泛在接入条件下移动应用安全关键技术研究

61572349
2015
F0203.软件理论、软件工程与服务
李晓红
面上项目
教授
天津大学
66万元
行为分析;开放路由安全;移动互联网安全;可信评估
2016-01-01到2019-12-31
  • 中英文摘要
  • 结题摘要
  • 结题报告
  • 项目成果
  • 项目参与人
查看更多信息请先登录或注册
查看更多信息请先登录或注册
查看更多信息请先登录或注册
重置
序号 标题 类型 作者
1 DeepWeak: Reasoning common software weaknesses via knowledge graph embedding 会议论文 Zhuobing Han;Xiaohong Li;Hongtao Liu;Zhenchang Xing;Zhiyong Feng
2 Optimal personalized defense strategy against man-in-the-middle attack 会议论文 Xiaohong Li;Shuxin Li;Jianye Hao;Zhiyong Feng;Bo An
3 Embedding and Predicting Software Security Entity Relationships: A Knowledge Graph Based Approach 会议论文 Hongbo Xiao;Zhenchang Xing;Xiaohong Li;Hao Guo
4 DCT: Differential Combination Testing of Deep Learning Systems 会议论文 Chunyan Wang;Weimin Ge;Xiaohong Li;Zhiyong Feng
5 基于学习的自适应动态异构网络选择策略的实现方法 专利 李晓红;王莹
6 基于安全博弈论的中间人攻击防御策略 奖励 李姝欣(李晓红为指导教师)
7 Automated Software Security Requirements Recommendation Based on FT-SR Model 会议论文 Jiangjuan Wang;Xiaohong Li;Zhiyong Feng;Jianye Hao;Guangquan Xu;Zhuobing Han
8 An Adaptive Learning Based Network Selection Approach for 5G Dynamic Environments 期刊论文 Li Xiaohong;Cao Ru;Hao Jianye
9 MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks 期刊论文 Guo Qi;Li Xiaohong;Xu Guangquan;Feng Zhiyong
10 A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol 期刊论文 Shu-Yang Gao;Xiao-Hong Li;Mao-De Ma
11 基于多因素的无线传感网络动态信任评价系统及方法 专利 李晓红;王江娟;宋姣娇
12 An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms 会议论文 Qianyu Guo;Sen Chen;Xiaofei Xie;Lei Ma;Qiang Hu;Hongtao Liu;Yang Liu;Jianjun Zhao;Xiaohong Li
13 An Efficient Handover Authentication Mechanism for 5G Wireless Network 会议论文 Kaihong Han;Xiaohong Li;Zhiyong Feng;Jianye Hao
14 Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis 奖励 Xiaofei Xie;Bihuan Chen;Yang Liu;Wei Le;Xiaohong Li
15 Socially-Aware Multiagent Learning: Towards Socially Optimal Outcomes 会议论文 Li Xiaohong;Zhang Chengwei;Hao Jianye
16 基于安全博弈论的中间人攻击防御策略 专利 徐怡琳;李晓红;葛卫民
17 基于5G网络的自适应切换触发策略实现方法 专利 李晓红;王春燕
18 基于数据驱动的软件安全需求推荐方法 专利 李晓红;肖洪波
19 Defending Against Man-In-The-Middle Attack in Repeated Games 会议论文 Shuxin Li;Xiaohong Li;Jianye Hao;Bo An;Zhiyong Feng
20 Loopster: Static Loop Termination Analysis 会议论文 Xie Xiaofei;Chen Bihuan;Zou Liang;Lin Shang Wei;Liu Yang;Li Xiaohong
21 Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems 期刊论文 Xu Guangquan;Ren Yuanyuan;Han Yuanbin;Li Xiaohong;Feng Zhiyong
22 An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET 会议论文 Ying Wang;Jing Hu;Xiaohong Li;Zhiyong Feng
23 SCC-rFMQ Learning in Cooperative Markov Games with Continuous Actions 会议论文 Chengwei Zhang;Xiaohong Li;Jianye Hao;Siqi Chen;Karl Tuyls;Zhiyong Feng
24 E-SSL:An SSL Security-Enhanced Method for Bypassing MITM Attacks in Mobile Internet 会议论文 Ren Zhao;Xiaohong Li;Guangquan Xu;Zhiyong Feng;Jianye Hao
25 Dynamically analyzing cell interactions in biological environments using multiagent social learning framework 期刊论文 Chengwei Zhang;Xiaohong Li;Shuxin Li;Zhiyong Feng
26 基于多策略的Android访问控制方法 专利 李晓红;曹茹;田冬冬
27 The Dynamics of Opinion Evolution in Gossiper-Media Model with WoLS-CALA Learning 会议论文 Chengwei Zhang;Xiaohong Li;Jianye Hao;Sandip Sen;Wanli Xue;Zhiyong Feng
28 Cross-project Defect Prediction via ASTToken2Vec and BLSTM-based Neural Network 会议论文 Hao Li;Xiaohong Li;Xiaofei Xie;Yanzhou Mu;Zhiyong Feng
29 Automatic Loop Summarization via Path Dependency Analysis 期刊论文 Xiaofei Xie;Bihuan Chen;Liang Zou;Yang Liu;Wei Le;Xiaohong Li
30 基于路径依赖关系的循环分析技术研究 奖励 谢肖飞(李晓红为指导教师)
31 Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service 期刊论文 Li Xiaohong;Xu Jiayi;Xu Guangquan;Hao Jianye;Li Xiaoru;Feng Zhiyong;Gao Honghao
32 A Prediction and Learning Based Approach to Network Selection in Dynamic Environments 会议论文 Xiaohong Li;Ru Cao;Jianye Hao;Zhiyong Feng
33 基于TLS协议的对抗中间人攻击的安全增强系统及方法 专利 李晓红;高澍阳
34 基于数据分析的软件安全需求推荐模型的实现方法 专利 张昱;李晓红
35 基于安全需求模板的软件安全需求获取系统及方法 专利 李晓红;杨薇
36 基于路径依赖关系的循环分析技术研究 奖励 谢肖飞(李晓红为指导教师)
37 TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis 会议论文 Wei Yang;Xiaohong Li;Zhiyong Feng;Jianye Hao
38 Universal Analysis and Detection Framework for Location Aided Routing 会议论文 Xin Zhang;Xiaohong Li;Zhiyong Feng;Guangquan Xu
39 Inferring Patterns for Taint-Style Vulnerabilities With Security Patches 期刊论文 TINGYU SONG;XIAOHONG LI;ZHIYONG FENG;GUANGQUAN XU
40 Proteus:Computing Disjunctive Loop Summary via Path Dependency Analysis 会议论文 Xie Xiaofei;ChenBihuan;LiuYang;Le Wei;Li Xiaohong
41 An Adaptive Handover Trigger Strategy for 5G C/U Plane Split Heterogeneous Network 会议论文 Huijuan He;Xiaohong Li;Zhiyong Feng;Jianye Hao;Xiaofei Wang;Haijun Zhang
42 A Co-occurrence Recommend Model of Software Security Requirement 会议论文 Yilin Xu;Weimin Ge;Xiaohong Li;Zhiyong Feng;Xiaofei Xie;Yude Bai
43 A Software Defined Network based Security Assessment Framework for CloudIoT 期刊论文 Zhuobing Han;Xiaohong Li;Keman Huang;Zhiyong Feng
44 An Improved Android Collusion Attack Detection Method Based on Program Slicing 会议论文 Yunhao Liu;Xiaohong Li;Zhiyong Feng;Jianye Hao
45 Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3 会议论文 Kunding Fang;Xiaohong Li;Jianye Hao;Zhiyong Feng
46 基于安全需求元模型的安全需求模板构建方法 专利 李晓红;何慧娟;韩卓兵;胡静
47 一种基于知识图谱向量化推理通用软件缺陷建模方法 专利 李晓红;宫喜
48 A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems 期刊论文 Xiaohong Li;Feng Liu;Zhiyong Feng;Guangquan Xu;Zhangjie Fu
49 SA-IGA: a multiagent reinforcement learning method towards socially optimal outcomes 期刊论文 Chengwei Zhang;Xiaohong Li;Jianye Hao;Siqi Chen;Karl Tuyls;Wanli Xue;Zhiyong Feng
50 基于多策略的Android访问控制系统及方法 专利 李晓红;曹茹;田冬冬
51 An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models 期刊论文 Zhuobin Han;Xiaohong Li;Guangquan Xu
52 一种无线传感器网络的安全性分析方法 专利 李晓红;刘云昊;郭奇
53 基于符号执行与模糊测试的混合测试方法 期刊论文 谢肖飞;李晓红;陈翔;孟国柱;刘杨
54 基于AADL的Web应用架构安全性的评估方法 专利 李晓红;李姝昕
55 Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description 会议论文 Zhuobing Han;Xiaohong Li;Zhenchang Xing;Hongtao Liu;Zhiyong Feng
查看更多信息请先登录或注册