Publications


2018:

  1. A Software Defined Network-Based Security Assessment Framework for CloudIoT.
    Zhuobing Han, Xiaohong Li, Keman Huang, Zhiyong Feng. IEEE Internet of Things Journal,2018

  2. DeepWeak: Reasoning common software weaknesses via knowledge graph embedding.
    Zhuobing Han, Xiaohong Li, Hongtao Liu, Zhenchang Xing, Zhiyong Feng. IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER),2018

  3. The Dynamics of Opinion Evolution in Gossiper-Media Model with WoLS-CALA Learning.
    Chengwei Zhang, Xiaohong Li, Jianye Hao, Sandip Sen, Wanli Xue, Zhiyong Feng. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS '18).

  4. An efficient approach for verifying automobile distributed application systems on timing property.
    Haitao Zhang, Guoqiang Li, Xiaohong Li, Zhuo Cheng,Jinyun Xue, Shaoying Liu. 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion)

  5. SCC-rFMQ learning in Cooperative Markov Games with Continuous Actions.
    Chengwei Zhang, Xiaohong Li, Jianye Hao*, Karl Tulys, Siqi Chen. Proceedings of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2018): 2018

  6. Seamless Integration of Cloud and Edge with a Service-Based Approach.
    Shouli Zhang, Chen Liu, Yanbo Han, Xiaohong Li. 2018 IEEE International Conference on Web Services(ICWS 2018)

  7. A Service-Based Declarative Approach for Capturing Events from Multiple Sensor Streams.
    Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han. Service-Oriented Computing - 16th International Conference(ICSOC 2018)

  8. A Declarative Service based Method for Adaptive Aggregation of Sensor Stream.
    Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han, Chen Lv, Weilong Ding. IEEE Access 2018

  9. ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning.
    Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

  10. A Service-Based Method for Multiple Sensor Streams Aggregation in Fog Computing.
    Zhongmei Zhang, Chen Liu, Shouli Zhang, Xiaohong Li, Yanbo Han. Wireless Communications and Mobile Computing, Volume 2018

  11. A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model.
    Shouli Zhang, Chen Liu, Shen Su, Yanbo Han, Xiaohong Li. International Journal of Network Management, Volume 28

  12. A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
    Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu. Future Generation Computer Systems, 2018, 79:417-430.

2017:

  1. Automatic Loop Summarization via Path Dependency Analysis.
    Xiaofei Xie, Bihuan Chen, Liang Zou, Yang Liu, Wei Le, Xiaohong Li. IEEE Transactions on Software Engineering, 2017

  2. Loopster: static loop termination analysis.
    Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li. Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering(ESEC/FSE 2017)

  3. Defending Against Man-In-The-Middle Attack in Repeated Games.
    Shuxin Li, Xiaohong Li, Jianye Hao, Bo An, Zhiyong Feng, Kangjie Chen, Chengwei Zhang. IJCAI'17 Proceedings of the 26th International Joint Conference on Artificial Intelligence

  4. Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack.
    Xiaohong Li, Shuxin Li, Jianye Hao, Zhiyong Feng, Bo An. AAAI. 2017: 593-599.

  5. Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description.
    Zhuobing Han, Xiaohong Li, Zhenchang Xing, Hongtao Liu, Zhiyong Feng. 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)

  6. A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data.
    Zhongmei Zhang, Xiaohong Li, Chen Liu, Shen Su, Yanbo Han. 2017 IEEE International Conference on Web Services(ICWS 2017)

  7. Dynamically analyzing cell interactions in biological environments using multiagent social learning framework.
    Chengwei Zhang, Xiaohong Li, Shuxin Li, Zhiyong Feng. Journal of Biomedical Semantics20178 (Suppl 1) :31

  8. Automated Software Security Requirements Recommendation Based on FT-SR Model.
    Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han. The International Conference on Software Engineering and Knowledge Engineering. 2017:382-385.

  9. An Improved Android Collusion Attack Detection Method Based on Program Slicing.
    Yunhao Liu, Xiaohong Li, Zhiyong Feng, Jianye Hao. International Conference on Formal Engineering Methods. Springer, Cham, 2017:315-331.

  10. TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis.
    Wei Yang, Xiaohong Li, Zhiyong Feng, Jianye Hao. 2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS)

  11. An Adaptive Handover Trigger Strategy for 5G C/U Plane Split Heterogeneous Network.
    Huijuan He, Xiaohong Li, Zhiyong Feng, Jianye Hao, Xiaofei Wang, Haijun Zhang. 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)

  12. A Prediction and Learning Based Approach to Network Selection in Dynamic Environments.
    Xiaohong Li, Ru Cao, Jianye Hao, Zhiyong Feng. Artificial Neural Networks and Machine Learning – ICANN 2017

  13. Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment.
    Shouli Zhang, Xiaohong Li, Jianwu Wang, Shen Su. International Conference on Collaborative Computing: Networking, Applications and Worksharing. Springer(CollaborateCom 2017).

  14. MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
    Qi Guo, Xiaohong Li, Guangquan Xu, Zhiyong Feng. Future Generation Computer Systems, 2017, 70: 42-47.

2016:

  1. Computing Disjunctive Loop Summary via Path Dependency Analysis.
    Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li. FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering

  2. Socially-aware Multiagent Learning towards Socially Optimal Outcomes.
    Xiaohong Li, Chengwei Zhang, Jianye Hao, Karl Tuyls, Siqi Chen, Zhiyong Feng. Volume 285: ECAI 2016

  3. Dynamic analysis of cell interactions in biological environments under multiagent social learning framework.
    Chengwei Zhang, Xiaohong Li, Shuxin Li, Jianye Hao. BIBM 2016: 1673-1678

  4. Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
    Xiaohong Li, Jiayi Xu, Guangquan Xu, Jianye Hao, Xiaoru Li, Zhiyong Feng, Honghao Gao. International Journal of Software Engineering and Knowledge Engineering, Vol. 26, No. 4 (2016), 563–585.

  5. Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3.
    Kunding Fang, Xiaohong Li, Jianye Hao, Zhiyong Feng. 2016 IEEE Trustcom/BigDataSE/ISPA

  6. E-SSL:An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
    Ren Zhao, Xiaohong Li, Guangquan Xu, Zhiyong Feng, Jianye Hao. SOFL+MSVL 2016

  7. Universal Analysis and Detection Framework for Location Aided Routing.
    Xin Zhang, Xiaohong Li, Zhiyong Feng, Guangquan Xu. 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS)

  8. A MIH and SDN based framework for optimizing vertical handover performance.
    Feng Liu, Xiaohong Li, Guangquan Xu. 2016 International Conference on Progress in Informatics and Computing (PIC)

  9. Web Application Architecture Security Evaluation Method Based on AADL.
    Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Dazhi Sun. 20th International Conference on Engineering of Complex Computer Systems (ICECCS) (2015)



2015:

  1. Wang T, Sun J, Wang X, et al. A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata[J]. IEEE Transactions on Software Engineering, Volume 41:3-18.(CCF A)
  2. Keman Huang(#)(*), Zhiyong Feng, Jianqiang Li, Xiaohong Li, System thinking of the Software Vulnerability Market via Complex Network Theory, IEEE Symposium on Security and Privacy 2015 (IEEE S&P 2015)
  3. Xie X, Liu Y, Le W, et al. S-looper: automatic summarization for multipath string loops[C]//Proceedings of the 2015 International Symposium on Software Testing and Analysis. ACM, 2015: 188-198.(CCF B)
  4. Han Z, Li X, Stroulia E. A Hierarchical Security-Auditing Methodology for Cloud Computing[C]//Services Computing (SCC), 2015 IEEE International Conference on. IEEE, 2015: 202-209.(CCF C)
  5. Geng S, Li X, Feng Z, et al. Web Application Architecture Security Evaluation Method based on AADL[C]//Engineering of Complex Computer Systems (ICECCS), 2015 20th International Conference on. IEEE, 2015: 186-189.(CCF C)
  6. Han Z, Mérineau M, Gauthier F, et al. Evolutionary analysis of access control models: a formal concept analysis method[C]//Proceedings of the 25th Annual International Conference on Computer Science and Software Engineering. IBM Corp., 2015: 261-264.(CCF C)
  7. Tian D, Li X, Hu J, et al. POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2015: 559-562. (CCF C)
  8. Song J, Li X, Hu J, et al. Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor[C]//Trustcom/BigDataSE/ISPA, 2015 IEEE. IEEE, 2015, 1: 33-40.(CCF C)
  9. Guo Q, Li X, Feng Z, et al. MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks[C]//High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE, 2015: 1512-1517.(CCF C)

2014:

1. Li X H, He K, Feng Z, et al. Unified threat model for analyzing and evaluating software threats[J]. Security and Communication Networks, 2014, 7(10): 1454-1466.(SCI)
2. Zhang C, Li X, Hu J, et al. Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols[J]. Journal of Applied Mathematics, 2014, 2014. (SSCI)
3. Li X, Li X, Xu G, et al. Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol[J]. Journal of Applied Mathematics, 2014, 2014.(SSCI)
4. Shen G, Li X, Feng R, et al. An extended uml method for the verification of security protocols[C]//Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 19-28.(CCF C)
5. Wu X, Li X, Feng R, et al. OOPN-SRAM: A novel method for software risk assessment[C]//Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 150-153.(CCF C)
6. Han Z, Li X, Feng R, et al. A Three-Dimensional Model for Software Security Evaluation[C]//Theoretical Aspects of Software Engineering Conference (TASE), 2014. IEEE, 2014: 34-41.(CCF C)
7. Zhao S, Li X, Xu G, et al. Attack tree based android malware detection with hybrid analysis[C]//2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 380-387.(CCF C)
8. Pei H, Li X, Xu G, et al. Mining Specification of Insecure Browser Extension Behavior[C]//2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 871-876.(CCF C)
9. Jiao H, Li X, Zhang L, et al. Hybrid Detection Using Permission Analysis for Android Malware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2014: 541-545.(CCF C)
10.Wang, T., Sun, J., Wang, X., Liu, Y., Si, Y., Dong, J. S., ... & Li, X. (2015). A systematic study on explicit-state non-zenoness checking for timed automata. IEEE Transactions on Software Engineering, 41(1), 3-18.
11.Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013: 154-165.

2013:

1. Yan Bobo, Li Xiaohong, Du Zhijie. A threat model-driven security testing approach for web application. Communications in Computer and Information Science,2013,332(1865-0929):158-168.
2. Wang Qin, Li Xiaohong, Yan Bobo. A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis. Communications in Computer and Information Science, 2013,332(1865-0929):259-270.
3. Liu Yizhen, Du Zhijie, Shi Hong, Li Xiaohong. A screening method of security functional components based on fuzzy. Communications in Computer and Information Science, 2013,332(1865-0929):292-305.
4. Yu Xiaofei, Li Xiaohong, Zhang Qianqian. Eliciting security requirements method based on safety knowledge base. Communications in Computer and Information Science, 2013,332(1865-0929):109-121.
5. Zhang Qianqian, Li Xiaohong, Yu Xiaofei, Feng, Zhiyong. Improving android security with layered structure instrumentation and Technology. Communications in Computer and Information Science, 2013,332(1865-0929):147-157.
6. Du C, Li X, Shi H, et al. Architecture Security Evaluation Method Based on Security of the Components[C]//2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013, 1: 523-528.
7. Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013: 154-165.
8. Chen M, Tan T H, Sun J, et al. Verification of functional and non-functional requirements of web service composition[C]//International Conference on Formal Engineering Methods. Springer Berlin Heidelberg, 2013: 313-328.

2012:

1. Junjie Wang, Xiaohong Li, Bobo Yan,Zhiyong Feng, "Pointer Analysis Based Vulnerability Detection for Browser Extension", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 488 ~ 495, 2012( EI 20120714765736)
2. Xiaofei Xie, Xiaohong Li, Kunyu Cao,Zhiyong Feng, "Security Modeling Based on CSP for Network Protocol", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 496 ~ 504, 2012 (EI 20120714765737)
3. Zhuobing HAN, Xiaohong LI, Yizhen LIU,Zhiyong FENG, "Auto-Selection of Security Functional Components Based on Common Criteria", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 479 ~ 487, 2012(EI 20120714765735)
4. Xiaohong Li, Ke He, Zhiyong Feng. Unified Threat Model for Analyzing and Evaluating Software Threats. 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2011).And Published by Journal: Security and Communication Networks (SCI)
5. Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang , Zhenkai Liang, and ZhiyongFeng, An Empirical Study of Dangerous Behaviors in Firefox Extensions. 15th International Conference on Information Security, ISC 2012,September 19, Passau, Germany (EI:20124115538466)
6. Junjie Wang, Xiaohong Li, Qin Wang,GuangQuan Xu, Characteristic Behavior Sequence Based Attack Detection Method for Browser Extension (ACSA-Summer 2012. SI of Journal of "INFORMATION".SCI)

2011:

1. Jun Sun1, Yang Liu2, Songzheng Song3, Jin Song Dong2 and Xiaohong Li.An Approach for Model Checking Probabilistic Real-time Hierarchical Systems.ICFEM2011
2. Luu Anh Tuan1, Jun Sun2, Yang Liu1, Jin Song Dong1, Xiaohong Li3, and QuanThanh .Automatic Tool for Verification of SecurityProtocols. Frontiers of Computer Science. ISSN: 1673-7350 (print version), ISSN: 1673-7466 (electronic version). Journal no. 11704(SCI)
3. Li,Xiaohong1; Wang,Xiangyu1; Zhang,Tao2; Yi, Jin2; Feng,Zhiyong. Software trustworthness evaluation based on weakness analysis and testing assessment. Qinghua Daxue Xuebao/Journal of Tsinghua University, Journal article (JA),Press of Tsinghua University.Vol.51(10):1287-1293,(EI 20114514493937)
4. Xiaohong Li, Fengxu Liu, Zhiyong Feng, Jinliang Xing? .A Knowledge Based Threat Analysis in Trustworthy Software Engineering, 2011 3rd International Conference on Mechanical and Electronics Engineering, ICMEE 2011 , (EI20114714534930 ).Applied Mechanics and Materials vol:130-134, Mechanical and Electronics Engineering III,2012,3177-3180
5. Li Xiaohong, Hu Chang , Feng Zhiyong, Du Hongwei, Ding Ganggang ,An Approach to obtain Software Security Vulnerabilities based on Vertical Search, Advanced Materials Research (2011) vol:403-408. 3203-3206.(EI20115014601918)
6. He, Ke1; Li, Xiao-Hong1;Feng, Zhi-Yong1; Marback, Aaron2 . Attack scenario based approach to security test generationTianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology.2011,04:344-352.(EI2011201399080).

2010:


1. Xiaohong Li,Guozhu Meng,Zhiyong Feng,Ganggang Ding,A framework based security-knowledge database for vulnerabilities detection of business logic, 2010 International Conference on Optics, Photonics and Energy Engineering (OPEE 2010),May,2010.(EI)
2. XING Jin-Liang,LI Xiao-Hong,CAO Yan,FENG Zhi-Yong and LIU Ran,Information Flow Analysis of Web Service Net,10th IEEE International Conference on Computer and Information Technology (CIT2010),June,2010.(EI)
3. Xiaohong Li,Yan,Cao, Zhiyong Feng, Ran Liu,Web Service Security Analysis Model Based on Program Slicing, 10th International Conference on Quality Software , QSBS10,July,2010. (EI)