Xiaohong Li
Orcid: 0000-0002-0752-6764Affiliations:
- Tianjin University, College of Intelligence and Computing, Institute of Software and Information Security Engineering, Tianjin, China
- Tianjin University, College of Intelligence and Computing, School of Computer Science and Technology, Tianjin Key Laboratory of Advanced Networking, Tianjin, China
According to our database1,
Xiaohong Li
authored at least 152 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Multiple Adverse Weather Conditions Adaptation for Object Detection via Causal Intervention.
IEEE Trans. Pattern Anal. Mach. Intell., March, 2024
Tackling data-heterogeneity variations in federated learning via adaptive aggregate weights.
Knowl. Based Syst., 2024
CoRR, 2024
Unmasking the Lurking: Malicious Behavior Detection for IoT Malware with Multi-label Classification.
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Extraction of Phrase-based Concepts in Vulnerability Descriptions through Unsupervised Labeling.
ACM Trans. Softw. Eng. Methodol., September, 2023
ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph.
Sci. China Inf. Sci., September, 2023
IEEE Trans. Software Eng., March, 2023
Opinion Dynamics in Gossiper-Media Networks Based on Multiagent Reinforcement Learning.
IEEE Trans. Netw. Sci. Eng., 2023
Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
SeqAdver: Automatic Payload Construction and Injection in Sequence-based Android Adversarial Attack.
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
2022
ACM Trans. Softw. Eng. Methodol., 2022
SCC-rFMQ: a multiagent reinforcement learning method in cooperative Markov games with continuous actions.
Int. J. Mach. Learn. Cybern., 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization.
CoRR, 2021
Comparative analysis of feature representations and machine learning methods in Android family classification.
Comput. Networks, 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021
A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021
Proceedings of the 18th IEEE/ACM International Conference on Mining Software Repositories, 2021
Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Service Deployment with Predictive Ability for Data Stream Processing in a Cloud-Edge Environment.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks.
Proceedings of the ICC 2021, 2021
Predicting Entity Relations across Different Security Databases by Using Graph Attention Network.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
2020
A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks.
IEEE Trans. Wirel. Commun., 2020
An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models.
IEEE Trans. Ind. Informatics, 2020
CoRR, 2020
A Method for Deploying Distributed Denial of Service Attack Defense Strategies on Edge Servers Using Reinforcement Learning.
IEEE Access, 2020
Proceedings of the Companion of The 2020 Web Conference 2020, 2020
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
A<sup>3</sup>Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020
Unsuccessful story about few shot malware family classification and siamese network to the rescue.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020
A Knowledge Graph-based Sensitive Feature Selection for Android Malware Classification.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020
2019
IEEE Trans. Software Eng., 2019
Sensors, 2019
CSP-E<sup>2</sup>: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.
Inf. Sci., 2019
IEEE Access, 2019
IEEE Access, 2019
SA-IGA: a multiagent reinforcement learning method towards socially optimal outcomes.
Auton. Agents Multi Agent Syst., 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019
An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
A Data-Driven Service Creation Approach for Effectively Capturing Events from Multiple Sensor Streams.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019
Embedding and Predicting Software Security Entity Relationships: A Knowledge Graph Based Approach.
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019
A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
Wirel. Commun. Mob. Comput., 2018
An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers.
IEEE Trans. Smart Grid, 2018
TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting.
J. Parallel Distributed Comput., 2018
IEEE Internet Things J., 2018
A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model.
Int. J. Netw. Manag., 2018
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Gener. Comput. Syst., 2018
Entropy, 2018
CoRR, 2018
SA-IGA: A Multiagent Reinforcement Learning Method Towards Socially Optimal Outcomes.
CoRR, 2018
Proceedings of the 25th International Conference on Software Analysis, 2018
ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Achieving Multiagent Coordination Through CALA-rFMQ Learning in Continuous Action Space.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018
Proceedings of the 2018 IEEE International Conference on Web Services, 2018
A Service-Based Declarative Approach for Capturing Events from Multiple Sensor Streams.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018
An efficient approach for verifying automobile distributed application systems on timing property.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
2017
A multi-attribute rating based trust model: improving the personalized trust modeling framework.
Multim. Tools Appl., 2017
IEEE Multim., 2017
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
Future Gener. Comput. Syst., 2017
Dynamically analyzing cell interactions in biological environments using multiagent social learning framework.
J. Biomed. Semant., 2017
Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things.
IEEE Access, 2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017
FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the Formal Methods and Software Engineering, 2017
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017
A Prediction and Learning Based Approach to Network Selection in Dynamic Environments.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017
Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
ATM: A Framework to Support Application State Migration in Multiple Terminals Environment.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017
2016
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
Int. J. Softw. Eng. Knowl. Eng., 2016
Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems.
IEICE Trans. Inf. Syst., 2016
Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016
Dynamic analysis of cell interactions in biological environments under multiagent social learning framework.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016
Proceedings of the Incentives and Trust in Electronic Communities, 2016
2015
IEEE Trans. Software Eng., 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
2014
Secur. Commun. Networks, 2014
J. Appl. Math., 2014
J. Appl. Math., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
2013
An algorithm on fairness verification of mobile sink routing in wireless sensor network.
Pers. Ubiquitous Comput., 2013
Proceedings of the Structured Object-Oriented Formal Language and Method, 2013
Proceedings of the Advances in Web-Based Learning - ICWL 2013 Workshops, 2013
Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013
2012
Frontiers Comput. Sci. China, 2012
Proceedings of the Information Security - 15th International Conference, 2012
PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
2011
Proceedings of the Formal Methods and Software Engineering, 2011
2010
Image Vis. Comput., 2010
Proceedings of the 10th International Conference on Quality Software, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
2006
Proceedings of the Computational Science and Its Applications, 2006
2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005