Dianxiang Xu
Orcid: 0000-0003-4529-3540
According to our database1,
Dianxiang Xu
authored at least 154 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Parallel Distributed Comput., 2024
GNN-Based Transfer Learning and Tuning for Detecting Code Vulnerabilities across Different Programming Languages.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
2022
Int. J. Artif. Intell. Tools, December, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
IEEE Trans. Netw. Serv. Manag., 2020
CoRR, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
IEEE Trans. Comput. Soc. Syst., 2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 2019 4th International Conference on Computing, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Int. J. Semantic Comput., 2018
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
2016
Int. J. Heal. Inf. Syst. Informatics, 2016
Conformance Testing of Balana: An Open Source Implementation of the XACML3.0 Standard.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
IEEE Trans. Reliab., 2015
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets.
IEEE Trans. Computers, 2015
Int. J. Softw. Eng. Knowl. Eng., 2015
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
2014
Softw. Qual. J., 2014
Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in Healthcare.
Proceedings of the 2014 International Conference on Trustworthy Systems and their Applications, 2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014
Effectiveness of Automated Function Testing with Petri Nets: A Series of Controlled Experiments.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing.
J. Grid Comput., 2013
Maximizing the Availability of Replicated Services in Widely Distributed Systems Considering Network Availability.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Software security testing of an online banking system: a unique research experience for undergraduates and computer teachers.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013
An Approach for Analyzing Software Specifications in Petri Nets.
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
2012
Proceedings of the Handbook of Finite State Based Models and Applications., 2012
IEEE Trans. Syst. Man Cybern. Part C, 2012
IEEE Trans. Dependable Secur. Comput., 2012
Softw. Test. Verification Reliab., 2012
J. Digit. Forensics Secur. Law, 2012
Int. J. Softw. Informatics, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Automated Generation of Concurrent Test Code from Function Nets.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012
Model-Based Metamorphic Testing: A Case Study.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012
2011
IEEE Trans. Syst. Man Cybern. Part A, 2011
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Security Analysis of FileZilla Server Using Threat Models.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011
Proceedings of the 6th International Workshop on Automation of Software Test, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the Applications and Theory of Petri Nets - 32nd International Conference, 2011
2010
Int. J. Softw. Eng. Knowl. Eng., 2010
A Stochastic Model for Optimizing the Patching Time of Software Bugs.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010
A Systematic Capture and Replay Strategy for Testing Complex GUI Based Java Applications.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
Proceedings of the Third International Conference on Software Testing, 2010
2009
J. Syst. Softw., 2009
J. Comput. Sci. Technol., 2009
Int. J. Softw. Eng. Knowl. Eng., 2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Automated Evaluation of Runtime Object States against Model-Level States for State-Based Test Execution.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009
Proceedings of the 4th International Workshop on Automation of Software Test, 2009
Proceedings of the ICDM Workshops 2009, 2009
2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Int. J. Softw. Eng. Knowl. Eng., 2008
Int. J. Comput. Appl. Technol., 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008
2007
Automated Test Code Generation from UML Protocol State Machines.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
Proceedings of the 3rd workshop on Testing aspect-oriented programs, 2007
2006
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets.
IEEE Trans. Software Eng., 2006
Multiagent Grid Syst., 2006
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006
Proceedings of the 2nd Workshop on Testing Aspect-Oriented Programs, 2006
Proceedings of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), 2006
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
Proceedings of the 5th International Conference on Aspect-Oriented Software Development, 2006
2005
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study.
Proceedings of the Modelling, 2005
A State-Based Approach to Testing Aspect-Oriented Programs.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005
Design an Interoperable Mobile Agent System Based on Predicate Transition Net Models.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005
Threat-Driven Architectural Design of Secure Information Systems.
Proceedings of the ICEIS 2005, 2005
2004
Development of a distributed multi-player computer game for scientific experimentation of team training protocols.
Electron. Libr., 2004
A Petri Net Based Software Architecture for UAV Simulation.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004
2003
IEEE Trans. Software Eng., 2003
Int. J. Softw. Eng. Knowl. Eng., 2003
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003
Collaborative Agents for C2 Teamwork Simulation.
Proceedings of the International Conference on Artificial Intelligence, 2003
2002
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002
Generating Parallel Based on Planning Graph Analysis of Predicate/Transition Nets.
Proceedings of the International Conference on Artificial Intelligence, 2002
2001
CAST: Collaborative Agents for Simulating Teamwork.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001
2000
Proceedings of the IEEE International Conference on Systems, 2000
1999
J. Comput. Sci. Technol., 1999
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999
1998
ACM SIGPLAN Notices, 1998
Knowl. Based Syst., 1998
Proceedings of the 1st International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98), 1998
1996
J. Comput. Sci. Technol., 1996
1995
1994
Proceedings of the Sixth International Conference on Tools with Artificial Intelligence, 1994