发表论文


2018:

  1. A Software Defined Network-Based Security Assessment Framework for CloudIoT.
    Zhuobing Han, Xiaohong Li, Keman Huang, Zhiyong Feng. IEEE Internet of Things Journal,2018

  2. DeepWeak: Reasoning common software weaknesses via knowledge graph embedding.
    Zhuobing Han, Xiaohong Li, Hongtao Liu, Zhenchang Xing, Zhiyong Feng. IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER),2018

  3. The Dynamics of Opinion Evolution in Gossiper-Media Model with WoLS-CALA Learning.
    Chengwei Zhang, Xiaohong Li, Jianye Hao, Sandip Sen, Wanli Xue, Zhiyong Feng. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS '18).

  4. An efficient approach for verifying automobile distributed application systems on timing property.
    Haitao Zhang, Guoqiang Li, Xiaohong Li, Zhuo Cheng,Jinyun Xue, Shaoying Liu. 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion)

  5. SCC-rFMQ learning in Cooperative Markov Games with Continuous Actions.
    Chengwei Zhang, Xiaohong Li, Jianye Hao*, Karl Tulys, Siqi Chen. Proceedings of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2018): 2018

  6. Seamless Integration of Cloud and Edge with a Service-Based Approach.
    Shouli Zhang, Chen Liu, Yanbo Han, Xiaohong Li. 2018 IEEE International Conference on Web Services(ICWS 2018)

  7. A Service-Based Declarative Approach for Capturing Events from Multiple Sensor Streams.
    Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han. Service-Oriented Computing - 16th International Conference(ICSOC 2018)

  8. A Declarative Service based Method for Adaptive Aggregation of Sensor Stream.
    Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han, Chen Lv, Weilong Ding. IEEE Access 2018

  9. ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning.
    Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

  10. A Service-Based Method for Multiple Sensor Streams Aggregation in Fog Computing.
    Zhongmei Zhang, Chen Liu, Shouli Zhang, Xiaohong Li, Yanbo Han. Wireless Communications and Mobile Computing, Volume 2018

  11. A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model.
    Shouli Zhang, Chen Liu, Shen Su, Yanbo Han, Xiaohong Li. International Journal of Network Management, Volume 28

  12. A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.
    Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu. Future Generation Computer Systems, 2018, 79:417-430.

2017:

  1. Automatic Loop Summarization via Path Dependency Analysis.
    Xiaofei Xie, Bihuan Chen, Liang Zou, Yang Liu, Wei Le, Xiaohong Li. IEEE Transactions on Software Engineering, 2017

  2. Loopster: static loop termination analysis.
    Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li. Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering(ESEC/FSE 2017)

  3. Defending Against Man-In-The-Middle Attack in Repeated Games.
    Shuxin Li, Xiaohong Li, Jianye Hao, Bo An, Zhiyong Feng, Kangjie Chen, Chengwei Zhang. IJCAI'17 Proceedings of the 26th International Joint Conference on Artificial Intelligence

  4. Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack.
    Xiaohong Li, Shuxin Li, Jianye Hao, Zhiyong Feng, Bo An. AAAI. 2017: 593-599.

  5. Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description.
    Zhuobing Han, Xiaohong Li, Zhenchang Xing, Hongtao Liu, Zhiyong Feng. 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)

  6. A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data.
    Zhongmei Zhang, Xiaohong Li, Chen Liu, Shen Su, Yanbo Han. 2017 IEEE International Conference on Web Services(ICWS 2017)

  7. Dynamically analyzing cell interactions in biological environments using multiagent social learning framework.
    Chengwei Zhang, Xiaohong Li, Shuxin Li, Zhiyong Feng. Journal of Biomedical Semantics20178 (Suppl 1) :31

  8. Automated Software Security Requirements Recommendation Based on FT-SR Model.
    Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han. The International Conference on Software Engineering and Knowledge Engineering. 2017:382-385.

  9. An Improved Android Collusion Attack Detection Method Based on Program Slicing.
    Yunhao Liu, Xiaohong Li, Zhiyong Feng, Jianye Hao. International Conference on Formal Engineering Methods. Springer, Cham, 2017:315-331.

  10. TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis.
    Wei Yang, Xiaohong Li, Zhiyong Feng, Jianye Hao. 2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS)

  11. An Adaptive Handover Trigger Strategy for 5G C/U Plane Split Heterogeneous Network.
    Huijuan He, Xiaohong Li, Zhiyong Feng, Jianye Hao, Xiaofei Wang, Haijun Zhang. 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)

  12. A Prediction and Learning Based Approach to Network Selection in Dynamic Environments.
    Xiaohong Li, Ru Cao, Jianye Hao, Zhiyong Feng. Artificial Neural Networks and Machine Learning – ICANN 2017

  13. Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment.
    Shouli Zhang, Xiaohong Li, Jianwu Wang, Shen Su. International Conference on Collaborative Computing: Networking, Applications and Worksharing. Springer(CollaborateCom 2017).

  14. MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks.
    Qi Guo, Xiaohong Li, Guangquan Xu, Zhiyong Feng. Future Generation Computer Systems, 2017, 70: 42-47.

2016:

  1. Computing Disjunctive Loop Summary via Path Dependency Analysis.(ACM SIGSOFT Distinguished Paper Award)
    Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li. FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering

  2. Socially-aware Multiagent Learning towards Socially Optimal Outcomes.
    Xiaohong Li, Chengwei Zhang, Jianye Hao, Karl Tuyls, Siqi Chen, Zhiyong Feng. Volume 285: ECAI 2016

  3. Dynamic analysis of cell interactions in biological environments under multiagent social learning framework.
    Chengwei Zhang, Xiaohong Li, Shuxin Li, Jianye Hao. BIBM 2016: 1673-1678

  4. Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service.
    Xiaohong Li, Jiayi Xu, Guangquan Xu, Jianye Hao, Xiaoru Li, Zhiyong Feng, Honghao Gao. International Journal of Software Engineering and Knowledge Engineering, Vol. 26, No. 4 (2016), 563–585.

  5. Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3.
    Kunding Fang, Xiaohong Li, Jianye Hao, Zhiyong Feng. 2016 IEEE Trustcom/BigDataSE/ISPA

  6. E-SSL:An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet.
    Ren Zhao, Xiaohong Li, Guangquan Xu, Zhiyong Feng, Jianye Hao. SOFL+MSVL 2016

  7. Universal Analysis and Detection Framework for Location Aided Routing.
    Xin Zhang, Xiaohong Li, Zhiyong Feng, Guangquan Xu. 2016 21st International Conference on Engineering of Complex Computer Systems (ICECCS)

  8. A MIH and SDN based framework for optimizing vertical handover performance.
    Feng Liu, Xiaohong Li, Guangquan Xu. 2016 International Conference on Progress in Informatics and Computing (PIC)

  9. Web Application Architecture Security Evaluation Method Based on AADL.
    Shaoguang Geng, Xiaohong Li, Zhiyong Feng, Dazhi Sun. 20th International Conference on Engineering of Complex Computer Systems (ICECCS) (2015)



2015:

  1. Wang T, Sun J, Wang X, et al. A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata[J]. IEEE Transactions on Software Engineering, Volume 41:3-18.(CCF A)
  2. Keman Huang(#)(*), Zhiyong Feng, Jianqiang Li, Xiaohong Li, System thinking of the Software Vulnerability Market via Complex Network Theory, IEEE Symposium on Security and Privacy 2015 (IEEE S&P 2015)
  3. Xie X, Liu Y, Le W, et al. S-looper: automatic summarization for multipath string loops[C]//Proceedings of the 2015 International Symposium on Software Testing and Analysis. ACM, 2015: 188-198.(CCF B)
  4. Han Z, Li X, Stroulia E. A Hierarchical Security-Auditing Methodology for Cloud Computing[C]//Services Computing (SCC), 2015 IEEE International Conference on. IEEE, 2015: 202-209.(CCF C)
  5. Geng S, Li X, Feng Z, et al. Web Application Architecture Security Evaluation Method based on AADL[C]//Engineering of Complex Computer Systems (ICECCS), 2015 20th International Conference on. IEEE, 2015: 186-189.(CCF C)
  6. Han Z, Mérineau M, Gauthier F, et al. Evolutionary analysis of access control models: a formal concept analysis method[C]//Proceedings of the 25th Annual International Conference on Computer Science and Software Engineering. IBM Corp., 2015: 261-264.(CCF C)
  7. Tian D, Li X, Hu J, et al. POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2015: 559-562. (CCF C)
  8. Song J, Li X, Hu J, et al. Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor[C]//Trustcom/BigDataSE/ISPA, 2015 IEEE. IEEE, 2015, 1: 33-40.(CCF C)
  9. Guo Q, Li X, Feng Z, et al. MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks[C]//High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on. IEEE, 2015: 1512-1517.(CCF C)

2014:

  1. Li X H, He K, Feng Z, et al. Unified threat model for analyzing and evaluating software threats[J]. Security and Communication Networks, 2014, 7(10): 1454-1466.(SCI)
  2. Zhang C, Li X, Hu J, et al. Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols[J]. Journal of Applied Mathematics, 2014, 2014. (SSCI)
  3. Li X, Li X, Xu G, et al. Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol[J]. Journal of Applied Mathematics, 2014, 2014.(SSCI)
  4. Shen G, Li X, Feng R, et al. An extended uml method for the verification of security protocols[C]//Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 19-28.(CCF C)
  5. Wu X, Li X, Feng R, et al. OOPN-SRAM: A novel method for software risk assessment[C]//Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 150-153.(CCF C)
  6. Han Z, Li X, Feng R, et al. A Three-Dimensional Model for Software Security Evaluation[C]//Theoretical Aspects of Software Engineering Conference (TASE), 2014. IEEE, 2014: 34-41.(CCF C)
  7. Zhao S, Li X, Xu G, et al. Attack tree based android malware detection with hybrid analysis[C]//2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 380-387.(CCF C)
  8. Pei H, Li X, Xu G, et al. Mining Specification of Insecure Browser Extension Behavior[C]//2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 871-876.(CCF C)
  9. Jiao H, Li X, Zhang L, et al. Hybrid Detection Using Permission Analysis for Android Malware[C]//International Conference on Security and Privacy in Communication Systems. Springer International Publishing, 2014: 541-545.(CCF C)
  10. 杜长霄, 李晓红, 石红, 冯志勇. J2EE应用软件的架构安全评估方法,计算机科学与探索, 2014 Vol.8 (5): 572-581.
  11. 刘月朋, 李晓红,石红,冯志勇.Android平台下基于联网行为的软件安全检测方法. 第十二届全国软件与应用学术会议
    (NASAC2013), 2013.
  12. Wang, T., Sun, J., Wang, X., Liu, Y., Si, Y., Dong, J. S., ... & Li, X. (2015). A systematic study on explicit-state non-zenoness checking for timed automata. IEEE Transactions on Software Engineering, 41(1), 3-18.
  13. Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013: 154-165.


2013:

  1. Yan Bobo, Li Xiaohong, Du Zhijie. A threat model-driven security testing approach for web application. Communications in Computer and Information Science,2013,332(1865-0929):158-168.
  2. Wang Qin, Li Xiaohong, Yan Bobo. A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis. Communications in Computer and Information Science, 2013,332(1865-0929):259-270.
  3. Liu Yizhen, Du Zhijie, Shi Hong, Li Xiaohong. A screening method of security functional components based on fuzzy. Communications in Computer and Information Science, 2013,332(1865-0929):292-305.
  4. Yu Xiaofei, Li Xiaohong, Zhang Qianqian. Eliciting security requirements method based on safety knowledge base. Communications in Computer and Information Science, 2013,332(1865-0929):109-121.
  5. Zhang Qianqian, Li Xiaohong, Yu Xiaofei, Feng, Zhiyong. Improving android security with layered structure instrumentation and Technology. Communications in Computer and Information Science, 2013,332(1865-0929):147-157.
  6. Du C, Li X, Shi H, et al. Architecture Security Evaluation Method Based on Security of the Components[C]//2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013, 1: 523-528.
  7. Yan L, Li X, Feng R, et al. Detection Method of the Second-Order SQL Injection in Web Applications[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer International Publishing, 2013: 154-165.
  8. Chen M, Tan T H, Sun J, et al. Verification of functional and non-functional requirements of web service composition[C]//International Conference on Formal Engineering Methods. Springer Berlin Heidelberg, 2013: 313-328.


2012:

  1. Junjie Wang, Xiaohong Li, Bobo Yan,Zhiyong Feng, "Pointer Analysis Based Vulnerability Detection for Browser Extension", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 488 ~ 495, 2012( EI 20120714765736)
  2. Xiaofei Xie, Xiaohong Li, Kunyu Cao,Zhiyong Feng, "Security Modeling Based on CSP for Network Protocol", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 496 ~ 504, 2012 (EI 20120714765737)
  3. Zhuobing HAN, Xiaohong LI, Yizhen LIU,Zhiyong FENG, "Auto-Selection of Security Functional Components Based on Common Criteria", JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 6, No. 1, pp. 479 ~ 487, 2012(EI 20120714765735)
  4. Xiaohong Li, Ke He, Zhiyong Feng. Unified Threat Model for Analyzing and Evaluating Software Threats. 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2011).And Published by Journal: Security and Communication Networks (SCI)
  5. Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang , Zhenkai Liang, and ZhiyongFeng, An Empirical Study of Dangerous Behaviors in Firefox Extensions. 15th International Conference on Information Security, ISC 2012,September 19, Passau, Germany (EI:20124115538466)
  6. Junjie Wang, Xiaohong Li, Qin Wang,GuangQuan Xu, Characteristic Behavior Sequence Based Attack Detection Method for Browser Extension (ACSA-Summer 2012. SI of Journal of "INFORMATION".SCI)
  7. 浏览器扩展行为监控系统的设计与实现。《计算机应用研究》 2012年01期

2011:

  1. Jun Sun1, Yang Liu2, Songzheng Song3, Jin Song Dong2 and Xiaohong Li.An Approach for Model Checking Probabilistic Real-time Hierarchical Systems.ICFEM2011
  2. Luu Anh Tuan1, Jun Sun2, Yang Liu1, Jin Song Dong1, Xiaohong Li3, and QuanThanh .Automatic Tool for Verification of SecurityProtocols. Frontiers of Computer Science. ISSN: 1673-7350 (print version), ISSN: 1673-7466 (electronic version). Journal no. 11704(SCI)
  3. Li,Xiaohong1; Wang,Xiangyu1; Zhang,Tao2; Yi, Jin2; Feng,Zhiyong. Software trustworthness evaluation based on weakness analysis and testing assessment. Qinghua Daxue Xuebao/Journal of Tsinghua University, Journal article (JA),Press of Tsinghua University.Vol.51(10):1287-1293,(EI 20114514493937)
  4. 李晓红,王翔宇,张涛,易锦,冯志勇,基于缺陷分析与测试评审的软件可信性评价方法. 清华大学学报,2011,
    Vol.51(10):1287-1293
  5. Xiaohong Li, Fengxu Liu, Zhiyong Feng, Jinliang Xing? .A Knowledge Based Threat Analysis in Trustworthy Software Engineering, 2011 3rd International Conference on Mechanical and Electronics Engineering, ICMEE 2011 , (EI20114714534930 ).Applied Mechanics and Materials vol:130-134, Mechanical and Electronics Engineering III,2012,3177-3180
  6. Li Xiaohong, Hu Chang , Feng Zhiyong, Du Hongwei, Ding Ganggang ,An Approach to obtain Software Security Vulnerabilities based on Vertical Search, Advanced Materials Research (2011) vol:403-408. 3203-3206.(EI20115014601918)
  7. 何可,李晓红,冯志勇,面向对象的威胁建模方法,计算机工程,2011,4
  8. He, Ke1; Li, Xiao-Hong1;Feng, Zhi-Yong1; Marback, Aaron2 . Attack scenario based approach to security test generationTianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology.2011,04:344-352.(EI2011201399080).
  9. 何 可,李晓红,冯志勇,等. 基于攻击场景的安全测试生成方法[J].天津大学学报(自然科学版),2011,04:344-352.(EI20112013990802)


2010:

  1. 李晓红, 冯志勇, 王翔宇.基于安全缺陷的软件可信性评价方法,China National Computer Conference 2010, (CNCC2010), HangZhou, China, Oct,11-13, 2010.
  2. 李晓红, 王翔宇,冯志勇,一种安全需求分析中的用例漏洞检测方法,计算机工程与应用2010,46(5):51-54.
  3. 何可, 李晓红, 冯志勇. 活动图模型驱动的Web应用程序测试方法. ,计算机应用2010,Vol.30(9):2365-2369.
  4. Xiaohong Li,Guozhu Meng,Zhiyong Feng,Ganggang Ding,A framework based security-knowledge database for vulnerabilities detection of business logic, 2010 International Conference on Optics, Photonics and Energy Engineering (OPEE 2010),May,2010.(EI收录)
  5. XING Jin-Liang,LI Xiao-Hong,CAO Yan,FENG Zhi-Yong and LIU Ran,Information Flow Analysis of Web Service Net,10th IEEE International Conference on Computer and Information Technology (CIT2010),June,2010.(EI收录)
  6. Xiaohong Li,Yan,Cao, Zhiyong Feng, Ran Liu,Web Service Security Analysis Model Based on Program Slicing, 10th International Conference on Quality Software , QSBS10,July,2010. (EI收录)


2008-2009:

  1. Xiaohong Li, Ran Liu, Zhiyong Feng, Threat Modeling-Oriented Attack path Evaluating Algorithm, Transactions of Tianjin University, 6,2009. EI20093012214314.
  2. Xiaohong Li, Ke He, Unified Threat Model for Assessing Threat in WebApplications , IEEE ISA08, International Journal of Security and Its Applications Vol.2 No.3, July,2008. EI083811558693.
  3. 李晓红,冯志勇,张亮,元搜索引擎的个性化,天津大学学报,第 5 期,2008 ,EI082611336893 。
  4. 李晓红,聂旭飞,冯志勇基于本体和规则的物流知识表示与推理 ,天津大学学报,第 3 期、 2008 ,EI082011256412。
  5. Ke He, Zhiyong Feng, Xiaohong Li, An Attack Scenario Based Approach for Software Security Testing at DesignStage, ISCSCT'2008, 12, 2008.
  6. 王泽来, 宋立军, 冯志勇,李晓红支持四方物流的Web服务集成平台的设计与实现计算机工程与应用 2009,45 (7): 15-219。
  7. 操晓春,武琳,李晓红,Video synchronization andits application to objecttransfer,Image and VisionComputing, May 4, 2009 SCI 1.194.
  8. 王泽来,李晓红,宋立军,冯志勇,基于WebGIS的第四方物流跟踪及应急系统设计与实现.计算机应用研究


2004-2006:

  1. XiaohongLi, Zhiyong Feng, A Template Language for Agent Construction , The 2006 International Conference in Computational Science and Its Applications" ICCSA'2006, 5 ,2006. SCI:BEL03. EI06 2910015055.
  2. Li Xiaohong, Yang Danjie, Feng Zhiyong, Design and Implementation of Negotiation Agent of Dynamic Supply Chain, IEEE ICITA05,5,2005,EI06229905657.
  3. 李晓红,冯志勇,孙济洲,基于PVM的并行辐射度声学仿真算法, 2004, 天津大学学报, 第8期, EI04488687201。
  4. 金辉,冯志勇,李晓红,基于聚类方法的CAPP零件知识库构建,天津大学学报、 第9期、2004, EI04518734281
  5. 饶国政,冯志勇,李晓红,通用的移动Agent系统快速集成开发环境,计算机工程与应用,2006,11,42(35)Inspec 9349130


2002-2003:

  1. 李晓红,冯志勇,孙济洲.基于移动Agent建立企业动态供应链,2003,天津大学学报,第2期,EI03387642980。
  2. Li Xiaohong, Zhang Xinrong, Feng Zhiyong, Acoustic simulation in architecture with parallel algorithm, 2003.10, 4th International Conference of VRAI, EI04238194968.
  3. 李晓红等,移动Agent在工程设计中的应用,计算机应用研究,2,2003。
  4. 李晓红等,面向Internet的弱耦合CAPP体系架构及其实现,制造业自动化,2003.6。
  5. 张新荣等,基于小波变换的视觉信号特征提取方法,电子与信息学报,2003.4。
  6. 李晓红,冯志勇,基于CORBA多客户机/服务器体系的ERP系统,制造业自动化,第11期,2002。
  7. 李晓红等,虚拟环境中声模拟关键技术研究, 声学技术,5,2002。
  8. 李晓红等,基于CORBA的多级客户机/服务器体系结构在工程中的应用,内蒙古工业大学学报,2,2002。
  9. 方毅等,Product-oriented workflow management In CAPP,机械工程学报英文版, 2002.4,EI 03127407796。
  10. HuiJin etc, gent-based Implementation for Automatic process planning,Transactions of Tianjin University, 2002.1.


1998-2001:

  1. 李晓红等,虚拟环境中声模拟的衍射处理, 电声技术,8,2001。
  2. 李晓红等,用辐射度算法计算厅堂声学传递特性, 电声技术,8,1999。
  3. 李晓红等,网络多媒体信息传输同步失调控制研究,内蒙古大学学报,1999.1。
  4. 李晓红等 神经计算机研究进展,内蒙古大学学报, 1997.6。
  5. 李晓红等 制造业的发展与未来,内蒙古工业大学学报,1998.1。