
- 教师名称:李晓红
- 教师拼音名称:XiaoHong Li
- 性别:女
- 职务:Dean of Computer and Information Technology Dept.
- 职称:教授
-
101. Xie X, Chen B, Zou L, et al. Loopster: static loop termination analysis[C]//Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering. ACM, 2017: 84-94.. 2017
-
100. Shuxin Li, Xiaohong Li, Jianye Hao*, Bo An, Zhiyong Feng, Kangjie chen, Chengwei Zhang. Defending against man-in-the-middle attack in repeated games , Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI17): 2017. 2017
-
99. Li X, Li S, Hao J, et al. Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack[C]//AAAI. 2017: 593-599.. 2017
-
98. Li X, Liu F, Feng Z, et al. A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems[J]. Future Generation Computer Systems, 2017.. 2017
-
97. Guo Q, Li X, Xu G, et al. MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks[J]. Future Generation Computer Systems, 2017, 70: 42-47.. 2017
-
96. Han Z, Li X, Xing Z, Liu H, Feng Z, et al. Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description[C]//2017 IEEE International Conference on Software Maintenance and Evolution (ICSME) 2017.. 2017
-
95. Chengwei Zhang, Xiaohong Li, Shuxin Li, Zhiyong Feng: Dynamically analyzing cell interactions in biological environments using multiagent social learning framework. J. Biomedical Semantics 8-S(1): 43-52 (2017). 2017
-
94. Liu F, Li X, Xu G. A MIH and SDN based framework for optimizing vertical handover performance[C]// International Conference on Progress in Informatics and Computing. IEEE, 2017:555-560.. 2017
-
93. Xiaohong Li, Ru Cao, Jianye Hao, et al.A Prediction and Learning based Approach to Network Selection in Dynamic Environments[C]// ICANN 2017, Part I, LNCS 10613 proceedings.. 2017
-
92. Huijuan He, Xiaohong Li, Zhiyong Feng, Jianye Hao, Xiaofei Wang, Haijun Zhang,An Adaptive Handover Trigger Strategy for 5G C/U Plane Split Heterogeneous Network, 14th IEEE International Conference on Mobile Ad-hoc and Sensor Systems IEEE MASS 2017 (submitted, CCF C). 2017
-
91. Wei Yang, Xiaohong Li, Zhiyong Feng and Jianye Hao. TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis,ICECCS2017 (The 22nd International Conference on Engineering of Complex Computer Systems (ICECCS 2017), The Kyushu University, November 5-8, 2017, Fukuoka, Japan). 2017
-
90. Yunhao Liu, Xiaohong Li, Zhiyong Feng, and Jianye Hao. An improved android collusion attack detection method based on program slicing. 19th International Conference on Formal Engineering Methods, 2017(Submitted, CCF C). . 2017
-
89. Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han. Automated Software Security Requirements Recommendation Based on FT-SR Model.SEKE2017.382-385(short paper). 2017
-
88. Zhao R, Li X, Xu G, et al. E-SSL: An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet[C]//International Workshop on Structured Object-Oriented Formal Language and Method. Springer, Cham, 2016: 101-120.. 2017
-
87. Fang K, Li X, Hao J, et al. Formal Modeling and Verification of Security Protocols on Cloud Computing Systems Based on UML 2.3[C]//Trustcom/BigDataSE/I SPA, 2016 IEEE. IEEE, 2016: 852-859.. 2017