knowledge Systems Institute Graduate School},
year = {2017},
url = {https://doi.org/10.18293/SEKE2017-040},
doi = {10.18293/SEKE2017-040},
timestamp = {Wed, 03 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/seke/WangLFHXH17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/XieCZLLL17,
author = {Xiaofei Xie and
Bihuan Chen and
Liang Zou and
Shang{-}Wei Lin and
Yang Liu and
Xiaohong Li},
editor = {Eric Bodden and
Wilhelm Sch{\"{a}}fer and
Arie van Deursen and
Andrea Zisman},
title = {Loopster: static loop termination analysis},
booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
pages = {84--94},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3106237.3106260},
doi = {10.1145/3106237.3106260},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sigsoft/XieCZLLL17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/XuRHLF16,
author = {Guangquan Xu and
Yuanyuan Ren and
Yuanbin Han and
Xiaohong Li and
Zhiyong Feng},
title = {Privacy Protection Method Based on Two-Factor Authentication Protocol
in {FRID} Systems},
journal = {{IEICE} Trans. Inf. Syst.},
volume = {99-D},
number = {8},
pages = {2019--2026},
year = {2016},
url = {https://doi.org/10.1587/transinf.2015INP0007},
doi = {10.1587/TRANSINF.2015INP0007},
timestamp = {Sat, 11 Apr 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/XuRHLF16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/LiXXHLFG16,
author = {Xiaohong Li and
Jiayi Xu and
Guangquan Xu and
Jianye Hao and
Xiaoru Li and
Zhiyong Feng and
Honghao Gao},
title = {Fepchecker: An Automatic Model Checker for Verifying Fairness and
Non-Repudiation of Security Protocols in Web Service},
journal = {Int. J. Softw. Eng. Knowl. Eng.},
volume = {26},
number = {4},
pages = {563--586},
year = {2016},
url = {https://doi.org/10.1142/S0218194016400027},
doi = {10.1142/S0218194016400027},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijseke/LiXXHLFG16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/XuCZZLF16,
author = {Guangquan Xu and
Yan Cao and
Yao Zhang and
Gaoxu Zhang and
Xiaohong Li and
Zhiyong Feng},
editor = {Jie Zhang and
Zeinab Noorian and
Stephen Marsh},
title = {{TRM:} Computing Reputation Score by Mining Reviews},
booktitle = {Incentives and Trust in Electronic Communities, Papers from the 2016
{AAAI} Workshop, Phoenix, Arizona, USA, February 12, 2016},
series = {{AAAI} Technical Report},
volume = {{WS-16-09}},
publisher = {{AAAI} Press},
year = {2016},
url = {http://www.aaai.org/ocs/index.php/WS/AAAIW16/paper/view/12560},
timestamp = {Thu, 18 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/aaai/XuCZZLF16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/ZhangLLH16,
author = {Chengwei Zhang and
Xiaohong Li and
Shuxin Li and
Jianye Hao},
editor = {Tianhai Tian and
Qinghua Jiang and
Yunlong Liu and
Kevin Burrage and
Jiangning Song and
Yadong Wang and
Xiaohua Hu and
Shinichi Morishita and
Qian Zhu and
Guohua Wang},
title = {Dynamic analysis of cell interactions in biological environments under
multiagent social learning framework},
booktitle = {{IEEE} International Conference on Bioinformatics and Biomedicine,
{BIBM} 2016, Shenzhen, China, December 15-18, 2016},
pages = {1673--1678},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/BIBM.2016.7822770},
doi = {10.1109/BIBM.2016.7822770},
timestamp = {Tue, 21 Oct 2025 08:27:38 +0200},
biburl = {https://dblp.org/rec/conf/bibm/ZhangLLH16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/LiZHTCF16,
author = {Xiaohong Li and
Chengwei Zhang and
Jianye Hao and
Karl Tuyls and
Siqi Chen and
Zhiyong Feng},
editor = {Gal A. Kaminka and
Maria Fox and
Paolo Bouquet and
Eyke H{\"{u}}llermeier and
Virginia Dignum and
Frank Dignum and
Frank van Harmelen},
title = {Socially-Aware Multiagent Learning: Towards Socially Optimal Outcomes},
booktitle = {{ECAI} 2016 - 22nd European Conference on Artificial Intelligence,
29 August-2 September 2016, The Hague, The Netherlands - Including
Prestigious Applications of Artificial Intelligence {(PAIS} 2016)},
series = {Frontiers in Artificial Intelligence and Applications},
volume = {285},
pages = {533--541},
publisher = {{IOS} Press},
year = {2016},
url = {https://doi.org/10.3233/978-1-61499-672-9-533},
doi = {10.3233/978-1-61499-672-9-533},
timestamp = {Wed, 15 Jan 2025 15:02:28 +0100},
biburl = {https://dblp.org/rec/conf/ecai/LiZHTCF16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/ZhangLFX16,
author = {Xin Zhang and
Xiaohong Li and
Zhiyong Feng and
Guangquan Xu},
editor = {Hai Wang and
Mounir Mokhtari},
title = {Universal Analysis and Detection Framework for Location Aided Routing},
booktitle = {21st International Conference on Engineering of Complex Computer Systems,
{ICECCS} 2016, Dubai, United Arab Emirates, November 6-8, 2016},
pages = {145--154},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/ICECCS.2016.026},
doi = {10.1109/ICECCS.2016.026},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iceccs/ZhangLFX16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SunL16,
author = {Da{-}Zhi Sun and
Xiao{-}Hong Li},
editor = {Kwok{-}Yan Lam and
Chi{-}Hung Chi and
Sihan Qing},
title = {Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation
Scheme for Security Modes 2 and 3},
booktitle = {Information and Communications Security - 18th International Conference,
{ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9977},
pages = {403--417},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-50011-9\_31},
doi = {10.1007/978-3-319-50011-9\_31},
timestamp = {Tue, 21 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icics/SunL16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/XieCLLL16,
author = {Xiaofei Xie and
Bihuan Chen and
Yang Liu and
Wei Le and
Xiaohong Li},
editor = {Thomas Zimmermann and
Jane Cleland{-}Huang and
Zhendong Su},
title = {Proteus: computing disjunctive loop summary via path dependency analysis},
booktitle = {Proceedings of the 24th {ACM} {SIGSOFT} International Symposium on
Foundations of Software Engineering, {FSE} 2016, Seattle, WA, USA,
November 13-18, 2016},
pages = {61--72},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2950290.2950340},
doi = {10.1145/2950290.2950340},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sigsoft/XieCLLL16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofl/ZhaoLXFH16,
author = {Ren Zhao and
Xiaohong Li and
Guangquan Xu and
Zhiyong Feng and
Jianye Hao},
editor = {Shaoying Liu and
Zhenhua Duan and
Cong Tian and
Fumiko Nagoya},
title = {{E-SSL:} An {SSL} Security-Enhanced Method for Bypassing {MITM} Attacks
in Mobile Internet},
booktitle = {Structured Object-Oriented Formal Language and Method - 6th International
Workshop, {SOFL+MSVL} 2016, Tokyo, Japan, November 15, 2016, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {10189},
pages = {101--120},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-57708-1\_7},
doi = {10.1007/978-3-319-57708-1\_7},
timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sofl/ZhaoLXFH16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangLHF16,
author = {Kunding Fang and
Xiaohong Li and
Jianye Hao and
Zhiyong Feng},
title = {Formal Modeling and Verification of Security Protocols on Cloud Computing
Systems Based on {UML} 2.3},
booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
2016},
pages = {852--859},
publisher = {{IEEE}},
year = {2016},
url = {https://doi.org/10.1109/TrustCom.2016.0148},
doi = {10.1109/TRUSTCOM.2016.0148},
timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/FangLHF16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/WangSWLSDYL15,
author = {Ting Wang and
Jun Sun and
Xinyu Wang and
Yang Liu and
Yuanjie Si and
Jin Song Dong and
Xiaohu Yang and
Xiaohong Li},
title = {A Systematic Study on Explicit-State Non-Zenoness Checking for Timed
Automata},
journal = {{IEEE} Trans. Software Eng.},
volume = {41},
number = {1},
pages = {3--18},
year = {2015},
url = {https://doi.org/10.1109/TSE.2014.2359893},
doi = {10.1109/TSE.2014.2359893},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tse/WangSWLSDYL15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/HanLS15,
author = {Zhuobing Han and
Xiaohong Li and
Eleni Stroulia},
title = {A Hierarchical Security-Auditing Methodology for Cloud Computing},
booktitle = {2015 {IEEE} International Conference on Services Computing, {SCC}
2015, New York City, NY, USA, June 27 - July 2, 2015},
pages = {202--209},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/SCC.2015.36},
doi = {10.1109/SCC.2015.36},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEscc/HanLS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/HanMGMLS15,
author = {Zhuobing Han and
Mathieu M{\'{e}}rineau and
Fran{\c{c}}ois Gauthier and
Ettore Merlo and
Xiaohong Li and
Eleni Stroulia},
editor = {Jordan Gould and
Marin Litoiu and
Hanan Lutfiyya},
title = {Evolutionary analysis of access control models: a formal concept analysis
method},
booktitle = {Proceedings of 25th Annual International Conference on Computer Science
and Software Engineering, {CASCON} 2015, Markham, Ontario, Canada,
2-4 November, 2015},
pages = {261--264},
publisher = {{IBM} / {ACM}},
year = {2015},
url = {http://dl.acm.org/citation.cfm?id=2886489},
timestamp = {Fri, 24 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cascon/HanMGMLS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/XuLRHZFL15,
author = {Guangquan Xu and
Bin Liu and
Yuanyuan Ren and
Runhe Huang and
Gaoxu Zhang and
Zhiyong Feng and
Xiaohong Li},
title = {Towards Trustworthy Participants in Social Participatory Networks},
booktitle = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing,
CSCloud 2015, New York, NY, USA, November 3-5, 2015},
pages = {194--199},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/CSCloud.2015.55},
doi = {10.1109/CSCLOUD.2015.55},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/cscloud/XuLRHZFL15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/GuoLFX15,
author = {Qi Guo and
Xiaohong Li and
Zhiyong Feng and
Guangquan Xu},
title = {{MPOID:} Multi-protocol Oriented Intrusion Detection Method for Wireless
Sensor Networks},
booktitle = {17th {IEEE} International Conference on High Performance Computing
and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
Conference on Embedded Software and Systems, {ICESS} 2015, New York,
NY, USA, August 24-26, 2015},
pages = {1512--1517},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.283},
doi = {10.1109/HPCC-CSS-ICESS.2015.283},
timestamp = {Thu, 19 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/hpcc/GuoLFX15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/XuRLZLF15,
author = {Guangquan Xu and
Yuanyuan Ren and
Bin Liu and
Gaoxu Zhang and
Xiaohong Li and
Zhiyong Feng},
editor = {Guojun Wang and
Albert Y. Zomaya and
Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
Kenli Li},
title = {{PEM4RFID:} Privacy Enhancement Model for {RFID} Systems},
booktitle = {Algorithms and Architectures for Parallel Processing - 15th International
Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015.
Proceedings, Part {III}},
series = {Lecture Notes in Computer Science},
volume = {9530},
pages = {682--694},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-27137-8\_49},
doi = {10.1007/978-3-319-27137-8\_49},
timestamp = {Sat, 06 Aug 2022 22:05:44 +0200},
biburl = {https://dblp.org/rec/conf/ica3pp/XuRLZLF15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/GengLFS15,
author = {Shaoguang Geng and
Xiaohong Li and
Zhiyong Feng and
Da{-}Zhi Sun},
title = {Web Application Architecture Security Evaluation Method Based on {AADL}},
booktitle = {20th International Conference on Engineering of Complex Computer Systems,
{ICECCS} 2015, Gold Coast, Australia, December 9-12, 2015},
pages = {186--189},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/ICECCS.2015.29},
doi = {10.1109/ICECCS.2015.29},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iceccs/GengLFS15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/XieLLLC15,
author = {Xiaofei Xie and
Yang Liu and
Wei Le and
Xiaohong Li and
Hongxu Chen},
editor = {Michal Young and
Tao Xie},
title = {S-looper: automatic summarization for multipath string loops},
booktitle = {Proceedings of the 2015 International Symposium on Software Testing
and Analysis, {ISSTA} 2015, Baltimore, MD, USA, July 12-17, 2015},
pages = {188--198},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2771783.2771815},
doi = {10.1145/2771783.2771815},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/issta/XieLLLC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TianLHXF15,
author = {Dongdong Tian and
Xiaohong Li and
Jing Hu and
Guangquan Xu and
Zhiyong Feng},
editor = {Bhavani Thuraisingham and
XiaoFeng Wang and
Vinod Yegneswaran},
title = {{POSTER:} API-Level Multi-policy Access Control Enforcement for Android
Middleware},
booktitle = {Security and Privacy in Communication Networks - 11th International
Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
Revised Selected Papers},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {164},
pages = {559--562},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-28865-9\_30},
doi = {10.1007/978-3-319-28865-9\_30},
timestamp = {Wed, 29 Jun 2022 15:37:43 +0200},
biburl = {https://dblp.org/rec/conf/securecomm/TianLHXF15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongLHXF15,
author = {Jiaojiao Song and
Xiaohong Li and
Jing Hu and
Guangquan Xu and
Zhiyong Feng},
title = {Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor},
booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
2015, Volume 1},
pages = {33--40},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/Trustcom.2015.354},
doi = {10.1109/TRUSTCOM.2015.354},
timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/trustcom/SongLHXF15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/XuRZLLF15,
author = {Guangquan Xu and
Yan Ren and
Gaoxu Zhang and
Bin Liu and
Xiaohong Li and
Zhiyong Feng},
title = {HyCPK: Securing Identity Authentication in Ubiquitous Computing},
booktitle = {2015 {IEEE} 12th Intl Conf on Ubiquitous Intelligence and Computing
and 2015 {IEEE} 12th Intl Conf on Autonomic and Trusted Computing
and 2015 {IEEE} 15th Intl Conf on Scalable Computing and Communications
and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, August
10-14, 2015},
pages = {239--246},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.56},
doi = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP.2015.56},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/uic/XuRZLLF15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/ZhangLHFS14,
author = {Chengwei Zhang and
Xiaohong Li and
Jing Hu and
Zhiyong Feng and
Jiaojiao Song},
title = {Formal Modeling and Analysis of Fairness Characterization of E-Commerce
Protocols},
journal = {J. Appl. Math.},
volume = {2014},
pages = {138370:1--138370:10},
year = {2014},
url = {https://doi.org/10.1155/2014/138370},
doi = {10.1155/2014/138370},
timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jam/ZhangLHFS14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/LiLXHF14,
author = {Xiaoru Li and
Xiaohong Li and
Guangquan Xu and
Jing Hu and
Zhiyong Feng},
title = {Formal Analysis of Fairness for Optimistic Multiparty Contract Signing
Protocol},
journal = {J. Appl. Math.},
volume = {2014},
pages = {983204:1--983204:10},
year = {2014},
url = {https://doi.org/10.1155/2014/983204},
doi = {10.1155/2014/983204},
timestamp = {Thu, 24 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jam/LiLXHF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiHFX14,
author = {Xiaohong Li and
Ke He and
Zhiyong Feng and
Guangquan Xu},
title = {Unified threat model for analyzing and evaluating software threats},
journal = {Secur. Commun. Networks},
volume = {7},
number = {10},
pages = {1454--1466},
year = {2014},
url = {https://doi.org/10.1002/sec.599},
doi = {10.1002/SEC.599},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/scn/LiHFX14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/ShenLFXHF14,
author = {Gang Shen and
Xiaohong Li and
Ruitao Feng and
Guangquan Xu and
Jing Hu and
Zhiyong Feng},
title = {An Extended {UML} Method for the Verification of Security Protocols},
booktitle = {2014 19th International Conference on Engineering of Complex Computer
Systems, Tianjin, China, August 4-7, 2014},
pages = {19--28},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/ICECCS.2014.12},
doi = {10.1109/ICECCS.2014.12},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iceccs/ShenLFXHF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/WuLFXHF14,
author = {Xiaofei Wu and
Xiaohong Li and
Ruitao Feng and
Guangquan Xu and
Jing Hu and
Zhiyong Feng},
title = {{OOPN-SRAM:} {A} Novel Method for Software Risk Assessment},
booktitle = {2014 19th International Conference on Engineering of Complex Computer
Systems, Tianjin, China, August 4-7, 2014},
pages = {150--153},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/ICECCS.2014.28},
doi = {10.1109/ICECCS.2014.28},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iceccs/WuLFXHF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JiaoLZXF14,
author = {Haofeng Jiao and
Xiaohong Li and
Lei Zhang and
Guangquan Xu and
Zhiyong Feng},
editor = {Jing Tian and
Jiwu Jing and
Mudhakar Srivatsa},
title = {Hybrid Detection Using Permission Analysis for Android Malware},
booktitle = {International Conference on Security and Privacy in Communication
Networks - 10th International {ICST} Conference, SecureComm 2014,
Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
{I}},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
and Telecommunications Engineering},
volume = {152},
pages = {541--545},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-23829-6\_40},
doi = {10.1007/978-3-319-23829-6\_40},
timestamp = {Tue, 30 Nov 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/securecomm/JiaoLZXF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofl/XieLLLFF14,
author = {Xiaofei Xie and
Xiaohong Li and
Yang Liu and
Li Li and
Ruitao Feng and
Zhiyong Feng},
editor = {Shaoying Liu and
Zhenhua Duan},
title = {Automatic Verification for Later-Correspondence of Security Protocols},
booktitle = {Structured Object-Oriented Formal Language and Method - 4th International
Workshop, {SOFL+MSVL} 2014, Luxembourg, Luxembourg, November 6, 2014,
Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {8979},
pages = {111--126},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-17404-4\_8},
doi = {10.1007/978-3-319-17404-4\_8},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sofl/XieLLLFF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/HanLFHXF14,
author = {Zhuobing Han and
Xiaohong Li and
Ruitao Feng and
Jing Hu and
Guangquan Xu and
Zhiyong Feng},
title = {A Three-Dimensional Model for Software Security Evaluation},
booktitle = {2014 Theoretical Aspects of Software Engineering Conference, {TASE}
2014, Changsha, China, September 1-3, 2014},
pages = {34--41},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/TASE.2014.31},
doi = {10.1109/TASE.2014.31},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/tase/HanLFHXF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoLXZF14,
author = {Shuai Zhao and
Xiaohong Li and
Guangquan Xu and
Lei Zhang and
Zhiyong Feng},
title = {Attack Tree Based Android Malware Detection with Hybrid Analysis},
booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2014, Beijing, China, September
24-26, 2014},
pages = {380--387},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/TrustCom.2014.49},
doi = {10.1109/TRUSTCOM.2014.49},
timestamp = {Thu, 27 Jun 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/trustcom/ZhaoLXZF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PeiLXF14,
author = {Hongbin Pei and
Xiaohong Li and
Guangquan Xu and
Zhiyong Feng},
title = {Mining Specification of Insecure Browser Extension Behavior},
booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2014, Beijing, China, September
24-26, 2014},
pages = {871--876},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/TrustCom.2014.119},
doi = {10.1109/TRUSTCOM.2014.119},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/trustcom/PeiLXF14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/XuLXXGLFM13,
author = {Guangquan Xu and
Weisheng Li and
Rui Xu and
Yingyuan Xiao and
Honghao Gao and
Xiaohong Li and
Zhiyong Feng and
Jia Mei},
title = {An algorithm on fairness verification of mobile sink routing in wireless
sensor network},
journal = {Pers. Ubiquitous Comput.},
volume = {17},
number = {5},
pages = {851--864},
year = {2013},
url = {https://doi.org/10.1007/s00779-012-0536-z},
doi = {10.1007/S00779-012-0536-Z},
timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/puc/XuLXXGLFM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/DuLSHFF13,
author = {Changxiao Du and
Xiaohong Li and
Hong Shi and
Jing Hu and
Ruitao Feng and
Zhiyong Feng},
editor = {Pornsiri Muenchaisri and
Gregg Rothermel},
title = {Architecture Security Evaluation Method Based on Security of the Components},
booktitle = {20th Asia-Pacific Software Engineering Conference, {APSEC} 2013, Ratchathewi,
Bangkok, Thailand, December 2-5, 2013 - Volume 1},
pages = {523--528},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://doi.org/10.1109/APSEC.2013.75},
doi = {10.1109/APSEC.2013.75},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/apsec/DuLSHFF13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/ChenT0LPL13,
author = {Manman Chen and
Tian Huat Tan and
Jun Sun and
Yang Liu and
Jun Pang and
Xiaohong Li},
editor = {Lindsay Groves and
Jing Sun},
title = {Verification of Functional and Non-functional Requirements of Web
Service Composition},
booktitle = {Formal Methods and Software Engineering - 15th International Conference
on Formal Engineering Methods, {ICFEM} 2013, Queenstown, New Zealand,
October 29 - November 1, 2013, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8144},
pages = {313--328},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-41202-8\_21},
doi = {10.1007/978-3-642-41202-8\_21},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icfem/ChenT0LPL13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwl/XuXSLF13,
author = {Rui Xu and
Guangquan Xu and
Da{-}Zhi Sun and
Xiaohong Li and
Zhiyong Feng},
editor = {Dickson K. W. Chiu and
Minhong Wang and
Elvira Popescu and
Qing Li and
Rynson W. H. Lau and
Timothy K. Shih and
Chu{-}Sing Yang and
Demetrios G. Sampson},
title = {Improving KeyNote Trust Management Model Based on User Behavior for
Social Learning},
booktitle = {Advances in Web-Based Learning - {ICWL} 2013 Workshops - {USL} 2013,
{IWSLL} 2013, {KMEL} 2013, {IWCWL} 2013, {WIL} 2013, and {IWEEC} 2013,
Kenting, Taiwan, October 6-9, 2013, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {8390},
pages = {96--103},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-662-46315-4\_10},
doi = {10.1007/978-3-662-46315-4\_10},
timestamp = {Wed, 24 Feb 2021 16:22:28 +0100},
biburl = {https://dblp.org/rec/conf/icwl/XuXSLF13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofl/YanLFFH13,
author = {Lu Yan and
Xiaohong Li and
Ruitao Feng and
Zhiyong Feng and
Jing Hu},
editor = {Shaoying Liu and
Zhenhua Duan},
title = {Detection Method of the Second-Order {SQL} Injection in Web Applications},
booktitle = {Structured Object-Oriented Formal Language and Method - Third International
Workshop, {SOFL+MSVL} 2013, Queenstown, New Zealand, October 29, 2013,
Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {8332},
pages = {154--165},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-319-04915-1\_11},
doi = {10.1007/978-3-319-04915-1\_11},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/sofl/YanLFFH13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LuuSLDLT12,
author = {Anh Tuan Luu and
Jun Sun and
Yang Liu and
Jin Song Dong and
Xiaohong Li and
Thanh Tho Quan},
title = {SeVe: automatic tool for verification of security protocols},
journal = {Frontiers Comput. Sci. China},
volume = {6},
number = {1},
pages = {57--75},
year = {2012},
url = {https://doi.org/10.1007/s11704-012-2903-3},
doi = {10.1007/S11704-012-2903-3},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/fcsc/LuuSLDLT12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgc/XuXTZLL12,
author = {Guangquan Xu and
Chao Xu and
Xiuming Tian and
Luxia Zhang and
Xiaohong Li and
Weisheng Li},
editor = {Jianxun Liu and
Jinjun Chen and
Guandong Xu},
title = {{PSO-TPS:} An Optimal Trust Path Selection Algorithm Based on Particle
Swarm Optimization in Small World Network},
booktitle = {2012 Second International Conference on Cloud and Green Computing,
{CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012},
pages = {594--600},
publisher = {{IEEE} Computer Society},
year = {2012},
url = {https://doi.org/10.1109/CGC.2012.81},
doi = {10.1109/CGC.2012.81},
timestamp = {Mon, 25 Aug 2025 08:52:53 +0200},
biburl = {https://dblp.org/rec/conf/cgc/XuXTZLL12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangLLDWLF12,
author = {Jiangang Wang and
Xiaohong Li and
Xuhui Liu and
Xinshu Dong and
Junjie Wang and
Zhenkai Liang and
Zhiyong Feng},
editor = {Dieter Gollmann and
Felix C. Freiling},
title = {An Empirical Study of Dangerous Behaviors in Firefox Extensions},
booktitle = {Information Security - 15th International Conference, {ISC} 2012,
Passau, Germany, September 19-21, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7483},
pages = {188--203},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-33383-5\_12},
doi = {10.1007/978-3-642-33383-5\_12},
timestamp = {Mon, 07 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isw/WangLLDWLF12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/SunLSDL11,
author = {Jun Sun and
Yang Liu and
Songzheng Song and
Jin Song Dong and
Xiaohong Li},
editor = {Shengchao Qin and
Zongyan Qiu},
title = {{PRTS:} An Approach for Model Checking Probabilistic Real-Time Hierarchical
Systems},
booktitle = {Formal Methods and Software Engineering - 13th International Conference
on Formal Engineering Methods, {ICFEM} 2011, Durham, UK, October 26-28,
2011. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {6991},
pages = {147--162},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-24559-6\_12},
doi = {10.1007/978-3-642-24559-6\_12},
timestamp = {Mon, 26 Jun 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icfem/SunLSDL11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ivc/CaoWXFZL10,
author = {Xiaochun Cao and
Lin Wu and
Jiangjian Xiao and
Hassan Foroosh and
Jigui Zhu and
Xiaohong Li},
title = {Video synchronization and its application to object transfer},
journal = {Image Vis. Comput.},
volume = {28},
number = {1},
pages = {92--100},
year = {2010},
url = {https://doi.org/10.1016/j.imavis.2009.04.015},
doi = {10.1016/J.IMAVIS.2009.04.015},
timestamp = {Tue, 14 Jul 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ivc/CaoWXFZL10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/Jin-LiangXYZR10,
author = {Jin{-}Liang Xing and
Xiaohong Li and
Yan Cao and
Zhiyong Feng and
Ran Liu},
title = {Information Flow Analysis of Web Service Net},
booktitle = {10th {IEEE} International Conference on Computer and Information Technology,
{CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
pages = {1622--1626},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/CIT.2010.287},
doi = {10.1109/CIT.2010.287},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/IEEEcit/Jin-LiangXYZR10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qsic/LiCFL10,
author = {Xiaohong Li and
Yan Cao and
Zhiyong Feng and
Ran Liu},
editor = {Ji Wang and
W. K. Chan and
Fei{-}Ching Kuo},
title = {Web Service Security Analysis Model Based on Program Slicing},
booktitle = {Proceedings of the 10th International Conference on Quality Software,
{QSIC} 2010, Zhangjiajie, China, 14-15 July 2010},
pages = {422--428},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/QSIC.2010.66},
doi = {10.1109/QSIC.2010.66},
timestamp = {Mon, 19 Aug 2024 08:29:06 +0200},
biburl = {https://dblp.org/rec/conf/qsic/LiCFL10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XuFLWYCR09,
author = {Guangquan Xu and
Zhiyong Feng and
Xiaohong Li and
Hutong Wu and
Yongxin Yu and
Shizhan Chen and
Guozheng Rao},
editor = {Sihan Qing and
Chris J. Mitchell and
Guilin Wang},
title = {TSM-Trust: {A} Time-Cognition Based Computational Model for Trust
Dynamics},
booktitle = {Information and Communications Security, 11th International Conference,
{ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5927},
pages = {385--395},
publisher = {Springer},
year = {2009},
url = {https://doi.org/10.1007/978-3-642-11145-7\_30},
doi = {10.1007/978-3-642-11145-7\_30},
timestamp = {Tue, 17 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icics/XuFLWYCR09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscsct/HeFL08,
author = {Ke He and
Zhiyong Feng and
Xiaohong Li},
title = {An Attack Scenario Based Approach for Software Security Testing at
Design Stage},
booktitle = {2008 International Symposium on Computer Science and Computational
Technology, {ISCSCT} 2008, 20-22 December 2008, Shanghai, China, 2
Volumes},
pages = {782--787},
publisher = {{IEEE} Computer Society},
year = {2008},
url = {https://doi.org/10.1109/ISCSCT.2008.116},
doi = {10.1109/ISCSCT.2008.116},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iscsct/HeFL08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/XiaohongZtL06,
author = {Xiaohong Li and
Zhiyong Feng and
Tie Li and
Li Lv},
editor = {Marina L. Gavrilova and
Osvaldo Gervasi and
Vipin Kumar and
Chih Jeng Kenneth Tan and
David Taniar and
Antonio Lagan{\`{a}} and
Youngsong Mun and
Hyunseung Choo},
title = {A Template Language for Agent Construction},
booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International
Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {V}},
series = {Lecture Notes in Computer Science},
volume = {3984},
pages = {32--38},
publisher = {Springer},
year = {2006},
url = {https://doi.org/10.1007/11751649\_4},
doi = {10.1007/11751649\_4},
timestamp = {Thu, 28 Apr 2022 16:17:38 +0200},
biburl = {https://dblp.org/rec/conf/iccsa/XiaohongZtL06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/LiYF05,
author = {Xiaohong Li and
Danjie Yang and
Zhiyong Feng},
title = {Design and Implementation of Negotiation Agent of Dynamic Supply Chain},
booktitle = {Third International Conference on Information Technology and Applications
{(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
pages = {250--255},
publisher = {{IEEE} Computer Society},
year = {2005},
url = {https://doi.org/10.1109/ICITA.2005.112},
doi = {10.1109/ICITA.2005.112},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icita/LiYF05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.