Chengwei Zhang, Xiaohong Li, Jianye Hao, Sandip Sen, Wanli Xue, Zhiyong Feng.
In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS '18).
Chengwei Zhang, Xiaohong Li, Jianye Hao*, Karl Tulys, Siqi Chen.
Proceedings of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2018): 2018
Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng.
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering(ESEC/FSE 2017)
Shuxin Li, Xiaohong Li, Jianye Hao, Bo An, Zhiyong Feng, Kangjie Chen, Chengwei Zhang.
IJCAI'17 Proceedings of the 26th International Joint Conference on Artificial Intelligence
Huijuan He, Xiaohong Li, Zhiyong Feng, Jianye Hao, Xiaofei Wang, Haijun Zhang.
2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li.
FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Dazhi Sun.
20th International Conference on Engineering of Complex Computer Systems (ICECCS) (2015)
2015:
Wang T, Sun J, Wang X, et al. A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata[J]. IEEE Transactions on Software Engineering, Volume 41:3-18.(CCF A)
Keman Huang(#)(*), Zhiyong Feng, Jianqiang Li, Xiaohong Li, System thinking of the Software Vulnerability Market via Complex Network Theory, IEEE Symposium on Security and Privacy 2015 (IEEE S&P 2015)
Xie X, Liu Y, Le W, et al. S-looper: automatic summarization for multipath string loops[C]//Proceedings of the 2015 International Symposium on Software Testing and Analysis. ACM, 2015: 188-198.(CCF B)
Han Z, Li X, Stroulia E. A Hierarchical Security-Auditing Methodology for Cloud Computing[C]//Services Computing (SCC), 2015 IEEE International Conference on. IEEE, 2015: 202-209.(CCF C)
Geng S, Li X, Feng Z, et al. Web Application Architecture Security Evaluation Method based on AADL[C]//Engineering of Complex Computer Systems (ICECCS), 2015 20th International Conference on. IEEE, 2015: 186-189.(CCF C)
Han Z, Mérineau M, Gauthier F, et al. Evolutionary analysis of access control models: a formal concept analysis method[C]//Proceedings of the 25th Annual International Conference on Computer Science and Software Engineering. IBM Corp., 2015: 261-264.(CCF C)
Tian D, Li X, Hu J, et al. POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2015: 559-562. (CCF C)
Song J, Li X, Hu J, et al. Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor[C]//Trustcom/BigDataSE/ISPA, 2015 IEEE. IEEE, 2015, 1: 33-40.(CCF C)
Guo Q, Li X, Feng Z, et al. MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks[C]//High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security
(CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE, 2015: 1512-1517.(CCF C)
2014:
Li X H, He K, Feng Z, et al. Unified threat model for analyzing and evaluating software threats[J]. Security and Communication Networks, 2014, 7(10): 1454-1466.(SCI)
Zhang C, Li X, Hu J, et al. Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols[J]. Journal of Applied Mathematics, 2014, 2014. (SSCI)
Li X, Li X, Xu G, et al. Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol[J]. Journal of Applied Mathematics, 2014, 2014.(SSCI)
Shen G, Li X, Feng R, et al. An extended uml method for the verification of security protocols[C]//Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 19-28.(CCF C)
Wu X, Li X, Feng R, et al. OOPN-SRAM: A novel method for software risk assessment[C]//Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 150-153.(CCF C)
Han Z, Li X, Feng R, et al. A Three-Dimensional Model for Software Security Evaluation[C]//Theoretical Aspects of Software Engineering Conference (TASE), 2014. IEEE, 2014: 34-41.(CCF C)
Zhao S, Li X, Xu G, et al. Attack tree based android malware detection with hybrid analysis[C]//2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 380-387.(CCF C)
Pei H, Li X, Xu G, et al. Mining Specification of Insecure Browser Extension Behavior[C]//2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 871-876.(CCF C)
Jiao H, Li X, Zhang L, et al. Hybrid Detection Using Permission Analysis for Android Malware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2014: 541-545.(CCF C)
Wang, T., Sun, J., Wang, X., Liu, Y., Si, Y., Dong, J. S., ... & Li, X. (2015). A systematic study on explicit-state non-zenoness checking for timed automata. IEEE Transactions on Software Engineering, 41(1), 3-18.
Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013: 154-165.
2013:
Yan Bobo, Li Xiaohong, Du Zhijie. A threat model-driven security testing approach for web application. Communications in Computer and Information Science,2013,332(1865-0929):158-168.
Wang Qin, Li Xiaohong, Yan Bobo. A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis. Communications in Computer and Information Science, 2013,332(1865-0929):259-270.
Liu Yizhen, Du Zhijie, Shi Hong, Li Xiaohong. A screening method of security functional components based on fuzzy. Communications in Computer and Information Science, 2013,332(1865-0929):292-305.
Yu Xiaofei, Li Xiaohong, Zhang Qianqian. Eliciting security requirements method based on safety knowledge base. Communications in Computer and Information Science, 2013,332(1865-0929):109-121.
Zhang Qianqian, Li Xiaohong, Yu Xiaofei, Feng, Zhiyong. Improving android security with layered structure instrumentation and Technology. Communications in Computer and Information Science, 2013,332(1865-0929):147-157.
Du C, Li X, Shi H, et al. Architecture Security Evaluation Method Based on Security of the Components[C]//2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013, 1: 523-528.
Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013: 154-165.
Chen M, Tan T H, Sun J, et al. Verification of functional and non-functional requirements of web service composition[C]//International Conference on Formal Engineering Methods. Springer Berlin Heidelberg, 2013: 313-328.
2012:
Junjie Wang, Xiaohong Li, Bobo Yan,Zhiyong Feng, "Pointer Analysis Based Vulnerability Detection for Browser Extension", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 488 ~ 495, 2012( EI 20120714765736)
Xiaofei Xie, Xiaohong Li, Kunyu Cao,Zhiyong Feng, "Security Modeling Based on CSP for Network Protocol", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 496 ~ 504, 2012 (EI 20120714765737)
Zhuobing HAN, Xiaohong LI, Yizhen LIU,Zhiyong FENG, "Auto-Selection of Security Functional Components Based on Common Criteria", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 479 ~ 487, 2012(EI
20120714765735)
Xiaohong Li, Ke He, Zhiyong Feng. Unified Threat Model for Analyzing and Evaluating Software Threats. 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2011).And Published by Journal:
Security and Communication Networks (SCI)
Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang , Zhenkai Liang, and ZhiyongFeng, An Empirical Study of Dangerous Behaviors in Firefox Extensions. 15th International Conference on Information Security, ISC 2012,September 19, Passau,
Germany (EI:20124115538466)
Junjie Wang, Xiaohong Li, Qin Wang,GuangQuan Xu, Characteristic Behavior Sequence Based Attack Detection Method for Browser Extension (ACSA-Summer 2012. SI of Journal of "INFORMATION".SCI)
浏览器扩展行为监控系统的设计与实现。《计算机应用研究》 2012年01期
2011:
Jun Sun1, Yang Liu2, Songzheng Song3, Jin Song Dong2 and Xiaohong Li.An Approach for Model Checking Probabilistic Real-time Hierarchical Systems.ICFEM2011
Luu Anh Tuan1, Jun Sun2, Yang Liu1, Jin Song Dong1, Xiaohong Li3, and QuanThanh .Automatic Tool for Verification of SecurityProtocols. Frontiers of Computer Science. ISSN: 1673-7350 (print version), ISSN: 1673-7466 (electronic version). Journal
no. 11704(SCI)
Li,Xiaohong1; Wang,Xiangyu1; Zhang,Tao2; Yi, Jin2; Feng,Zhiyong. Software trustworthness evaluation based on weakness analysis and testing assessment. Qinghua Daxue Xuebao/Journal of Tsinghua University, Journal article (JA),Press of Tsinghua University.Vol.51(10):1287-1293,(EI
20114514493937)
Xiaohong Li, Fengxu Liu, Zhiyong Feng, Jinliang Xing? .A Knowledge Based Threat Analysis in Trustworthy Software Engineering, 2011 3rd International Conference on Mechanical and Electronics Engineering, ICMEE 2011 , (EI20114714534930 ).Applied Mechanics
and Materials vol:130-134, Mechanical and Electronics Engineering III,2012,3177-3180
Li Xiaohong, Hu Chang , Feng Zhiyong, Du Hongwei, Ding Ganggang ,An Approach to obtain Software Security Vulnerabilities based on Vertical Search, Advanced Materials Research (2011) vol:403-408. 3203-3206.(EI20115014601918)
何可,李晓红,冯志勇,面向对象的威胁建模方法,计算机工程,2011,4
He, Ke1; Li, Xiao-Hong1;Feng, Zhi-Yong1; Marback, Aaron2 . Attack scenario based approach to security test generationTianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology.2011,04:344-352.(EI2011201399080).
Xiaohong Li,Guozhu Meng,Zhiyong Feng,Ganggang Ding,A framework based security-knowledge database for vulnerabilities detection of business logic, 2010 International Conference on Optics, Photonics and Energy Engineering (OPEE 2010),May,2010.(EI收录)
XING Jin-Liang,LI Xiao-Hong,CAO Yan,FENG Zhi-Yong and LIU Ran,Information Flow Analysis of Web Service Net,10th IEEE International Conference on Computer and Information Technology (CIT2010),June,2010.(EI收录)
Xiaohong Li,Yan,Cao, Zhiyong Feng, Ran Liu,Web Service Security Analysis Model Based on Program Slicing, 10th International Conference on Quality Software , QSBS10,July,2010. (EI收录)
2008-2009:
Xiaohong Li, Ran Liu, Zhiyong Feng, Threat Modeling-Oriented Attack path Evaluating Algorithm, Transactions of Tianjin University, 6,2009. EI20093012214314.
Xiaohong Li, Ke He, Unified Threat Model for Assessing Threat in WebApplications , IEEE ISA08, International Journal of Security and Its Applications Vol.2 No.3, July,2008. EI083811558693.
XiaohongLi, Zhiyong Feng, A Template Language for Agent Construction , The 2006 International Conference in Computational Science and Its Applications" ICCSA'2006, 5 ,2006. SCI:BEL03. EI06 2910015055.
Li Xiaohong, Yang Danjie, Feng Zhiyong, Design and Implementation of Negotiation Agent of Dynamic Supply Chain, IEEE ICITA05,5,2005,EI06229905657.
Li Xiaohong, Zhang Xinrong, Feng Zhiyong, Acoustic simulation in architecture with parallel algorithm, 2003.10, 4th International Conference of VRAI, EI04238194968.