Tong Li

Orcid: 0000-0002-8881-0037

Affiliations:
  • Beijing University of Technology, China
  • University of Trento, Italy (PhD 2016)
  • Tsinghua University, School of Software, Beijing, China (former)


According to our database1, Tong Li authored at least 109 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MUREQ: a multilayer framework for analyzing and operationalizing visualization requirements.
Softw. Syst. Model., October, 2024

A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment.
Int. J. Softw. Eng. Knowl. Eng., May, 2024

A Systematic Literature Review of Reinforcement Learning-based Knowledge Graph Research.
Expert Syst. Appl., March, 2024

Machine learning for requirements engineering (ML4RE): A systematic literature review complemented by practitioners' voices from Stack Overflow.
Inf. Softw. Technol., 2024

Fusion learning of preference and bias from ratings and reviews for item recommendation.
Data Knowl. Eng., 2024

JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm.
Concurr. Comput. Pract. Exp., 2024

Detecting APT attacks using an attack intent-driven and sequence-based learning approach.
Comput. Secur., 2024

1st International Usable Security and Privacy for Emerging Technologies Workshop (ASPIRING 2024): Preface.
Proceedings of the Joint Proceedings of RCIS 2024 Workshops and Research Projects Track co-located with the 18th International Conferecence on Research Challenges in Information Science (RCIS 2024), 2024

VCRLog: Variable Contents Relationship Perception for Log-based Anomaly Detection.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

Integrating Dependency Type and Directionality into Adapted Graph Attention Networks to Enhance Relation Extraction.
Proceedings of the Document Analysis and Recognition - ICDAR 2024 - 18th International Conference, Athens, Greece, August 30, 2024

2023
Empowering Domain Experts With Formal Methods for Consistency Verification of Safety Requirements.
IEEE Trans. Intell. Transp. Syst., December, 2023

Evaluating the intelligence capability of smart homes: A conceptual modeling approach.
Data Knowl. Eng., November, 2023

Defending against social engineering attacks: A security pattern-based analysis framework.
IET Inf. Secur., July, 2023

Philanthropic conference-based requirements engineering in time of pandemic and beyond.
Requir. Eng., June, 2023

An effective points of interest recommendation approach based on embedded meta-path of spatiotemporal data.
Expert Syst. J. Knowl. Eng., 2023

APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A novel subjective bias detection method based on multi-information fusion.
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Discovering Runtime Requirements from User Interactions: Ideas and Preliminary Studies.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023

Improving Requirements Classification Models Based on Explainable Requirements Concerns.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2023

Application Recommendation based on Metagraphs: Combining Behavioral and Published Information.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Dealing with Explainability Requirements for Machine Learning Systems.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Two-tier Shared Embedding Method for Review-based Recommender Systems.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

A Requirements-Driven Framework for Automatic Data Visualization.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2023

2022
SPR: Similarity pairwise ranking for personalized recommendation.
Knowl. Based Syst., 2022

Aligning social concerns with information system security: A fundamental ontology for social engineering.
Inf. Syst., 2022

FAC: A Music Recommendation Model Based on Fusing Audio and Chord Features (115).
Int. J. Softw. Eng. Knowl. Eng., 2022

A Novel Trajectory Based Prediction Method for Urban Subway Design.
ISPRS Int. J. Geo Inf., 2022

A systematic literature review of methods and datasets for anomaly-based network intrusion detection.
Comput. Secur., 2022

An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits.
Cogn. Comput., 2022

An object detection-based framework for automatically recognizing iStar hand drafts.
Autom. Softw. Eng., 2022

A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction.
Appl. Intell., 2022

A Novel Network Alert Classification Model based on Behavior Semantic.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

A User-friendly Semi-automatic iStar Modeling Approach.
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022

BiStar: A Template-Based iStar Modeling Tool Combining Graphical and Textual Modeling.
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022

Telling Us Your Needs with Your Eyes.
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022

Continuous Usability Requirements Evaluation based on Runtime User Behavior Mining.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Assisting in requirements goal modeling: a hybrid approach based on machine learning and logical reasoning.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems, 2022

Detection of anomalous modeling behavior: a goal-driven data mining approach.
Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, 2022

2021
Visual Analysis of Land Use Characteristics Around Urban Rail Transit Stations.
IEEE Trans. Intell. Transp. Syst., 2021

Profiling users via their reviews: an extended systematic mapping study.
Softw. Syst. Model., 2021

A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection.
Secur. Commun. Networks, 2021

Toward practical adoption of i* framework: an automatic two-level layout approach.
Requir. Eng., 2021

Extracting features from app descriptions based on POS and dependency.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

A Hybrid Music Recommendation Algorithm Based on Attention Mechanism.
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021

A Learner-Friendly Approach for Using the iStar Modeling Framework: an Ongoing Study.
Proceedings of the 14th International iStar Workshop (iStar 2021), 2021

Goal2UCM: Automatic Generation of Use Case Model from iStar Model.
Proceedings of the 14th International iStar Workshop (iStar 2021), 2021

User Response-Based Fake News Detection on Social Media.
Proceedings of the Applied Informatics - Fourth International Conference, 2021

Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Graphical Modeling VS. Textual Modeling: An Experimental Comparison Based on iStar Models.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Research on Analysis Method of Characteristics Generation of Urban Rail Transit.
IEEE Trans. Intell. Transp. Syst., 2020

An ontology-based learning approach for automatically classifying security requirements.
J. Syst. Softw., 2020

Identifying Similar Users Based on Their Check-in Data: A Graph Embedding Approach.
Int. J. Softw. Eng. Knowl. Eng., 2020

Hierarchy construction and classification of heterogeneous information networks based on RSDAEf.
Data Knowl. Eng., 2020

Identifying Similar Users Based on Metagraph of Check-in Trajectory Data.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

A Preliminary Framework for Recognizing iStar Hand Drafts.
Proceedings of the Thirteenth International iStar Workshop co-located with 28th IEEE International Requirements Engineering Conference (RE 2020), 2020

Using the Doughnut Model to Support Sustainable Quality Requirements in iStar.
Proceedings of the Thirteenth International iStar Workshop co-located with 28th IEEE International Requirements Engineering Conference (RE 2020), 2020

Predicting Polypharmacy Side Effects Based on an Enhanced Domain Knowledge Graph.
Proceedings of the Applied Informatics - Third International Conference, 2020

Automatically Identifying Requirements-Oriented Reviews Using a Top-Down Feature Extraction Approach.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery: Extended Abstract.
Proceedings of the 7th IEEE International Workshop on Artificial Intelligence for Requirements Engineering, 2020

2019
Recognizing patterns of student's modeling behaviour patterns via process mining.
Smart Learn. Environ., 2019

Goal-oriented requirements engineering: an extended systematic mapping study.
Requir. Eng., 2019

Improving software security awareness using a serious game.
IET Softw., 2019

An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm.
IEEE Access, 2019

Automating Consistency Verification of Safety Requirements for Railway Interlocking Systems.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Towards Effective Assessment for Social Engineering Attacks.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Using Graph Embedding to Improve Requirements Traceability Recovery.
Proceedings of the Applied Informatics - Second International Conference, 2019

Evaluating Student Learning Effect Based on Process Mining.
Proceedings of the Applied Informatics - Second International Conference, 2019

An Ontology Enhanced User Profiling Algorithm Based on Application Feedback.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Paving Ontological Foundation for Social Engineering Analysis.
Proceedings of the Advanced Information Systems Engineering, 2019

Review-Based User Profiling: A Systematic Mapping Study.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2019

Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Holistic security requirements analysis for socio-technical systems.
Softw. Syst. Model., 2018

Semantic Trajectory Based Behavior Generation for Groups Identification.
KSII Trans. Internet Inf. Syst., 2018

Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG).
Inf. Softw. Technol., 2018

NFRfinder: a knowledge based strategy for mining non-functional requirements.
Proceedings of the XXXII Brazilian Symposium on Software Engineering, 2018

Automatic User Preferences Elicitation: A Data-Driven Approach.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2018

CHIN: Classification with META-PATH in Heterogeneous Information Networks.
Proceedings of the Applied Informatics - First International Conference, 2018

Design of an Empirical Study for Evaluating an Automatic Layout Tool.
Proceedings of the Advances in Conceptual Modeling, 2018

A Prototype for Generating Meaningful Layout of iStar Models.
Proceedings of the Advances in Conceptual Modeling, 2018

2017
Evaluation of MUSER, a holistic security requirements analysis framework.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

An Automatic Layout Approach for iStar Models.
Proceedings of the 10th International i* Workshop co-located with the 29th International Conference on Advanced Information Systems Engineering (CAiSE 2017), 2017

GH4RE: Repository Recommendation on GitHub for Requirements Elicitation Reuse.
Proceedings of the Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering, 2017

2016
Holistic Security Requirements Engineering for Socio-Technical Systems.
PhD thesis, 2016

Goal-Oriented Requirements Engineering: A Systematic Literature Map.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Security attack analysis using attack patterns.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

Understanding Challenges and Tradeoffs in iStar Tool Development.
Proceedings of the Ninth International i* Workshop co-located with 24th International Conference on Requirements Engineering (RE 2016), 2016

2015
Using Goal Models Downstream: A Systematic Roadmap and Literature Review.
Int. J. Inf. Syst. Model. Des., 2015

Analyzing and Enforcing Security Mechanisms on Requirements Specifications.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015

Holistic security requirements analysis: An attacker's perspective.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

A Holistic Approach to Attack Modeling and Analysis.
Proceedings of the Eighth International i*Workshop, 2015

Analyzing Attack Strategies Through Anti-goal Refinement.
Proceedings of the Practice of Enterprise Modeling, 2015

2014
Taking goal models downstream: A systematic roadmap.
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014

Modeling and Applying Security Patterns Using Contextual Goal Models.
Proceedings of the Seventh International i* Workshop co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014

Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models.
Proceedings of the Practice of Enterprise Modeling - 7th IFIP WG 8.1 Working Conference, 2014

Evaluating Modeling Languages: An Example from the Requirements Domain.
Proceedings of the Conceptual Modeling - 33rd International Conference, 2014

A Prototype Tool for Modeling and Analyzing Security Requirements from A Holistic Viewpoint.
Proceedings of the Joint Proceedings of the CAiSE 2014 Forum and CAiSE 2014 Doctoral Consortium co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014

Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach.
Proceedings of the Advanced Information Systems Engineering, 2014

2011
Designing IT systems according to environmental settings: A strategic analysis framework.
J. Strateg. Inf. Syst., 2011

Computer Aided Threat Identification.
Proceedings of the 13th IEEE Conference on Commerce and Enterprise Computing, 2011

I*-Prefer: A Tool for Preference Model-Driven Decision Making.
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011

Security Requirements Engineering in the Wild: A Survey of Common Practices.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Why Requirements Engineering Fails: A Survey Report from China.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

Goal-oriented requirements modelling for running systems.
Proceedings of the First International Workshop on Requirements@Run.Time, 2010

Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report.
Proceedings of the 4<sup>th</sup> International <i>i</i>* Workshop, 2010

Negotiating Service Requirements among Strategic Actors.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010


  Loading...