Xiaohong Li

Orcid: 0000-0002-0752-6764

Affiliations:
  • Tianjin University, College of Intelligence and Computing, Institute of Software and Information Security Engineering, Tianjin, China
  • Tianjin University, College of Intelligence and Computing, School of Computer Science and Technology, Tianjin Key Laboratory of Advanced Networking, Tianjin, China


According to our database1, Xiaohong Li authored at least 149 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multiple Adverse Weather Conditions Adaptation for Object Detection via Causal Intervention.
IEEE Trans. Pattern Anal. Mach. Intell., March, 2024

Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Extraction of Phrase-based Concepts in Vulnerability Descriptions through Unsupervised Labeling.
ACM Trans. Softw. Eng. Methodol., September, 2023

ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph.
Sci. China Inf. Sci., September, 2023

Demystifying Performance Regressions in String Solvers.
IEEE Trans. Software Eng., March, 2023

Opinion Dynamics in Gossiper-Media Networks Based on Multiagent Reinforcement Learning.
IEEE Trans. Netw. Sci. Eng., 2023

Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

SeqAdver: Automatic Payload Construction and Injection in Sequence-based Android Adversarial Attack.
Proceedings of the IEEE International Conference on Data Mining, 2023

Automatic Detection and Analysis towards Malicious Behavior in IoT Malware.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions.
ACM Trans. Softw. Eng. Methodol., 2022

SCC-rFMQ: a multiagent reinforcement learning method in cooperative Markov games with continuous actions.
Int. J. Mach. Learn. Cybern., 2022

Large-scale analysis of non-termination bugs in real-world OSS projects.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Towards Understanding the Faults of JavaScript-Based Deep Learning Systems.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability Detection?
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization.
CoRR, 2021

Comparative analysis of feature representations and machine learning methods in Android family classification.
Comput. Networks, 2021

A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Discovering Properties about Arrays via Path Dependence Analysis.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

Inferring Loop Invariants for Multi-Path Loops.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021

Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions.
Proceedings of the 18th IEEE/ACM International Conference on Mining Software Repositories, 2021

Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

AVA: Adversarial Vignetting Attack against Visual Recognition.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Service Deployment with Predictive Ability for Data Stream Processing in a Cloud-Edge Environment.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

Bias Field Poses a Threat to DNN-Based X-Ray Recognition.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks.
Proceedings of the ICC 2021, 2021

Predicting Entity Relations across Different Security Databases by Using Graph Attention Network.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Loopster++: Termination Analysis for Multi-path Linear Loop.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks.
IEEE Trans. Wirel. Commun., 2020

An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models.
IEEE Trans. Ind. Informatics, 2020

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
CoRR, 2020

Predicting Missing Information of Key Aspects in Vulnerability Reports.
CoRR, 2020

A Method for Deploying Distributed Denial of Service Attack Defense Strategies on Edge Servers Using Reinforcement Learning.
IEEE Access, 2020

Predicting Missing Information of Vulnerability Reports.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

The Scheme of Security Requirement Acquisition Based on Knowledge Graph.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

An Empirical Study in Software Verification Tools.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Audee: Automated Testing for Deep Learning Frameworks.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

A<sup>3</sup>Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Unsuccessful story about few shot malware family classification and siamese network to the rescue.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Weighted Subject-Semi-Independent ERP-based Brain-Computer Interface.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

An Empirical Study on Robustness of DNNs with Out-of-Distribution Awareness.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

A Knowledge Graph-based Sensitive Feature Selection for Android Malware Classification.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2019
Automatic Loop Summarization via Path Dependency Analysis.
IEEE Trans. Software Eng., 2019

A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol.
Sensors, 2019

CSP-E<sup>2</sup>: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.
Inf. Sci., 2019

A Declarative Service-Based Method for Adaptive Aggregation of Sensor Streams.
IEEE Access, 2019

Inferring Patterns for Taint-Style Vulnerabilities With Security Patches.
IEEE Access, 2019

SA-IGA: a multiagent reinforcement learning method towards socially optimal outcomes.
Auton. Agents Multi Agent Syst., 2019

An Efficient Handover Authentication Mechanism for 5G Wireless Network.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A Co-Occurrence Recommendation Model of Software Security Requirement.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Cross-project Defect Prediction via ASTToken2Vec and BLSTM-based Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2019

DiffChaser: Detecting Disagreements for Deep Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

A Data-Driven Service Creation Approach for Effectively Capturing Events from Multiple Sensor Streams.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Mobility-Aware Service Selection in Mobile Edge Computing Systems.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Latency-Aware Deployment of IoT Services in a Cloud-Edge Environment.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019

Embedding and Predicting Software Security Entity Relationships: A Knowledge Graph Based Approach.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

DCT: Differential Combination Testing of Deep Learning Systems.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019

A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
A Service-Based Method for Multiple Sensor Streams Aggregation in Fog Computing.
Wirel. Commun. Mob. Comput., 2018

An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers.
IEEE Trans. Smart Grid, 2018

TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting.
J. Parallel Distributed Comput., 2018

A Software Defined Network-Based Security Assessment Framework for CloudIoT.
IEEE Internet Things J., 2018

A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model.
Int. J. Netw. Manag., 2018

A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Gener. Comput. Syst., 2018

An Adaptive Learning Based Network Selection Approach for 5G Dynamic Environments.
Entropy, 2018

An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms.
CoRR, 2018

SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions.
CoRR, 2018

SA-IGA: A Multiagent Reinforcement Learning Method Towards Socially Optimal Outcomes.
CoRR, 2018

DeepWeak: Reasoning common software weaknesses via knowledge graph embedding.
Proceedings of the 25th International Conference on Software Analysis, 2018

ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Achieving Multiagent Coordination Through CALA-rFMQ Learning in Continuous Action Space.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Seamless Integration of Cloud and Edge with a Service-Based Approach.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

A Service-Based Declarative Approach for Capturing Events from Multiple Sensor Streams.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

An efficient approach for verifying automobile distributed application systems on timing property.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

The Dynamics of Opinion Evolution in Gossiper-Media Model with WoLS-CALA Learning.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

2017
A multi-attribute rating based trust model: improving the personalized trust modeling framework.
Multim. Tools Appl., 2017

Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks.
IEEE Multim., 2017

MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
Future Gener. Comput. Syst., 2017

Dynamically analyzing cell interactions in biological environments using multiagent social learning framework.
J. Biomed. Semant., 2017

Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things.
IEEE Access, 2017

Loopster: static loop termination analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Automated Software Security Requirements Recommendation Based on FT-SR Model.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

An Adaptive Handover Trigger Strategy for 5G C/U Plane Split Heterogeneous Network.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Defending Against Man-In-The-Middle Attack in Repeated Games.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

An Improved Android Collusion Attack Detection Method Based on Program Slicing.
Proceedings of the Formal Methods and Software Engineering, 2017

TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017

A Prediction and Learning Based Approach to Network Selection in Dynamic Environments.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

ATM: A Framework to Support Application State Migration in Multiple Terminals Environment.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
Int. J. Softw. Eng. Knowl. Eng., 2016

Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems.
IEICE Trans. Inf. Syst., 2016

Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016

Proteus: computing disjunctive loop summary via path dependency analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Universal Analysis and Detection Framework for Location Aided Routing.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Socially-Aware Multiagent Learning: Towards Socially Optimal Outcomes.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

Dynamic analysis of cell interactions in biological environments under multiagent social learning framework.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

TRM: Computing Reputation Score by Mining Reviews.
Proceedings of the Incentives and Trust in Electronic Communities, 2016

2015
A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata.
IEEE Trans. Software Eng., 2015

HyCPK: Securing Identity Authentication in Ubiquitous Computing.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware.
Proceedings of the Security and Privacy in Communication Networks, 2015

S-looper: automatic summarization for multipath string loops.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Web Application Architecture Security Evaluation Method Based on AADL.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

PEM4RFID: Privacy Enhancement Model for RFID Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Towards Trustworthy Participants in Social Participatory Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Evolutionary analysis of access control models: a formal concept analysis method.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

A Hierarchical Security-Auditing Methodology for Cloud Computing.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
Unified threat model for analyzing and evaluating software threats.
Secur. Commun. Networks, 2014

Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols.
J. Appl. Math., 2014

Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol.
J. Appl. Math., 2014

Attack Tree Based Android Malware Detection with Hybrid Analysis.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Mining Specification of Insecure Browser Extension Behavior.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Three-Dimensional Model for Software Security Evaluation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Automatic Verification for Later-Correspondence of Security Protocols.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014

Hybrid Detection Using Permission Analysis for Android Malware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

OOPN-SRAM: A Novel Method for Software Risk Assessment.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

An Extended UML Method for the Verification of Security Protocols.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

2013
An algorithm on fairness verification of mobile sink routing in wireless sensor network.
Pers. Ubiquitous Comput., 2013

Detection Method of the Second-Order SQL Injection in Web Applications.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2013

Improving KeyNote Trust Management Model Based on User Behavior for Social Learning.
Proceedings of the Advances in Web-Based Learning - ICWL 2013 Workshops, 2013

Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013

Architecture Security Evaluation Method Based on Security of the Components.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
SeVe: automatic tool for verification of security protocols.
Frontiers Comput. Sci. China, 2012

An Empirical Study of Dangerous Behaviors in Firefox Extensions.
Proceedings of the Information Security - 15th International Conference, 2012

PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
PRTS: An Approach for Model Checking Probabilistic Real-Time Hierarchical Systems.
Proceedings of the Formal Methods and Software Engineering, 2011

2010
Video synchronization and its application to object transfer.
Image Vis. Comput., 2010

Web Service Security Analysis Model Based on Program Slicing.
Proceedings of the 10th International Conference on Quality Software, 2010

Information Flow Analysis of Web Service Net.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
An Attack Scenario Based Approach for Software Security Testing at Design Stage.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2006
A Template Language for Agent Construction.
Proceedings of the Computational Science and Its Applications, 2006

2005
Design and Implementation of Negotiation Agent of Dynamic Supply Chain.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005


  Loading...