成人影院

Publications


2018:

  1. Zhuobing Han, Xiaohong Li, Keman Huang, Zhiyong Feng. IEEE Internet of Things Journal,2018

  2. Zhuobing Han, Xiaohong Li, Hongtao Liu, Zhenchang Xing, Zhiyong Feng. IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER),2018

  3. Chengwei Zhang, Xiaohong Li, Jianye Hao, Sandip Sen, Wanli Xue, Zhiyong Feng. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS '18).

  4. Haitao Zhang, Guoqiang Li, Xiaohong Li, Zhuo Cheng,Jinyun Xue, Shaoying Liu. 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion)

  5. Chengwei Zhang, Xiaohong Li, Jianye Hao*, Karl Tulys, Siqi Chen. Proceedings of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2018): 2018

  6. Shouli Zhang, Chen Liu, Yanbo Han, Xiaohong Li. 2018 IEEE International Conference on Web Services(ICWS 2018)

  7. Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han. Service-Oriented Computing - 16th International Conference(ICSOC 2018)

  8. Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han, Chen Lv, Weilong Ding. IEEE Access 2018

  9. Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

  10. Zhongmei Zhang, Chen Liu, Shouli Zhang, Xiaohong Li, Yanbo Han. Wireless Communications and Mobile Computing, Volume 2018

  11. Shouli Zhang, Chen Liu, Shen Su, Yanbo Han, Xiaohong Li. International Journal of Network Management, Volume 28

  12. Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu. Future Generation Computer Systems, 2018, 79:417-430.

2017:

  1. Xiaofei Xie, Bihuan Chen, Liang Zou, Yang Liu, Wei Le, Xiaohong Li. IEEE Transactions on Software Engineering, 2017

  2. Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li. Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering(ESEC/FSE 2017)

  3. Shuxin Li, Xiaohong Li, Jianye Hao, Bo An, Zhiyong Feng, Kangjie Chen, Chengwei Zhang. IJCAI'17 Proceedings of the 26th International Joint Conference on Artificial Intelligence

  4. Xiaohong Li, Shuxin Li, Jianye Hao, Zhiyong Feng, Bo An. AAAI. 2017: 593-599.

  5. Zhuobing Han, Xiaohong Li, Zhenchang Xing, Hongtao Liu, Zhiyong Feng. 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)

  6. Zhongmei Zhang, Xiaohong Li, Chen Liu, Shen Su, Yanbo Han. 2017 IEEE International Conference on Web Services(ICWS 2017)

  7. Chengwei Zhang, Xiaohong Li, Shuxin Li, Zhiyong Feng. Journal of Biomedical Semantics20178 (Suppl 1) :31

  8. Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han. The International Conference on Software Engineering and Knowledge Engineering. 2017:382-385.

  9. Yunhao Liu, Xiaohong Li, Zhiyong Feng, Jianye Hao. International Conference on Formal Engineering Methods. Springer, Cham, 2017:315-331.

  10. Wei Yang, Xiaohong Li, Zhiyong Feng, Jianye Hao. 2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS)

  11. Huijuan He, Xiaohong Li, Zhiyong Feng, Jianye Hao, Xiaofei Wang, Haijun Zhang. 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)

  12. Xiaohong Li, Ru Cao, Jianye Hao, Zhiyong Feng. Artificial Neural Networks and Machine Learning – ICANN 2017

  13. Shouli Zhang, Xiaohong Li, Jianwu Wang, Shen Su. International Conference on Collaborative Computing: Networking, Applications and Worksharing. Springer(CollaborateCom 2017).

  14. Qi Guo, Xiaohong Li, Guangquan Xu, Zhiyong Feng. Future Generation Computer Systems, 2017, 70: 42-47.

2016:

  1. Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li. FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering

  2. Xiaohong Li, Chengwei Zhang, Jianye Hao, Karl Tuyls, Siqi Chen, Zhiyong Feng. Volume 285: ECAI 2016

  3. Chengwei Zhang, Xiaohong Li, Shuxin Li, Jianye Hao. BIBM 2016: 1673-1678

  4. Xiaohong Li, Jiayi Xu, Guangquan Xu, Jianye Hao, Xiaoru Li, Zhiyong Feng, Honghao Gao. International Journal of Software Engineering and Knowledge Engineering, Vol. 26, No. 4 (2016), 563–585.

  5. Kunding Fang, Xiaohong Li, Jianye Hao, Zhiyong Feng. 2016 IEEE Trustcom/BigDataSE/ISPA

  6. Ren Zhao, Xiaohong Li, Guangquan Xu, Zhiyong Feng, Jianye Hao. SOFL+MSVL 2016

  7. Xin Zhang, Xiaohong Li, Zhiyong Feng, Guangquan Xu. 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS)

  8. Feng Liu, Xiaohong Li, Guangquan Xu. 2016 International Conference on Progress in Informatics and Computing (PIC)

  9. Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Dazhi Sun. 20th International Conference on Engineering of Complex Computer Systems (ICECCS) (2015)



2015:

  1. Wang T, Sun J, Wang X, et al. A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata[J]. IEEE Transactions on Software Engineering, Volume 41:3-18.(CCF A)
  2. Keman Huang(#)(*), Zhiyong Feng, Jianqiang Li, Xiaohong Li, System thinking of the Software Vulnerability Market via Complex Network Theory, IEEE Symposium on Security and Privacy 2015 (IEEE S&P 2015)
  3. Xie X, Liu Y, Le W, et al. S-looper: automatic summarization for multipath string loops[C]//Proceedings of the 2015 International Symposium on Software Testing and Analysis. ACM, 2015: 188-198.(CCF B)
  4. Han Z, Li X, Stroulia E. A Hierarchical Security-Auditing Methodology for Cloud Computing[C]//Services Computing (SCC), 2015 IEEE International Conference on. IEEE, 2015: 202-209.(CCF C)
  5. Geng S, Li X, Feng Z, et al. Web Application Architecture Security Evaluation Method based on AADL[C]//Engineering of Complex Computer Systems (ICECCS), 2015 20th International Conference on. IEEE, 2015: 186-189.(CCF C)
  6. Han Z, Mérineau M, Gauthier F, et al. Evolutionary analysis of access control models: a formal concept analysis method[C]//Proceedings of the 25th Annual International Conference on Computer Science and Software Engineering. IBM Corp., 2015: 261-264.(CCF C)
  7. Tian D, Li X, Hu J, et al. POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2015: 559-562. (CCF C)
  8. Song J, Li X, Hu J, et al. Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor[C]//Trustcom/BigDataSE/ISPA, 2015 IEEE. IEEE, 2015, 1: 33-40.(CCF C)
  9. Guo Q, Li X, Feng Z, et al. MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks[C]//High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE, 2015: 1512-1517.(CCF C)

2014:

1. Li X H, He K, Feng Z, et al. Unified threat model for analyzing and evaluating software threats[J]. Security and Communication Networks, 2014, 7(10): 1454-1466.(SCI)
2. Zhang C, Li X, Hu J, et al. Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols[J]. Journal of Applied Mathematics, 2014, 2014. (SSCI)
3. Li X, Li X, Xu G, et al. Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol[J]. Journal of Applied Mathematics, 2014, 2014.(SSCI)
4. Shen G, Li X, Feng R, et al. An extended uml method for the verification of security protocols[C]//Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 19-28.(CCF C)
5. Wu X, Li X, Feng R, et al. OOPN-SRAM: A novel method for software risk assessment[C]//Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 150-153.(CCF C)
6. Han Z, Li X, Feng R, et al. A Three-Dimensional Model for Software Security Evaluation[C]//Theoretical Aspects of Software Engineering Conference (TASE), 2014. IEEE, 2014: 34-41.(CCF C)
7. Zhao S, Li X, Xu G, et al. Attack tree based android malware detection with hybrid analysis[C]//2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 380-387.(CCF C)
8. Pei H, Li X, Xu G, et al. Mining Specification of Insecure Browser Extension Behavior[C]//2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 871-876.(CCF C)
9. Jiao H, Li X, Zhang L, et al. Hybrid Detection Using Permission Analysis for Android Malware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2014: 541-545.(CCF C)
10.Wang, T., Sun, J., Wang, X., Liu, Y., Si, Y., Dong, J. S., ... & Li, X. (2015). A systematic study on explicit-state non-zenoness checking for timed automata. IEEE Transactions on Software Engineering, 41(1), 3-18.
11.Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013: 154-165.

2013:

1. Yan Bobo, Li Xiaohong, Du Zhijie. A threat model-driven security testing approach for web application. Communications in Computer and Information Science,2013,332(1865-0929):158-168.
2. Wang Qin, Li Xiaohong, Yan Bobo. A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis. Communications in Computer and Information Science, 2013,332(1865-0929):259-270.
3. Liu Yizhen, Du Zhijie, Shi Hong, Li Xiaohong. A screening method of security functional components based on fuzzy. Communications in Computer and Information Science, 2013,332(1865-0929):292-305.
4. Yu Xiaofei, Li Xiaohong, Zhang Qianqian. Eliciting security requirements method based on safety knowledge base. Communications in Computer and Information Science, 2013,332(1865-0929):109-121.
5. Zhang Qianqian, Li Xiaohong, Yu Xiaofei, Feng, Zhiyong. Improving android security with layered structure instrumentation and Technology. Communications in Computer and Information Science, 2013,332(1865-0929):147-157.
6. Du C, Li X, Shi H, et al. Architecture Security Evaluation Method Based on Security of the Components[C]//2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013, 1: 523-528.
7. Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013: 154-165.
8. Chen M, Tan T H, Sun J, et al. Verification of functional and non-functional requirements of web service composition[C]//International Conference on Formal Engineering Methods. Springer Berlin Heidelberg, 2013: 313-328.

2012:

1. Junjie Wang, Xiaohong Li, Bobo Yan,Zhiyong Feng, "Pointer Analysis Based Vulnerability Detection for Browser Extension", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 488 ~ 495, 2012( EI 20120714765736)
2. Xiaofei Xie, Xiaohong Li, Kunyu Cao,Zhiyong Feng, "Security Modeling Based on CSP for Network Protocol", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 496 ~ 504, 2012 (EI 20120714765737)
3. Zhuobing HAN, Xiaohong LI, Yizhen LIU,Zhiyong FENG, "Auto-Selection of Security Functional Components Based on Common Criteria", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 479 ~ 487, 2012(EI 20120714765735)
4. Xiaohong Li, Ke He, Zhiyong Feng. Unified Threat Model for Analyzing and Evaluating Software Threats. 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2011).And Published by Journal: Security and Communication Networks (SCI)
5. Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang , Zhenkai Liang, and ZhiyongFeng, An Empirical Study of Dangerous Behaviors in Firefox Extensions. 15th International Conference on Information Security, ISC 2012,September 19, Passau, Germany (EI:20124115538466)
6. Junjie Wang, Xiaohong Li, Qin Wang,GuangQuan Xu, Characteristic Behavior Sequence Based Attack Detection Method for Browser Extension (ACSA-Summer 2012. SI of Journal of "INFORMATION".SCI)

2011:

1. Jun Sun1, Yang Liu2, Songzheng Song3, Jin Song Dong2 and Xiaohong Li.An Approach for Model Checking Probabilistic Real-time Hierarchical Systems.ICFEM2011
2. Luu Anh Tuan1, Jun Sun2, Yang Liu1, Jin Song Dong1, Xiaohong Li3, and QuanThanh .Automatic Tool for Verification of SecurityProtocols. Frontiers of Computer Science. ISSN: 1673-7350 (print version), ISSN: 1673-7466 (electronic version). Journal no. 11704(SCI)
3. Li,Xiaohong1; Wang,Xiangyu1; Zhang,Tao2; Yi, Jin2; Feng,Zhiyong. Software trustworthness evaluation based on weakness analysis and testing assessment. Qinghua Daxue Xuebao/Journal of Tsinghua University, Journal article (JA),Press of Tsinghua University.Vol.51(10):1287-1293,(EI 20114514493937)
4. Xiaohong Li, Fengxu Liu, Zhiyong Feng, Jinliang Xing? .A Knowledge Based Threat Analysis in Trustworthy Software Engineering, 2011 3rd International Conference on Mechanical and Electronics Engineering, ICMEE 2011 , (EI20114714534930 ).Applied Mechanics and Materials vol:130-134, Mechanical and Electronics Engineering III,2012,3177-3180
5. Li Xiaohong, Hu Chang , Feng Zhiyong, Du Hongwei, Ding Ganggang ,An Approach to obtain Software Security Vulnerabilities based on Vertical Search, Advanced Materials Research (2011) vol:403-408. 3203-3206.(EI20115014601918)
6. He, Ke1; Li, Xiao-Hong1;Feng, Zhi-Yong1; Marback, Aaron2 . Attack scenario based approach to security test generationTianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology.2011,04:344-352.(EI2011201399080).

2010:


1. Xiaohong Li,Guozhu Meng,Zhiyong Feng,Ganggang Ding,A framework based security-knowledge database for vulnerabilities detection of business logic, 2010 International Conference on Optics, Photonics and Energy Engineering (OPEE 2010),May,2010.(EI)
2. XING Jin-Liang,LI Xiao-Hong,CAO Yan,FENG Zhi-Yong and LIU Ran,Information Flow Analysis of Web Service Net,10th IEEE International Conference on Computer and Information Technology (CIT2010),June,2010.(EI)
3. Xiaohong Li,Yan,Cao, Zhiyong Feng, Ran Liu,Web Service Security Analysis Model Based on Program Slicing, 10th International Conference on Quality Software , QSBS10,July,2010. (EI)