default search action
Xiaohong Li 0001
Person information
- affiliation: Tianjin University, College of Intelligence and Computing, Institute of Software and Information Security Engineering, Tianjin, China
- affiliation: Tianjin University, College of Intelligence and Computing, School of Computer Science and Technology, Tianjin Key Laboratory of Advanced Networking, Tianjin, China
Other persons with the same name
- Xiaohong Li — disambiguation page
- Xiaohong Li 0002 (aka: Xiao-Hong Li 0002) — Hefei University of Technology, School of Computer Science and Information Engineering, Hefei, China
- Xiaohong Li 0003 — Wuhan University, School of Computer Science, Wuhan, China
- Xiaohong Li 0004 (aka: Xiao-Hong Li 0004) — Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
- Xiaohong Li 0005 — University of Louisville School of Medicine, Department of Anatomical Sciences and Neurobiology, Louisville, KY, USA
- Xiaohong Li 0006 — Fred Hutchinson Cancer Research Center, Seattle, WA, USA
- Xiaohong Li 0007 — University of Texas at Austin, Austin, TX, USA
- Xiaohong Li 0008 — Xi'an Jiaotong University, School of Management, State Key Laboratory for Manufacturing System Engineering, Xi'an, China (and 1 more)
- Xiaohong Li 0009 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Key Laboratory of Digital Earth Science, Beijing, China
- Xiaohong Li 0010 — Center for Medical Imaging and Medical Informatics, Coral Gables, FL, USA
- Xiaohong Li 0011 — Ministry of Education, Key Laboratory for the Exploitation of South West Resources and the Environmental Disaster Control Engineering, Chongqing, China (and 1 more)
- Xiaohong Li 0012 — Northwest Normal University, College of Computer Science and Engineering, Lanzhou, China
- Xiaohong Li 0013 — Nankai University, College of Computer and Control Engineering, Tianjin, China
- Xiaohong Li 0014 — Shaoyang University, College of Information Engineering, Provincial Key Laboratory of Informational Service for Rural Area of Southwestern Hunan, Shaoyang, China
- Xiaohong Li 0015 — Donghua University, School of Business and Management, Shanghai, China
- Xiaohong Li 0016 — Liaocheng University, Physics Science and Information Engineering College, Liaocheng, China
- Xiaohong Li 0017 — Eurasia University, School of Information Engineering, Xi'an, China
- Xiaohong Li 0018 — University of Minnesota, Department of Genetics, Cell Biology and Development, Center for Genome Engineering, Minneapolis, MN, USA
- Xiaohong Li 0019 — Jilin Province Economic Management Cadre College, Changchun,China
- Xiaohong Li 0020 — Southwest Medical University, Affiliated Hospital, Luzhou, China
- Xiaohong Li 0021 — Chinese Academy of Forestry, Institute of Forest Resources Information Technique, Beijing, China
- Xiaohong Li 0022 — Dalian Polytechnic University, Information Science and Engineering School, Dalian, China
- Xiaohong Li 0023 — Tsinghua University, School of Software, Beijing, China
- Xiaohong Li 0024 — Beijing Jiaotong University, School of Traffic and Transportation, Beijing, China
- Xiao-Hong Li 0025 — Jiangxi University of Science and Technology, School of Applied Science, Ganzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Qiaoyun Yin, Zhiyong Feng, Xiaohong Li, Shizhan Chen, Hongyue Wu, Gaoyong Han:
Tackling data-heterogeneity variations in federated learning via adaptive aggregate weights. Knowl. Based Syst. 304: 112484 (2024) - [j39]Hua Zhang, Xiaohong Li, Xiaochun Cao, Hassan Foroosh:
Multiple Adverse Weather Conditions Adaptation for Object Detection via Causal Intervention. IEEE Trans. Pattern Anal. Mach. Intell. 46(3): 1742-1756 (2024) - [j38]Yongyang Lv, Ruitao Feng, Maode Ma, Manqing Zhu, Hanwei Wu, Xiaohong Li:
Reinventing Multi-User Authentication Security From Cross-Chain Perspective. IEEE Trans. Inf. Forensics Secur. 19: 8908-8923 (2024) - [c108]Manqing Zhu, Lingxiao Wang, Xiaohong Li:
Design and Optimization of Smart Contracts for Cross-Domain Sharing of Sensitive Data. ICPADS 2024: 633-640 - [c107]Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. ICSE 2024: 34:1-34:13 - [c106]Qi Guo, Xiaohong Li, Xiaofei Xie, Shangqing Liu, Ze Tang, Ruitao Feng, Junjie Wang, Jidong Ge, Lei Bu:
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion. ISSTA 2024: 313-324 - [c105]Ruitao Feng, Sen Li, Sen Chen, Mengmeng Ge, Xuewei Li, Xiaohong Li:
Unmasking the Lurking: Malicious Behavior Detection for IoT Malware with Multi-label Classification. LCTES 2024: 95-106 - [i15]Qi Guo, Xiaohong Li, Xiaofei Xie, Shangqing Liu, Ze Tang, Ruitao Feng, Junjie Wang, Jidong Ge, Lei Bu:
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion. CoRR abs/2404.01554 (2024) - [i14]Qijing Qiao, Ruitao Feng, Sen Chen, Fei Zhang, Xiaohong Li:
Multi-label Classification for Android Malware Based on Active Learning. CoRR abs/2410.06444 (2024) - 2023
- [j37]Yude Bai, Sen Chen, Zhenchang Xing, Xiaohong Li:
ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph. Sci. China Inf. Sci. 66(9) (2023) - [j36]Chengwei Zhang, Dina Fang, Sandip Sen, Xiaohong Li, Zhiyong Feng, Wanli Xue, Dou An, Xintian Zhao, Rong Chen:
Opinion Dynamics in Gossiper-Media Networks Based on Multiagent Reinforcement Learning. IEEE Trans. Netw. Sci. Eng. 10(2): 1143-1156 (2023) - [j35]Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, Zhiyong Feng, Xiaohong Li, Linyi Han:
Extraction of Phrase-based Concepts in Vulnerability Descriptions through Unsupervised Labeling. ACM Trans. Softw. Eng. Methodol. 32(5): 112:1-112:45 (2023) - [j34]Yao Zhang, Xiaofei Xie, Yi Li, Yun Lin, Sen Chen, Yang Liu, Xiaohong Li:
Demystifying Performance Regressions in String Solvers. IEEE Trans. Software Eng. 49(3): 947-961 (2023) - [c104]Sen Li, Mengmeng Ge, Ruitao Feng, Xiaohong Li, Kwok-Yan Lam:
Automatic Detection and Analysis towards Malicious Behavior in IoT Malware. ICDM (Workshops) 2023: 1332-1341 - [c103]Fei Zhang, Ruitao Feng, Xiaofei Xie, Xiaohong Li, Lianshuan Shi:
SeqAdver: Automatic Payload Construction and Injection in Sequence-based Android Adversarial Attack. ICDM (Workshops) 2023: 1342-1351 - [c102]Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. ASE 2023: 686-697 - [c101]Yuxin Zhang, Sen Chen, Lingling Fan, Chunyang Chen, Xiaohong Li:
Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps. ESEC/SIGSOFT FSE 2023: 1255-1267 - [i13]Yuxin Zhang, Sen Chen, Lingling Fan, Chunyang Chen, Xiaohong Li:
Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps. CoRR abs/2308.09029 (2023) - [i12]Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. CoRR abs/2309.08221 (2023) - [i11]Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. CoRR abs/2312.03335 (2023) - 2022
- [j33]Chengwei Zhang, Zhuobing Han, Bingfu Liu, Wanli Xue, Jianye Hao, Xiaohong Li, Dou An, Rong Chen:
SCC-rFMQ: a multiagent reinforcement learning method in cooperative Markov games with continuous actions. Int. J. Mach. Learn. Cybern. 13(7): 1927-1944 (2022) - [j32]Hao Guo, Sen Chen, Zhenchang Xing, Xiaohong Li, Yude Bai, Jiamou Sun:
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions. ACM Trans. Softw. Eng. Methodol. 31(3): 49:1-49:27 (2022) - [c100]Guoqing Yan, Sen Chen, Yude Bai, Xiaohong Li:
Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability Detection? COMPSAC 2022: 904-913 - [c99]Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. ASE 2022: 105:1-105:13 - [c98]Xiuhan Shi, Xiaofei Xie, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li:
Large-scale analysis of non-termination bugs in real-world OSS projects. ESEC/SIGSOFT FSE 2022: 256-268 - [i10]Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. CoRR abs/2209.04791 (2022) - 2021
- [j31]Yude Bai, Zhenchang Xing, Duoyuan Ma, Xiaohong Li, Zhiyong Feng:
Comparative analysis of feature representations and machine learning methods in Android family classification. Comput. Networks 184: 107639 (2021) - [c97]Yuxuan Li, Ruitao Feng, Sen Chen, Qianyu Guo, Lingling Fan, Xiaohong Li:
IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps. APSEC 2021: 202-212 - [c96]Hui Jin, Weimin Ge, Yao Zhang, Xiaohong Li, Zhidong Deng:
Loopster++: Termination Analysis for Multi-path Linear Loop. CollaborateCom (1) 2021: 479-497 - [c95]Liu Yuan, Yude Bai, Zhenchang Xing, Sen Chen, Xiaohong Li, Zhidong Deng:
Predicting Entity Relations across Different Security Databases by Using Graph Attention Network. COMPSAC 2021: 834-843 - [c94]Hao Guo, Zhenchang Xing, Sen Chen, Xiaohong Li, Yude Bai, Hu Zhang:
Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases. COMPSAC 2021: 1020-1025 - [c93]Fengye Yu, Maode Ma, Xiaohong Li:
A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks. ICC 2021: 1-6 - [c92]Binyu Tian, Qing Guo, Felix Juefei-Xu, Wen Le Chan, Yupeng Cheng, Xiaohong Li, Xiaofei Xie, Shengchao Qin:
Bias Field Poses a Threat to DNN-Based X-Ray Recognition. ICME 2021: 1-6 - [c91]Shouli Zhang, Chen Liu, Han Li, Zhuofeng Zhao, Xiaohong Li:
Service Deployment with Predictive Ability for Data Stream Processing in a Cloud-Edge Environment. ICSOC 2021: 781-789 - [c90]Binyu Tian, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Xiaohong Li, Yang Liu:
AVA: Adversarial Vignetting Attack against Visual Recognition. IJCAI 2021: 1046-1053 - [c89]Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, Zhiyong Feng, Xiaohong Li, Linyi Han:
Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions. ASE 2021: 943-954 - [c88]Siqi Li, Yun Lin, Xiaofei Xie, Yuekang Li, Xiaohong Li, Weimin Ge, Yang Liu, Jin Song Dong:
A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing. ASE 2021: 1186-1189 - [c87]Sofonias Yitagesu, Xiaowang Zhang, Zhiyong Feng, Xiaohong Li, Zhenchang Xing:
Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions. MSR 2021: 29-40 - [c86]Qianqian Zhang, Yao Zhang, Xiao-Hong Li, Bin Wu:
Discovering Properties about Arrays via Path Dependence Analysis. TASE 2021: 55-62 - [c85]Yingwen Lin, Yao Zhang, Sen Chen, Fu Song, Xiaofei Xie, Xiaohong Li, Lintan Sun:
Inferring Loop Invariants for Multi-Path Loops. TASE 2021: 63-70 - [c84]Jinghui Lyu, Yude Bai, Zhenchang Xing, Xiaohong Li, Weimin Ge:
A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability. TASE 2021: 119-126 - [c83]Mingxi Tan, Dazhi Sun, Xiaohong Li:
A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN. WCNC 2021: 1-7 - [i9]Jiamou Sun, Zhenchang Xing, Hao Guo, Deheng Ye, Xiaohong Li, Xiwei Xu, Liming Zhu:
Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization. CoRR abs/2101.01431 (2021) - [i8]Binyu Tian, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Xiaohong Li, Yang Liu:
AVA: Adversarial Vignetting Attack against Visual Recognition. CoRR abs/2105.05558 (2021) - 2020
- [j30]Haodi Zhang, Jianye Hao, Xiaohong Li:
A Method for Deploying Distributed Denial of Service Attack Defense Strategies on Edge Servers Using Reinforcement Learning. IEEE Access 8: 78482-78491 (2020) - [j29]Zhuobing Han, Xiaohong Li, Guangquan Xu, Naixue Xiong, Ettore Merlo, Eleni Stroulia:
An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models. IEEE Trans. Ind. Informatics 16(2): 1024-1034 (2020) - [j28]Zhengyi Shang, Maode Ma, Xiaohong Li:
A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks. IEEE Trans. Wirel. Commun. 19(11): 7021-7032 (2020) - [c82]Duoyuan Ma, Yude Bai, Zhenchang Xing, Lintan Sun, Xiaohong Li:
A Knowledge Graph-based Sensitive Feature Selection for Android Malware Classification. APSEC 2020: 188-197 - [c81]Lingjun Zhou, Bing Yu, David Berend, Xiaofei Xie, Xiaohong Li, Jianjun Zhao, Xusheng Liu:
An Empirical Study on Robustness of DNNs with Out-of-Distribution Awareness. APSEC 2020: 266-275 - [c80]Xingwei An, Xiangtong Zhou, Wenxiao Zhong, Shuang Liu, Xiaohong Li, Dong Ming:
Weighted Subject-Semi-Independent ERP-based Brain-Computer Interface. EMBC 2020: 2969-2972 - [c79]Yude Bai, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Duoyuan Ma:
Unsuccessful story about few shot malware family classification and siamese network to the rescue. ICSE 2020: 1560-1571 - [c78]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. ICSME 2020: 617-628 - [c77]Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen:
Audee: Automated Testing for Deep Learning Frameworks. ASE 2020: 486-498 - [c76]Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu:
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations. ASE 2020: 524-535 - [c75]Mengmeng Jiang, Xiaohong Li, Xiaofei Xie, Yao Zhang:
An Empirical Study in Software Verification Tools. TASE 2020: 201-208 - [c74]Yu Zhang, Xiaohong Li:
The Scheme of Security Requirement Acquisition Based on Knowledge Graph. TASE 2020: 225-231 - [c73]Hao Guo, Zhenchang Xing, Xiaohong Li:
Predicting Missing Information of Vulnerability Reports. WWW (Companion Volume) 2020: 81-82 - [i7]Hao Guo, Zhenchang Xing, Xiaohong Li:
Predicting Missing Information of Key Aspects in Vulnerability Reports. CoRR abs/2008.02456 (2020) - [i6]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. CoRR abs/2008.13768 (2020) - [i5]Binyu Tian, Qing Guo, Felix Juefei-Xu, Wen Le Chan, Yupeng Cheng, Xiaohong Li, Xiaofei Xie, Shengchao Qin:
Bias Field Poses a Threat to DNN-based X-Ray Recognition. CoRR abs/2009.09247 (2020)
2010 – 2019
- 2019
- [j27]Chengwei Zhang, Xiaohong Li, Jianye Hao, Siqi Chen, Karl Tuyls, Wanli Xue, Zhiyong Feng:
SA-IGA: a multiagent reinforcement learning method towards socially optimal outcomes. Auton. Agents Multi Agent Syst. 33(4): 403-429 (2019) - [j26]Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han, Chen Lv, Weilong Ding:
A Declarative Service-Based Method for Adaptive Aggregation of Sensor Streams. IEEE Access 7: 89-98 (2019) - [j25]Tingyu Song, Xiaohong Li, Zhiyong Feng, Guangquan Xu:
Inferring Patterns for Taint-Style Vulnerabilities With Security Patches. IEEE Access 7: 52339-52349 (2019) - [j24]Guangquan Xu, Yao Zhang, Arun Kumar Sangaiah, Xiaohong Li, Aniello Castiglione, Xi Zheng:
CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf. Sci. 476: 505-515 (2019) - [j23]Shu-Yang Gao, Xiao-Hong Li, Maode Ma:
A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol. Sensors 19(23): 5122 (2019) - [j22]Xiaofei Xie, Bihuan Chen, Liang Zou, Yang Liu, Wei Le, Xiaohong Li:
Automatic Loop Summarization via Path Dependency Analysis. IEEE Trans. Software Eng. 45(6): 537-557 (2019) - [c72]Ying Wang, Jing Hu, Xiaohong Li, Zhiyong Feng:
An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET. CollaborateCom 2019: 799-815 - [c71]Zhengyi Shang, Maode Ma, Xiaohong Li:
A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks. GLOBECOM 2019: 1-7 - [c70]Chunyan Wang, Weimin Ge, Xiaohong Li, Zhiyong Feng:
DCT: Differential Combination Testing of Deep Learning Systems. ICANN (3) 2019: 697-710 - [c69]Xi Gong, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Zhuobing Han:
Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning. ICECCS 2019: 31-40 - [c68]Hongbo Xiao, Zhenchang Xing, Xiaohong Li, Hao Guo:
Embedding and Predicting Software Security Entity Relationships: A Knowledge Graph Based Approach. ICONIP (3) 2019: 50-63 - [c67]Shouli Zhang, Chen Liu, Jianwu Wang, Zhongguo Yang, Yanbo Han, Xiaohong Li:
Latency-Aware Deployment of IoT Services in a Cloud-Edge Environment. ICSOC 2019: 231-236 - [c66]Hongyue Wu, Shuiguang Deng, Wei Li, Jianwei Yin, Xiaohong Li, Zhiyong Feng, Albert Y. Zomaya:
Mobility-Aware Service Selection in Mobile Edge Computing Systems. ICWS 2019: 201-208 - [c65]Zhongmei Zhang, Jian Yu, Xiaohong Li, Chen Liu, Yanbo Han, Yunan Ma:
A Data-Driven Service Creation Approach for Effectively Capturing Events from Multiple Sensor Streams. ICWS 2019: 346-354 - [c64]Xiaofei Xie, Lei Ma, Haijun Wang, Yuekang Li, Yang Liu, Xiaohong Li:
DiffChaser: Detecting Disagreements for Deep Neural Networks. IJCAI 2019: 5772-5778 - [c63]Hao Li, Xiaohong Li, Xiang Chen, Xiaofei Xie, Yanzhou Mu, Zhiyong Feng:
Cross-project Defect Prediction via ASTToken2Vec and BLSTM-based Neural Network. IJCNN 2019: 1-8 - [c62]Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms. ASE 2019: 810-822 - [c61]Yilin Xu, Weimin Ge, Xiaohong Li, Zhiyong Feng, Xiaofei Xie, Yude Bai:
A Co-Occurrence Recommendation Model of Software Security Requirement. TASE 2019: 41-48 - [c60]Kaihong Han, Maode Ma, Xiaohong Li, Zhiyong Feng, Jianye Hao:
An Efficient Handover Authentication Mechanism for 5G Wireless Network. WCNC 2019: 1-8 - [i4]Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms. CoRR abs/1909.06727 (2019) - 2018
- [j21]Xiaohong Li, Ru Cao, Jianye Hao:
An Adaptive Learning Based Network Selection Approach for 5G Dynamic Environments. Entropy 20(4): 236 (2018) - [j20]Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu:
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems. Future Gener. Comput. Syst. 79: 417-430 (2018) - [j19]Shouli Zhang, Chen Liu, Shen Su, Yanbo Han, Xiaohong Li:
A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model. Int. J. Netw. Manag. 28(5) (2018) - [j18]Zhuobing Han, Xiaohong Li, Keman Huang, Zhiyong Feng:
A Software Defined Network-Based Security Assessment Framework for CloudIoT. IEEE Internet Things J. 5(3): 1424-1434 (2018) - [j17]Ran Wang, Guangquan Xu, Xianjiao Zeng, Xiaohong Li, Zhiyong Feng:
TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting. J. Parallel Distributed Comput. 118(Part): 100-106 (2018) - [j16]Jianye Hao, Eunsuk Kang, Jun Sun, Zan Wang, Zhaopeng Meng, Xiaohong Li, Zhong Ming:
An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers. IEEE Trans. Smart Grid 9(4): 2398-2408 (2018) - [j15]Zhongmei Zhang, Chen Liu, Shouli Zhang, Xiaohong Li, Yanbo Han:
A Service-Based Method for Multiple Sensor Streams Aggregation in Fog Computing. Wirel. Commun. Mob. Comput. 2018: 8475604:1-8475604:11 (2018) - [c59]Chengwei Zhang, Xiaohong Li, Jianye Hao, Sandip Sen, Wanli Xue, Zhiyong Feng:
The Dynamics of Opinion Evolution in Gossiper-Media Model with WoLS-CALA Learning. AAMAS 2018: 2159-2161 - [c58]Chengwei Zhang, Xiaohong Li, Jianye Hao, Siqi Chen, Karl Tuyls, Zhiyong Feng:
SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions. AAMAS 2018: 2162-2164 - [c57]Haitao Zhang, Guoqiang Li, Xiaohong Li, Zhuo Cheng, Jinyun Xue, Shaoying Liu:
An efficient approach for verifying automobile distributed application systems on timing property. ICSE (Companion Volume) 2018: 230-231 - [c56]Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han:
A Service-Based Declarative Approach for Capturing Events from Multiple Sensor Streams. ICSOC 2018: 255-263 - [c55]Shouli Zhang, Chen Liu, Yanbo Han, Xiaohong Li:
Seamless Integration of Cloud and Edge with a Service-Based Approach. ICWS 2018: 155-162 - [c54]Wanshu Liu, Chengwei Zhang, Tianpei Yang, Jianye Hao, Xiaohong Li, Zhijie Bao:
Achieving Multiagent Coordination Through CALA-rFMQ Learning in Continuous Action Space. PRICAI 2018: 132-139 - [c53]Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng:
ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning. TrustCom/BigDataSE 2018: 149-155 - [c52]Zhuobing Han, Xiaohong Li, Hongtao Liu, Zhenchang Xing, Zhiyong Feng:
DeepWeak: Reasoning common software weaknesses via knowledge graph embedding. SANER 2018: 456-466 - [i3]Chengwei Zhang, Xiaohong Li, Jianye Hao, Siqi Chen, Karl Tuyls, Wanli Xue:
SA-IGA: A Multiagent Reinforcement Learning Method Towards Socially Optimal Outcomes. CoRR abs/1803.03021 (2018) - [i2]Chengwei Zhang, Xiaohong Li, Jianye Hao, Siqi Chen, Karl Tuyls, Zhiyong Feng, Wanli Xue, Rong Chen:
SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions. CoRR abs/1809.06625 (2018) - [i1]Qianyu Guo, Xiaofei Xie, Lei Ma, Qiang Hu, Ruitao Feng, Li Li, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms. CoRR abs/1811.05187 (2018) - 2017
- [j14]Guangquan Xu, Yan Cao, Yuanyuan Ren, Xiaohong Li, Zhiyong Feng:
Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things. IEEE Access 5: 21046-21056 (2017) - [j13]Chengwei Zhang, Xiaohong Li, Shuxin Li, Zhiyong Feng:
Dynamically analyzing cell interactions in biological environments using multiagent social learning framework. J. Biomed. Semant. 8-S(1): 43-52 (2017) - [j12]Qi Guo, Xiaohong Li, Guangquan Xu, Zhiyong Feng:
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks. Future Gener. Comput. Syst. 70: 42-47 (2017) - [j11]Ran Wang, Guangquan Xu, Bin Liu, Yan Cao, Xiaohong Li:
Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks. IEEE Multim. 24(4): 38-47 (2017) - [j10]Guangquan Xu, Gaoxu Zhang, Chao Xu, Bin Liu, Mingquan Li, Yan Ren, Xiaohong Li, Zhiyong Feng, Degan Zhang:
A multi-attribute rating based trust model: improving the personalized trust modeling framework. Multim. Tools Appl. 76(4): 5833-5849 (2017) - [c51]Jianrui Lin, Zhiyong Feng, Shizhan Chen, Keman Huang, Wei Tan, Xiaohong Li:
ATM: A Framework to Support Application State Migration in Multiple Terminals Environment. SCC 2017: 188-195 - [c50]Xiaohong Li, Shuxin Li, Jianye Hao, Zhiyong Feng, Bo An:
Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack. AAAI 2017: 593-599 - [c49]Shouli Zhang, Xiaohong Li, Jianwu Wang, Shen Su:
Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment. CollaborateCom 2017: 253-263 - [c48]Xiaohong Li, Ru Cao, Jianye Hao, Zhiyong Feng:
A Prediction and Learning Based Approach to Network Selection in Dynamic Environments. ICANN (1) 2017: 92-100 - [c47]Wei Yang, Xiaohong Li, Zhiyong Feng, Jianye Hao:
TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis. ICECCS 2017: 30-39 - [c46]Yunhao Liu, Xiaohong Li, Zhiyong Feng, Jianye Hao:
An Improved Android Collusion Attack Detection Method Based on Program Slicing. ICFEM 2017: 315-331 - [c45]Zhuobing Han, Xiaohong Li, Zhenchang Xing, Hongtao Liu, Zhiyong Feng:
Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description. ICSME 2017: 125-136 - [c44]Zhongmei Zhang, Xiaohong Li, Chen Liu, Shen Su, Yanbo Han:
A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data. ICWS 2017: 572-579 - [c43]Shuxin Li, Xiaohong Li, Jianye Hao, Bo An, Zhiyong Feng, Kangjie Chen, Chengwei Zhang:
Defending Against Man-In-The-Middle Attack in Repeated Games. IJCAI 2017: 3742-3748 - [c42]Huijuan He, Xiaohong Li, Zhiyong Feng, Jianye Hao, Xiaofei Wang, Haijun Zhang:
An Adaptive Handover Trigger Strategy for 5G C/U Plane Split Heterogeneous Network. MASS 2017: 476-480 - [c41]Hongbo Li, Xiaohong Li, Jianye Hao, Guangquan Xu, Zhiyong Feng, Xiaofei Xie:
FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model. QRS 2017: 352-363 - [c40]Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han:
Automated Software Security Requirements Recommendation Based on FT-SR Model. SEKE 2017: 382-385 - [c39]Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li:
Loopster: static loop termination analysis. ESEC/SIGSOFT FSE 2017: 84-94 - 2016
- [j9]Guangquan Xu, Yuanyuan Ren, Yuanbin Han, Xiaohong Li, Zhiyong Feng:
Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems. IEICE Trans. Inf. Syst. 99-D(8): 2019-2026 (2016) - [j8]Xiaohong Li, Jiayi Xu, Guangquan Xu, Jianye Hao, Xiaoru Li, Zhiyong Feng, Honghao Gao:
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service. Int. J. Softw. Eng. Knowl. Eng. 26(4): 563-586 (2016) - [c38]Guangquan Xu, Yan Cao, Yao Zhang, Gaoxu Zhang, Xiaohong Li, Zhiyong Feng:
TRM: Computing Reputation Score by Mining Reviews. AAAI Workshop: Incentives and Trust in Electronic Communities 2016 - [c37]Chengwei Zhang, Xiaohong Li, Shuxin Li, Jianye Hao:
Dynamic analysis of cell interactions in biological environments under multiagent social learning framework. BIBM 2016: 1673-1678 - [c36]Xiaohong Li, Chengwei Zhang, Jianye Hao, Karl Tuyls, Siqi Chen, Zhiyong Feng:
Socially-Aware Multiagent Learning: Towards Socially Optimal Outcomes. ECAI 2016: 533-541 - [c35]Xin Zhang, Xiaohong Li, Zhiyong Feng, Guangquan Xu:
Universal Analysis and Detection Framework for Location Aided Routing. ICECCS 2016: 145-154 - [c34]Da-Zhi Sun, Xiao-Hong Li:
Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3. ICICS 2016: 403-417 - [c33]Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li:
Proteus: computing disjunctive loop summary via path dependency analysis. SIGSOFT FSE 2016: 61-72 - [c32]Ren Zhao, Xiaohong Li, Guangquan Xu, Zhiyong Feng, Jianye Hao:
E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet. SOFL+MSVL 2016: 101-120 - [c31]Kunding Fang, Xiaohong Li, Jianye Hao, Zhiyong Feng:
Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3. Trustcom/BigDataSE/ISPA 2016: 852-859 - 2015
- [j7]Ting Wang, Jun Sun, Xinyu Wang, Yang Liu, Yuanjie Si, Jin Song Dong, Xiaohu Yang, Xiaohong Li:
A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata. IEEE Trans. Software Eng. 41(1): 3-18 (2015) - [c30]Zhuobing Han, Xiaohong Li, Eleni Stroulia:
A Hierarchical Security-Auditing Methodology for Cloud Computing. SCC 2015: 202-209 - [c29]Zhuobing Han, Mathieu Mérineau, François Gauthier, Ettore Merlo, Xiaohong Li, Eleni Stroulia:
Evolutionary analysis of access control models: a formal concept analysis method. CASCON 2015: 261-264 - [c28]Guangquan Xu, Bin Liu, Yuanyuan Ren, Runhe Huang, Gaoxu Zhang, Zhiyong Feng, Xiaohong Li:
Towards Trustworthy Participants in Social Participatory Networks. CSCloud 2015: 194-199 - [c27]Qi Guo, Xiaohong Li, Zhiyong Feng, Guangquan Xu:
MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks. HPCC/CSS/ICESS 2015: 1512-1517 - [c26]Guangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li, Zhiyong Feng:
PEM4RFID: Privacy Enhancement Model for RFID Systems. ICA3PP (3) 2015: 682-694 - [c25]Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Da-Zhi Sun:
Web Application Architecture Security Evaluation Method Based on AADL. ICECCS 2015: 186-189 - [c24]Xiaofei Xie, Yang Liu, Wei Le, Xiaohong Li, Hongxu Chen:
S-looper: automatic summarization for multipath string loops. ISSTA 2015: 188-198 - [c23]Dongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:
POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware. SecureComm 2015: 559-562 - [c22]Jiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng:
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor. TrustCom/BigDataSE/ISPA (1) 2015: 33-40 - [c21]Guangquan Xu, Yan Ren, Gaoxu Zhang, Bin Liu, Xiaohong Li, Zhiyong Feng:
HyCPK: Securing Identity Authentication in Ubiquitous Computing. UIC/ATC/ScalCom 2015: 239-246 - 2014
- [j6]Chengwei Zhang, Xiaohong Li, Jing Hu, Zhiyong Feng, Jiaojiao Song:
Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols. J. Appl. Math. 2014: 138370:1-138370:10 (2014) - [j5]Xiaoru Li, Xiaohong Li, Guangquan Xu, Jing Hu, Zhiyong Feng:
Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol. J. Appl. Math. 2014: 983204:1-983204:10 (2014) - [j4]Xiaohong Li, Ke He, Zhiyong Feng, Guangquan Xu:
Unified threat model for analyzing and evaluating software threats. Secur. Commun. Networks 7(10): 1454-1466 (2014) - [c20]Gang Shen, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng:
An Extended UML Method for the Verification of Security Protocols. ICECCS 2014: 19-28 - [c19]Xiaofei Wu, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng:
OOPN-SRAM: A Novel Method for Software Risk Assessment. ICECCS 2014: 150-153 - [c18]Haofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu, Zhiyong Feng:
Hybrid Detection Using Permission Analysis for Android Malware. SecureComm (1) 2014: 541-545 - [c17]Xiaofei Xie, Xiaohong Li, Yang Liu, Li Li, Ruitao Feng, Zhiyong Feng:
Automatic Verification for Later-Correspondence of Security Protocols. SOFL+MSVL 2014: 111-126 - [c16]Zhuobing Han, Xiaohong Li, Ruitao Feng, Jing Hu, Guangquan Xu, Zhiyong Feng:
A Three-Dimensional Model for Software Security Evaluation. TASE 2014: 34-41 - [c15]Shuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang, Zhiyong Feng:
Attack Tree Based Android Malware Detection with Hybrid Analysis. TrustCom 2014: 380-387 - [c14]Hongbin Pei, Xiaohong Li, Guangquan Xu, Zhiyong Feng:
Mining Specification of Insecure Browser Extension Behavior. TrustCom 2014: 871-876 - 2013
- [j3]Guangquan Xu, Weisheng Li, Rui Xu, Yingyuan Xiao, Honghao Gao, Xiaohong Li, Zhiyong Feng, Jia Mei:
An algorithm on fairness verification of mobile sink routing in wireless sensor network. Pers. Ubiquitous Comput. 17(5): 851-864 (2013) - [c13]Changxiao Du, Xiaohong Li, Hong Shi, Jing Hu, Ruitao Feng, Zhiyong Feng:
Architecture Security Evaluation Method Based on Security of the Components. APSEC (1) 2013: 523-528 - [c12]Manman Chen, Tian Huat Tan, Jun Sun, Yang Liu, Jun Pang, Xiaohong Li:
Verification of Functional and Non-functional Requirements of Web Service Composition. ICFEM 2013: 313-328 - [c11]Rui Xu, Guangquan Xu, Da-Zhi Sun, Xiaohong Li, Zhiyong Feng:
Improving KeyNote Trust Management Model Based on User Behavior for Social Learning. ICWL Workshops 2013: 96-103 - [c10]Lu Yan, Xiaohong Li, Ruitao Feng, Zhiyong Feng, Jing Hu:
Detection Method of the Second-Order SQL Injection in Web Applications. SOFL+MSVL 2013: 154-165 - 2012
- [j2]Anh Tuan Luu, Jun Sun, Yang Liu, Jin Song Dong, Xiaohong Li, Thanh Tho Quan:
SeVe: automatic tool for verification of security protocols. Frontiers Comput. Sci. China 6(1): 57-75 (2012) - [c9]Guangquan Xu, Chao Xu, Xiuming Tian, Luxia Zhang, Xiaohong Li, Weisheng Li:
PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network. CGC 2012: 594-600 - [c8]Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng:
An Empirical Study of Dangerous Behaviors in Firefox Extensions. ISC 2012: 188-203 - 2011
- [c7]Jun Sun, Yang Liu, Songzheng Song, Jin Song Dong, Xiaohong Li:
PRTS: An Approach for Model Checking Probabilistic Real-Time Hierarchical Systems. ICFEM 2011: 147-162 - 2010
- [j1]Xiaochun Cao, Lin Wu, Jiangjian Xiao, Hassan Foroosh, Jigui Zhu, Xiaohong Li:
Video synchronization and its application to object transfer. Image Vis. Comput. 28(1): 92-100 (2010) - [c6]Jin-Liang Xing, Xiaohong Li, Yan Cao, Zhiyong Feng, Ran Liu:
Information Flow Analysis of Web Service Net. CIT 2010: 1622-1626 - [c5]Xiaohong Li, Yan Cao, Zhiyong Feng, Ran Liu:
Web Service Security Analysis Model Based on Program Slicing. QSIC 2010: 422-428
2000 – 2009
- 2009
- [c4]Guangquan Xu, Zhiyong Feng, Xiaohong Li, Hutong Wu, Yongxin Yu, Shizhan Chen, Guozheng Rao:
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics. ICICS 2009: 385-395 - 2008
- [c3]Ke He, Zhiyong Feng, Xiaohong Li:
An Attack Scenario Based Approach for Software Security Testing at Design Stage. ISCSCT (1) 2008: 782-787 - 2006
- [c2]Xiaohong Li, Zhiyong Feng, Tie Li, Li Lv:
A Template Language for Agent Construction. ICCSA (5) 2006: 32-38 - 2005
- [c1]Xiaohong Li, Danjie Yang, Zhiyong Feng:
Design and Implementation of Negotiation Agent of Dynamic Supply Chain. ICITA (1) 2005: 250-255
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint