这是indexloc提供的服务,不要输入任何密码

BibTeX records: Xiaohong Li 0001

download as .bib file

@article{DBLP:journals/ijisec/FanZL25,
  author       = {Xubo Fan and
                  Jie Zhang and
                  Xiaohong Li},
  title        = {A blockchain-based trust and reputation model resilient to forgery
                  attacks for data sharing scenarios {(RWS-BTRM)}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {24},
  number       = {5},
  pages        = {205},
  year         = {2025},
  url          = {https://doi.org/10.1007/s10207-025-01050-y},
  doi          = {10.1007/S10207-025-01050-Y},
  timestamp    = {Sat, 18 Oct 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/FanZL25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LvLCHBF25,
  author       = {Yongyang Lv and
                  Xiaohong Li and
                  Kui Chen and
                  Zhe Hou and
                  Guangdong Bai and
                  Ruitao Feng},
  title        = {MedExChain: Enabling Secure and Efficient {PHR} Sharing Across Heterogeneous
                  Blockchains},
  journal      = {{IEEE} Internet Things J.},
  volume       = {12},
  number       = {16},
  pages        = {32932--32950},
  year         = {2025},
  url          = {https://doi.org/10.1109/JIOT.2025.3579266},
  doi          = {10.1109/JIOT.2025.3579266},
  timestamp    = {Thu, 11 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LvLCHBF25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ploscb/ShaoSXQWMMYZL25,
  author       = {Wen{-}Wei Shao and
                  Qi Shao and
                  Hai{-}Huan Xu and
                  Guan{-}Ji Qiao and
                  Run{-}Xuan Wang and
                  Zhi{-}Yun Ma and
                  Wei{-}Wei Meng and
                  Zhuo{-}Bin Yang and
                  Yun{-}Liang Zang and
                  Xiao{-}Hong Li},
  title        = {Repetitive training enhances the pattern recognition capability of
                  cultured neural networks},
  journal      = {PLoS Comput. Biol.},
  volume       = {21},
  number       = {4},
  pages        = {1013043},
  year         = {2025},
  url          = {https://doi.org/10.1371/journal.pcbi.1013043},
  doi          = {10.1371/JOURNAL.PCBI.1013043},
  timestamp    = {Wed, 18 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ploscb/ShaoSXQWMMYZL25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/ZhangLZHBF25,
  author       = {Mengke Zhang and
                  Xiaohong Li and
                  Jie Zhang and
                  Zhe Hou and
                  Guangdong Bai and
                  Ruitao Feng},
  editor       = {Weiming Shen and
                  Marie{-}H{\'{e}}l{\`{e}}ne Abel and
                  Nada Matta and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Jinghui Zhang and
                  Haibin Zhu and
                  Kunkun Peng},
  title        = {SwiftGuard: Enhanced Privacy and Efficiency in Blockchain-Based Fine-Grained
                  Access Control for Cross-Domain Healthcare Collaboration},
  booktitle    = {28th International Conference on Computer Supported Cooperative Work
                  in Design, {CSCWD} 2025, Compiegne, France, May 5-7, 2025},
  pages        = {1863--1868},
  publisher    = {{IEEE}},
  year         = {2025},
  url          = {https://doi.org/10.1109/CSCWD64889.2025.11033363},
  doi          = {10.1109/CSCWD64889.2025.11033363},
  timestamp    = {Sat, 15 Nov 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscwd/ZhangLZHBF25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GuoXL00B25,
  author       = {Qi Guo and
                  Xiaofei Xie and
                  Shangqing Liu and
                  Ming Hu and
                  Xiaohong Li and
                  Lei Bu},
  title        = {Intention is All you Need: Refining your Code from your Intention},
  booktitle    = {47th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2025, Ottawa, ON, Canada, April 26 - May 6, 2025},
  pages        = {1127--1139},
  publisher    = {{IEEE}},
  year         = {2025},
  url          = {https://doi.org/10.1109/ICSE55347.2025.00191},
  doi          = {10.1109/ICSE55347.2025.00191},
  timestamp    = {Mon, 30 Jun 2025 11:40:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/GuoXL00B25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/QuanLXCCJL25,
  author       = {Lili Quan and
                  Tianlin Li and
                  Xiaofei Xie and
                  Zhenpeng Chen and
                  Sen Chen and
                  Lingxiao Jiang and
                  Xiaohong Li},
  title        = {Dissecting Global Search: {A} Simple Yet Effective Method to Boost
                  Individual Discrimination Testing and Repair},
  booktitle    = {47th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2025, Ottawa, ON, Canada, April 26 - May 6, 2025},
  pages        = {1908--1920},
  publisher    = {{IEEE}},
  year         = {2025},
  url          = {https://doi.org/10.1109/ICSE55347.2025.00235},
  doi          = {10.1109/ICSE55347.2025.00235},
  timestamp    = {Sat, 06 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/QuanLXCCJL25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/MaoZZL25,
  author       = {Honglin Mao and
                  Jie Zhang and
                  Yao Zhang and
                  Xiaohong Li},
  editor       = {Philipp R{\"{u}}mmer and
                  Zhilin Wu},
  title        = {A Cross-Domain Data Sharing Scheme Based on Federated Blockchain},
  booktitle    = {Theoretical Aspects of Software Engineering - 19th International Symposium,
                  {TASE} 2025, Limassol, Cyprus, July 14-16, 2025, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {15841},
  pages        = {285--302},
  publisher    = {Springer},
  year         = {2025},
  url          = {https://doi.org/10.1007/978-3-031-98208-8\_17},
  doi          = {10.1007/978-3-031-98208-8\_17},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/MaoZZL25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/QuanXGJ00025,
  author       = {Lili Quan and
                  Xiaofei Xie and
                  Qianyu Guo and
                  Lingxiao Jiang and
                  Sen Chen and
                  Junjie Wang and
                  Xiaohong Li},
  editor       = {Guodong Long and
                  Michale Blumestein and
                  Yi Chang and
                  Liane Lewin{-}Eytan and
                  Zi Helen Huang and
                  Elad Yom{-}Tov},
  title        = {TensorJSFuzz: Effective Testing of Web-Based Deep Learning Frameworks
                  via Input-Constraint Extraction},
  booktitle    = {Proceedings of the {ACM} on Web Conference 2025, {WWW} 2025, Sydney,
                  NSW, Australia, 28 April 2025- 2 May 2025},
  pages        = {3405--3414},
  publisher    = {{ACM}},
  year         = {2025},
  url          = {https://doi.org/10.1145/3696410.3714649},
  doi          = {10.1145/3696410.3714649},
  timestamp    = {Sun, 02 Nov 2025 21:27:17 +0100},
  biburl       = {https://dblp.org/rec/conf/www/QuanXGJ00025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2502-08172,
  author       = {Qi Guo and
                  Xiaofei Xie and
                  Shangqing Liu and
                  Ming Hu and
                  Xiaohong Li and
                  Lei Bu},
  title        = {Intention is All You Need: Refining Your Code from Your Intention},
  journal      = {CoRR},
  volume       = {abs/2502.08172},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2502.08172},
  doi          = {10.48550/ARXIV.2502.08172},
  eprinttype    = {arXiv},
  eprint       = {2502.08172},
  timestamp    = {Fri, 14 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2502-08172.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2502-13412,
  author       = {Yanbang Sun and
                  Qing Huang and
                  Xiaoxue Ren and
                  Zhenchang Xing and
                  Xiaohong Li and
                  Junjie Wang},
  title        = {Explore-Construct-Filter: An Automated Framework for Rich and Reliable
                  {API} Knowledge Graph Construction},
  journal      = {CoRR},
  volume       = {abs/2502.13412},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2502.13412},
  doi          = {10.48550/ARXIV.2502.13412},
  eprinttype    = {arXiv},
  eprint       = {2502.13412},
  timestamp    = {Mon, 07 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2502-13412.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2506-23461,
  author       = {Yun Xing and
                  Qing Guo and
                  Xiaohong Li and
                  Yihao Huang and
                  Xiaofeng Cao and
                  Di Lin and
                  Ivor W. Tsang and
                  Lei Ma},
  title        = {Time-variant Image Inpainting via Interactive Distribution Transition
                  Estimation},
  journal      = {CoRR},
  volume       = {abs/2506.23461},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2506.23461},
  doi          = {10.48550/ARXIV.2506.23461},
  eprinttype    = {arXiv},
  eprint       = {2506.23461},
  timestamp    = {Sat, 12 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2506-23461.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2507-09529,
  author       = {Yunqian Wang and
                  Xiaohong Li and
                  Yao Zhang and
                  Yuekang Li and
                  Zhiping Zhou and
                  Ruitao Feng},
  title        = {It Only Gets Worse: Revisiting DL-Based Vulnerability Detectors from
                  a Practical Perspective},
  journal      = {CoRR},
  volume       = {abs/2507.09529},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2507.09529},
  doi          = {10.48550/ARXIV.2507.09529},
  eprinttype    = {arXiv},
  eprint       = {2507.09529},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2507-09529.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2507-10927,
  author       = {Jie Zhang and
                  Xiaohong Li and
                  Man Zheng and
                  Zhe Hou and
                  Guangdong Bai and
                  Ruitao Feng},
  title        = {{DVFS:} {A} Dynamic Verifiable Fuzzy Search Service for Encrypted
                  Cloud Data},
  journal      = {CoRR},
  volume       = {abs/2507.10927},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2507.10927},
  doi          = {10.48550/ARXIV.2507.10927},
  eprinttype    = {arXiv},
  eprint       = {2507.10927},
  timestamp    = {Wed, 27 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2507-10927.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2507-14969,
  author       = {Sai Zhang and
                  Zhenchang Xing and
                  Jieshan Chen and
                  Dehai Zhao and
                  Zizhong Zhu and
                  Xiaowang Zhang and
                  Zhiyong Feng and
                  Xiaohong Li},
  title        = {Think Like an Engineer: {A} Neuro-Symbolic Collaboration Agent for
                  Generative Software Requirements Elicitation and Self-Review},
  journal      = {CoRR},
  volume       = {abs/2507.14969},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2507.14969},
  doi          = {10.48550/ARXIV.2507.14969},
  eprinttype    = {arXiv},
  eprint       = {2507.14969},
  timestamp    = {Mon, 18 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2507-14969.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2510-19615,
  author       = {Zhiping Zhou and
                  Xiaohong Li and
                  Ruitao Feng and
                  Yao Zhang and
                  Yuekang Li and
                  Wenbu Feng and
                  Yunqian Wang and
                  Yuqing Li},
  title        = {FidelityGPT: Correcting Decompilation Distortions with Retrieval Augmented
                  Generation},
  journal      = {CoRR},
  volume       = {abs/2510.19615},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2510.19615},
  doi          = {10.48550/ARXIV.2510.19615},
  eprinttype    = {arXiv},
  eprint       = {2510.19615},
  timestamp    = {Sun, 16 Nov 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2510-19615.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2510-21124,
  author       = {Jie Zhang and
                  Xiaohong Li and
                  Mengke Zhang and
                  Ruitao Feng and
                  Shanshan Xu and
                  Zhe Hou and
                  Guangdong Bai},
  title        = {{QAE-BAC:} Achieving Quantifiable Anonymity and Efficiency in Blockchain-Based
                  Access Control with Attribute},
  journal      = {CoRR},
  volume       = {abs/2510.21124},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2510.21124},
  doi          = {10.48550/ARXIV.2510.21124},
  eprinttype    = {arXiv},
  eprint       = {2510.21124},
  timestamp    = {Sun, 16 Nov 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2510-21124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/YinFLCWH24,
  author       = {Qiaoyun Yin and
                  Zhiyong Feng and
                  Xiaohong Li and
                  Shizhan Chen and
                  Hongyue Wu and
                  Gaoyong Han},
  title        = {Tackling data-heterogeneity variations in federated learning via adaptive
                  aggregate weights},
  journal      = {Knowl. Based Syst.},
  volume       = {304},
  pages        = {112484},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2024.112484},
  doi          = {10.1016/J.KNOSYS.2024.112484},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/YinFLCWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/ZhangLCF24,
  author       = {Hua Zhang and
                  Xiaohong Li and
                  Xiaochun Cao and
                  Hassan Foroosh},
  title        = {Multiple Adverse Weather Conditions Adaptation for Object Detection
                  via Causal Intervention},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {46},
  number       = {3},
  pages        = {1742--1756},
  year         = {2024},
  url          = {https://doi.org/10.1109/TPAMI.2022.3166765},
  doi          = {10.1109/TPAMI.2022.3166765},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pami/ZhangLCF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LvFMZWL24,
  author       = {Yongyang Lv and
                  Ruitao Feng and
                  Maode Ma and
                  Manqing Zhu and
                  Hanwei Wu and
                  Xiaohong Li},
  title        = {Reinventing Multi-User Authentication Security From Cross-Chain Perspective},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {8908--8923},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3463533},
  doi          = {10.1109/TIFS.2024.3463533},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LvFMZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZhuW024,
  author       = {Manqing Zhu and
                  Lingxiao Wang and
                  Xiaohong Li},
  title        = {Design and Optimization of Smart Contracts for Cross-Domain Sharing
                  of Sensitive Data},
  booktitle    = {30th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2024, Belgrade, Serbia, October 10-14, 2024},
  pages        = {633--640},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICPADS63350.2024.00088},
  doi          = {10.1109/ICPADS63350.2024.00088},
  timestamp    = {Mon, 23 Dec 2024 14:09:07 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ZhuW024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GuoCXLL0024,
  author       = {Qi Guo and
                  Junming Cao and
                  Xiaofei Xie and
                  Shangqing Liu and
                  Xiaohong Li and
                  Bihuan Chen and
                  Xin Peng},
  title        = {Exploring the Potential of ChatGPT in Automated Code Refinement: An
                  Empirical Study},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {34:1--34:13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3623306},
  doi          = {10.1145/3597503.3623306},
  timestamp    = {Mon, 24 Jun 2024 15:20:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/GuoCXLL0024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/Guo0XLTFWGB24,
  author       = {Qi Guo and
                  Xiaohong Li and
                  Xiaofei Xie and
                  Shangqing Liu and
                  Ze Tang and
                  Ruitao Feng and
                  Junjie Wang and
                  Jidong Ge and
                  Lei Bu},
  editor       = {Maria Christakis and
                  Michael Pradel},
  title        = {FT2Ra: {A} Fine-Tuning-Inspired Approach to Retrieval-Augmented Code
                  Completion},
  booktitle    = {Proceedings of the 33rd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2024, Vienna, Austria, September
                  16-20, 2024},
  pages        = {313--324},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3650212.3652130},
  doi          = {10.1145/3650212.3652130},
  timestamp    = {Wed, 25 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/Guo0XLTFWGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/FengL0GL024,
  author       = {Ruitao Feng and
                  Sen Li and
                  Sen Chen and
                  Mengmeng Ge and
                  Xuewei Li and
                  Xiaohong Li},
  editor       = {Aviral Shrivastava and
                  Yulei Sui},
  title        = {Unmasking the Lurking: Malicious Behavior Detection for IoT Malware
                  with Multi-label Classification},
  booktitle    = {Proceedings of the 25th {ACM} {SIGPLAN/SIGBED} International Conference
                  on Languages, Compilers, and Tools for Embedded Systems, {LCTES} 2024,
                  Copenhagen, Denmark, 24 June 2024},
  pages        = {95--106},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3652032.3657577},
  doi          = {10.1145/3652032.3657577},
  timestamp    = {Wed, 22 Oct 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/FengL0GL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangL0F24,
  author       = {Fei Zhang and
                  Xiaohong Li and
                  Sen Chen and
                  Ruitao Feng},
  title        = {Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family
                  Classification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {166--175},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00048},
  doi          = {10.1109/TRUSTCOM63139.2024.00048},
  timestamp    = {Sat, 15 Nov 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangL0F24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-01554,
  author       = {Qi Guo and
                  Xiaohong Li and
                  Xiaofei Xie and
                  Shangqing Liu and
                  Ze Tang and
                  Ruitao Feng and
                  Junjie Wang and
                  Jidong Ge and
                  Lei Bu},
  title        = {FT2Ra: {A} Fine-Tuning-Inspired Approach to Retrieval-Augmented Code
                  Completion},
  journal      = {CoRR},
  volume       = {abs/2404.01554},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.01554},
  doi          = {10.48550/ARXIV.2404.01554},
  eprinttype    = {arXiv},
  eprint       = {2404.01554},
  timestamp    = {Wed, 25 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-01554.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2410-06444,
  author       = {Qijing Qiao and
                  Ruitao Feng and
                  Sen Chen and
                  Fei Zhang and
                  Xiaohong Li},
  title        = {Multi-label Classification for Android Malware Based on Active Learning},
  journal      = {CoRR},
  volume       = {abs/2410.06444},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2410.06444},
  doi          = {10.48550/ARXIV.2410.06444},
  eprinttype    = {arXiv},
  eprint       = {2410.06444},
  timestamp    = {Mon, 18 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2410-06444.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/BaiCXL23,
  author       = {Yude Bai and
                  Sen Chen and
                  Zhenchang Xing and
                  Xiaohong Li},
  title        = {ArgusDroid: detecting Android malware variants by mining permission-API
                  knowledge graph},
  journal      = {Sci. China Inf. Sci.},
  volume       = {66},
  number       = {9},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11432-021-3414-7},
  doi          = {10.1007/S11432-021-3414-7},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/BaiCXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuFLX23,
  author       = {Anbin Wu and
                  Zhiyong Feng and
                  Xiaohong Li and
                  Jianmao Xiao},
  title        = {ZTWeb: Cross site scripting detection based on zero trust},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103434},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103434},
  doi          = {10.1016/J.COSE.2023.103434},
  timestamp    = {Mon, 13 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WuFLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ZhangFSLFXAZC23,
  author       = {Chengwei Zhang and
                  Dina Fang and
                  Sandip Sen and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Wanli Xue and
                  Dou An and
                  Xintian Zhao and
                  Rong Chen},
  title        = {Opinion Dynamics in Gossiper-Media Networks Based on Multiagent Reinforcement
                  Learning},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {1143--1156},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3229770},
  doi          = {10.1109/TNSE.2022.3229770},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/ZhangFSLFXAZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/YitagesuXZFLH23,
  author       = {Sofonias Yitagesu and
                  Zhenchang Xing and
                  Xiaowang Zhang and
                  Zhiyong Feng and
                  Xiaohong Li and
                  Linyi Han},
  title        = {Extraction of Phrase-based Concepts in Vulnerability Descriptions
                  through Unsupervised Labeling},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {32},
  number       = {5},
  pages        = {112:1--112:45},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579638},
  doi          = {10.1145/3579638},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/YitagesuXZFLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhangXLLCLL23,
  author       = {Yao Zhang and
                  Xiaofei Xie and
                  Yi Li and
                  Yun Lin and
                  Sen Chen and
                  Yang Liu and
                  Xiaohong Li},
  title        = {Demystifying Performance Regressions in String Solvers},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {3},
  pages        = {947--961},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3168373},
  doi          = {10.1109/TSE.2022.3168373},
  timestamp    = {Wed, 17 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/ZhangXLLCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/LiGF0L23,
  author       = {Sen Li and
                  Mengmeng Ge and
                  Ruitao Feng and
                  Xiaohong Li and
                  Kwok{-}Yan Lam},
  editor       = {Jihe Wang and
                  Yi He and
                  Thang N. Dinh and
                  Christan Grant and
                  Meikang Qiu and
                  Witold Pedrycz},
  title        = {Automatic Detection and Analysis towards Malicious Behavior in IoT
                  Malware},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops,
                  Shanghai, China, December 4, 2023},
  pages        = {1332--1341},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDMW60847.2023.00171},
  doi          = {10.1109/ICDMW60847.2023.00171},
  timestamp    = {Wed, 22 Oct 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdm/LiGF0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/ZhangFXLS23,
  author       = {Fei Zhang and
                  Ruitao Feng and
                  Xiaofei Xie and
                  Xiaohong Li and
                  Lianshuan Shi},
  editor       = {Jihe Wang and
                  Yi He and
                  Thang N. Dinh and
                  Christan Grant and
                  Meikang Qiu and
                  Witold Pedrycz},
  title        = {SeqAdver: Automatic Payload Construction and Injection in Sequence-based
                  Android Adversarial Attack},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops,
                  Shanghai, China, December 4, 2023},
  pages        = {1342--1351},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDMW60847.2023.00172},
  doi          = {10.1109/ICDMW60847.2023.00172},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/ZhangFXLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ZhangXLCZL23,
  author       = {Yao Zhang and
                  Xiaofei Xie and
                  Yi Li and
                  Sen Chen and
                  Cen Zhang and
                  Xiaohong Li},
  title        = {EndWatch: {A} Practical Method for Detecting Non-Termination in Real-World
                  Software},
  booktitle    = {38th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2023, Luxembourg, September 11-15, 2023},
  pages        = {686--697},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ASE56229.2023.00061},
  doi          = {10.1109/ASE56229.2023.00061},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/ZhangXLCZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZhangC0C023,
  author       = {Yuxin Zhang and
                  Sen Chen and
                  Lingling Fan and
                  Chunyang Chen and
                  Xiaohong Li},
  editor       = {Satish Chandra and
                  Kelly Blincoe and
                  Paolo Tonella},
  title        = {Automated and Context-Aware Repair of Color-Related Accessibility
                  Issues for Android Apps},
  booktitle    = {Proceedings of the 31st {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023},
  pages        = {1255--1267},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611643.3616329},
  doi          = {10.1145/3611643.3616329},
  timestamp    = {Mon, 30 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ZhangC0C023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-09029,
  author       = {Yuxin Zhang and
                  Sen Chen and
                  Lingling Fan and
                  Chunyang Chen and
                  Xiaohong Li},
  title        = {Automated and Context-Aware Repair of Color-Related Accessibility
                  Issues for Android Apps},
  journal      = {CoRR},
  volume       = {abs/2308.09029},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.09029},
  doi          = {10.48550/ARXIV.2308.09029},
  eprinttype    = {arXiv},
  eprint       = {2308.09029},
  timestamp    = {Mon, 30 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-09029.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-08221,
  author       = {Qi Guo and
                  Junming Cao and
                  Xiaofei Xie and
                  Shangqing Liu and
                  Xiaohong Li and
                  Bihuan Chen and
                  Xin Peng},
  title        = {Exploring the Potential of ChatGPT in Automated Code Refinement: An
                  Empirical Study},
  journal      = {CoRR},
  volume       = {abs/2309.08221},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.08221},
  doi          = {10.48550/ARXIV.2309.08221},
  eprinttype    = {arXiv},
  eprint       = {2309.08221},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-08221.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-03335,
  author       = {Yao Zhang and
                  Xiaofei Xie and
                  Yi Li and
                  Sen Chen and
                  Cen Zhang and
                  Xiaohong Li},
  title        = {EndWatch: {A} Practical Method for Detecting Non-Termination in Real-World
                  Software},
  journal      = {CoRR},
  volume       = {abs/2312.03335},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.03335},
  doi          = {10.48550/ARXIV.2312.03335},
  eprinttype    = {arXiv},
  eprint       = {2312.03335},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-03335.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/ZhangHLXHLAC22,
  author       = {Chengwei Zhang and
                  Zhuobing Han and
                  Bingfu Liu and
                  Wanli Xue and
                  Jianye Hao and
                  Xiaohong Li and
                  Dou An and
                  Rong Chen},
  title        = {SCC-rFMQ: a multiagent reinforcement learning method in cooperative
                  Markov games with continuous actions},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {13},
  number       = {7},
  pages        = {1927--1944},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13042-021-01497-0},
  doi          = {10.1007/S13042-021-01497-0},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mlc/ZhangHLXHLAC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/GuoCXLBS22,
  author       = {Hao Guo and
                  Sen Chen and
                  Zhenchang Xing and
                  Xiaohong Li and
                  Yude Bai and
                  Jiamou Sun},
  title        = {Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {31},
  number       = {3},
  pages        = {49:1--49:27},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498537},
  doi          = {10.1145/3498537},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/GuoCXLBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YanCBL22,
  author       = {Guoqing Yan and
                  Sen Chen and
                  Yude Bai and
                  Xiaohong Li},
  editor       = {Hong Va Leong and
                  Sahra Sedigh Sarvestani and
                  Yuuichi Teranishi and
                  Alfredo Cuzzocrea and
                  Hiroki Kashiwazaki and
                  Dave Towey and
                  Ji{-}Jiang Yang and
                  Hossain Shahriar},
  title        = {Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability
                  Detection?},
  booktitle    = {46th {IEEE} Annual Computers, Software, and Applications Conferenc,
                  {COMPSAC} 2022, Los Alamitos, CA, USA, June 27 - July 1, 2022},
  pages        = {904--913},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COMPSAC54236.2022.00142},
  doi          = {10.1109/COMPSAC54236.2022.00142},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/YanCBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/QuanGXCLL22,
  author       = {Lili Quan and
                  Qianyu Guo and
                  Xiaofei Xie and
                  Sen Chen and
                  Xiaohong Li and
                  Yang Liu},
  title        = {Towards Understanding the Faults of JavaScript-Based Deep Learning
                  Systems},
  booktitle    = {37th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2022, Rochester, MI, USA, October 10-14, 2022},
  pages        = {105:1--105:13},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3551349.3560427},
  doi          = {10.1145/3551349.3560427},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/QuanGXCLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ShiXLZCL22,
  author       = {Xiuhan Shi and
                  Xiaofei Xie and
                  Yi Li and
                  Yao Zhang and
                  Sen Chen and
                  Xiaohong Li},
  editor       = {Abhik Roychoudhury and
                  Cristian Cadar and
                  Miryung Kim},
  title        = {Large-scale analysis of non-termination bugs in real-world {OSS} projects},
  booktitle    = {Proceedings of the 30th {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022},
  pages        = {256--268},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3540250.3549129},
  doi          = {10.1145/3540250.3549129},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ShiXLZCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-04791,
  author       = {Lili Quan and
                  Qianyu Guo and
                  Xiaofei Xie and
                  Sen Chen and
                  Xiaohong Li and
                  Yang Liu},
  title        = {Towards Understanding the Faults of JavaScript-Based Deep Learning
                  Systems},
  journal      = {CoRR},
  volume       = {abs/2209.04791},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.04791},
  doi          = {10.48550/ARXIV.2209.04791},
  eprinttype    = {arXiv},
  eprint       = {2209.04791},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-04791.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BaiXMLF21,
  author       = {Yude Bai and
                  Zhenchang Xing and
                  Duoyuan Ma and
                  Xiaohong Li and
                  Zhiyong Feng},
  title        = {Comparative analysis of feature representations and machine learning
                  methods in Android family classification},
  journal      = {Comput. Networks},
  volume       = {184},
  pages        = {107639},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2020.107639},
  doi          = {10.1016/J.COMNET.2020.107639},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BaiXMLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/LiFCGFL21,
  author       = {Yuxuan Li and
                  Ruitao Feng and
                  Sen Chen and
                  Qianyu Guo and
                  Lingling Fan and
                  Xiaohong Li},
  title        = {IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps},
  booktitle    = {28th Asia-Pacific Software Engineering Conference, {APSEC} 2021, Taipei,
                  Taiwan, December 6-9, 2021},
  pages        = {202--212},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/APSEC53868.2021.00028},
  doi          = {10.1109/APSEC53868.2021.00028},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/LiFCGFL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinGZLD21,
  author       = {Hui Jin and
                  Weimin Ge and
                  Yao Zhang and
                  Xiaohong Li and
                  Zhidong Deng},
  editor       = {Honghao Gao and
                  Xinheng Wang},
  title        = {Loopster++: Termination Analysis for Multi-path Linear Loop},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 17th {EAI} International Conference, CollaborateCom 2021, Virtual
                  Event, October 16-18, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {406},
  pages        = {479--497},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92635-9\_28},
  doi          = {10.1007/978-3-030-92635-9\_28},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/JinGZLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YuanBXC0D21,
  author       = {Liu Yuan and
                  Yude Bai and
                  Zhenchang Xing and
                  Sen Chen and
                  Xiaohong Li and
                  Zhidong Deng},
  title        = {Predicting Entity Relations across Different Security Databases by
                  Using Graph Attention Network},
  booktitle    = {{IEEE} 45th Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2021, Madrid, Spain, July 12-16, 2021},
  pages        = {834--843},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/COMPSAC51774.2021.00116},
  doi          = {10.1109/COMPSAC51774.2021.00116},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/YuanBXC0D21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/GuoXCLBZ21,
  author       = {Hao Guo and
                  Zhenchang Xing and
                  Sen Chen and
                  Xiaohong Li and
                  Yude Bai and
                  Hu Zhang},
  title        = {Key Aspects Augmentation of Vulnerability Description based on Multiple
                  Security Databases},
  booktitle    = {{IEEE} 45th Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2021, Madrid, Spain, July 12-16, 2021},
  pages        = {1020--1025},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/COMPSAC51774.2021.00138},
  doi          = {10.1109/COMPSAC51774.2021.00138},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/GuoXCLBZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/YuM021,
  author       = {Fengye Yu and
                  Maode Ma and
                  Xiaohong Li},
  title        = {A Blockchain-Assisted Seamless Handover Authentication for {V2I} Communication
                  in 5G Wireless Networks},
  booktitle    = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal,
                  QC, Canada, June 14-23, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICC42927.2021.9500334},
  doi          = {10.1109/ICC42927.2021.9500334},
  timestamp    = {Mon, 09 Aug 2021 11:13:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/YuM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/Tian0JCC0XQ21,
  author       = {Binyu Tian and
                  Qing Guo and
                  Felix Juefei{-}Xu and
                  Wen Le Chan and
                  Yupeng Cheng and
                  Xiaohong Li and
                  Xiaofei Xie and
                  Shengchao Qin},
  title        = {Bias Field Poses a Threat to DNN-Based X-Ray Recognition},
  booktitle    = {2021 {IEEE} International Conference on Multimedia and Expo, {ICME}
                  2021, Shenzhen, China, July 5-9, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICME51207.2021.9428437},
  doi          = {10.1109/ICME51207.2021.9428437},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/Tian0JCC0XQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/ZhangLLZ021,
  author       = {Shouli Zhang and
                  Chen Liu and
                  Han Li and
                  Zhuofeng Zhao and
                  Xiaohong Li},
  editor       = {Hakim Hacid and
                  Odej Kao and
                  Massimo Mecella and
                  Naouel Moha and
                  Hye{-}young Paik},
  title        = {Service Deployment with Predictive Ability for Data Stream Processing
                  in a Cloud-Edge Environment},
  booktitle    = {Service-Oriented Computing - 19th International Conference, {ICSOC}
                  2021, Virtual Event, November 22-25, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13121},
  pages        = {781--789},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91431-8\_55},
  doi          = {10.1007/978-3-030-91431-8\_55},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/ZhangLLZ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/TianJ0XLL21,
  author       = {Binyu Tian and
                  Felix Juefei{-}Xu and
                  Qing Guo and
                  Xiaofei Xie and
                  Xiaohong Li and
                  Yang Liu},
  editor       = {Zhi{-}Hua Zhou},
  title        = {{AVA:} Adversarial Vignetting Attack against Visual Recognition},
  booktitle    = {Proceedings of the Thirtieth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27
                  August 2021},
  pages        = {1046--1053},
  publisher    = {ijcai.org},
  year         = {2021},
  url          = {https://doi.org/10.24963/ijcai.2021/145},
  doi          = {10.24963/IJCAI.2021/145},
  timestamp    = {Tue, 15 Oct 2024 16:43:28 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/TianJ0XLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/YitagesuXZ00H21,
  author       = {Sofonias Yitagesu and
                  Zhenchang Xing and
                  Xiaowang Zhang and
                  Zhiyong Feng and
                  Xiaohong Li and
                  Linyi Han},
  title        = {Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability
                  Descriptions},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021, Melbourne, Australia, November 15-19, 2021},
  pages        = {943--954},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASE51524.2021.9678638},
  doi          = {10.1109/ASE51524.2021.9678638},
  timestamp    = {Fri, 04 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/YitagesuXZ00H21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/LiLXLLGLD21,
  author       = {Siqi Li and
                  Yun Lin and
                  Xiaofei Xie and
                  Yuekang Li and
                  Xiaohong Li and
                  Weimin Ge and
                  Yang Liu and
                  Jin Song Dong},
  title        = {A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021, Melbourne, Australia, November 15-19, 2021},
  pages        = {1186--1189},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASE51524.2021.9678794},
  doi          = {10.1109/ASE51524.2021.9678794},
  timestamp    = {Mon, 15 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/LiLXLLGLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msr/YitagesuZ00X21,
  author       = {Sofonias Yitagesu and
                  Xiaowang Zhang and
                  Zhiyong Feng and
                  Xiaohong Li and
                  Zhenchang Xing},
  title        = {Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions},
  booktitle    = {18th {IEEE/ACM} International Conference on Mining Software Repositories,
                  {MSR} 2021, Madrid, Spain, May 17-19, 2021},
  pages        = {29--40},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSR52588.2021.00016},
  doi          = {10.1109/MSR52588.2021.00016},
  timestamp    = {Fri, 04 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/msr/YitagesuZ00X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/ZhangZLW21,
  author       = {Qianqian Zhang and
                  Yao Zhang and
                  Xiao{-}Hong Li and
                  Bin Wu},
  title        = {Discovering Properties about Arrays via Path Dependence Analysis},
  booktitle    = {International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2021, Shanghai, China, August 25-27, 2021},
  pages        = {55--62},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TASE52547.2021.00022},
  doi          = {10.1109/TASE52547.2021.00022},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/ZhangZLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/LinZCSXLS21,
  author       = {Yingwen Lin and
                  Yao Zhang and
                  Sen Chen and
                  Fu Song and
                  Xiaofei Xie and
                  Xiaohong Li and
                  Lintan Sun},
  title        = {Inferring Loop Invariants for Multi-Path Loops},
  booktitle    = {International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2021, Shanghai, China, August 25-27, 2021},
  pages        = {63--70},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TASE52547.2021.00030},
  doi          = {10.1109/TASE52547.2021.00030},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/LinZCSXLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/LyuBXLG21,
  author       = {Jinghui Lyu and
                  Yude Bai and
                  Zhenchang Xing and
                  Xiaohong Li and
                  Weimin Ge},
  title        = {A Character-Level Convolutional Neural Network for Predicting Exploitability
                  of Vulnerability},
  booktitle    = {International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2021, Shanghai, China, August 25-27, 2021},
  pages        = {119--126},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TASE52547.2021.00014},
  doi          = {10.1109/TASE52547.2021.00014},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/LyuBXLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/TanSL21,
  author       = {Mingxi Tan and
                  Dazhi Sun and
                  Xiaohong Li},
  title        = {A Secure and Efficient Blockchain-based Key Management Scheme for
                  LoRaWAN},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021,
                  Nanjing, China, March 29 - April 1, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WCNC49053.2021.9417304},
  doi          = {10.1109/WCNC49053.2021.9417304},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/TanSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-01431,
  author       = {Jiamou Sun and
                  Zhenchang Xing and
                  Hao Guo and
                  Deheng Ye and
                  Xiaohong Li and
                  Xiwei Xu and
                  Liming Zhu},
  title        = {Generating Informative {CVE} Description From ExploitDB Posts by Extractive
                  Summarization},
  journal      = {CoRR},
  volume       = {abs/2101.01431},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.01431},
  eprinttype    = {arXiv},
  eprint       = {2101.01431},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-01431.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-05558,
  author       = {Binyu Tian and
                  Felix Juefei{-}Xu and
                  Qing Guo and
                  Xiaofei Xie and
                  Xiaohong Li and
                  Yang Liu},
  title        = {{AVA:} Adversarial Vignetting Attack against Visual Recognition},
  journal      = {CoRR},
  volume       = {abs/2105.05558},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.05558},
  eprinttype    = {arXiv},
  eprint       = {2105.05558},
  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-05558.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangHL20a,
  author       = {Haodi Zhang and
                  Jianye Hao and
                  Xiaohong Li},
  title        = {A Method for Deploying Distributed Denial of Service Attack Defense
                  Strategies on Edge Servers Using Reinforcement Learning},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {78482--78491},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2989353},
  doi          = {10.1109/ACCESS.2020.2989353},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangHL20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HanLXXMS20,
  author       = {Zhuobing Han and
                  Xiaohong Li and
                  Guangquan Xu and
                  Naixue Xiong and
                  Ettore Merlo and
                  Eleni Stroulia},
  title        = {An Effective Evolutionary Analysis Scheme for Industrial Software
                  Access Control Models},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {2},
  pages        = {1024--1034},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2925422},
  doi          = {10.1109/TII.2019.2925422},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/HanLXXMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/ShangML20,
  author       = {Zhengyi Shang and
                  Maode Ma and
                  Xiaohong Li},
  title        = {A Secure Group-Oriented Device-to-Device Authentication Protocol for
                  5G Wireless Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {19},
  number       = {11},
  pages        = {7021--7032},
  year         = {2020},
  url          = {https://doi.org/10.1109/TWC.2020.3007702},
  doi          = {10.1109/TWC.2020.3007702},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/twc/ShangML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/MaBXS020,
  author       = {Duoyuan Ma and
                  Yude Bai and
                  Zhenchang Xing and
                  Lintan Sun and
                  Xiaohong Li},
  title        = {A Knowledge Graph-based Sensitive Feature Selection for Android Malware
                  Classification},
  booktitle    = {27th Asia-Pacific Software Engineering Conference, {APSEC} 2020, Singapore,
                  December 1-4, 2020},
  pages        = {188--197},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/APSEC51365.2020.00027},
  doi          = {10.1109/APSEC51365.2020.00027},
  timestamp    = {Sat, 20 Mar 2021 14:55:58 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/MaBXS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/ZhouYBXLZL20,
  author       = {Lingjun Zhou and
                  Bing Yu and
                  David Berend and
                  Xiaofei Xie and
                  Xiaohong Li and
                  Jianjun Zhao and
                  Xusheng Liu},
  title        = {An Empirical Study on Robustness of DNNs with Out-of-Distribution
                  Awareness},
  booktitle    = {27th Asia-Pacific Software Engineering Conference, {APSEC} 2020, Singapore,
                  December 1-4, 2020},
  pages        = {266--275},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/APSEC51365.2020.00035},
  doi          = {10.1109/APSEC51365.2020.00035},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsec/ZhouYBXLZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/AnZZLLM20,
  author       = {Xingwei An and
                  Xiangtong Zhou and
                  Wenxiao Zhong and
                  Shuang Liu and
                  Xiaohong Li and
                  Dong Ming},
  title        = {Weighted Subject-Semi-Independent ERP-based Brain-Computer Interface},
  booktitle    = {42nd Annual International Conference of the {IEEE} Engineering in
                  Medicine {\&} Biology Society, {EMBC} 2020, Montreal, QC, Canada,
                  July 20-24, 2020},
  pages        = {2969--2972},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EMBC44109.2020.9176683},
  doi          = {10.1109/EMBC44109.2020.9176683},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/embc/AnZZLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BaiX00M20,
  author       = {Yude Bai and
                  Zhenchang Xing and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Duoyuan Ma},
  editor       = {Gregg Rothermel and
                  Doo{-}Hwan Bae},
  title        = {Unsuccessful story about few shot malware family classification and
                  siamese network to the rescue},
  booktitle    = {{ICSE} '20: 42nd International Conference on Software Engineering,
                  Seoul, South Korea, 27 June - 19 July, 2020},
  pages        = {1560--1571},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377811.3380354},
  doi          = {10.1145/3377811.3380354},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BaiX00M20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/WangMW0G020,
  author       = {Wei Wang and
                  Guozhu Meng and
                  Haoyu Wang and
                  Kai Chen and
                  Weimin Ge and
                  Xiaohong Li},
  title        = {A\({}^{\mbox{3}}\)Ident: {A} Two-phased Approach to Identify the Leading
                  Authors of Android Apps},
  booktitle    = {{IEEE} International Conference on Software Maintenance and Evolution,
                  {ICSME} 2020, Adelaide, Australia, September 28 - October 2, 2020},
  pages        = {617--628},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICSME46990.2020.00064},
  doi          = {10.1109/ICSME46990.2020.00064},
  timestamp    = {Thu, 24 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsm/WangMW0G020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/GuoXLZLLS20,
  author       = {Qianyu Guo and
                  Xiaofei Xie and
                  Yi Li and
                  Xiaoyu Zhang and
                  Yang Liu and
                  Xiaohong Li and
                  Chao Shen},
  title        = {Audee: Automated Testing for Deep Learning Frameworks},
  booktitle    = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2020, Melbourne, Australia, September 21-25, 2020},
  pages        = {486--498},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3324884.3416571},
  doi          = {10.1145/3324884.3416571},
  timestamp    = {Wed, 19 Feb 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/GuoXLZLLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/QuanGCXLLH20,
  author       = {Lili Quan and
                  Qianyu Guo and
                  Hongxu Chen and
                  Xiaofei Xie and
                  Xiaohong Li and
                  Yang Liu and
                  Jing Hu},
  title        = {{SADT:} Syntax-Aware Differential Testing of Certificate Validation
                  in {SSL/TLS} Implementations},
  booktitle    = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2020, Melbourne, Australia, September 21-25, 2020},
  pages        = {524--535},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3324884.3416552},
  doi          = {10.1145/3324884.3416552},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/QuanGCXLLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/Jiang0XZ20,
  author       = {Mengmeng Jiang and
                  Xiaohong Li and
                  Xiaofei Xie and
                  Yao Zhang},
  editor       = {Toshiaki Aoki and
                  Qin Li},
  title        = {An Empirical Study in Software Verification Tools},
  booktitle    = {International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2020, Hangzhou, China, December 11-13, 2020},
  pages        = {201--208},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TASE49443.2020.00035},
  doi          = {10.1109/TASE49443.2020.00035},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/Jiang0XZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/ZhangL20,
  author       = {Yu Zhang and
                  Xiaohong Li},
  editor       = {Toshiaki Aoki and
                  Qin Li},
  title        = {The Scheme of Security Requirement Acquisition Based on Knowledge
                  Graph},
  booktitle    = {International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2020, Hangzhou, China, December 11-13, 2020},
  pages        = {225--231},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TASE49443.2020.00038},
  doi          = {10.1109/TASE49443.2020.00038},
  timestamp    = {Sun, 19 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tase/ZhangL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/GuoXL20,
  author       = {Hao Guo and
                  Zhenchang Xing and
                  Xiaohong Li},
  editor       = {Amal El Fallah Seghrouchni and
                  Gita Sukthankar and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Predicting Missing Information of Vulnerability Reports},
  booktitle    = {Companion of The 2020 Web Conference 2020, Taipei, Taiwan, April 20-24,
                  2020},
  pages        = {81--82},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366424.3382707},
  doi          = {10.1145/3366424.3382707},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/GuoXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-02456,
  author       = {Hao Guo and
                  Zhenchang Xing and
                  Xiaohong Li},
  title        = {Predicting Missing Information of Key Aspects in Vulnerability Reports},
  journal      = {CoRR},
  volume       = {abs/2008.02456},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.02456},
  eprinttype    = {arXiv},
  eprint       = {2008.02456},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-02456.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-13768,
  author       = {Wei Wang and
                  Guozhu Meng and
                  Haoyu Wang and
                  Kai Chen and
                  Weimin Ge and
                  Xiaohong Li},
  title        = {A3Ident: {A} Two-phased Approach to Identify the Leading Authors of
                  Android Apps},
  journal      = {CoRR},
  volume       = {abs/2008.13768},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.13768},
  eprinttype    = {arXiv},
  eprint       = {2008.13768},
  timestamp    = {Thu, 24 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-13768.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-09247,
  author       = {Binyu Tian and
                  Qing Guo and
                  Felix Juefei{-}Xu and
                  Wen Le Chan and
                  Yupeng Cheng and
                  Xiaohong Li and
                  Xiaofei Xie and
                  Shengchao Qin},
  title        = {Bias Field Poses a Threat to DNN-based X-Ray Recognition},
  journal      = {CoRR},
  volume       = {abs/2009.09247},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.09247},
  eprinttype    = {arXiv},
  eprint       = {2009.09247},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-09247.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aamas/ZhangLHCTXF19,
  author       = {Chengwei Zhang and
                  Xiaohong Li and
                  Jianye Hao and
                  Siqi Chen and
                  Karl Tuyls and
                  Wanli Xue and
                  Zhiyong Feng},
  title        = {{SA-IGA:} a multiagent reinforcement learning method towards socially
                  optimal outcomes},
  journal      = {Auton. Agents Multi Agent Syst.},
  volume       = {33},
  number       = {4},
  pages        = {403--429},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10458-019-09411-3},
  doi          = {10.1007/S10458-019-09411-3},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aamas/ZhangLHCTXF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangLLHLD19,
  author       = {Zhongmei Zhang and
                  Chen Liu and
                  Xiaohong Li and
                  Yanbo Han and
                  Chen Lv and
                  Weilong Ding},
  title        = {A Declarative Service-Based Method for Adaptive Aggregation of Sensor
                  Streams},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {89--98},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2884924},
  doi          = {10.1109/ACCESS.2018.2884924},
  timestamp    = {Thu, 06 Nov 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangLLHLD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SongLFX19,
  author       = {Tingyu Song and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Guangquan Xu},
  title        = {Inferring Patterns for Taint-Style Vulnerabilities With Security Patches},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {52339--52349},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2911592},
  doi          = {10.1109/ACCESS.2019.2911592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SongLFX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XuZSLCZ19,
  author       = {Guangquan Xu and
                  Yao Zhang and
                  Arun Kumar Sangaiah and
                  Xiaohong Li and
                  Aniello Castiglione and
                  Xi Zheng},
  title        = {CSP-E\({}^{\mbox{2}}\): An abuse-free contract signing protocol with
                  low-storage {TTP} for energy-efficient electronic transaction ecosystems},
  journal      = {Inf. Sci.},
  volume       = {476},
  pages        = {505--515},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.05.022},
  doi          = {10.1016/J.INS.2018.05.022},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/XuZSLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GaoLM19,
  author       = {Shu{-}Yang Gao and
                  Xiao{-}Hong Li and
                  Maode Ma},
  title        = {A Malicious Behavior Awareness and Defense Countermeasure Based on
                  LoRaWAN Protocol},
  journal      = {Sensors},
  volume       = {19},
  number       = {23},
  pages        = {5122},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19235122},
  doi          = {10.3390/S19235122},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GaoLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/XieCZLLL19,
  author       = {Xiaofei Xie and
                  Bihuan Chen and
                  Liang Zou and
                  Yang Liu and
                  Wei Le and
                  Xiaohong Li},
  title        = {Automatic Loop Summarization via Path Dependency Analysis},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {45},
  number       = {6},
  pages        = {537--557},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSE.2017.2788018},
  doi          = {10.1109/TSE.2017.2788018},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/XieCZLLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/WangHLF19,
  author       = {Ying Wang and
                  Jing Hu and
                  Xiaohong Li and
                  Zhiyong Feng},
  editor       = {Xinheng Wang and
                  Honghao Gao and
                  Muddesar Iqbal and
                  Geyong Min},
  title        = {An Efficient Mutual Authentication Framework with Conditional Privacy
                  Protection in {VANET}},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 15th {EAI} International Conference, CollaborateCom 2019, London,
                  UK, August 19-22, 2019, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {292},
  pages        = {799--815},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30146-0\_53},
  doi          = {10.1007/978-3-030-30146-0\_53},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/WangHLF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ShangML19,
  author       = {Zhengyi Shang and
                  Maode Ma and
                  Xiaohong Li},
  title        = {A Certificateless Authentication Protocol for {D2D} Group Communications
                  in 5G Cellular Networks},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9014047},
  doi          = {10.1109/GLOBECOM38437.2019.9014047},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ShangML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/WangGLF19,
  author       = {Chunyan Wang and
                  Weimin Ge and
                  Xiaohong Li and
                  Zhiyong Feng},
  editor       = {Igor V. Tetko and
                  Vera Kurkov{\'{a}} and
                  Pavel Karpov and
                  Fabian J. Theis},
  title        = {{DCT:} Differential Combination Testing of Deep Learning Systems},
  booktitle    = {Artificial Neural Networks and Machine Learning - {ICANN} 2019: Image
                  Processing - 28th International Conference on Artificial Neural Networks,
                  Munich, Germany, September 17-19, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11729},
  pages        = {697--710},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30508-6\_55},
  doi          = {10.1007/978-3-030-30508-6\_55},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icann/WangGLF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/GongXLFH19,
  author       = {Xi Gong and
                  Zhenchang Xing and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Zhuobing Han},
  editor       = {Jun Pang and
                  Jing Sun},
  title        = {Joint Prediction of Multiple Vulnerability Characteristics Through
                  Multi-Task Learning},
  booktitle    = {24th International Conference on Engineering of Complex Computer Systems,
                  {ICECCS} 2019, Guangzhou, China, November 10-13, 2019},
  pages        = {31--40},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICECCS.2019.00011},
  doi          = {10.1109/ICECCS.2019.00011},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/GongXLFH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/XiaoXLG19,
  author       = {Hongbo Xiao and
                  Zhenchang Xing and
                  Xiaohong Li and
                  Hao Guo},
  editor       = {Tom Gedeon and
                  Kok Wai Wong and
                  Minho Lee},
  title        = {Embedding and Predicting Software Security Entity Relationships: {A}
                  Knowledge Graph Based Approach},
  booktitle    = {Neural Information Processing - 26th International Conference, {ICONIP}
                  2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11955},
  pages        = {50--63},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36718-3\_5},
  doi          = {10.1007/978-3-030-36718-3\_5},
  timestamp    = {Thu, 05 Aug 2021 17:55:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/XiaoXLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/Zhang0WYHL19,
  author       = {Shouli Zhang and
                  Chen Liu and
                  Jianwu Wang and
                  Zhongguo Yang and
                  Yanbo Han and
                  Xiaohong Li},
  editor       = {Sami Yangui and
                  Ismael Bouassida Rodriguez and
                  Khalil Drira and
                  Zahir Tari},
  title        = {Latency-Aware Deployment of IoT Services in a Cloud-Edge Environment},
  booktitle    = {Service-Oriented Computing - 17th International Conference, {ICSOC}
                  2019, Toulouse, France, October 28-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11895},
  pages        = {231--236},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33702-5\_17},
  doi          = {10.1007/978-3-030-33702-5\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/Zhang0WYHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/WuD0YLFZ19,
  author       = {Hongyue Wu and
                  Shuiguang Deng and
                  Wei Li and
                  Jianwei Yin and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Albert Y. Zomaya},
  editor       = {Elisa Bertino and
                  Carl K. Chang and
                  Peter Chen and
                  Ernesto Damiani and
                  Michael Goul and
                  Katsunori Oyama},
  title        = {Mobility-Aware Service Selection in Mobile Edge Computing Systems},
  booktitle    = {2019 {IEEE} International Conference on Web Services, {ICWS} 2019,
                  Milan, Italy, July 8-13, 2019},
  pages        = {201--208},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICWS.2019.00042},
  doi          = {10.1109/ICWS.2019.00042},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icws/WuD0YLFZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/ZhangYLLHM19,
  author       = {Zhongmei Zhang and
                  Jian Yu and
                  Xiaohong Li and
                  Chen Liu and
                  Yanbo Han and
                  Yunan Ma},
  editor       = {Elisa Bertino and
                  Carl K. Chang and
                  Peter Chen and
                  Ernesto Damiani and
                  Michael Goul and
                  Katsunori Oyama},
  title        = {A Data-Driven Service Creation Approach for Effectively Capturing
                  Events from Multiple Sensor Streams},
  booktitle    = {2019 {IEEE} International Conference on Web Services, {ICWS} 2019,
                  Milan, Italy, July 8-13, 2019},
  pages        = {346--354},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICWS.2019.00063},
  doi          = {10.1109/ICWS.2019.00063},
  timestamp    = {Tue, 01 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icws/ZhangYLLHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/XieMWLLL19,
  author       = {Xiaofei Xie and
                  Lei Ma and
                  Haijun Wang and
                  Yuekang Li and
                  Yang Liu and
                  Xiaohong Li},
  editor       = {Sarit Kraus},
  title        = {DiffChaser: Detecting Disagreements for Deep Neural Networks},
  booktitle    = {Proceedings of the Twenty-Eighth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
                  2019},
  pages        = {5772--5778},
  publisher    = {ijcai.org},
  year         = {2019},
  url          = {https://doi.org/10.24963/ijcai.2019/800},
  doi          = {10.24963/IJCAI.2019/800},
  timestamp    = {Sun, 02 Nov 2025 21:27:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/XieMWLLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/LiLCXMF19,
  author       = {Hao Li and
                  Xiaohong Li and
                  Xiang Chen and
                  Xiaofei Xie and
                  Yanzhou Mu and
                  Zhiyong Feng},
  title        = {Cross-project Defect Prediction via ASTToken2Vec and BLSTM-based Neural
                  Network},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
                  Hungary, July 14-19, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IJCNN.2019.8852135},
  doi          = {10.1109/IJCNN.2019.8852135},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/LiLCXMF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/GuoCXMHLLZL19,
  author       = {Qianyu Guo and
                  Sen Chen and
                  Xiaofei Xie and
                  Lei Ma and
                  Qiang Hu and
                  Hongtao Liu and
                  Yang Liu and
                  Jianjun Zhao and
                  Xiaohong Li},
  title        = {An Empirical Study Towards Characterizing Deep Learning Development
                  and Deployment Across Different Frameworks and Platforms},
  booktitle    = {34th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2019, San Diego, CA, USA, November 11-15, 2019},
  pages        = {810--822},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ASE.2019.00080},
  doi          = {10.1109/ASE.2019.00080},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/GuoCXMHLLZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/XuGLFXB19,
  author       = {Yilin Xu and
                  Weimin Ge and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Xiaofei Xie and
                  Yude Bai},
  editor       = {Dominique M{\'{e}}ry and
                  Shengchao Qin},
  title        = {A Co-Occurrence Recommendation Model of Software Security Requirement},
  booktitle    = {2019 International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2019, Guilin, China, July 29-31, 2019},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TASE.2019.00-21},
  doi          = {10.1109/TASE.2019.00-21},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tase/XuGLFXB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/HanMLFH19,
  author       = {Kaihong Han and
                  Maode Ma and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Jianye Hao},
  title        = {An Efficient Handover Authentication Mechanism for 5G Wireless Network},
  booktitle    = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2019, Marrakesh, Morocco, April 15-18, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WCNC.2019.8885915},
  doi          = {10.1109/WCNC.2019.8885915},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/HanMLFH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-06727,
  author       = {Qianyu Guo and
                  Sen Chen and
                  Xiaofei Xie and
                  Lei Ma and
                  Qiang Hu and
                  Hongtao Liu and
                  Yang Liu and
                  Jianjun Zhao and
                  Xiaohong Li},
  title        = {An Empirical Study towards Characterizing Deep Learning Development
                  and Deployment across Different Frameworks and Platforms},
  journal      = {CoRR},
  volume       = {abs/1909.06727},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.06727},
  eprinttype    = {arXiv},
  eprint       = {1909.06727},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-06727.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LiCH18,
  author       = {Xiaohong Li and
                  Ru Cao and
                  Jianye Hao},
  title        = {An Adaptive Learning Based Network Selection Approach for 5G Dynamic
                  Environments},
  journal      = {Entropy},
  volume       = {20},
  number       = {4},
  pages        = {236},
  year         = {2018},
  url          = {https://doi.org/10.3390/e20040236},
  doi          = {10.3390/E20040236},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/LiCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiLFXF18,
  author       = {Xiaohong Li and
                  Feng Liu and
                  Zhiyong Feng and
                  Guangquan Xu and
                  Zhangjie Fu},
  title        = {A novel optimized vertical handover framework for seamless networking
                  integration in cyber-enabled systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {79},
  pages        = {417--430},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.03.031},
  doi          = {10.1016/J.FUTURE.2017.03.031},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiLFXF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/ZhangLSHL18,
  author       = {Shouli Zhang and
                  Chen Liu and
                  Shen Su and
                  Yanbo Han and
                  Xiaohong Li},
  title        = {A feature extraction method for predictive maintenance with time-lagged
                  correlation-based curve-registration model},
  journal      = {Int. J. Netw. Manag.},
  volume       = {28},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/nem.2025},
  doi          = {10.1002/NEM.2025},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/ZhangLSHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HanLHF18,
  author       = {Zhuobing Han and
                  Xiaohong Li and
                  Keman Huang and
                  Zhiyong Feng},
  title        = {A Software Defined Network-Based Security Assessment Framework for
                  CloudIoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {3},
  pages        = {1424--1434},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2018.2801944},
  doi          = {10.1109/JIOT.2018.2801944},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HanLHF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/WangXZLF18,
  author       = {Ran Wang and
                  Guangquan Xu and
                  Xianjiao Zeng and
                  Xiaohong Li and
                  Zhiyong Feng},
  title        = {{TT-XSS:} {A} novel taint tracking based dynamic detection framework
                  for {DOM} Cross-Site Scripting},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {118},
  number       = {Part},
  pages        = {100--106},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jpdc.2017.07.006},
  doi          = {10.1016/J.JPDC.2017.07.006},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/WangXZLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/HaoKSWMLM18,
  author       = {Jianye Hao and
                  Eunsuk Kang and
                  Jun Sun and
                  Zan Wang and
                  Zhaopeng Meng and
                  Xiaohong Li and
                  Zhong Ming},
  title        = {An Adaptive Markov Strategy for Defending Smart Grid False Data Injection
                  From Malicious Attackers},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {4},
  pages        = {2398--2408},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2016.2610582},
  doi          = {10.1109/TSG.2016.2610582},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/HaoKSWMLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhangLZLH18,
  author       = {Zhongmei Zhang and
                  Chen Liu and
                  Shouli Zhang and
                  Xiaohong Li and
                  Yanbo Han},
  title        = {A Service-Based Method for Multiple Sensor Streams Aggregation in
                  Fog Computing},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {8475604:1--8475604:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/8475604},
  doi          = {10.1155/2018/8475604},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/ZhangLZLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/ZhangLHSXF18,
  author       = {Chengwei Zhang and
                  Xiaohong Li and
                  Jianye Hao and
                  Sandip Sen and
                  Wanli Xue and
                  Zhiyong Feng},
  editor       = {Elisabeth Andr{\'{e}} and
                  Sven Koenig and
                  Mehdi Dastani and
                  Gita Sukthankar},
  title        = {The Dynamics of Opinion Evolution in Gossiper-Media Model with WoLS-CALA
                  Learning},
  booktitle    = {Proceedings of the 17th International Conference on Autonomous Agents
                  and MultiAgent Systems, {AAMAS} 2018, Stockholm, Sweden, July 10-15,
                  2018},
  pages        = {2159--2161},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems
                  Richland, SC, {USA} / {ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3238105},
  timestamp    = {Sat, 30 Sep 2023 09:34:53 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/ZhangLHSXF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/ZhangLHCTF18,
  author       = {Chengwei Zhang and
                  Xiaohong Li and
                  Jianye Hao and
                  Siqi Chen and
                  Karl Tuyls and
                  Zhiyong Feng},
  editor       = {Elisabeth Andr{\'{e}} and
                  Sven Koenig and
                  Mehdi Dastani and
                  Gita Sukthankar},
  title        = {SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions},
  booktitle    = {Proceedings of the 17th International Conference on Autonomous Agents
                  and MultiAgent Systems, {AAMAS} 2018, Stockholm, Sweden, July 10-15,
                  2018},
  pages        = {2162--2164},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems
                  Richland, SC, {USA} / {ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3238106},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/ZhangLHCTF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Zhang0LCXL18,
  author       = {Haitao Zhang and
                  Guoqiang Li and
                  Xiaohong Li and
                  Zhuo Cheng and
                  Jinyun Xue and
                  Shaoying Liu},
  editor       = {Michel Chaudron and
                  Ivica Crnkovic and
                  Marsha Chechik and
                  Mark Harman},
  title        = {An efficient approach for verifying automobile distributed application
                  systems on timing property},
  booktitle    = {Proceedings of the 40th International Conference on Software Engineering:
                  Companion Proceeedings, {ICSE} 2018, Gothenburg, Sweden, May 27 -
                  June 03, 2018},
  pages        = {230--231},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183440.3194945},
  doi          = {10.1145/3183440.3194945},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/Zhang0LCXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/ZhangLLH18,
  author       = {Zhongmei Zhang and
                  Chen Liu and
                  Xiaohong Li and
                  Yanbo Han},
  editor       = {Claus Pahl and
                  Maja Vukovic and
                  Jianwei Yin and
                  Qi Yu},
  title        = {A Service-Based Declarative Approach for Capturing Events from Multiple
                  Sensor Streams},
  booktitle    = {Service-Oriented Computing - 16th International Conference, {ICSOC}
                  2018, Hangzhou, China, November 12-15, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11236},
  pages        = {255--263},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03596-9\_17},
  doi          = {10.1007/978-3-030-03596-9\_17},
  timestamp    = {Mon, 26 Jun 2023 20:44:14 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/ZhangLLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/ZhangLHL18,
  author       = {Shouli Zhang and
                  Chen Liu and
                  Yanbo Han and
                  Xiaohong Li},
  title        = {Seamless Integration of Cloud and Edge with a Service-Based Approach},
  booktitle    = {2018 {IEEE} International Conference on Web Services, {ICWS} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {155--162},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICWS.2018.00027},
  doi          = {10.1109/ICWS.2018.00027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/ZhangLHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pricai/LiuZYHLB18,
  author       = {Wanshu Liu and
                  Chengwei Zhang and
                  Tianpei Yang and
                  Jianye Hao and
                  Xiaohong Li and
                  Zhijie Bao},
  editor       = {Xin Geng and
                  Byeong{-}Ho Kang},
  title        = {Achieving Multiagent Coordination Through CALA-rFMQ Learning in Continuous
                  Action Space},
  booktitle    = {{PRICAI} 2018: Trends in Artificial Intelligence - 15th Pacific Rim
                  International Conference on Artificial Intelligence, Nanjing, China,
                  August 28-31, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11013},
  pages        = {132--139},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97310-4\_15},
  doi          = {10.1007/978-3-319-97310-4\_15},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pricai/LiuZYHLB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWLHF18,
  author       = {Gaosheng Liu and
                  Xin Wang and
                  Xiaohong Li and
                  Jianye Hao and
                  Zhiyong Feng},
  title        = {{ESRQ:} An Efficient Secure Routing Method in Wireless Sensor Networks
                  Based on Q-Learning},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {149--155},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00032},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWLHF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HanLLXF18,
  author       = {Zhuobing Han and
                  Xiaohong Li and
                  Hongtao Liu and
                  Zhenchang Xing and
                  Zhiyong Feng},
  editor       = {Rocco Oliveto and
                  Massimiliano Di Penta and
                  David C. Shepherd},
  title        = {DeepWeak: Reasoning common software weaknesses via knowledge graph
                  embedding},
  booktitle    = {25th International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2018, Campobasso, Italy, March 20-23, 2018},
  pages        = {456--466},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SANER.2018.8330232},
  doi          = {10.1109/SANER.2018.8330232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/HanLLXF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-03021,
  author       = {Chengwei Zhang and
                  Xiaohong Li and
                  Jianye Hao and
                  Siqi Chen and
                  Karl Tuyls and
                  Wanli Xue},
  title        = {{SA-IGA:} {A} Multiagent Reinforcement Learning Method Towards Socially
                  Optimal Outcomes},
  journal      = {CoRR},
  volume       = {abs/1803.03021},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.03021},
  eprinttype    = {arXiv},
  eprint       = {1803.03021},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-03021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-06625,
  author       = {Chengwei Zhang and
                  Xiaohong Li and
                  Jianye Hao and
                  Siqi Chen and
                  Karl Tuyls and
                  Zhiyong Feng and
                  Wanli Xue and
                  Rong Chen},
  title        = {SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions},
  journal      = {CoRR},
  volume       = {abs/1809.06625},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.06625},
  eprinttype    = {arXiv},
  eprint       = {1809.06625},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-06625.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-05187,
  author       = {Qianyu Guo and
                  Xiaofei Xie and
                  Lei Ma and
                  Qiang Hu and
                  Ruitao Feng and
                  Li Li and
                  Yang Liu and
                  Jianjun Zhao and
                  Xiaohong Li},
  title        = {An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms},
  journal      = {CoRR},
  volume       = {abs/1811.05187},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.05187},
  eprinttype    = {arXiv},
  eprint       = {1811.05187},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-05187.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XuCRLF17,
  author       = {Guangquan Xu and
                  Yan Cao and
                  Yuanyuan Ren and
                  Xiaohong Li and
                  Zhiyong Feng},
  title        = {Network Security Situation Awareness Based on Semantic Ontology and
                  User-Defined Rules for Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {21046--21056},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2734681},
  doi          = {10.1109/ACCESS.2017.2734681},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/XuCRLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/biomedsem/ZhangLLF17,
  author       = {Chengwei Zhang and
                  Xiaohong Li and
                  Shuxin Li and
                  Zhiyong Feng},
  title        = {Dynamically analyzing cell interactions in biological environments
                  using multiagent social learning framework},
  journal      = {J. Biomed. Semant.},
  volume       = {8-S},
  number       = {1},
  pages        = {43--52},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13326-017-0142-0},
  doi          = {10.1186/S13326-017-0142-0},
  timestamp    = {Tue, 10 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/biomedsem/ZhangLLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GuoLXF17,
  author       = {Qi Guo and
                  Xiaohong Li and
                  Guangquan Xu and
                  Zhiyong Feng},
  title        = {{MP-MID:} Multi-Protocol Oriented Middleware-level Intrusion Detection
                  method for wireless sensor networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {70},
  pages        = {42--47},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.06.010},
  doi          = {10.1016/J.FUTURE.2016.06.010},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/GuoLXF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/WangXLCL17,
  author       = {Ran Wang and
                  Guangquan Xu and
                  Bin Liu and
                  Yan Cao and
                  Xiaohong Li},
  title        = {Flow Watermarking for Antinoise and Multistream Tracing in Anonymous
                  Networks},
  journal      = {{IEEE} Multim.},
  volume       = {24},
  number       = {4},
  pages        = {38--47},
  year         = {2017},
  url          = {https://doi.org/10.1109/MMUL.2017.4031314},
  doi          = {10.1109/MMUL.2017.4031314},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/WangXLCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XuZXLLRLFZ17,
  author       = {Guangquan Xu and
                  Gaoxu Zhang and
                  Chao Xu and
                  Bin Liu and
                  Mingquan Li and
                  Yan Ren and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Degan Zhang},
  title        = {A multi-attribute rating based trust model: improving the personalized
                  trust modeling framework},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {4},
  pages        = {5833--5849},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-015-2539-z},
  doi          = {10.1007/S11042-015-2539-Z},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XuZXLLRLFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/LinFCHTL17,
  author       = {Jianrui Lin and
                  Zhiyong Feng and
                  Shizhan Chen and
                  Keman Huang and
                  Wei Tan and
                  Xiaohong Li},
  editor       = {Xiaoqing (Frank) Liu and
                  Umesh Bellur},
  title        = {{ATM:} {A} Framework to Support Application State Migration in Multiple
                  Terminals Environment},
  booktitle    = {2017 {IEEE} International Conference on Services Computing, {SCC}
                  2017, Honolulu, HI, USA, June 25-30, 2017},
  pages        = {188--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SCC.2017.31},
  doi          = {10.1109/SCC.2017.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/LinFCHTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/LiLHFA17,
  author       = {Xiaohong Li and
                  Shuxin Li and
                  Jianye Hao and
                  Zhiyong Feng and
                  Bo An},
  editor       = {Satinder Singh and
                  Shaul Markovitch},
  title        = {Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack},
  booktitle    = {Proceedings of the Thirty-First {AAAI} Conference on Artificial Intelligence,
                  February 4-9, 2017, San Francisco, California, {USA}},
  pages        = {593--599},
  publisher    = {{AAAI} Press},
  year         = {2017},
  url          = {https://doi.org/10.1609/aaai.v31i1.10565},
  doi          = {10.1609/AAAI.V31I1.10565},
  timestamp    = {Tue, 10 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/LiLHFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhangLWS17,
  author       = {Shouli Zhang and
                  Xiaohong Li and
                  Jianwu Wang and
                  Shen Su},
  editor       = {Imed Romdhani and
                  Lei Shu and
                  Takahiro Hara and
                  Zhangbing Zhou and
                  Timothy J. Gordon and
                  Deze Zeng},
  title        = {Curve-Registration-Based Feature Extraction for Predictive Maintenance
                  of Industrial Equipment},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 13th International Conference, CollaborateCom 2017, Edinburgh, UK,
                  December 11-13, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {252},
  pages        = {253--263},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-00916-8\_24},
  doi          = {10.1007/978-3-030-00916-8\_24},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/ZhangLWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/LiCHF17,
  author       = {Xiaohong Li and
                  Ru Cao and
                  Jianye Hao and
                  Zhiyong Feng},
  editor       = {Alessandra Lintas and
                  Stefano Rovetta and
                  Paul F. M. J. Verschure and
                  Alessandro E. P. Villa},
  title        = {A Prediction and Learning Based Approach to Network Selection in Dynamic
                  Environments},
  booktitle    = {Artificial Neural Networks and Machine Learning - {ICANN} 2017 - 26th
                  International Conference on Artificial Neural Networks, Alghero, Italy,
                  September 11-14, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10613},
  pages        = {92--100},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68600-4\_12},
  doi          = {10.1007/978-3-319-68600-4\_12},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icann/LiCHF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/YangLFH17,
  author       = {Wei Yang and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Jianye Hao},
  title        = {TLSsem: {A} {TLS} Security-Enhanced Mechanism against {MITM} Attacks
                  in Public WiFis},
  booktitle    = {22nd International Conference on Engineering of Complex Computer Systems,
                  {ICECCS} 2017, Fukuoka, Japan, November 5-8, 2017},
  pages        = {30--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICECCS.2017.24},
  doi          = {10.1109/ICECCS.2017.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/YangLFH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/LiuLFH17,
  author       = {Yunhao Liu and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Jianye Hao},
  editor       = {Zhenhua Duan and
                  Luke Ong},
  title        = {An Improved Android Collusion Attack Detection Method Based on Program
                  Slicing},
  booktitle    = {Formal Methods and Software Engineering - 19th International Conference
                  on Formal Engineering Methods, {ICFEM} 2017, Xi'an, China, November
                  13-17, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10610},
  pages        = {315--331},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68690-5\_19},
  doi          = {10.1007/978-3-319-68690-5\_19},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfem/LiuLFH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/HanLXLF17,
  author       = {Zhuobing Han and
                  Xiaohong Li and
                  Zhenchang Xing and
                  Hongtao Liu and
                  Zhiyong Feng},
  title        = {Learning to Predict Severity of Software Vulnerability Using Only
                  Vulnerability Description},
  booktitle    = {2017 {IEEE} International Conference on Software Maintenance and Evolution,
                  {ICSME} 2017, Shanghai, China, September 17-22, 2017},
  pages        = {125--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICSME.2017.52},
  doi          = {10.1109/ICSME.2017.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/HanLXLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/ZhangLLSH17,
  author       = {Zhongmei Zhang and
                  Xiaohong Li and
                  Chen Liu and
                  Shen Su and
                  Yanbo Han},
  editor       = {Ilkay Altintas and
                  Shiping Chen},
  title        = {A Service-Based Approach to Situational Correlation and Analyses of
                  Stream Sensor Data},
  booktitle    = {2017 {IEEE} International Conference on Web Services, {ICWS} 2017,
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {572--579},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICWS.2017.67},
  doi          = {10.1109/ICWS.2017.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/ZhangLLSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/LiLHAFCZ17,
  author       = {Shuxin Li and
                  Xiaohong Li and
                  Jianye Hao and
                  Bo An and
                  Zhiyong Feng and
                  Kangjie Chen and
                  Chengwei Zhang},
  editor       = {Carles Sierra},
  title        = {Defending Against Man-In-The-Middle Attack in Repeated Games},
  booktitle    = {Proceedings of the Twenty-Sixth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
                  19-25, 2017},
  pages        = {3742--3748},
  publisher    = {ijcai.org},
  year         = {2017},
  url          = {https://doi.org/10.24963/ijcai.2017/523},
  doi          = {10.24963/IJCAI.2017/523},
  timestamp    = {Tue, 10 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/LiLHAFCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/HeLFHWZ17,
  author       = {Huijuan He and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Jianye Hao and
                  Xiaofei Wang and
                  Haijun Zhang},
  title        = {An Adaptive Handover Trigger Strategy for 5G {C/U} Plane Split Heterogeneous
                  Network},
  booktitle    = {14th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems,
                  {MASS} 2017, Orlando, FL, USA, October 22-25, 2017},
  pages        = {476--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MASS.2017.28},
  doi          = {10.1109/MASS.2017.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/HeLFHWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/LiLHXFX17,
  author       = {Hongbo Li and
                  Xiaohong Li and
                  Jianye Hao and
                  Guangquan Xu and
                  Zhiyong Feng and
                  Xiaofei Xie},
  title        = {{FESR:} {A} Framework for Eliciting Security Requirements Based on
                  Integration of Common Criteria and Weakness Detection Formal Model},
  booktitle    = {2017 {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2017, Prague, Czech Republic, July 25-29, 2017},
  pages        = {352--363},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/QRS.2017.45},
  doi          = {10.1109/QRS.2017.45},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qrs/LiLHXFX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/WangLFHXH17,
  author       = {Jiangjuan Wang and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Jianye Hao and
                  Guangquan Xu and
                  Zhuobing Han},
  editor       = {Xudong He},
  title        = {Automated Software Security Requirements Recommendation Based on {FT-SR}
                  Model},
  booktitle    = {The 29th International Conference on Software Engineering and Knowledge
                  Engineering, Wyndham Pittsburgh University Center, Pittsburgh, PA,
                  USA, July 5-7, 2017},
  pages        = {382--385},
  publisher    = {{KSI} Research Inc. and Knowledge Systems Institute Graduate School},
  year         = {2017},
  url          = {https://doi.org/10.18293/SEKE2017-040},
  doi          = {10.18293/SEKE2017-040},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/WangLFHXH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/XieCZLLL17,
  author       = {Xiaofei Xie and
                  Bihuan Chen and
                  Liang Zou and
                  Shang{-}Wei Lin and
                  Yang Liu and
                  Xiaohong Li},
  editor       = {Eric Bodden and
                  Wilhelm Sch{\"{a}}fer and
                  Arie van Deursen and
                  Andrea Zisman},
  title        = {Loopster: static loop termination analysis},
  booktitle    = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages        = {84--94},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3106237.3106260},
  doi          = {10.1145/3106237.3106260},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/XieCZLLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/XuRHLF16,
  author       = {Guangquan Xu and
                  Yuanyuan Ren and
                  Yuanbin Han and
                  Xiaohong Li and
                  Zhiyong Feng},
  title        = {Privacy Protection Method Based on Two-Factor Authentication Protocol
                  in {FRID} Systems},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {8},
  pages        = {2019--2026},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015INP0007},
  doi          = {10.1587/TRANSINF.2015INP0007},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/XuRHLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/LiXXHLFG16,
  author       = {Xiaohong Li and
                  Jiayi Xu and
                  Guangquan Xu and
                  Jianye Hao and
                  Xiaoru Li and
                  Zhiyong Feng and
                  Honghao Gao},
  title        = {Fepchecker: An Automatic Model Checker for Verifying Fairness and
                  Non-Repudiation of Security Protocols in Web Service},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {26},
  number       = {4},
  pages        = {563--586},
  year         = {2016},
  url          = {https://doi.org/10.1142/S0218194016400027},
  doi          = {10.1142/S0218194016400027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/LiXXHLFG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/XuCZZLF16,
  author       = {Guangquan Xu and
                  Yan Cao and
                  Yao Zhang and
                  Gaoxu Zhang and
                  Xiaohong Li and
                  Zhiyong Feng},
  editor       = {Jie Zhang and
                  Zeinab Noorian and
                  Stephen Marsh},
  title        = {{TRM:} Computing Reputation Score by Mining Reviews},
  booktitle    = {Incentives and Trust in Electronic Communities, Papers from the 2016
                  {AAAI} Workshop, Phoenix, Arizona, USA, February 12, 2016},
  series       = {{AAAI} Technical Report},
  volume       = {{WS-16-09}},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {http://www.aaai.org/ocs/index.php/WS/AAAIW16/paper/view/12560},
  timestamp    = {Thu, 18 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/XuCZZLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibm/ZhangLLH16,
  author       = {Chengwei Zhang and
                  Xiaohong Li and
                  Shuxin Li and
                  Jianye Hao},
  editor       = {Tianhai Tian and
                  Qinghua Jiang and
                  Yunlong Liu and
                  Kevin Burrage and
                  Jiangning Song and
                  Yadong Wang and
                  Xiaohua Hu and
                  Shinichi Morishita and
                  Qian Zhu and
                  Guohua Wang},
  title        = {Dynamic analysis of cell interactions in biological environments under
                  multiagent social learning framework},
  booktitle    = {{IEEE} International Conference on Bioinformatics and Biomedicine,
                  {BIBM} 2016, Shenzhen, China, December 15-18, 2016},
  pages        = {1673--1678},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BIBM.2016.7822770},
  doi          = {10.1109/BIBM.2016.7822770},
  timestamp    = {Tue, 21 Oct 2025 08:27:38 +0200},
  biburl       = {https://dblp.org/rec/conf/bibm/ZhangLLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/LiZHTCF16,
  author       = {Xiaohong Li and
                  Chengwei Zhang and
                  Jianye Hao and
                  Karl Tuyls and
                  Siqi Chen and
                  Zhiyong Feng},
  editor       = {Gal A. Kaminka and
                  Maria Fox and
                  Paolo Bouquet and
                  Eyke H{\"{u}}llermeier and
                  Virginia Dignum and
                  Frank Dignum and
                  Frank van Harmelen},
  title        = {Socially-Aware Multiagent Learning: Towards Socially Optimal Outcomes},
  booktitle    = {{ECAI} 2016 - 22nd European Conference on Artificial Intelligence,
                  29 August-2 September 2016, The Hague, The Netherlands - Including
                  Prestigious Applications of Artificial Intelligence {(PAIS} 2016)},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {285},
  pages        = {533--541},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-672-9-533},
  doi          = {10.3233/978-1-61499-672-9-533},
  timestamp    = {Wed, 15 Jan 2025 15:02:28 +0100},
  biburl       = {https://dblp.org/rec/conf/ecai/LiZHTCF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/ZhangLFX16,
  author       = {Xin Zhang and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Guangquan Xu},
  editor       = {Hai Wang and
                  Mounir Mokhtari},
  title        = {Universal Analysis and Detection Framework for Location Aided Routing},
  booktitle    = {21st International Conference on Engineering of Complex Computer Systems,
                  {ICECCS} 2016, Dubai, United Arab Emirates, November 6-8, 2016},
  pages        = {145--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICECCS.2016.026},
  doi          = {10.1109/ICECCS.2016.026},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/ZhangLFX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SunL16,
  author       = {Da{-}Zhi Sun and
                  Xiao{-}Hong Li},
  editor       = {Kwok{-}Yan Lam and
                  Chi{-}Hung Chi and
                  Sihan Qing},
  title        = {Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation
                  Scheme for Security Modes 2 and 3},
  booktitle    = {Information and Communications Security - 18th International Conference,
                  {ICICS} 2016, Singapore, November 29 - December 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9977},
  pages        = {403--417},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-50011-9\_31},
  doi          = {10.1007/978-3-319-50011-9\_31},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/SunL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/XieCLLL16,
  author       = {Xiaofei Xie and
                  Bihuan Chen and
                  Yang Liu and
                  Wei Le and
                  Xiaohong Li},
  editor       = {Thomas Zimmermann and
                  Jane Cleland{-}Huang and
                  Zhendong Su},
  title        = {Proteus: computing disjunctive loop summary via path dependency analysis},
  booktitle    = {Proceedings of the 24th {ACM} {SIGSOFT} International Symposium on
                  Foundations of Software Engineering, {FSE} 2016, Seattle, WA, USA,
                  November 13-18, 2016},
  pages        = {61--72},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2950290.2950340},
  doi          = {10.1145/2950290.2950340},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/XieCLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofl/ZhaoLXFH16,
  author       = {Ren Zhao and
                  Xiaohong Li and
                  Guangquan Xu and
                  Zhiyong Feng and
                  Jianye Hao},
  editor       = {Shaoying Liu and
                  Zhenhua Duan and
                  Cong Tian and
                  Fumiko Nagoya},
  title        = {{E-SSL:} An {SSL} Security-Enhanced Method for Bypassing {MITM} Attacks
                  in Mobile Internet},
  booktitle    = {Structured Object-Oriented Formal Language and Method - 6th International
                  Workshop, {SOFL+MSVL} 2016, Tokyo, Japan, November 15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10189},
  pages        = {101--120},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-57708-1\_7},
  doi          = {10.1007/978-3-319-57708-1\_7},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sofl/ZhaoLXFH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangLHF16,
  author       = {Kunding Fang and
                  Xiaohong Li and
                  Jianye Hao and
                  Zhiyong Feng},
  title        = {Formal Modeling and Verification of Security Protocols on Cloud Computing
                  Systems Based on {UML} 2.3},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {852--859},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0148},
  doi          = {10.1109/TRUSTCOM.2016.0148},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangLHF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/WangSWLSDYL15,
  author       = {Ting Wang and
                  Jun Sun and
                  Xinyu Wang and
                  Yang Liu and
                  Yuanjie Si and
                  Jin Song Dong and
                  Xiaohu Yang and
                  Xiaohong Li},
  title        = {A Systematic Study on Explicit-State Non-Zenoness Checking for Timed
                  Automata},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {41},
  number       = {1},
  pages        = {3--18},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSE.2014.2359893},
  doi          = {10.1109/TSE.2014.2359893},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/WangSWLSDYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/HanLS15,
  author       = {Zhuobing Han and
                  Xiaohong Li and
                  Eleni Stroulia},
  title        = {A Hierarchical Security-Auditing Methodology for Cloud Computing},
  booktitle    = {2015 {IEEE} International Conference on Services Computing, {SCC}
                  2015, New York City, NY, USA, June 27 - July 2, 2015},
  pages        = {202--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SCC.2015.36},
  doi          = {10.1109/SCC.2015.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/HanLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/HanMGMLS15,
  author       = {Zhuobing Han and
                  Mathieu M{\'{e}}rineau and
                  Fran{\c{c}}ois Gauthier and
                  Ettore Merlo and
                  Xiaohong Li and
                  Eleni Stroulia},
  editor       = {Jordan Gould and
                  Marin Litoiu and
                  Hanan Lutfiyya},
  title        = {Evolutionary analysis of access control models: a formal concept analysis
                  method},
  booktitle    = {Proceedings of 25th Annual International Conference on Computer Science
                  and Software Engineering, {CASCON} 2015, Markham, Ontario, Canada,
                  2-4 November, 2015},
  pages        = {261--264},
  publisher    = {{IBM} / {ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2886489},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/HanMGMLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/XuLRHZFL15,
  author       = {Guangquan Xu and
                  Bin Liu and
                  Yuanyuan Ren and
                  Runhe Huang and
                  Gaoxu Zhang and
                  Zhiyong Feng and
                  Xiaohong Li},
  title        = {Towards Trustworthy Participants in Social Participatory Networks},
  booktitle    = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2015, New York, NY, USA, November 3-5, 2015},
  pages        = {194--199},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSCloud.2015.55},
  doi          = {10.1109/CSCLOUD.2015.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/XuLRHZFL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/GuoLFX15,
  author       = {Qi Guo and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Guangquan Xu},
  title        = {{MPOID:} Multi-protocol Oriented Intrusion Detection Method for Wireless
                  Sensor Networks},
  booktitle    = {17th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
                  on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
                  Conference on Embedded Software and Systems, {ICESS} 2015, New York,
                  NY, USA, August 24-26, 2015},
  pages        = {1512--1517},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.283},
  doi          = {10.1109/HPCC-CSS-ICESS.2015.283},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/GuoLFX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/XuRLZLF15,
  author       = {Guangquan Xu and
                  Yuanyuan Ren and
                  Bin Liu and
                  Gaoxu Zhang and
                  Xiaohong Li and
                  Zhiyong Feng},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {{PEM4RFID:} Privacy Enhancement Model for {RFID} Systems},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 15th International
                  Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015.
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9530},
  pages        = {682--694},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27137-8\_49},
  doi          = {10.1007/978-3-319-27137-8\_49},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/XuRLZLF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/GengLFS15,
  author       = {Shaoguang Geng and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Da{-}Zhi Sun},
  title        = {Web Application Architecture Security Evaluation Method Based on {AADL}},
  booktitle    = {20th International Conference on Engineering of Complex Computer Systems,
                  {ICECCS} 2015, Gold Coast, Australia, December 9-12, 2015},
  pages        = {186--189},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICECCS.2015.29},
  doi          = {10.1109/ICECCS.2015.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/GengLFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/XieLLLC15,
  author       = {Xiaofei Xie and
                  Yang Liu and
                  Wei Le and
                  Xiaohong Li and
                  Hongxu Chen},
  editor       = {Michal Young and
                  Tao Xie},
  title        = {S-looper: automatic summarization for multipath string loops},
  booktitle    = {Proceedings of the 2015 International Symposium on Software Testing
                  and Analysis, {ISSTA} 2015, Baltimore, MD, USA, July 12-17, 2015},
  pages        = {188--198},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2771783.2771815},
  doi          = {10.1145/2771783.2771815},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/XieLLLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TianLHXF15,
  author       = {Dongdong Tian and
                  Xiaohong Li and
                  Jing Hu and
                  Guangquan Xu and
                  Zhiyong Feng},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {{POSTER:} API-Level Multi-policy Access Control Enforcement for Android
                  Middleware},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {559--562},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_30},
  doi          = {10.1007/978-3-319-28865-9\_30},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TianLHXF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongLHXF15,
  author       = {Jiaojiao Song and
                  Xiaohong Li and
                  Jing Hu and
                  Guangquan Xu and
                  Zhiyong Feng},
  title        = {Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.354},
  doi          = {10.1109/TRUSTCOM.2015.354},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongLHXF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/XuRZLLF15,
  author       = {Guangquan Xu and
                  Yan Ren and
                  Gaoxu Zhang and
                  Bin Liu and
                  Xiaohong Li and
                  Zhiyong Feng},
  title        = {HyCPK: Securing Identity Authentication in Ubiquitous Computing},
  booktitle    = {2015 {IEEE} 12th Intl Conf on Ubiquitous Intelligence and Computing
                  and 2015 {IEEE} 12th Intl Conf on Autonomic and Trusted Computing
                  and 2015 {IEEE} 15th Intl Conf on Scalable Computing and Communications
                  and Its Associated Workshops (UIC-ATC-ScalCom), Beijing, China, August
                  10-14, 2015},
  pages        = {239--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.56},
  doi          = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP.2015.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/XuRZLLF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/ZhangLHFS14,
  author       = {Chengwei Zhang and
                  Xiaohong Li and
                  Jing Hu and
                  Zhiyong Feng and
                  Jiaojiao Song},
  title        = {Formal Modeling and Analysis of Fairness Characterization of E-Commerce
                  Protocols},
  journal      = {J. Appl. Math.},
  volume       = {2014},
  pages        = {138370:1--138370:10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/138370},
  doi          = {10.1155/2014/138370},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jam/ZhangLHFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/LiLXHF14,
  author       = {Xiaoru Li and
                  Xiaohong Li and
                  Guangquan Xu and
                  Jing Hu and
                  Zhiyong Feng},
  title        = {Formal Analysis of Fairness for Optimistic Multiparty Contract Signing
                  Protocol},
  journal      = {J. Appl. Math.},
  volume       = {2014},
  pages        = {983204:1--983204:10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/983204},
  doi          = {10.1155/2014/983204},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jam/LiLXHF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiHFX14,
  author       = {Xiaohong Li and
                  Ke He and
                  Zhiyong Feng and
                  Guangquan Xu},
  title        = {Unified threat model for analyzing and evaluating software threats},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {10},
  pages        = {1454--1466},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.599},
  doi          = {10.1002/SEC.599},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiHFX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/ShenLFXHF14,
  author       = {Gang Shen and
                  Xiaohong Li and
                  Ruitao Feng and
                  Guangquan Xu and
                  Jing Hu and
                  Zhiyong Feng},
  title        = {An Extended {UML} Method for the Verification of Security Protocols},
  booktitle    = {2014 19th International Conference on Engineering of Complex Computer
                  Systems, Tianjin, China, August 4-7, 2014},
  pages        = {19--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICECCS.2014.12},
  doi          = {10.1109/ICECCS.2014.12},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/ShenLFXHF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/WuLFXHF14,
  author       = {Xiaofei Wu and
                  Xiaohong Li and
                  Ruitao Feng and
                  Guangquan Xu and
                  Jing Hu and
                  Zhiyong Feng},
  title        = {{OOPN-SRAM:} {A} Novel Method for Software Risk Assessment},
  booktitle    = {2014 19th International Conference on Engineering of Complex Computer
                  Systems, Tianjin, China, August 4-7, 2014},
  pages        = {150--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICECCS.2014.28},
  doi          = {10.1109/ICECCS.2014.28},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/WuLFXHF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JiaoLZXF14,
  author       = {Haofeng Jiao and
                  Xiaohong Li and
                  Lei Zhang and
                  Guangquan Xu and
                  Zhiyong Feng},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Hybrid Detection Using Permission Analysis for Android Malware},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {541--545},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_40},
  doi          = {10.1007/978-3-319-23829-6\_40},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/JiaoLZXF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofl/XieLLLFF14,
  author       = {Xiaofei Xie and
                  Xiaohong Li and
                  Yang Liu and
                  Li Li and
                  Ruitao Feng and
                  Zhiyong Feng},
  editor       = {Shaoying Liu and
                  Zhenhua Duan},
  title        = {Automatic Verification for Later-Correspondence of Security Protocols},
  booktitle    = {Structured Object-Oriented Formal Language and Method - 4th International
                  Workshop, {SOFL+MSVL} 2014, Luxembourg, Luxembourg, November 6, 2014,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8979},
  pages        = {111--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17404-4\_8},
  doi          = {10.1007/978-3-319-17404-4\_8},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sofl/XieLLLFF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tase/HanLFHXF14,
  author       = {Zhuobing Han and
                  Xiaohong Li and
                  Ruitao Feng and
                  Jing Hu and
                  Guangquan Xu and
                  Zhiyong Feng},
  title        = {A Three-Dimensional Model for Software Security Evaluation},
  booktitle    = {2014 Theoretical Aspects of Software Engineering Conference, {TASE}
                  2014, Changsha, China, September 1-3, 2014},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TASE.2014.31},
  doi          = {10.1109/TASE.2014.31},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tase/HanLFHXF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoLXZF14,
  author       = {Shuai Zhao and
                  Xiaohong Li and
                  Guangquan Xu and
                  Lei Zhang and
                  Zhiyong Feng},
  title        = {Attack Tree Based Android Malware Detection with Hybrid Analysis},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {380--387},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.49},
  doi          = {10.1109/TRUSTCOM.2014.49},
  timestamp    = {Thu, 27 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoLXZF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PeiLXF14,
  author       = {Hongbin Pei and
                  Xiaohong Li and
                  Guangquan Xu and
                  Zhiyong Feng},
  title        = {Mining Specification of Insecure Browser Extension Behavior},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {871--876},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.119},
  doi          = {10.1109/TRUSTCOM.2014.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PeiLXF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/XuLXXGLFM13,
  author       = {Guangquan Xu and
                  Weisheng Li and
                  Rui Xu and
                  Yingyuan Xiao and
                  Honghao Gao and
                  Xiaohong Li and
                  Zhiyong Feng and
                  Jia Mei},
  title        = {An algorithm on fairness verification of mobile sink routing in wireless
                  sensor network},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {17},
  number       = {5},
  pages        = {851--864},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00779-012-0536-z},
  doi          = {10.1007/S00779-012-0536-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/XuLXXGLFM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/DuLSHFF13,
  author       = {Changxiao Du and
                  Xiaohong Li and
                  Hong Shi and
                  Jing Hu and
                  Ruitao Feng and
                  Zhiyong Feng},
  editor       = {Pornsiri Muenchaisri and
                  Gregg Rothermel},
  title        = {Architecture Security Evaluation Method Based on Security of the Components},
  booktitle    = {20th Asia-Pacific Software Engineering Conference, {APSEC} 2013, Ratchathewi,
                  Bangkok, Thailand, December 2-5, 2013 - Volume 1},
  pages        = {523--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/APSEC.2013.75},
  doi          = {10.1109/APSEC.2013.75},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/DuLSHFF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/ChenT0LPL13,
  author       = {Manman Chen and
                  Tian Huat Tan and
                  Jun Sun and
                  Yang Liu and
                  Jun Pang and
                  Xiaohong Li},
  editor       = {Lindsay Groves and
                  Jing Sun},
  title        = {Verification of Functional and Non-functional Requirements of Web
                  Service Composition},
  booktitle    = {Formal Methods and Software Engineering - 15th International Conference
                  on Formal Engineering Methods, {ICFEM} 2013, Queenstown, New Zealand,
                  October 29 - November 1, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8144},
  pages        = {313--328},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41202-8\_21},
  doi          = {10.1007/978-3-642-41202-8\_21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/ChenT0LPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwl/XuXSLF13,
  author       = {Rui Xu and
                  Guangquan Xu and
                  Da{-}Zhi Sun and
                  Xiaohong Li and
                  Zhiyong Feng},
  editor       = {Dickson K. W. Chiu and
                  Minhong Wang and
                  Elvira Popescu and
                  Qing Li and
                  Rynson W. H. Lau and
                  Timothy K. Shih and
                  Chu{-}Sing Yang and
                  Demetrios G. Sampson},
  title        = {Improving KeyNote Trust Management Model Based on User Behavior for
                  Social Learning},
  booktitle    = {Advances in Web-Based Learning - {ICWL} 2013 Workshops - {USL} 2013,
                  {IWSLL} 2013, {KMEL} 2013, {IWCWL} 2013, {WIL} 2013, and {IWEEC} 2013,
                  Kenting, Taiwan, October 6-9, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8390},
  pages        = {96--103},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-46315-4\_10},
  doi          = {10.1007/978-3-662-46315-4\_10},
  timestamp    = {Wed, 24 Feb 2021 16:22:28 +0100},
  biburl       = {https://dblp.org/rec/conf/icwl/XuXSLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofl/YanLFFH13,
  author       = {Lu Yan and
                  Xiaohong Li and
                  Ruitao Feng and
                  Zhiyong Feng and
                  Jing Hu},
  editor       = {Shaoying Liu and
                  Zhenhua Duan},
  title        = {Detection Method of the Second-Order {SQL} Injection in Web Applications},
  booktitle    = {Structured Object-Oriented Formal Language and Method - Third International
                  Workshop, {SOFL+MSVL} 2013, Queenstown, New Zealand, October 29, 2013,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8332},
  pages        = {154--165},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04915-1\_11},
  doi          = {10.1007/978-3-319-04915-1\_11},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sofl/YanLFFH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LuuSLDLT12,
  author       = {Anh Tuan Luu and
                  Jun Sun and
                  Yang Liu and
                  Jin Song Dong and
                  Xiaohong Li and
                  Thanh Tho Quan},
  title        = {SeVe: automatic tool for verification of security protocols},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {6},
  number       = {1},
  pages        = {57--75},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11704-012-2903-3},
  doi          = {10.1007/S11704-012-2903-3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/LuuSLDLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgc/XuXTZLL12,
  author       = {Guangquan Xu and
                  Chao Xu and
                  Xiuming Tian and
                  Luxia Zhang and
                  Xiaohong Li and
                  Weisheng Li},
  editor       = {Jianxun Liu and
                  Jinjun Chen and
                  Guandong Xu},
  title        = {{PSO-TPS:} An Optimal Trust Path Selection Algorithm Based on Particle
                  Swarm Optimization in Small World Network},
  booktitle    = {2012 Second International Conference on Cloud and Green Computing,
                  {CGC} 2012, Xiangtan, Hunan, China, November 1-3, 2012},
  pages        = {594--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CGC.2012.81},
  doi          = {10.1109/CGC.2012.81},
  timestamp    = {Mon, 25 Aug 2025 08:52:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cgc/XuXTZLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangLLDWLF12,
  author       = {Jiangang Wang and
                  Xiaohong Li and
                  Xuhui Liu and
                  Xinshu Dong and
                  Junjie Wang and
                  Zhenkai Liang and
                  Zhiyong Feng},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {An Empirical Study of Dangerous Behaviors in Firefox Extensions},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {188--203},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_12},
  doi          = {10.1007/978-3-642-33383-5\_12},
  timestamp    = {Mon, 07 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangLLDWLF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/SunLSDL11,
  author       = {Jun Sun and
                  Yang Liu and
                  Songzheng Song and
                  Jin Song Dong and
                  Xiaohong Li},
  editor       = {Shengchao Qin and
                  Zongyan Qiu},
  title        = {{PRTS:} An Approach for Model Checking Probabilistic Real-Time Hierarchical
                  Systems},
  booktitle    = {Formal Methods and Software Engineering - 13th International Conference
                  on Formal Engineering Methods, {ICFEM} 2011, Durham, UK, October 26-28,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6991},
  pages        = {147--162},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24559-6\_12},
  doi          = {10.1007/978-3-642-24559-6\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/SunLSDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ivc/CaoWXFZL10,
  author       = {Xiaochun Cao and
                  Lin Wu and
                  Jiangjian Xiao and
                  Hassan Foroosh and
                  Jigui Zhu and
                  Xiaohong Li},
  title        = {Video synchronization and its application to object transfer},
  journal      = {Image Vis. Comput.},
  volume       = {28},
  number       = {1},
  pages        = {92--100},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.imavis.2009.04.015},
  doi          = {10.1016/J.IMAVIS.2009.04.015},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ivc/CaoWXFZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/Jin-LiangXYZR10,
  author       = {Jin{-}Liang Xing and
                  Xiaohong Li and
                  Yan Cao and
                  Zhiyong Feng and
                  Ran Liu},
  title        = {Information Flow Analysis of Web Service Net},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {1622--1626},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.287},
  doi          = {10.1109/CIT.2010.287},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/Jin-LiangXYZR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qsic/LiCFL10,
  author       = {Xiaohong Li and
                  Yan Cao and
                  Zhiyong Feng and
                  Ran Liu},
  editor       = {Ji Wang and
                  W. K. Chan and
                  Fei{-}Ching Kuo},
  title        = {Web Service Security Analysis Model Based on Program Slicing},
  booktitle    = {Proceedings of the 10th International Conference on Quality Software,
                  {QSIC} 2010, Zhangjiajie, China, 14-15 July 2010},
  pages        = {422--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/QSIC.2010.66},
  doi          = {10.1109/QSIC.2010.66},
  timestamp    = {Mon, 19 Aug 2024 08:29:06 +0200},
  biburl       = {https://dblp.org/rec/conf/qsic/LiCFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XuFLWYCR09,
  author       = {Guangquan Xu and
                  Zhiyong Feng and
                  Xiaohong Li and
                  Hutong Wu and
                  Yongxin Yu and
                  Shizhan Chen and
                  Guozheng Rao},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {TSM-Trust: {A} Time-Cognition Based Computational Model for Trust
                  Dynamics},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {385--395},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_30},
  doi          = {10.1007/978-3-642-11145-7\_30},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/XuFLWYCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscsct/HeFL08,
  author       = {Ke He and
                  Zhiyong Feng and
                  Xiaohong Li},
  title        = {An Attack Scenario Based Approach for Software Security Testing at
                  Design Stage},
  booktitle    = {2008 International Symposium on Computer Science and Computational
                  Technology, {ISCSCT} 2008, 20-22 December 2008, Shanghai, China, 2
                  Volumes},
  pages        = {782--787},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCSCT.2008.116},
  doi          = {10.1109/ISCSCT.2008.116},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscsct/HeFL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/XiaohongZtL06,
  author       = {Xiaohong Li and
                  Zhiyong Feng and
                  Tie Li and
                  Li Lv},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {A Template Language for Agent Construction},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3984},
  pages        = {32--38},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751649\_4},
  doi          = {10.1007/11751649\_4},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/XiaohongZtL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/LiYF05,
  author       = {Xiaohong Li and
                  Danjie Yang and
                  Zhiyong Feng},
  title        = {Design and Implementation of Negotiation Agent of Dynamic Supply Chain},
  booktitle    = {Third International Conference on Information Technology and Applications
                  {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  pages        = {250--255},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICITA.2005.112},
  doi          = {10.1109/ICITA.2005.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icita/LiYF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}