default search action
Xiaohong Li 0001
Xiao-Hong Li 0001
Person information
- affiliation: Tianjin University, College of Intelligence and Computing, Institute of Software and Information Security Engineering, Tianjin, China
- affiliation: Tianjin University, College of Intelligence and Computing, School of Computer Science and Technology, Tianjin Key Laboratory of Advanced Networking, Tianjin, China
Other persons with the same name
- Xiaohong Li — disambiguation page
- Xiaohong Li 0002 (aka: Xiao-Hong Li 0002) — Hefei University of Technology, School of Computer Science and Information Engineering, Hefei, China
- Xiaohong Li 0003 — Wuhan University, School of Computer Science, Wuhan, China
- Xiaohong Li 0004 (aka: Xiao-Hong Li 0004) — Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
- Xiaohong Li 0005 — University of Louisville School of Medicine, Department of Anatomical Sciences and Neurobiology, Louisville, KY, USA
- Xiaohong Li 0006 — Fred Hutchinson Cancer Research Center, Seattle, WA, USA
- Xiaohong Li 0007 — University of Texas at Austin, Austin, TX, USA
- Xiaohong Li 0008 — Xi'an Jiaotong University, School of Management, State Key Laboratory for Manufacturing System Engineering, Xi'an, China (and 1 more)
- Xiaohong Li 0009 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Key Laboratory of Digital Earth Science, Beijing, China
- Xiaohong Li 0010 — Center for Medical Imaging and Medical Informatics, Coral Gables, FL, USA
- Xiaohong Li 0011 — Ministry of Education, Key Laboratory for the Exploitation of South West Resources and the Environmental Disaster Control Engineering, Chongqing, China (and 1 more)
- Xiaohong Li 0012 — Northwest Normal University, College of Computer Science and Engineering, Lanzhou, China
- Xiaohong Li 0013 — Nankai University, College of Computer and Control Engineering, Tianjin, China
- Xiaohong Li 0014 — Shaoyang University, College of Information Engineering, Provincial Key Laboratory of Informational Service for Rural Area of Southwestern Hunan, Shaoyang, China
- Xiaohong Li 0015 — Donghua University, School of Business and Management, Shanghai, China
- Xiaohong Li 0016 — Liaocheng University, Physics Science and Information Engineering College, Liaocheng, China
- Xiaohong Li 0017 — Eurasia University, School of Information Engineering, Xi'an, China
- Xiaohong Li 0018 — University of Minnesota, Department of Genetics, Cell Biology and Development, Center for Genome Engineering, Minneapolis, MN, USA
- Xiaohong Li 0019 — Jilin Province Economic Management Cadre College, Changchun,China
- Xiaohong Li 0020 — Southwest Medical University, Affiliated Hospital, Luzhou, China
- Xiaohong Li 0021 — Chinese Academy of Forestry, Institute of Forest Resources Information Technique, Beijing, China
- Xiaohong Li 0022 — Dalian Polytechnic University, Information Science and Engineering School, Dalian, China
- Xiaohong Li 0023 — Tsinghua University, School of Software, Beijing, China
- Xiaohong Li 0024 — Beijing Jiaotong University, School of Traffic and Transportation, Beijing, China
- Xiao-Hong Li 0025 — Jiangxi University of Science and Technology, School of Applied Science, Ganzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j40]Qiaoyun Yin, Zhiyong Feng, Xiaohong Li, Shizhan Chen, Hongyue Wu, Gaoyong Han:
Tackling data-heterogeneity variations in federated learning via adaptive aggregate weights. Knowl. Based Syst. 304: 112484 (2024) - [j39]Hua Zhang, Xiaohong Li, Xiaochun Cao, Hassan Foroosh:
Multiple Adverse Weather Conditions Adaptation for Object Detection via Causal Intervention. IEEE Trans. Pattern Anal. Mach. Intell. 46(3): 1742-1756 (2024) - [j38]Yongyang Lv, Ruitao Feng, Maode Ma, Manqing Zhu, Hanwei Wu, Xiaohong Li:
Reinventing Multi-User Authentication Security From Cross-Chain Perspective. IEEE Trans. Inf. Forensics Secur. 19: 8908-8923 (2024) - [c107]Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. ICSE 2024: 34:1-34:13 - [c106]Qi Guo, Xiaohong Li, Xiaofei Xie, Shangqing Liu, Ze Tang, Ruitao Feng, Junjie Wang, Jidong Ge, Lei Bu:
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion. ISSTA 2024: 313-324 - [c105]Ruitao Feng, Sen Li, Sen Chen, Mengmeng Ge, Xuewei Li, Xiaohong Li:
Unmasking the Lurking: Malicious Behavior Detection for IoT Malware with Multi-label Classification. LCTES 2024: 95-106 - [i14]Qi Guo, Xiaohong Li, Xiaofei Xie, Shangqing Liu, Ze Tang, Ruitao Feng, Junjie Wang, Jidong Ge, Lei Bu:
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion. CoRR abs/2404.01554 (2024) - 2023
- [j37]Yude Bai, Sen Chen, Zhenchang Xing, Xiaohong Li:
ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph. Sci. China Inf. Sci. 66(9) (2023) - [j36]Chengwei Zhang, Dina Fang, Sandip Sen, Xiaohong Li, Zhiyong Feng, Wanli Xue, Dou An, Xintian Zhao, Rong Chen:
Opinion Dynamics in Gossiper-Media Networks Based on Multiagent Reinforcement Learning. IEEE Trans. Netw. Sci. Eng. 10(2): 1143-1156 (2023) - [j35]Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, Zhiyong Feng, Xiaohong Li, Linyi Han:
Extraction of Phrase-based Concepts in Vulnerability Descriptions through Unsupervised Labeling. ACM Trans. Softw. Eng. Methodol. 32(5): 112:1-112:45 (2023) - [j34]Yao Zhang, Xiaofei Xie, Yi Li, Yun Lin, Sen Chen, Yang Liu, Xiaohong Li:
Demystifying Performance Regressions in String Solvers. IEEE Trans. Software Eng. 49(3): 947-961 (2023) - [c104]Sen Li, Mengmeng Ge, Ruitao Feng, Xiaohong Li, Kwok-Yan Lam:
Automatic Detection and Analysis towards Malicious Behavior in IoT Malware. ICDM (Workshops) 2023: 1332-1341 - [c103]Fei Zhang, Ruitao Feng, Xiaofei Xie, Xiaohong Li, Lianshuan Shi:
SeqAdver: Automatic Payload Construction and Injection in Sequence-based Android Adversarial Attack. ICDM (Workshops) 2023: 1342-1351 - [c102]Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. ASE 2023: 686-697 - [c101]Yuxin Zhang, Sen Chen, Lingling Fan, Chunyang Chen, Xiaohong Li:
Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps. ESEC/SIGSOFT FSE 2023: 1255-1267 - [i13]Yuxin Zhang, Sen Chen, Lingling Fan, Chunyang Chen, Xiaohong Li:
Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps. CoRR abs/2308.09029 (2023) - [i12]Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. CoRR abs/2309.08221 (2023) - [i11]Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. CoRR abs/2312.03335 (2023) - 2022
- [j33]Chengwei Zhang, Zhuobing Han, Bingfu Liu, Wanli Xue, Jianye Hao, Xiaohong Li, Dou An, Rong Chen:
SCC-rFMQ: a multiagent reinforcement learning method in cooperative Markov games with continuous actions. Int. J. Mach. Learn. Cybern. 13(7): 1927-1944 (2022) - [j32]Hao Guo, Sen Chen, Zhenchang Xing, Xiaohong Li, Yude Bai, Jiamou Sun:
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions. ACM Trans. Softw. Eng. Methodol. 31(3): 49:1-49:27 (2022) - [c100]Guoqing Yan, Sen Chen, Yude Bai, Xiaohong Li:
Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability Detection? COMPSAC 2022: 904-913 - [c99]Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. ASE 2022: 105:1-105:13 - [c98]Xiuhan Shi, Xiaofei Xie, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li:
Large-scale analysis of non-termination bugs in real-world OSS projects. ESEC/SIGSOFT FSE 2022: 256-268 - [i10]Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. CoRR abs/2209.04791 (2022) - 2021
- [j31]Yude Bai, Zhenchang Xing, Duoyuan Ma, Xiaohong Li, Zhiyong Feng:
Comparative analysis of feature representations and machine learning methods in Android family classification. Comput. Networks 184: 107639 (2021) - [c97]Yuxuan Li, Ruitao Feng, Sen Chen, Qianyu Guo, Lingling Fan, Xiaohong Li:
IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps. APSEC 2021: 202-212 - [c96]Hui Jin, Weimin Ge, Yao Zhang, Xiaohong Li, Zhidong Deng:
Loopster++: Termination Analysis for Multi-path Linear Loop. CollaborateCom (1) 2021: 479-497 - [c95]Liu Yuan, Yude Bai, Zhenchang Xing, Sen Chen, Xiaohong Li, Zhidong Deng:
Predicting Entity Relations across Different Security Databases by Using Graph Attention Network. COMPSAC 2021: 834-843 - [c94]Hao Guo, Zhenchang Xing, Sen Chen, Xiaohong Li, Yude Bai, Hu Zhang:
Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases. COMPSAC 2021: 1020-1025 - [c93]Fengye Yu, Maode Ma, Xiaohong Li:
A Blockchain-Assisted Seamless Handover Authentication for V2I Communication in 5G Wireless Networks. ICC 2021: 1-6 - [c92]Binyu Tian, Qing Guo, Felix Juefei-Xu, Wen Le Chan, Yupeng Cheng, Xiaohong Li, Xiaofei Xie, Shengchao Qin:
Bias Field Poses a Threat to DNN-Based X-Ray Recognition. ICME 2021: 1-6 - [c91]Shouli Zhang, Chen Liu, Han Li, Zhuofeng Zhao, Xiaohong Li:
Service Deployment with Predictive Ability for Data Stream Processing in a Cloud-Edge Environment. ICSOC 2021: 781-789 - [c90]Binyu Tian, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Xiaohong Li, Yang Liu:
AVA: Adversarial Vignetting Attack against Visual Recognition. IJCAI 2021: 1046-1053 - [c89]Sofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, Zhiyong Feng, Xiaohong Li, Linyi Han:
Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions. ASE 2021: 943-954 - [c88]Siqi Li, Yun Lin, Xiaofei Xie, Yuekang Li, Xiaohong Li, Weimin Ge, Yang Liu, Jin Song Dong:
A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing. ASE 2021: 1186-1189 - [c87]Sofonias Yitagesu, Xiaowang Zhang, Zhiyong Feng, Xiaohong Li, Zhenchang Xing:
Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions. MSR 2021: 29-40 - [c86]Qianqian Zhang, Yao Zhang, Xiao-Hong Li, Bin Wu:
Discovering Properties about Arrays via Path Dependence Analysis. TASE 2021: 55-62 - [c85]Yingwen Lin, Yao Zhang, Sen Chen, Fu Song, Xiaofei Xie, Xiaohong Li, Lintan Sun:
Inferring Loop Invariants for Multi-Path Loops. TASE 2021: 63-70 - [c84]Jinghui Lyu, Yude Bai, Zhenchang Xing, Xiaohong Li, Weimin Ge:
A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability. TASE 2021: 119-126 - [c83]Mingxi Tan, Dazhi Sun, Xiaohong Li:
A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN. WCNC 2021: 1-7 - [i9]Jiamou Sun, Zhenchang Xing, Hao Guo, Deheng Ye, Xiaohong Li, Xiwei Xu, Liming Zhu:
Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization. CoRR abs/2101.01431 (2021) - [i8]Binyu Tian, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Xiaohong Li, Yang Liu:
AVA: Adversarial Vignetting Attack against Visual Recognition. CoRR abs/2105.05558 (2021) - 2020
- [j30]Haodi Zhang, Jianye Hao, Xiaohong Li:
A Method for Deploying Distributed Denial of Service Attack Defense Strategies on Edge Servers Using Reinforcement Learning. IEEE Access 8: 78482-78491 (2020) - [j29]Zhuobing Han, Xiaohong Li, Guangquan Xu, Naixue Xiong, Ettore Merlo, Eleni Stroulia:
An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models. IEEE Trans. Ind. Informatics 16(2): 1024-1034 (2020) - [j28]Zhengyi Shang, Maode Ma, Xiaohong Li:
A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks. IEEE Trans. Wirel. Commun. 19(11): 7021-7032 (2020) - [c82]Duoyuan Ma, Yude Bai, Zhenchang Xing, Lintan Sun, Xiaohong Li:
A Knowledge Graph-based Sensitive Feature Selection for Android Malware Classification. APSEC 2020: 188-197 - [c81]Lingjun Zhou, Bing Yu, David Berend, Xiaofei Xie, Xiaohong Li, Jianjun Zhao, Xusheng Liu:
An Empirical Study on Robustness of DNNs with Out-of-Distribution Awareness. APSEC 2020: 266-275 - [c80]Xingwei An, Xiangtong Zhou, Wenxiao Zhong, Shuang Liu, Xiaohong Li, Dong Ming:
Weighted Subject-Semi-Independent ERP-based Brain-Computer Interface. EMBC 2020: 2969-2972 - [c79]Yude Bai, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Duoyuan Ma:
Unsuccessful story about few shot malware family classification and siamese network to the rescue. ICSE 2020: 1560-1571 - [c78]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. ICSME 2020: 617-628 - [c77]Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen:
Audee: Automated Testing for Deep Learning Frameworks. ASE 2020: 486-498 - [c76]Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu:
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations. ASE 2020: 524-535 - [c75]Mengmeng Jiang, Xiaohong Li, Xiaofei Xie, Yao Zhang:
An Empirical Study in Software Verification Tools. TASE 2020: 201-208 - [c74]Yu Zhang, Xiaohong Li:
The Scheme of Security Requirement Acquisition Based on Knowledge Graph. TASE 2020: 225-231 - [c73]Hao Guo, Zhenchang Xing, Xiaohong Li:
Predicting Missing Information of Vulnerability Reports. WWW (Companion Volume) 2020: 81-82 - [i7]Hao Guo, Zhenchang Xing, Xiaohong Li:
Predicting Missing Information of Key Aspects in Vulnerability Reports. CoRR abs/2008.02456 (2020) - [i6]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. CoRR abs/2008.13768 (2020) - [i5]Binyu Tian, Qing Guo, Felix Juefei-Xu, Wen Le Chan, Yupeng Cheng, Xiaohong Li, Xiaofei Xie, Shengchao Qin:
Bias Field Poses a Threat to DNN-based X-Ray Recognition. CoRR abs/2009.09247 (2020)
2010 – 2019
- 2019
- [j27]Chengwei Zhang, Xiaohong Li, Jianye Hao, Siqi Chen, Karl Tuyls, Wanli Xue, Zhiyong Feng:
SA-IGA: a multiagent reinforcement learning method towards socially optimal outcomes. Auton. Agents Multi Agent Syst. 33(4): 403-429 (2019) - [j26]Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han, Chen Lv, Weilong Ding:
A Declarative Service-Based Method for Adaptive Aggregation of Sensor Streams. IEEE Access 7: 89-98 (2019) - [j25]Tingyu Song, Xiaohong Li, Zhiyong Feng, Guangquan Xu:
Inferring Patterns for Taint-Style Vulnerabilities With Security Patches. IEEE Access 7: 52339-52349 (2019) - [j24]Guangquan Xu, Yao Zhang, Arun Kumar Sangaiah, Xiaohong Li, Aniello Castiglione, Xi Zheng:
CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf. Sci. 476: 505-515 (2019) - [j23]Shu-Yang Gao, Xiao-Hong Li, Maode Ma:
A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol. Sensors 19(23): 5122 (2019) - [j22]Xiaofei Xie, Bihuan Chen, Liang Zou, Yang Liu, Wei Le, Xiaohong Li:
Automatic Loop Summarization via Path Dependency Analysis. IEEE Trans. Software Eng. 45(6): 537-557 (2019) - [c72]Ying Wang, Jing Hu, Xiaohong Li, Zhiyong Feng:
An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET. CollaborateCom 2019: 799-815 - [c71]Zhengyi Shang, Maode Ma, Xiaohong Li:
A Certificateless Authentication Protocol for D2D Group Communications in 5G Cellular Networks. GLOBECOM 2019: 1-7 - [c70]Chunyan Wang, Weimin Ge, Xiaohong Li, Zhiyong Feng:
DCT: Differential Combination Testing of Deep Learning Systems. ICANN (3) 2019: 697-710 - [c69]Xi Gong, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Zhuobing Han:
Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning. ICECCS 2019: 31-40 - [c68]Hongbo Xiao, Zhenchang Xing, Xiaohong Li, Hao Guo:
Embedding and Predicting Software Security Entity Relationships: A Knowledge Graph Based Approach. ICONIP (3) 2019: 50-63 - [c67]Shouli Zhang, Chen Liu, Jianwu Wang, Zhongguo Yang, Yanbo Han, Xiaohong Li:
Latency-Aware Deployment of IoT Services in a Cloud-Edge Environment. ICSOC 2019: 231-236 - [c66]Hongyue Wu, Shuiguang Deng, Wei Li, Jianwei Yin, Xiaohong Li, Zhiyong Feng, Albert Y. Zomaya:
Mobility-Aware Service Selection in Mobile Edge Computing Systems. ICWS 2019: 201-208 - [c65]Zhongmei Zhang, Jian Yu, Xiaohong Li, Chen Liu, Yanbo Han, Yunan Ma:
A Data-Driven Service Creation Approach for Effectively Capturing Events from Multiple Sensor Streams. ICWS 2019: 346-354 - [c64]Xiaofei Xie, Lei Ma, Haijun Wang, Yuekang Li, Yang Liu, Xiaohong Li:
DiffChaser: Detecting Disagreements for Deep Neural Networks. IJCAI 2019: 5772-5778 - [c63]Hao Li, Xiaohong Li, Xiang Chen, Xiaofei Xie, Yanzhou Mu, Zhiyong Feng:
Cross-project Defect Prediction via ASTToken2Vec and BLSTM-based Neural Network. IJCNN 2019: 1-8 - [c62]Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms. ASE 2019: 810-822 - [c61]Yilin Xu, Weimin Ge, Xiaohong Li, Zhiyong Feng, Xiaofei Xie, Yude Bai:
A Co-Occurrence Recommendation Model of Software Security Requirement. TASE 2019: 41-48 - [c60]Kaihong Han, Maode Ma, Xiaohong Li, Zhiyong Feng, Jianye Hao:
An Efficient Handover Authentication Mechanism for 5G Wireless Network. WCNC 2019: 1-8 - [i4]Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms. CoRR abs/1909.06727 (2019) - 2018
- [j21]Xiaohong Li, Ru Cao, Jianye Hao:
An Adaptive Learning Based Network Selection Approach for 5G Dynamic Environments. Entropy 20(4): 236 (2018) - [j20]Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu, Zhangjie Fu:
A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems. Future Gener. Comput. Syst. 79: 417-430 (2018) - [j19]Shouli Zhang, Chen Liu, Shen Su, Yanbo Han, Xiaohong Li:
A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model. Int. J. Netw. Manag. 28(5) (2018) - [j18]Zhuobing Han, Xiaohong Li, Keman Huang, Zhiyong Feng:
A Software Defined Network-Based Security Assessment Framework for CloudIoT. IEEE Internet Things J. 5(3): 1424-1434 (2018) - [j17]Ran Wang, Guangquan Xu, Xianjiao Zeng, Xiaohong Li, Zhiyong Feng:
TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting. J. Parallel Distributed Comput. 118(Part): 100-106 (2018) - [j16]Jianye Hao, Eunsuk Kang, Jun Sun, Zan Wang, Zhaopeng Meng, Xiaohong Li, Zhong Ming:
An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers. IEEE Trans. Smart Grid 9(4): 2398-2408 (2018) - [j15]Zhongmei Zhang, Chen Liu, Shouli Zhang, Xiaohong Li, Yanbo Han:
A Service-Based Method for Multiple Sensor Streams Aggregation in Fog Computing. Wirel. Commun. Mob. Comput. 2018: 8475604:1-8475604:11 (2018) - [c59]Chengwei Zhang, Xiaohong Li, Jianye Hao, Sandip Sen, Wanli Xue, Zhiyong Feng:
The Dynamics of Opinion Evolution in Gossiper-Media Model with WoLS-CALA Learning. AAMAS 2018: 2159-2161 - [c58]Chengwei Zhang, Xiaohong Li, Jianye Hao, Siqi Chen, Karl Tuyls, Zhiyong Feng:
SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions. AAMAS 2018: 2162-2164 - [c57]Haitao Zhang, Guoqiang Li, Xiaohong Li, Zhuo Cheng, Jinyun Xue, Shaoying Liu:
An efficient approach for verifying automobile distributed application systems on timing property. ICSE (Companion Volume) 2018: 230-231 - [c56]Zhongmei Zhang, Chen Liu, Xiaohong Li, Yanbo Han:
A Service-Based Declarative Approach for Capturing Events from Multiple Sensor Streams. ICSOC 2018: 255-263 - [c55]Shouli Zhang, Chen Liu, Yanbo Han, Xiaohong Li:
Seamless Integration of Cloud and Edge with a Service-Based Approach. ICWS 2018: 155-162 - [c54]Wanshu Liu, Chengwei Zhang, Tianpei Yang, Jianye Hao, Xiaohong Li, Zhijie Bao:
Achieving Multiagent Coordination Through CALA-rFMQ Learning in Continuous Action Space. PRICAI 2018: 132-139 - [c53]Gaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng:
ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning. TrustCom/BigDataSE 2018: 149-155 - [c52]Zhuobing Han, Xiaohong Li, Hongtao Liu, Zhenchang Xing, Zhiyong Feng:
DeepWeak: Reasoning common software weaknesses via knowledge graph embedding. SANER 2018: 456-466 - [i3]Chengwei Zhang, Xiaohong Li, Jianye Hao, Siqi Chen, Karl Tuyls, Wanli Xue:
SA-IGA: A Multiagent Reinforcement Learning Method Towards Socially Optimal Outcomes. CoRR abs/1803.03021 (2018) - [i2]Chengwei Zhang, Xiaohong Li, Jianye Hao, Siqi Chen, Karl Tuyls, Zhiyong Feng, Wanli Xue, Rong Chen:
SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions. CoRR abs/1809.06625 (2018) - [i1]Qianyu Guo, Xiaofei Xie, Lei Ma, Qiang Hu, Ruitao Feng, Li Li, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms. CoRR abs/1811.05187 (2018) - 2017
- [j14]Guangquan Xu, Yan Cao, Yuanyuan Ren, Xiaohong Li, Zhiyong Feng:
Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things. IEEE Access 5: 21046-21056 (2017) - [j13]Chengwei Zhang, Xiaohong Li, Shuxin Li, Zhiyong Feng:
Dynamically analyzing cell interactions in biological environments using multiagent social learning framework. J. Biomed. Semant. 8-S(1): 43-52 (2017) - [j12]Qi Guo, Xiaohong Li, Guangquan Xu, Zhiyong Feng:
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks. Future Gener. Comput. Syst. 70: 42-47 (2017) - [j11]Ran Wang, Guangquan Xu, Bin Liu, Yan Cao, Xiaohong Li:
Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks. IEEE Multim. 24(4): 38-47 (2017) - [j10]Guangquan Xu, Gaoxu Zhang, Chao Xu, Bin Liu, Mingquan Li, Yan Ren, Xiaohong Li, Zhiyong Feng, Degan Zhang:
A multi-attribute rating based trust model: improving the personalized trust modeling framework. Multim. Tools Appl. 76(4): 5833-5849 (2017) - [c51]Jianrui Lin, Zhiyong Feng, Shizhan Chen, Keman Huang, Wei Tan, Xiaohong Li:
ATM: A Framework to Support Application State Migration in Multiple Terminals Environment. SCC 2017: 188-195 - [c50]Xiaohong Li, Shuxin Li, Jianye Hao, Zhiyong Feng, Bo An:
Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack. AAAI 2017: 593-599 - [c49]Shouli Zhang, Xiaohong Li, Jianwu Wang, Shen Su:
Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment. CollaborateCom 2017: 253-263 - [c48]Xiaohong Li, Ru Cao, Jianye Hao, Zhiyong Feng:
A Prediction and Learning Based Approach to Network Selection in Dynamic Environments. ICANN (1) 2017: 92-100 - [c47]Wei Yang, Xiaohong Li, Zhiyong Feng, Jianye Hao:
TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis. ICECCS 2017: 30-39 - [c46]Yunhao Liu, Xiaohong Li, Zhiyong Feng, Jianye Hao:
An Improved Android Collusion Attack Detection Method Based on Program Slicing. ICFEM 2017: 315-331 - [c45]Zhuobing Han, Xiaohong Li, Zhenchang Xing, Hongtao Liu, Zhiyong Feng:
Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description. ICSME 2017: 125-136 - [c44]Zhongmei Zhang, Xiaohong Li, Chen Liu, Shen Su, Yanbo Han:
A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data. ICWS 2017: 572-579 - [c43]Shuxin Li, Xiaohong Li, Jianye Hao, Bo An, Zhiyong Feng, Kangjie Chen, Chengwei Zhang:
Defending Against Man-In-The-Middle Attack in Repeated Games. IJCAI 2017: 3742-3748 - [c42]Huijuan He, Xiaohong Li, Zhiyong Feng, Jianye Hao, Xiaofei Wang, Haijun Zhang:
An Adaptive Handover Trigger Strategy for 5G C/U Plane Split Heterogeneous Network. MASS 2017: 476-480 - [c41]Hongbo Li, Xiaohong Li, Jianye Hao, Guangquan Xu, Zhiyong Feng, Xiaofei Xie:
FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model. QRS 2017: 352-363 - [c40]