Dianxiang Xu

According to our database1, Dianxiang Xu authored at least 128 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Forensic Analysis of Bitcoin Transactions.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
Statistical Unigram Analysis for Source Code Repository.
Int. J. Semantic Computing, 2018

Network slicing to improve multicasting in HPC clusters.
Cluster Computing, 2018

XPA: An Open Soruce IDE for XACML Policies (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Automated Coverage-Based Testing of XACML Policies.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Model-Based Testing of Obligatory ABAC Systems.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Detecting Saturation Attacks in Software-Defined Networks.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Message from the SEPT Symposium Program Chairs.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Model Checking of Security Properties in Industrial Control Systems (ICS).
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Bayesian Unigram-Based Inference for Expanding Abbreviations in Source Code.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Software Security Testing via Misuse Case Modeling.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Statistical Unigram Analysis for Source Code Repository.
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017

Predicting Friendship Strength for Privacy Preserving: A Case Study on Facebook.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Automated Integration Testing Using Logical Contracts.
IEEE Trans. Reliability, 2016

Analysis of Healthcare Workflows in Accordance with Access Control Policies.
IJHISI, 2016

Conformance Testing of Balana: An Open Source Implementation of the XACML3.0 Standard.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Automated Fault Localization of XACML Policies.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Towards automatic repair of access control policies.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Interaction-based Reputation Model in Online Social Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Privacy and Social Capital in Online Social Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
An Automated Test Generation Technique for Software Quality Assurance.
IEEE Trans. Reliability, 2015

Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets.
IEEE Trans. Computers, 2015

Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies.
International Journal of Software Engineering and Knowledge Engineering, 2015

Security of Software Defined Networks: A survey.
Computers & Security, 2015

Model-Based Testing of SDN Firewalls: A Case Study.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

Fault-Based Testing of Combining Algorithms in XACML3.0 Policies.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Toward a mature industrial practice of software test automation.
Software Quality Journal, 2014

Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare.
Proceedings of the 2014 International Conference on Trustworthy Systems and their Applications, 2014

Specification and Analysis of Attribute-Based Access Control Policies: An Overview.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Rule-Based Test Input Generation from Bytecode.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Effectiveness of Automated Function Testing with Petri Nets: A Series of Controlled Experiments.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Automated Generation of Integration Test Sequences from Logical Contracts.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
A threat model-based approach to security testing.
Softw., Pract. Exper., 2013

Resilience as a New System Engineering for Cloud Computing.
JCM, 2013

Guest Editor's Introduction.
International Journal of Software Engineering and Knowledge Engineering, 2013

Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing.
J. Grid Comput., 2013

Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Software security testing of an online banking system: a unique research experience for undergraduates and computer teachers.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

An Approach for Analyzing Software Specifications in Petri Nets.
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013

Testing access control and obligation policies.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

System resilience modeling and enhancement for the cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Mining Test Oracles for Test Inputs Generated from Java Bytecode.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

An UML Behavior Diagram Based Automatic Testing Approach.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
System Modeling with UML State Machines.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

Towards Better Fault Localization: A Crosstab-Based Statistical Approach.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

Automated Security Test Generation with Formal Threat Models.
IEEE Trans. Dependable Sec. Comput., 2012

Testing aspect-oriented programs with finite state machines.
Softw. Test., Verif. Reliab., 2012

On the Development of Digital Forensics Curriculum.
JDFSL, 2012

Secure System Modeling: Integrating Security Attacks with Statecharts.
Int. J. Software and Informatics, 2012

Mining Executable Specifications of Web Applications from Selenium IDE Tests.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Automated Generation of Concurrent Test Code from Function Nets.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

Model-Based Metamorphic Testing: A Case Study.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

A model-based approach to automated testing of access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

A Methodology for Building Effective Test Models with Function Nets.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2011
Integrating Safety Analysis With Functional Modeling.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2011

Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Security Analysis of FileZilla Server Using Threat Models.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Security mutation testing of the FileZilla FTP server.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Modeling security attacks with statecharts.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011

Metamorphic testing of a Monte Carlo modeling program.
Proceedings of the 6th International Workshop on Automation of Software Test, 2011

Reach Availability Modeling of Replicated Services.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

A Tool for Automated Test Code Generation from High-Level Petri Nets.
Proceedings of the Applications and Theory of Petri Nets - 32nd International Conference, 2011

2010
Uml-Based Modeling and Analysis of Security Threats.
International Journal of Software Engineering and Knowledge Engineering, 2010

Software Test Automation.
Adv. Software Engineering, 2010

A Stochastic Model for Optimizing the Patching Time of Software Bugs.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

A Systematic Capture and Replay Strategy for Testing Complex GUI Based Java Applications.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Prioritizing State-Based Aspect Tests.
Proceedings of the Third International Conference on Software Testing, 2010

2009
Specifying behavioral semantics of UML diagrams through graph transformations.
Journal of Systems and Software, 2009

Aspect-Oriented Modeling and Verification with Finite State Machines.
J. Comput. Sci. Technol., 2009

Automated Test Code Generation from Class State Models.
International Journal of Software Engineering and Knowledge Engineering, 2009

A Comparative Study of Access Control Languages.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Modeling and integrating aspects with UML activity diagrams.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Automated Evaluation of Runtime Object States against Model-Level States for State-Based Test Execution.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Security Test Generation Using Threat Trees.
Proceedings of the 4th International Workshop on Automation of Software Test, 2009

Mining for Core Patterns in Stock Market Data.
Proceedings of the ICDM Workshops 2009, 2009

2008
Software Security.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Testing Aspect-Oriented Programs with UML Design Models.
International Journal of Software Engineering and Knowledge Engineering, 2008

Aspect-oriented specification of threat-driven security requirements.
IJCAT, 2008

A UML-Based Framework for Design and Analysis of Dependable Software.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

A Systematic Approach for Integrating Fault Trees into System Statecharts.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Multi-agent designs for ambient systems.
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008

2007
Automated Test Code Generation from UML Protocol State Machines.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

A Threat Model Driven Approach for Security Testing.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Model Checking Aspect-Oriented Design Specification.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Generation of test requirements from aspectual use cases.
Proceedings of the 3rd workshop on Testing aspect-oriented programs, 2007

2006
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets.
IEEE Trans. Software Eng., 2006

A formal model-based approach for developing an interoperable mobile agent system.
Multiagent and Grid Systems, 2006

Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

State-based testing of integration aspects.
Proceedings of the 2nd Workshop on Testing Aspect-Oriented Programs, 2006

Integrating Functional and Security Requirements with Use Case Decomposition.
Proceedings of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), 2006

An Aspect-Oriented Approach to Security Requirements Analysis.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

State-based incremental testing of aspect-oriented programs.
Proceedings of the 5th International Conference on Aspect-Oriented Software Development, 2006

2005
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study.
Proceedings of the Modelling, 2005

A State-Based Approach to Testing Aspect-Oriented Programs.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Design an Interoperable Mobile Agent System Based on Predicate Transition Net Models.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

A threat-driven approach to modeling and verifying secure software.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

An Aspect-Oriented Approach to Mobile Agent Access Control.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Misuse Case-Based Design and Analysis of Secure Software Architecture.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Threat-Driven Architectural Design of Secure Information Systems.
Proceedings of the ICEIS 2005, 2005

2004
Development of a distributed multi-player computer game for scientific experimentation of team training protocols.
The Electronic Library, 2004

A Petri Net Based Software Architecture for UAV Simulation.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Illumination Invariant Face Recognition Based on Neural Network Ensemble.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

2003
A Formal Architectural Model for Logical Agent Mobility.
IEEE Trans. Software Eng., 2003

Modeling and Analyzing Multi-Agent Behaviors Using Predicate/Transition Nets.
International Journal of Software Engineering and Knowledge Engineering, 2003

Human-Agent Teamwork for Distributed Team Training.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Collaborative Agents for C2 Teamwork Simulation.
Proceedings of the International Conference on Artificial Intelligence, 2003

2002
Modeling and verifying multi-agent behaviors using predicate/transition nets.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

Generating Parallel Based on Planning Graph Analysis of Predicate/Transition Nets.
Proceedings of the International Conference on Artificial Intelligence, 2002

2001
CAST: Collaborative Agents for Simulating Teamwork.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001

2000
Modeling mobile agent systems with high level Petri nets.
Proceedings of the IEEE International Conference on Systems, 2000

1999
A Type System of Logic Objects.
SIGPLAN Notices, 1999

Reasoning about concurrent actions in multi-agent systems.
J. Comput. Sci. Technol., 1999

Reasoning about Inheritance and Cloning Behaviors of Software Agents.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999

1998
SPLAW: A Computable Language for Agent-oriented Programming.
SIGPLAN Notices, 1998

Towards an object-oriented logic framework for knowledge based systems.
Knowl.-Based Syst., 1998

A logic based language for networked agents.
Information & Software Technology, 1998

SPLAW: A Computable Agent-Oriented Programming Language.
Proceedings of the 1st International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98), 1998

1996
Towards a declarative semantics of inheritance with exceptions.
J. Comput. Sci. Technol., 1996

1995
Logical Objects with Constraints.
SIGPLAN Notices, 1995

Logical object as a basis of knowledge based systems.
J. Comput. Sci. Technol., 1995

1994
KBMDL: A Knowledge Based Model Description Language for Decision Support.
Proceedings of the Sixth International Conference on Tools with Artificial Intelligence, 1994


  Loading...