default search action
Jianwei Niu 0001
Person information
- affiliation: University of Texas at San Antonio, Department of Computer Science, TX, USA
Other persons with the same name
- Jianwei Niu — disambiguation page
- Jianwei Niu 0002 — Beihang University, School of Computer Science and Engineering, Beijing, China
- Jianwei Niu 0003 — University of Science and Technology Beijing, School of Mechanical Engineering, China
- Jianwei Niu 0004 — Horizon Robotics
- Jianwei Niu 0005 — Chinese University of Hong Kong, Department of Mathematics, Shatin, Hong Kong
- Jianwei Niu 0006 — Soochow University, School of Optoelectronic Science and Engineering, Suzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c48]Rebecca Schroeder, Jianwei Niu, Ashwin Malshe, Sue Hum, Siobhan Flemming, Ian Thacker:
Enabling Widespread Engagement in DS and AI: The Generation AI Curriculum Initiative for Community Colleges. SIGCSE (2) 2024: 1938 - [e2]Jianwei Niu, Jaideep Vaidya:
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, SACMAT 2024, San Antonio, TX, USA, May 15-17, 2024. ACM 2024 [contents] - 2023
- [j8]Xueling Zhang, John Heaps, Rocky Slavin, Jianwei Niu, Travis D. Breaux, Xiaoyin Wang:
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data. ACM Trans. Softw. Eng. Methodol. 32(4): 89:1-89:34 (2023) - [c47]Kevin Baldor, Xiaoyin Wang, Jianwei Niu:
Thorium: A Language for Bounded Verification of Dynamic Reactive Objects. REBLS@SPLASH 2023: 1-13 - 2021
- [j7]Mitra Bokaei Hosseini, Travis D. Breaux, Rocky Slavin, Jianwei Niu, Xiaoyin Wang:
Analyzing privacy policies through syntax-driven semantic analysis of information types. Inf. Softw. Technol. 138: 106608 (2021) - [j6]Jonathan Shahen, Jianwei Niu, Mahesh Tripunitara:
Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies. IEEE Trans. Dependable Secur. Comput. 18(5): 2349-2364 (2021) - [c46]John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu, Ravi S. Sandhu:
Access Control Policy Generation from User Stories Using Machine Learning. DBSec 2021: 171-188 - [c45]Mitra Bokaei Hosseini, John Heaps, Rocky Slavin, Jianwei Niu, Travis D. Breaux:
Ambiguity and Generality in Natural Language Privacy Policies. RE 2021: 70-81 - [c44]Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Jianwei Niu:
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis. SP 2021: 796-812 - 2020
- [c43]Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis D. Breaux, Jianwei Niu:
How does misconfiguration of analytic services compromise mobile privacy? ICSE 2020: 1572-1583 - [c42]Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Xiaoyin Wang, Jianwei Niu:
Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types. REFSQ 2020: 97-115
2010 – 2019
- 2019
- [c41]Xue Qin, Robert Neuhaus, Diego Gonzales, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Taming web views in the detection of Android privacy leaks. HotSoS 2019: 23:1-23:2 - [c40]John Heaps, Xueling Zhang, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Toward a reliability measurement framework automated using deep learning. HotSoS 2019: 25:1-25:2 - [c39]Xueling Zhang, Rocky Slavin, Xiaoyin Wang, Jianwei Niu:
Privacy Assurance for Android Augmented Reality Apps. PRDC 2019: 114-115 - [c38]John Heaps, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Toward Detection of Access Control Models from Source Code via Word Embedding. SACMAT 2019: 103-112 - [e1]Florian Kerschbaum, Atefeh Mashatan, Jianwei Niu, Adam J. Lee:
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019. ACM 2019, ISBN 978-1-4503-6753-0 [contents] - 2018
- [c37]Mitra Bokaei Hosseini, Xue Qin, Jianwei Niu:
Extracting Information Types from Android Layout Code Using Sequence to Sequence Learning. AAAI Workshops 2018: 767-770 - [c36]Xiaoyin Wang, Xue Qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Jianwei Niu:
GUILeak: tracing privacy policy claims on user input data for Android applications. ICSE 2018: 37-47 - [c35]Mitra Bokaei Hosseini, Travis D. Breaux, Jianwei Niu:
Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants. REFSQ 2018: 39-56 - 2017
- [c34]Claiborne Johnson, Thomas MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne, Jianwei Niu:
Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures. SACMAT 2017: 167-178 - [c33]Thomas MacGahan, Claiborne Johnson, Armando Rodriguez, Jeffery von Ronne, Jianwei Niu:
Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language. SACMAT 2017: 191-198 - 2016
- [j5]Hui Shen, Ram Krishnan, Rocky Slavin, Jianwei Niu:
Sequence Diagram Aided Privacy Policy Specification. IEEE Trans. Dependable Secur. Comput. 13(3): 381-393 (2016) - [c32]Mitra Bokaei Hosseini, Sudarshan Wadkar, Travis D. Breaux, Jianwei Niu:
Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies. AAAI Fall Symposia 2016 - [c31]Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
Toward a framework for detecting privacy policy violations in android application code. ICSE 2016: 25-36 - [c30]Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
PVDetector: a detector of privacy-policy violations for Android apps. MOBILESoft 2016: 299-300 - [c29]Jianwei Niu, Yier Jin, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang:
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. SACMAT 2016: 49-50 - 2015
- [c28]Jonathan Shahen, Jianwei Niu, Mahesh V. Tripunitara:
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies. SACMAT 2015: 15-26 - 2014
- [j4]Jianwei Niu, Mark Reith, William H. Winsborough:
Formal verification of security properties in trust management policy. J. Comput. Secur. 22(1): 69-153 (2014) - [c27]Ashwini Rao, Hanan Hibshi, Travis D. Breaux, Jean-Michel Lehker, Jianwei Niu:
Less is more?: investigating the role of examples in security studies using analogical transfer. HotSoS 2014: 7 - [c26]Rocky Slavin, Jean-Michel Lehker, Jianwei Niu, Travis D. Breaux:
Managing security requirements patterns using feature diagram hierarchies. RE 2014: 193-202 - 2013
- [c25]Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia, William H. Winsborough:
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. SACMAT 2013: 3-14 - 2012
- [c24]Wanying Zhao, Jianwei Niu, William H. Winsborough:
Refinement-based design of a group-centric secure information sharing model. CODASPY 2012: 149-156 - [c23]Hui Shen, Mark Robinson, Jianwei Niu:
Formal Analysis of Sequence Diagram with Combined Fragments. ICSOFT 2012: 44-54 - [c22]Rocky Slavin, Hui Shen, Jianwei Niu:
Characterizations and boundaries of security requirements patterns. RePa 2012: 48-53 - [c21]Kevin Baldor, Jianwei Niu:
Monitoring Dense-Time, Continuous-Semantics, Metric Temporal Logic. RV 2012: 245-259 - [c20]Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, Jianwei Niu:
Ensuring authorization privileges for cascading user obligations. SACMAT 2012: 33-44 - [c19]Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, Elisa Bertino:
On XACML's Adequacy to Specify and to Enforce HIPAA. HealthSec 2012 - 2011
- [j3]Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough:
Group-Centric Secure Information-Sharing Models for Isolated Groups. ACM Trans. Inf. Syst. Secur. 14(3): 23:1-23:29 (2011) - [c18]Qing Yi, Jianwei Niu, Anitha R. Marneni:
Collective Specification and Verification of Behavior Models and Object-oriented Implementations. ICSOFT (2) 2011: 15-24 - [c17]Mark Robinson, Jianwei Niu, Macneil Shonle:
GitBAC: Flexible access control for non-modular concerns. ASE 2011: 500-503 - 2010
- [j2]Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, Jianwei Niu:
Deconstructing the semantics of big-step modelling languages. Requir. Eng. 15(2): 235-265 (2010) - [c16]Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William H. Winsborough:
Group-Centric Models for Secure and Agile Information Sharing. MMM-ACNS 2010: 55-69
2000 – 2009
- 2009
- [c15]Mark Reith, Jianwei Niu, William H. Winsborough:
Toward practical analysis for trust management policy. AsiaCCS 2009: 310-321 - [c14]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
A conceptual framework for Group-Centric secure information sharing. AsiaCCS 2009: 384-387 - [c13]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
Towards a framework for group-centric secure collaboration. CollaborateCom 2009: 1-10 - [c12]Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, Jianwei Niu:
Semantic Criteria for Choosing a Language for Big-Step Models. RE 2009: 181-190 - [c11]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
Foundations for group-centric secure information sharing models. SACMAT 2009: 115-124 - 2008
- [c10]Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough:
Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62 - [c9]Hui Shen, Aliya Virani, Jianwei Niu:
Formalize UML 2 Sequence Diagrams. HASE 2008: 437-440 - [c8]Mark Reith, Jianwei Niu, William H. Winsborough:
Role-based trust management security policy analysis and correction environment (RT-SPACE). ICSE Companion 2008: 929-930 - [c7]Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
Role Based Access Control and OWL. OWLED (Spring) 2008 - [c6]Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 - 2007
- [c5]Mark Reith, Jianwei Niu, William H. Winsborough:
Apply Model Checking to Security Analysis in Trust Management. ICDE Workshops 2007: 734-743 - [c4]Mark Reith, Jianwei Niu, William H. Winsborough:
Engineering Trust Management into Software Models. MiSE@ICSE 2007: 9 - 2004
- [c3]Yun Lu, Joanne M. Atlee, Nancy A. Day, Jianwei Niu:
Mapping Template Semantics to SMV. ASE 2004: 320-325 - 2003
- [j1]Jianwei Niu, Joanne M. Atlee, Nancy A. Day:
Template Semantics for Model-Based Notations. IEEE Trans. Software Eng. 29(10): 866-882 (2003) - [c2]Jianwei Niu, Joanne M. Atlee, Nancy A. Day:
Understanding and Comparing Model-Based Specification Notations. RE 2003: 188-199 - 2002
- [c1]Jianwei Niu, Joanne M. Atlee, Nancy A. Day:
Composable semantics for model-based notations. SIGSOFT FSE 2002: 149-158
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint