Xiang Li
Orcid: 0000-0001-5512-7920Affiliations:
- Beijing Institute of System Engineering, National Key Laboratory of Science and Technology on Information System Security, China
According to our database1,
Xiang Li
authored at least 21 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the Database Systems for Advanced Applications, 2023
2022
Int. J. Intell. Syst., 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
An Automatic Code Generation Method Based on Sequence Generative Adversarial Network.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Secur. Commun. Networks, 2020
An Adversarial Machine Learning Method Based on OpCode N-grams Feature in Malware Detection.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
2019
一种基于程序切片相似度匹配的脆弱性发现方法 (Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing).
计算机科学, 2019
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2017
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017
2015
A clustering approach based on convergence degree chain for wireless sensor networks.
Secur. Commun. Networks, 2015
KSII Trans. Internet Inf. Syst., 2015
2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
2011
Towards a Flaw Function Heuristic Vulnerability Static Analysis Framework for Executable File.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010