Dianxiang Xu

Orcid: 0000-0003-4529-3540

According to our database1, Dianxiang Xu authored at least 150 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Coverage-Based Testing of Obligations in NGAC Systems.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Dynamic Access Control with Administrative Obligations: A Case Study.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

SMT-Based Verification of NGAC Policies.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Predicting Integer Overflow Errors via Supervised Learning.
Int. J. Artif. Intell. Tools, December, 2022

Towards a Theory on Testing XACML Policies.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Towards Designing Shared Digital Forensics Instructional Materials.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Compact Abstract Graphs for Detecting Code Vulnerability with GNN Models.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Mutation Analysis of NGAC Policies.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Detecting Integer Overflow Errors in Java Source Code via Machine Learning.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

Quantifying Event Impact on the Bitcoin Blockchain.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic.
IEEE Trans. Netw. Serv. Manag., 2020

Assessing Holistic Impacts of Major Events on the Bitcoin Blockchain Network.
CoRR, 2020

Automated Strong Mutation Testing of XACML Policies.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

A Bigram-based Inference Model for Retrieving Abbreviated Phrases in Source Code.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Effect of NO<sub>2</sub> on O<sub>3</sub> Using Complex Network Topology Analysis.
IEEE Trans. Comput. Soc. Syst., 2019

Identifying suspicious addresses in Bitcoin thefts.
Digit. Investig., 2019

Forensic Analysis of Bitcoin Transactions.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Detecting Saturation Attacks in SDN via Machine Learning.
Proceedings of the 2019 4th International Conference on Computing, 2019

Deviant: A Mutation Testing Tool for Solidity Smart Contracts.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Statistical Unigram Analysis for Source Code Repository.
Int. J. Semantic Comput., 2018

Network slicing to improve multicasting in HPC clusters.
Clust. Comput., 2018

XPA: An Open Soruce IDE for XACML Policies (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Automated Coverage-Based Testing of XACML Policies.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Model-Based Testing of Obligatory ABAC Systems.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Detecting Saturation Attacks in Software-Defined Networks.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Message from the SEPT Symposium Program Chairs.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Model Checking of Security Properties in Industrial Control Systems (ICS).
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Bayesian Unigram-Based Inference for Expanding Abbreviations in Source Code.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Software Security Testing via Misuse Case Modeling.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Statistical Unigram Analysis for Source Code Repository.
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017

Predicting Friendship Strength for Privacy Preserving: A Case Study on Facebook.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Automated Integration Testing Using Logical Contracts.
IEEE Trans. Reliab., 2016

Analysis of Healthcare Workflows in Accordance with Access Control Policies.
Int. J. Heal. Inf. Syst. Informatics, 2016

Conformance Testing of Balana: An Open Source Implementation of the XACML3.0 Standard.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Automated Fault Localization of XACML Policies.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Towards automatic repair of access control policies.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Interaction-based Reputation Model in Online Social Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Privacy and Social Capital in Online Social Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
An Automated Test Generation Technique for Software Quality Assurance.
IEEE Trans. Reliab., 2015

Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets.
IEEE Trans. Computers, 2015

Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies.
Int. J. Softw. Eng. Knowl. Eng., 2015

Security of Software Defined Networks: A survey.
Comput. Secur., 2015

Model-Based Testing of SDN Firewalls: A Case Study.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

Fault-Based Testing of Combining Algorithms in XACML3.0 Policies.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Toward a mature industrial practice of software test automation.
Softw. Qual. J., 2014

Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare.
Proceedings of the 2014 International Conference on Trustworthy Systems and their Applications, 2014

Specification and Analysis of Attribute-Based Access Control Policies: An Overview.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Rule-Based Test Input Generation from Bytecode.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Effectiveness of Automated Function Testing with Petri Nets: A Series of Controlled Experiments.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Automated Generation of Integration Test Sequences from Logical Contracts.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
A threat model-based approach to security testing.
Softw. Pract. Exp., 2013

Resilience as a New System Engineering for Cloud Computing.
J. Commun., 2013

Guest Editor's Introduction.
Int. J. Softw. Eng. Knowl. Eng., 2013

Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing.
J. Grid Comput., 2013

Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Software security testing of an online banking system: a unique research experience for undergraduates and computer teachers.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

An Approach for Analyzing Software Specifications in Petri Nets.
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013

Testing access control and obligation policies.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

System resilience modeling and enhancement for the cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Mining Test Oracles for Test Inputs Generated from Java Bytecode.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

An UML Behavior Diagram Based Automatic Testing Approach.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
System Modeling with UML State Machines.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

Towards Better Fault Localization: A Crosstab-Based Statistical Approach.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Automated Security Test Generation with Formal Threat Models.
IEEE Trans. Dependable Secur. Comput., 2012

Testing aspect-oriented programs with finite state machines.
Softw. Test. Verification Reliab., 2012

On the Development of Digital Forensics Curriculum.
J. Digit. Forensics Secur. Law, 2012

Secure System Modeling: Integrating Security Attacks with Statecharts.
Int. J. Softw. Informatics, 2012

Mining Executable Specifications of Web Applications from Selenium IDE Tests.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Automated Generation of Concurrent Test Code from Function Nets.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

Model-Based Metamorphic Testing: A Case Study.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

A model-based approach to automated testing of access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

A Methodology for Building Effective Test Models with Function Nets.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2011
Integrating Safety Analysis With Functional Modeling.
IEEE Trans. Syst. Man Cybern. Part A, 2011

Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Security Analysis of FileZilla Server Using Threat Models.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Security mutation testing of the FileZilla FTP server.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Modeling security attacks with statecharts.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011

Metamorphic testing of a Monte Carlo modeling program.
Proceedings of the 6th International Workshop on Automation of Software Test, 2011

Reach Availability Modeling of Replicated Services.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

A Tool for Automated Test Code Generation from High-Level Petri Nets.
Proceedings of the Applications and Theory of Petri Nets - 32nd International Conference, 2011

2010
Uml-Based Modeling and Analysis of Security Threats.
Int. J. Softw. Eng. Knowl. Eng., 2010

Software Test Automation.
Adv. Softw. Eng., 2010

A Stochastic Model for Optimizing the Patching Time of Software Bugs.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

A Systematic Capture and Replay Strategy for Testing Complex GUI Based Java Applications.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Prioritizing State-Based Aspect Tests.
Proceedings of the Third International Conference on Software Testing, 2010

2009
Specifying behavioral semantics of UML diagrams through graph transformations.
J. Syst. Softw., 2009

Aspect-Oriented Modeling and Verification with Finite State Machines.
J. Comput. Sci. Technol., 2009

Automated Test Code Generation from Class State Models.
Int. J. Softw. Eng. Knowl. Eng., 2009

A Comparative Study of Access Control Languages.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Modeling and integrating aspects with UML activity diagrams.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Automated Evaluation of Runtime Object States against Model-Level States for State-Based Test Execution.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Security Test Generation Using Threat Trees.
Proceedings of the 4th International Workshop on Automation of Software Test, 2009

Mining for Core Patterns in Stock Market Data.
Proceedings of the ICDM Workshops 2009, 2009

2008
Software Security.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Testing Aspect-Oriented Programs with UML Design Models.
Int. J. Softw. Eng. Knowl. Eng., 2008

Aspect-oriented specification of threat-driven security requirements.
Int. J. Comput. Appl. Technol., 2008

A UML-Based Framework for Design and Analysis of Dependable Software.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

A Systematic Approach for Integrating Fault Trees into System Statecharts.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Multi-agent designs for ambient systems.
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008

2007
Automated Test Code Generation from UML Protocol State Machines.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

A Threat Model Driven Approach for Security Testing.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Model Checking Aspect-Oriented Design Specification.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Generation of test requirements from aspectual use cases.
Proceedings of the 3rd workshop on Testing aspect-oriented programs, 2007

2006
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets.
IEEE Trans. Software Eng., 2006

A formal model-based approach for developing an interoperable mobile agent system.
Multiagent Grid Syst., 2006

Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

State-based testing of integration aspects.
Proceedings of the 2nd Workshop on Testing Aspect-Oriented Programs, 2006

Integrating Functional and Security Requirements with Use Case Decomposition.
Proceedings of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), 2006

An Aspect-Oriented Approach to Security Requirements Analysis.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

State-based incremental testing of aspect-oriented programs.
Proceedings of the 5th International Conference on Aspect-Oriented Software Development, 2006

2005
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study.
Proceedings of the Modelling, 2005

A State-Based Approach to Testing Aspect-Oriented Programs.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Design an Interoperable Mobile Agent System Based on Predicate Transition Net Models.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

A threat-driven approach to modeling and verifying secure software.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

An Aspect-Oriented Approach to Mobile Agent Access Control.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Misuse Case-Based Design and Analysis of Secure Software Architecture.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Threat-Driven Architectural Design of Secure Information Systems.
Proceedings of the ICEIS 2005, 2005

2004
Development of a distributed multi-player computer game for scientific experimentation of team training protocols.
Electron. Libr., 2004

A Petri Net Based Software Architecture for UAV Simulation.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Illumination Invariant Face Recognition Based on Neural Network Ensemble.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

2003
A Formal Architectural Model for Logical Agent Mobility.
IEEE Trans. Software Eng., 2003

Modeling and Analyzing Multi-Agent Behaviors Using Predicate/Transition Nets.
Int. J. Softw. Eng. Knowl. Eng., 2003

Human-Agent Teamwork for Distributed Team Training.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Collaborative Agents for C2 Teamwork Simulation.
Proceedings of the International Conference on Artificial Intelligence, 2003

2002
Modeling and verifying multi-agent behaviors using predicate/transition nets.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

Generating Parallel Based on Planning Graph Analysis of Predicate/Transition Nets.
Proceedings of the International Conference on Artificial Intelligence, 2002

2001
CAST: Collaborative Agents for Simulating Teamwork.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001

2000
Modeling mobile agent systems with high level Petri nets.
Proceedings of the IEEE International Conference on Systems, 2000

1999
A Type System of Logic Objects.
ACM SIGPLAN Notices, 1999

Reasoning about concurrent actions in multi-agent systems.
J. Comput. Sci. Technol., 1999

Reasoning about Inheritance and Cloning Behaviors of Software Agents.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999

1998
Reasoning about team tracking.
ACM SIGSOFT Softw. Eng. Notes, 1998

SPLAW: A Computable Language for Agent-oriented Programming.
ACM SIGPLAN Notices, 1998

Towards an object-oriented logic framework for knowledge based systems.
Knowl. Based Syst., 1998

A logic based language for networked agents.
Inf. Softw. Technol., 1998

SPLAW: A Computable Agent-Oriented Programming Language.
Proceedings of the 1st International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98), 1998

1996
Towards a declarative semantics of inheritance with exceptions.
J. Comput. Sci. Technol., 1996

1995
Inheritance as sublation and its semantics.
ACM SIGSOFT Softw. Eng. Notes, 1995

Logical Objects with Constraints.
ACM SIGPLAN Notices, 1995

Logical object as a basis of knowledge based systems.
J. Comput. Sci. Technol., 1995

1994
KBMDL: A Knowledge Based Model Description Language for Decision Support.
Proceedings of the Sixth International Conference on Tools with Artificial Intelligence, 1994


  Loading...