Jianwei Niu

Orcid: 0000-0002-5667-3285

Affiliations:
  • University of Texas at San Antonio, Department of Computer Science, TX, USA


According to our database1, Jianwei Niu authored at least 56 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enabling Widespread Engagement in DS and AI: The Generation AI Curriculum Initiative for Community Colleges.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data.
ACM Trans. Softw. Eng. Methodol., July, 2023

Thorium: A Language for Bounded Verification of Dynamic Reactive Objects.
Proceedings of the 10th ACM SIGPLAN International Workshop on Reactive and Event-Based Languages and Systems, 2023

2021
Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
IEEE Trans. Dependable Secur. Comput., 2021

Analyzing privacy policies through syntax-driven semantic analysis of information types.
Inf. Softw. Technol., 2021

ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Ambiguity and Generality in Natural Language Privacy Policies.
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021

Access Control Policy Generation from User Stories Using Machine Learning.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2020

How does misconfiguration of analytic services compromise mobile privacy?
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Toward Detection of Access Control Models from Source Code via Word Embedding.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Privacy Assurance for Android Augmented Reality Apps.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Taming web views in the detection of Android privacy leaks.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Toward a reliability measurement framework automated using deep learning.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

2018
Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2018

GUILeak: tracing privacy policy claims on user input data for Android applications.
Proceedings of the 40th International Conference on Software Engineering, 2018

Extracting Information Types from Android Layout Code Using Sequence to Sequence Learning.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

2016
Sequence Diagram Aided Privacy Policy Specification.
IEEE Trans. Dependable Secur. Comput., 2016

Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

PVDetector: a detector of privacy-policy violations for Android apps.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

Toward a framework for detecting privacy policy violations in android application code.
Proceedings of the 38th International Conference on Software Engineering, 2016

Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

2015
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
Formal verification of security properties in trust management policy.
J. Comput. Secur., 2014

Managing security requirements patterns using feature diagram hierarchies.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Less is more?: investigating the role of examples in security studies using analogical transfer.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

2013
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
On XACML's Adequacy to Specify and to Enforce HIPAA.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Ensuring authorization privileges for cascading user obligations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Monitoring Dense-Time, Continuous-Semantics, Metric Temporal Logic.
Proceedings of the Runtime Verification, Third International Conference, 2012

Characterizations and boundaries of security requirements patterns.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012

Formal Analysis of Sequence Diagram with Combined Fragments.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012

Refinement-based design of a group-centric secure information sharing model.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Group-Centric Secure Information-Sharing Models for Isolated Groups.
ACM Trans. Inf. Syst. Secur., 2011

GitBAC: Flexible access control for non-modular concerns.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Collective Specification and Verification of Behavior Models and Object-oriented Implementations.
Proceedings of the ICSOFT 2011, 2011

2010
Deconstructing the semantics of big-step modelling languages.
Requir. Eng., 2010

Group-Centric Models for Secure and Agile Information Sharing.
Proceedings of the Computer Network Security, 2010

2009
Foundations for group-centric secure information sharing models.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Semantic Criteria for Choosing a Language for Big-Step Models.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

Towards a framework for group-centric secure collaboration.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Toward practical analysis for trust management policy.
Proceedings of the 2009 ACM Symposium on Information, 2009

A conceptual framework for Group-Centric secure information sharing.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
R<i>OWL</i>BAC: representing role based access control in <i>OWL</i>.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Role Based Access Control and OWL.
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008

Role-based trust management security policy analysis and correction environment (RT-SPACE).
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Formalize UML 2 Sequence Diagrams.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Stale-safe security properties for group-based secure information sharing.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

2007
Engineering Trust Management into Software Models.
Proceedings of the International Workshop on Modeling in Software Engineering, 2007

Apply Model Checking to Security Analysis in Trust Management.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

2004
Mapping Template Semantics to SMV.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

2003
Template Semantics for Model-Based Notations.
IEEE Trans. Software Eng., 2003

Understanding and Comparing Model-Based Specification Notations.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

2002
Composable semantics for model-based notations.
Proceedings of the Tenth ACM SIGSOFT Symposium on Foundations of Software Engineering 2002, 2002


  Loading...