
- 教师名称:李晓红
- 教师拼音名称:XiaoHong Li
- 性别:女
- 职务:Dean of Computer and Information Technology Dept.
- 职称:教授
-
86. Zhang X, Li X, Feng Z, et al. Universal Analysis and Detection Framework for Location Aided Routing[C]//Engineering of Complex Computer Systems (ICECCS), 2016 21st International Conference on. IEEE, 2016: 145-154.. 2017
-
85. Li X, Xu J, Xu G, et al. Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service[J]. International Journal of Software Engineering and Knowledge Engineering, 2016, 26(04): 563-585.. 2017
-
84. Huang K, Siegel M, Madnick S, et al. Poster: Diversity or concentration? Hackers’ strategy for working across multiple bug bounty programs[C]//37th IEEE Symposium on Security and Privacy (S&P). 2016.. 2017
-
83. Li X, Zhang C, Hao J, et al. Socially-Aware Multiagent Learning: Towards Socially Optimal Outcomes[C]//ECAI. 2016: 533-541.. 2017
-
82. Xie X, Chen B, Liu Y, et al. Proteus: computing disjunctive loop summary via path dependency analysis[C]//Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, 2016: 61-72.. 2017
-
81. Geng S, Li X, Feng Z, et al. Web Application Architecture Security Evaluation Method Based on AADL[C]// International Conference on Engineering of Complex Computer Systems. IEEE, 2016:186-189. (CCF C类会议). Gold Coast, Australia, 2015/12/9—2015/12/11. 2017
-
80. Wang T, Sun J, Wang X, et al. A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata[J]. Software Engineering IEEE Transactions on, 2015, 41(1):3-18.. 2017
-
79. Guo Q, Li X, Feng Z, et al. MPOID: Multi-protocol Oriented Intrusion Detection Method for Wireless Sensor Networks[C]// IEEE, International Conference on High PERFORMANCE Computing and Communications. IEEE, 2015:1512-1517.. 2017
-
78. Song J, Li X, Hu J, et al. Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor[C]// IEEE Trustcom/bigdatase/ispa. IEEE Computer Society, 2015:33-40. (CCF C类会议). Helsinki, Finland, 2015/8/20-2015/8/22.. 2017
-
77. Tian D, Li X, Hu J, et al. POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware[M]// Security and Privacy in Communication Networks. Springer International Publishing, 2015. (CCF C类会议). DALLAS, UNITED STATES. 2015/10/26-2015/10/29. 2017
-
76. Han Z, Rineau M, Gauthier F, et al. Evolutionary analysis of access control models: a formal concept analysis method[C]// International Conference on Computer Science and Software Engineering. IBM Corp. 2015:261-264. (CCF C类会议). Markham, Ontario, Canada, 2015/11/2—2015/11/14. 2017
-
75. Han Z, Li X, Stroulia E. A Hierarchical Security-Auditing Methodology for Cloud Computing[C]// IEEE International Conference on Services Computing. IEEE, 2015:202-209. (CCF C类会议). USA, New York , 2015/6/27—2015/7/2.. 2017
-
74. Keman Huang(#)(*), Zhiyong Feng, Jianqiang Li, Xiaohong Li, System thinking of the Software Vulnerability Market via Complex Network Theory, IEEE Symposium on Security and Privacy 2015 (IEEE S&P 2015) . 2017
-
73. Xie X, Liu Y, Le W, et al. S-looper: automatic summarization for multipath string loops[C]// International Symposium on Software Testing and Analysis. ACM, 2015:188-198.. 2017
-
72. Wang T, Sun J, Wang X, et al. A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata[J]. Software Engineering IEEE Transactions on, 2015, 41(1):3-18.. 2017