Login / Signup
Xiang Li
ORCID
Publication Activity (10 Years)
Years Active: 2010-2023
Publications (10 Years): 12
Top Topics
Ddos Attacks
Wireless Sensor
Databases
Malware Detection
Top Venues
Secur. Commun. Networks
DSC
ICME
Int. J. Intell. Syst.
</>
Publications
</>
Jingjing Wang
,
Minhuan Huang
,
Yuanping Nie
,
Xiaohui Kuang
,
Xiang Li
,
Wenjing Zhong
Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S).
SEKE
(2023)
Qianjin Du
,
Xiaohui Kuang
,
Xiang Li
,
Gang Zhao
Fine-Grained Software Vulnerability Detection via Neural Architecture Search.
DASFAA (4)
(2023)
Qianjin Du
,
Wei Kun
,
Xiaohui Kuang
,
Xiang Li
,
Gang Zhao
Automated Software Vulnerability Detection via Curriculum Learning.
ICME
(2023)
Hanwen Sun
,
Yuanping Nie
,
Xiang Li
,
Minhuan Huang
,
Jianwen Tian
,
Wei Kong
An Automatic Code Generation Method Based on Sequence Generative Adversarial Network.
DSC
(2022)
Zhi Wang
,
Leshi Shao
,
Kai Cheng
,
Yuanzhao Liu
,
Jianan Jiang
,
Yuanping Nie
,
Xiang Li
,
Xiaohui Kuang
ICDF: Intrusion collaborative detection framework based on confidence.
Int. J. Intell. Syst.
37 (10) (2022)
Xiaolin Zhao
,
Hui Peng
,
Xiang Li
,
Yue Li
,
Jingfeng Xue
,
Yaoyuan Liang
,
Mingzhe Pei
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope.
Secur. Commun. Networks
2020 (2020)
Xiang Li
,
Kefan Qiu
,
Cheng Qian
,
Gang Zhao
An Adversarial Machine Learning Method Based on OpCode N-grams Feature in Malware Detection.
DSC
(2020)
Xiang Li
,
Yuanping Nie
,
Zhi Wang
,
Xiaohui Kuang
,
Kefan Qiu
,
Cheng Qian
,
Gang Zhao
BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features.
Wirel. Commun. Mob. Comput.
2020 (2020)
Qiang Liu
,
Xiaohui Kuang
,
Hua Chen
,
Xiang Li
,
Guangke Li
一种基于程序切片相似度匹配的脆弱性发现方法 (Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing).
计算机科学
46 (7) (2019)
Xiaolu Wang
,
Zhi Wang
,
Wei Shao
,
Chunfu Jia
,
Xiang Li
Explaining Concept Drift of Deep Learning Models.
CSS (2)
(2019)
Jinjing Zhao
,
Yan Wen
,
Xiang Li
,
Ling Pang
,
Xiaohui Kuang
,
Dongxia Wang
A heuristic fuzz test generator for Java native interface.
SQUADE@ESEC/SIGSOFT FSE
(2019)
Zhechao Lin
,
Xiang Li
,
Xiaohui Kuang
Machine Learning in Vulnerability Databases.
ISCID (1)
(2017)
Xiaohui Kuang
,
Li Liu
,
Qiang Liu
,
Xiang Li
A clustering approach based on convergence degree chain for wireless sensor networks.
Secur. Commun. Networks
8 (10) (2015)
Liang Ming
,
Gang Zhao
,
Dongxia Wang
,
Minhuan Huang
,
Xiang Li
,
Qing Miao
,
Fei Xu
A Novel Method for Survivability Test Based on End Nodes in Large Scale Network.
KSII Trans. Internet Inf. Syst.
9 (2) (2015)
Xiaohui Kuang
,
Xiang Li
,
Jinjing Zhao
Architecture of Network Environment for High-Risk Security Experimentation.
ICT-EurAsia
(2013)
Jinjing Zhao
,
Gang Zhao
,
Yan Wen
,
Xiang Li
Towards Detecting the Interaction Vulnerabilities in Large Distributed System.
CIT
(2010)