Xiaohong Li

According to our database1, Xiaohong Li
  • authored at least 107 papers between 1996 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
Future Generation Comp. Syst., 2018

Decision support to product configuration considering component replenishment uncertainty: A stochastic programming approach.
Decision Support Systems, 2018

2017
A multi-attribute rating based trust model: improving the personalized trust modeling framework.
Multimedia Tools Appl., 2017

Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks.
IEEE MultiMedia, 2017

MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
Future Generation Comp. Syst., 2017

Predicting potential drug-drug interactions by integrating chemical, biological, phenotypic and network data.
BMC Bioinformatics, 2017

Dynamically analyzing cell interactions in biological environments using multiagent social learning framework.
J. Biomedical Semantics, 2017

Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things.
IEEE Access, 2017

Loopster: static loop termination analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Automated Software Security Requirements Recommendation Based on FT-SR Model.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

An Adaptive Handover Trigger Strategy for 5G C/U Plane Split Heterogeneous Network.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Defending Against Man-In-The-Middle Attack in Repeated Games.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

A Novel Semi-supervised Short Text Classification Algorithm Based on Fusion Similarity.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

An Improved Android Collusion Attack Detection Method Based on Program Slicing.
Proceedings of the Formal Methods and Software Engineering, 2017

A Prediction and Learning Based Approach to Network Selection in Dynamic Environments.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

Predicting drug-disease associations based on the known association bipartite network.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

ATM: A Framework to Support Application State Migration in Multiple Terminals Environment.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
International Journal of Software Engineering and Knowledge Engineering, 2016

A Gaussian mixture framework for incremental nonparametric regression with topology learning neural networks.
Neurocomputing, 2016

Normalized-Mutual-Information-Based Mining Method for Cascading Patterns.
ISPRS Int. J. Geo-Information, 2016

Low-cost sensors aided vehicular position prediction with partial least squares regression during GPS outage.
IJES, 2016

Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems.
IEICE Transactions, 2016

Short-Term Traffic Flow Prediction Based on Ensemble Real-Time Sequential Extreme Learning Machine Under Non-Stationary Condition.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2016

Proteus: computing disjunctive loop summary via path dependency analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

A Microblog Hot Topic Detection Algorithm Based on Discrete Particle Swarm Optimization.
Proceedings of the PRICAI 2016: Trends in Artificial Intelligence, 2016

Research on L-MVC Framework.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

A method integrating GF-1 multi-spectral and modis multi-temporal NDVI data for forest land cover classification.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Combining Statistical Information and Semantic Similarity for Short Text Feature Extension.
Proceedings of the Intelligent Information Processing VIII, 2016

A Novel Graph Partitioning Criterion Based Short Text Clustering Method.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

Universal Analysis and Detection Framework for Location Aided Routing.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Socially-Aware Multiagent Learning: Towards Socially Optimal Outcomes.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Dynamic analysis of cell interactions in biological environments under multiagent social learning framework.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

TRM: Computing Reputation Score by Mining Reviews.
Proceedings of the Incentives and Trust in Electronic Communities, 2016

2015
A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata.
IEEE Trans. Software Eng., 2015

A Remote-Sensing-Driven System for Mining Marine Spatiotemporal Association Patterns.
Remote Sensing, 2015

HyCPK: Securing Identity Authentication in Ubiquitous Computing.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware.
Proceedings of the Security and Privacy in Communication Networks, 2015

Online-SVR for vehicular position prediction during GPS outages using low-cost INS.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

A three-dimensional localization method in severe non-line-of-sight environment with lacking arrival angle.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

S-looper: automatic summarization for multipath string loops.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Web Application Architecture Security Evaluation Method Based on AADL.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

PEM4RFID: Privacy Enhancement Model for RFID Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An intelligent traffic light control approach for reducing vehicles CO2 emissions in VANET.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

An analysis of anonymity on capacity finite social spots based pseudonym changing for location privacy in VANETs.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Hysteresis automatic configuration for outbound handover in heterogeneous small cell networks.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Towards Trustworthy Participants in Social Participatory Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Robust Face Detection Based on Enhanced Local Sensitive Support Vector Machine.
Proceedings of the Biometric Recognition - 10th Chinese Conference, 2015

Evolutionary analysis of access control models: a formal concept analysis method.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

A Hierarchical Security-Auditing Methodology for Cloud Computing.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
Unified threat model for analyzing and evaluating software threats.
Security and Communication Networks, 2014

Quantification of population benefit in evaluation of biomarkers: practical implications for disease detection and prevention.
BMC Med. Inf. & Decision Making, 2014

Improved HT Object Detection Algorithm Based on Canny Edge Operator.
Journal of Multimedia, 2014

Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols.
J. Applied Mathematics, 2014

Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol.
J. Applied Mathematics, 2014

Attack Tree Based Android Malware Detection with Hybrid Analysis.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Mining Specification of Insecure Browser Extension Behavior.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Three-Dimensional Model for Software Security Evaluation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Automatic Verification for Later-Correspondence of Security Protocols.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014

Hybrid Detection Using Permission Analysis for Android Malware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

OOPN-SRAM: A Novel Method for Software Risk Assessment.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

An Extended UML Method for the Verification of Security Protocols.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

2013
An algorithm on fairness verification of mobile sink routing in wireless sensor network.
Personal and Ubiquitous Computing, 2013

A sighting-aware obstacle mobility model for ad hoc network.
IJWMC, 2013

Coordinating preventive lateral transshipment between two locations.
Computers & Industrial Engineering, 2013

Detection Method of the Second-Order SQL Injection in Web Applications.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2013

Improving KeyNote Trust Management Model Based on User Behavior for Social Learning.
Proceedings of the Advances in Web-Based Learning - ICWL 2013 Workshops, 2013

Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013

Architecture Security Evaluation Method Based on Security of the Components.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
SeVe: automatic tool for verification of security protocols.
Frontiers of Computer Science in China, 2012

An Empirical Study of Dangerous Behaviors in Firefox Extensions.
Proceedings of the Information Security - 15th International Conference, 2012

Interprocedural path-sensitive resource leaks detection for C programs.
Proceedings of the Fourth Asia-Pacific Symposium on Internetware, 2012

Inventory Coordinating Contract for the Two-location Supply Chain with Lateral Transshipment.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
Application of Biomarkers in Cancer Risk Management: Evaluation from Stochastic Clonal Evolutionary and Dynamic System Optimization Points of View.
PLoS Computational Biology, 2011

PRTS: An Approach for Model Checking Probabilistic Real-Time Hierarchical Systems.
Proceedings of the Formal Methods and Software Engineering, 2011

2010
Video synchronization and its application to object transfer.
Image Vision Comput., 2010

Single-machine scheduling time-dependent jobs with resource-dependent ready times.
Computers & Industrial Engineering, 2010

The UofL Microarray Facility: merger and new location.
BMC Bioinformatics, 2010

Predicting success of oligomerized pool engineering (OPEN) for zinc finger target site sequences.
BMC Bioinformatics, 2010

Web Service Security Analysis Model Based on Program Slicing.
Proceedings of the 10th International Conference on Quality Software, 2010

Information Flow Analysis of Web Service Net.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Microarray analysis and quantitative real-time PCR validation of gene expression during auditory hair cell regeneration in zebrafish (Danio rerio).
BMC Bioinformatics, 2009

TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Requirement Risk Assessment Focused-On Stakeholder Risk Analysis.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
A Robust and Scalable Constant- gm Rail-to-Rail CMOS Input Stage With Dynamic Feedback for VLSI Cell Libraries.
IEEE Trans. on Circuits and Systems, 2008

Microarray analysis of gene expression during auditory hair cell regeneration in zebrafish (Danio rerio).
BMC Bioinformatics, 2008

An Attack Scenario Based Approach for Software Security Testing at Design Stage.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Application of Chaotic Phase Space Reconstruction into Nonlinear Time Series Prediction in Deep Rock Mass.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
A Constant- gm Constant-Slew-Rate Rail-to-Rail Input Stage With Static Feedback and Dynamic Current Steering for VLSI Cell Libraries.
IEEE Trans. on Circuits and Systems, 2007

Direct Inference of SNP Heterozygosity Rates and Resolution of LOH Detection.
PLoS Computational Biology, 2007

2006
An Expert System Based on BP Neural Networks for Pre-splitting Blasting Design.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A Template Language for Agent Construction.
Proceedings of the Computational Science and Its Applications, 2006

2005
Application of Artificial Neural Networks in Abrasive Waterjet Cutting Process.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Artificial Neural Network for Prediction of Rockburst in Deep-Buried Long Tunnel.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Application of Grey Majorized Model in Tunnel Surrounding Rock Displacement Forecasting.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Design and Implementation of Negotiation Agent of Dynamic Supply Chain.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Biopsy preparation for flow analysis using microfabricated disaggregation blades.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2005

1996
Labeling of MR brain images using Boolean neural network.
IEEE Trans. Med. Imaging, 1996


  Loading...