Xiang Li

Orcid: 0000-0001-5512-7920

Affiliations:
  • Beijing Institute of System Engineering, National Key Laboratory of Science and Technology on Information System Security, China


According to our database1, Xiang Li authored at least 21 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ECFuzz: Effective Configuration Fuzzing for Large-Scale Systems.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Automated Software Vulnerability Detection via Curriculum Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Fine-Grained Software Vulnerability Detection via Neural Architecture Search.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
ICDF: Intrusion collaborative detection framework based on confidence.
Int. J. Intell. Syst., 2022

Group-based corpus scheduling for parallel fuzzing.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

An Automatic Code Generation Method Based on Sequence Generative Adversarial Network.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Gradient-oriented gray-box protocol fuzzing.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features.
Wirel. Commun. Mob. Comput., 2020

Defending Application Layer DDoS Attacks via Multidimensional Parallelotope.
Secur. Commun. Networks, 2020

An Adversarial Machine Learning Method Based on OpCode N-grams Feature in Malware Detection.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
一种基于程序切片相似度匹配的脆弱性发现方法 (Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing).
计算机科学, 2019

A heuristic fuzz test generator for Java native interface.
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019

Explaining Concept Drift of Deep Learning Models.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2017
Machine Learning in Vulnerability Databases.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

2015
A clustering approach based on convergence degree chain for wireless sensor networks.
Secur. Commun. Networks, 2015

A Novel Method for Survivability Test Based on End Nodes in Large Scale Network.
KSII Trans. Internet Inf. Syst., 2015

2013
Architecture of Network Environment for High-Risk Security Experimentation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2011
Towards a Flaw Function Heuristic Vulnerability Static Analysis Framework for Executable File.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

An Overview of Bootkit Attacking Approaches.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

2010
Towards Detecting the Interaction Vulnerabilities in Large Distributed System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...