Li Xie

Affiliations:
  • Nanjing University, Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, China


According to our database1, Li Xie authored at least 55 papers between 1998 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

2013
Secure localization and location verification in wireless sensor networks: a survey.
J. Supercomput., 2013

DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Replacement attacks: automatically evading behavior-based software birthmark.
Int. J. Inf. Sec., 2012

RandHyp: Preventing Attacks via Xen Hypercall Interface.
Proceedings of the Information Security and Privacy Research, 2012

RIM: A Method to Defend from JIT Spraying Attack.
Proceedings of the Seventh International Conference on Availability, 2012

2011
JITDefender: A Defense against JIT Spraying Attacks.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Replacement Attacks on Behavior Based Software Birthmark.
Proceedings of the Information Security, 14th International Conference, 2011

Automatic construction of jump-oriented programming shellcode (on the x86).
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Random-walk based approach to detect clone attacks in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2010

Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation.
Proceedings of the Information Security - 13th International Conference, 2010

Efficient Detection of the Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Return-Oriented Rootkit without Returns (on the x86).
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
A traffic aware, energy-efficient MAC protocol for Wireless Sensor Networks.
Int. J. Ad Hoc Ubiquitous Comput., 2009

EEFF: a cross-layer designed energy efficient fast forwarding protocol for wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Pollution attack: a new attack against localization in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

SWCA: a secure weighted clustering algorithm in wireless ad hoc networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Modeling the Topology for Cluster-Based Wireless Sensor Networks.
Proceedings of the NTMS 2009, 2009

SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Secure localization and location verification in wireless sensor networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A Decentralized Storage Scheme for Multi-Dimensional Range Queries over Sensor Networks.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

DROP: Detecting Return-Oriented Programming Malicious Code.
Proceedings of the Information Systems Security, 5th International Conference, 2009

IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Traffic Controller: A Practical Approach to Block Network Covert Timing Channel.
Proceedings of the The Forth International Conference on Availability, 2009

BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks.
J. Comput. Sci. Technol., 2008

EEBASS: Energy-Efficient Balanced Storage Scheme for Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Data Consistency for Cooperative Caching in Mobile Environments.
Computer, 2007

Evolution of Wireless Sensor Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Clustering-Based Approximation Scheme for In-Network Aggregation over Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Colored Petri Net Based Automatic Service Composition.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Consistency of cooperative caching in mobile peer-to-peer systems over MANET.
Int. J. Parallel Emergent Distributed Syst., 2006

Threshold-based admission control for a multimedia Grid: analysis and performance evaluation.
Concurr. Comput. Pract. Exp., 2006

PREG: A Practical Power Control Algorithm Based on a Novel Proximity Graph for Heterogeneous Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Energy-Efficient Multi-query Optimization over Large-Scale Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

An Interference Free Cluster-Based TDMA Protocol for Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

An Energy Efficient TDMA Protocol for Event Driven Applications in Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation.
Proceedings of the Information Security, 9th International Conference, 2006

Efficient and Practical Control Flow Monitoring for Program Security.
Proceedings of the Advances in Computer Science, 2006

Distributed Energy Efficient Data Gathering with Intra-cluster Coverage in Wireless Sensor Networks.
Proceedings of the Frontiers of WWW Research and Development, 2006

A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities.
Proceedings of the The First International Conference on Availability, 2006

2005
A policy flexible architecture for secure operating system.
ACM SIGOPS Oper. Syst. Rev., 2005

NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Traffic Adaptive MAC Protocol for Wireless Sensor Network.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Mobile-Agent-Based Web Service Composition.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

2004
The design and implementation of a runtime system for graph-oriented parallel and distributed programming.
J. Syst. Softw., 2004

A Novel Admission Control Strategy with Layered Threshold for Grid-Based Multimedia Services Systems.
Proceedings of the Grid and Cooperative Computing, 2004

A QoS-Enabled Services System Framework for Grid Computing.
Proceedings of the Grid and Cooperative Computing, 2004

2000
Scalable Scheduling on a Network of Workstations.
ACM SIGOPS Oper. Syst. Rev., 2000

Portable Runtime Support for Graph-oriented Parallel and Distributed Programming.
Proceedings of the 5th International Symposium on Parallel Architectures, 2000

1999
A model for dynamic adaptive coscheduling.
J. Comput. Sci. Technol., 1999

An Object-Oriented Developing Framework of Fault-Tolerance System.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999

Object Mapping for Layered Cooperative Systems.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999

1998
A Scalable Load Balancing System for NOWs.
ACM SIGOPS Oper. Syst. Rev., 1998

Adaptive coscheduling for concurrent systems: Model and performance.
Proceedings of the Computers and Their Applications (CATA-98), 1998


  Loading...