Tong Li
Orcid: 0000-0002-8881-0037Affiliations:
- Beijing University of Technology, China
- University of Trento, Italy (PhD 2016)
- Tsinghua University, School of Software, Beijing, China (former)
According to our database1,
Tong Li
authored at least 109 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
MUREQ: a multilayer framework for analyzing and operationalizing visualization requirements.
Softw. Syst. Model., October, 2024
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment.
Int. J. Softw. Eng. Knowl. Eng., May, 2024
A Systematic Literature Review of Reinforcement Learning-based Knowledge Graph Research.
Expert Syst. Appl., March, 2024
Machine learning for requirements engineering (ML4RE): A systematic literature review complemented by practitioners' voices from Stack Overflow.
Inf. Softw. Technol., 2024
Fusion learning of preference and bias from ratings and reviews for item recommendation.
Data Knowl. Eng., 2024
JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm.
Concurr. Comput. Pract. Exp., 2024
Detecting APT attacks using an attack intent-driven and sequence-based learning approach.
Comput. Secur., 2024
1st International Usable Security and Privacy for Emerging Technologies Workshop (ASPIRING 2024): Preface.
Proceedings of the Joint Proceedings of RCIS 2024 Workshops and Research Projects Track co-located with the 18th International Conferecence on Research Challenges in Information Science (RCIS 2024), 2024
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
Integrating Dependency Type and Directionality into Adapted Graph Attention Networks to Enhance Relation Extraction.
Proceedings of the Document Analysis and Recognition - ICDAR 2024 - 18th International Conference, Athens, Greece, August 30, 2024
2023
Empowering Domain Experts With Formal Methods for Consistency Verification of Safety Requirements.
IEEE Trans. Intell. Transp. Syst., December, 2023
Evaluating the intelligence capability of smart homes: A conceptual modeling approach.
Data Knowl. Eng., November, 2023
Defending against social engineering attacks: A security pattern-based analysis framework.
IET Inf. Secur., July, 2023
Philanthropic conference-based requirements engineering in time of pandemic and beyond.
Requir. Eng., June, 2023
An effective points of interest recommendation approach based on embedded meta-path of spatiotemporal data.
Expert Syst. J. Knowl. Eng., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023
Discovering Runtime Requirements from User Interactions: Ideas and Preliminary Studies.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023
Improving Requirements Classification Models Based on Explainable Requirements Concerns.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2023
Application Recommendation based on Metagraphs: Combining Behavioral and Published Information.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2023
2022
Knowl. Based Syst., 2022
Aligning social concerns with information system security: A fundamental ontology for social engineering.
Inf. Syst., 2022
Int. J. Softw. Eng. Knowl. Eng., 2022
ISPRS Int. J. Geo Inf., 2022
A systematic literature review of methods and datasets for anomaly-based network intrusion detection.
Comput. Secur., 2022
An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits.
Cogn. Comput., 2022
Autom. Softw. Eng., 2022
A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction.
Appl. Intell., 2022
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022
COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022
BiStar: A Template-Based iStar Modeling Tool Combining Graphical and Textual Modeling.
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Assisting in requirements goal modeling: a hybrid approach based on machine learning and logical reasoning.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems, 2022
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
Softw. Syst. Model., 2021
Secur. Commun. Networks, 2021
Requir. Eng., 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021
A Learner-Friendly Approach for Using the iStar Modeling Framework: an Ongoing Study.
Proceedings of the 14th International iStar Workshop (iStar 2021), 2021
Proceedings of the 14th International iStar Workshop (iStar 2021), 2021
Proceedings of the Applied Informatics - Fourth International Conference, 2021
Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Graphical Modeling VS. Textual Modeling: An Experimental Comparison Based on iStar Models.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
IEEE Trans. Intell. Transp. Syst., 2020
An ontology-based learning approach for automatically classifying security requirements.
J. Syst. Softw., 2020
Int. J. Softw. Eng. Knowl. Eng., 2020
Hierarchy construction and classification of heterogeneous information networks based on RSDAEf.
Data Knowl. Eng., 2020
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020
An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020
Proceedings of the Thirteenth International iStar Workshop co-located with 28th IEEE International Requirements Engineering Conference (RE 2020), 2020
Proceedings of the Thirteenth International iStar Workshop co-located with 28th IEEE International Requirements Engineering Conference (RE 2020), 2020
Proceedings of the Applied Informatics - Third International Conference, 2020
Automatically Identifying Requirements-Oriented Reviews Using a Top-Down Feature Extraction Approach.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020
An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery: Extended Abstract.
Proceedings of the 7th IEEE International Workshop on Artificial Intelligence for Requirements Engineering, 2020
2019
Smart Learn. Environ., 2019
Requir. Eng., 2019
An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm.
IEEE Access, 2019
Automating Consistency Verification of Safety Requirements for Railway Interlocking Systems.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019
Proceedings of the Applied Informatics - Second International Conference, 2019
Proceedings of the Applied Informatics - Second International Conference, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the Advanced Information Systems Engineering, 2019
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2019
Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019
2018
Softw. Syst. Model., 2018
KSII Trans. Internet Inf. Syst., 2018
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG).
Inf. Softw. Technol., 2018
Proceedings of the XXXII Brazilian Symposium on Software Engineering, 2018
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2018
Proceedings of the Applied Informatics - First International Conference, 2018
Proceedings of the Advances in Conceptual Modeling, 2018
Proceedings of the Advances in Conceptual Modeling, 2018
2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Proceedings of the 10th International i* Workshop co-located with the 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), 2017
Proceedings of the Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering, 2017
2016
PhD thesis, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016
Proceedings of the Ninth International i* Workshop co-located with 24th International Conference on Requirements Engineering (RE 2016), 2016
2015
Int. J. Inf. Syst. Model. Des., 2015
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015
Proceedings of the Eighth International i*Workshop, 2015
Proceedings of the Practice of Enterprise Modeling, 2015
2014
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014
Proceedings of the Seventh International i* Workshop co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014
Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models.
Proceedings of the Practice of Enterprise Modeling - 7th IFIP WG 8.1 Working Conference, 2014
Proceedings of the Conceptual Modeling - 33rd International Conference, 2014
A Prototype Tool for Modeling and Analyzing Security Requirements from A Holistic Viewpoint.
Proceedings of the Joint Proceedings of the CAiSE 2014 Forum and CAiSE 2014 Doctoral Consortium co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014
Proceedings of the Advanced Information Systems Engineering, 2014
2011
Designing IT systems according to environmental settings: A strategic analysis framework.
J. Strateg. Inf. Syst., 2011
Proceedings of the 13th IEEE Conference on Commerce and Enterprise Computing, 2011
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010
Proceedings of the First International Workshop on Requirements@Run.Time, 2010
Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report.
Proceedings of the 4<sup>th</sup> International <i>i</i>* Workshop, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010