Personal HomePage

+

XiaoHong Li

Personal Information

Gender:Female

Date of Employment:2018年06月08日

Administrative Position:Dean of Computer and Information Technology Dept.

Other Contact Information

Zipcode :

Fax :

Postal Address :

E-mail :


Patents more+
[1] 47. 李晓红、赵仁、焦浩峰、胡静、许光全,基于权限的Android恶意软件混合检测方法,中华人民共和国知识产权局,2015102825075,受理
[2] 46. 李晓红、李洪波、吴晓菲、孙达志、张蕾,基于粗糙集理论和未确知测度理论的安全需求获取方法,中华人民共和国知识产权局,2015102197292,受理
[3] 45. 李晓红、李洪波、吴晓菲、孙达志、张蕾,基于形式化建模的软件安全需求获取方法,中华人民共和国知识产权局,2015102844216,受理
[4] 44. 李晓红、白裕德、孙达志、许光全、韩卓兵、经雅婷,云架构安全评估方法,中华人民共和国知识产权局,2015102881041,受理
[5] 43. 李晓红、方坤丁、沈岗、胡静、谢肖飞、张程伟,基于UML的轻量级安全协议形式化验证,中华人民共和国知识产权局,2015103510227,受理
Books
[1] 1. 本体论工程及其应用,北京:清华大学出版社,2007年5。
Selected Papers more+
[1] 101. Xie X, Chen B, Zou L, et al. Loopster: static loop termination analysis[C]//Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering. ACM, 2017: 84-94. .2017
[2] 100. Shuxin Li, Xiaohong Li, Jianye Hao*, Bo An, Zhiyong Feng, Kangjie chen, Chengwei Zhang. Defending against man-in-the-middle attack in repeated games , Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI17): 2017 .2017
[3] 99. Li X, Li S, Hao J, et al. Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack[C]//AAAI. 2017: 593-599. .2017
[4] 98. Li X, Liu F, Feng Z, et al. A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems[J]. Future Generation Computer Systems, 2017. .2017
[5] 97. Guo Q, Li X, Xu G, et al. MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks[J]. Future Generation Computer Systems, 2017, 70: 42-47. .2017