default search action
Li Xie 0001
Person information
- affiliation: Nanjing University, Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, China
Other persons with the same name
- Li Xie — disambiguation page
- Li Xie 0002 — City University of New York, Hunter College, Department of Computer Science, NY, USA (and 1 more)
- Li Xie 0003 — Tongji University, College of Electronics and Information Engineering, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [c43]Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph. SEC 2014: 142-155 - 2013
- [j13]Yingpei Zeng, Jiannong Cao, Jue Hong, Shigeng Zhang, Li Xie:
Secure localization and location verification in wireless sensor networks: a survey. J. Supercomput. 64(3): 685-701 (2013) - [c42]Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware. AsiaCCS 2013: 353-358 - 2012
- [j12]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement attacks: automatically evading behavior-based software birthmark. Int. J. Inf. Sec. 11(5): 293-304 (2012) - [c41]Rui Wu, Ping Chen, Bing Mao, Li Xie:
RIM: A Method to Defend from JIT Spraying Attack. ARES 2012: 143-148 - [c40]Feifei Wang, Ping Chen, Bing Mao, Li Xie:
RandHyp: Preventing Attacks via Xen Hypercall Interface. SEC 2012: 138-149 - 2011
- [c39]Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin:
Automatic construction of jump-oriented programming shellcode (on the x86). AsiaCCS 2011: 20-29 - [c38]Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:
Replacement Attacks on Behavior Based Software Birthmark. ISC 2011: 1-16 - [c37]Ping Chen, Yi Fang, Bing Mao, Li Xie:
JITDefender: A Defense against JIT Spraying Attacks. SEC 2011: 142-153 - 2010
- [j11]Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqing Guo, Li Xie:
Random-walk based approach to detect clone attacks in wireless sensor networks. IEEE J. Sel. Areas Commun. 28(5): 677-691 (2010) - [c36]Ping Chen, Xiao Xing, Bing Mao, Li Xie:
Return-Oriented Rootkit without Returns (on the x86). ICICS 2010: 340-354 - [c35]Ping Chen, Xiao Xing, Hao Han, Bing Mao, Li Xie:
Efficient Detection of the Return-Oriented Programming Malicious Code. ICISS 2010: 140-155 - [c34]Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie:
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. ISC 2010: 181-195
2000 – 2009
- 2009
- [j10]Hai-gang Gong, Jiannong Cao, Ming Liu, Lijun Chen, Li Xie:
A traffic aware, energy-efficient MAC protocol for Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 148-156 (2009) - [c33]Ping Chen, Yi Wang, Zhi Xin, Bing Mao, Li Xie:
BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. ARES 2009: 208-215 - [c32]Yi Wang, Ping Chen, Yi Ge, Bing Mao, Li Xie:
Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. ARES 2009: 349-354 - [c31]Ping Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. ICICS 2009: 336-345 - [c30]Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie:
DROP: Detecting Return-Oriented Programming Malicious Code. ICISS 2009: 163-177 - [c29]Lei Xie, Lijun Chen, Daoxu Chen, Li Xie:
A Decentralized Storage Scheme for Multi-Dimensional Range Queries over Sensor Networks. ICPADS 2009: 166-173 - [c28]Yingpei Zeng, Jiannong Cao, Jue Hong, Li Xie:
Secure localization and location verification in wireless sensor networks. MASS 2009: 864-869 - [c27]Yingpei Zeng, Jiannong Cao, Jue Hong, Shigeng Zhang, Li Xie:
SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks. MASS 2009: 1054-1059 - [c26]Lijun Chen, Qing-feng Pan, Daoxu Chen, Li Xie:
Modeling the Topology for Cluster-Based Wireless Sensor Networks. NTMS 2009: 1-5 - [c25]Tao Zhang, Lijun Chen, Daoxu Chen, Li Xie:
EEFF: a cross-layer designed energy efficient fast forwarding protocol for wireless sensor networks. WCNC 2009: 1514-1519 - [c24]Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqing Guo, Li Xie:
Pollution attack: a new attack against localization in wireless sensor networks. WCNC 2009: 2038-2043 - [c23]Yingpei Zeng, Jiannong Cao, Shanqing Guo, Kai Yang, Li Xie:
SWCA: a secure weighted clustering algorithm in wireless ad hoc networks. WCNC 2009: 2426-2431 - 2008
- [j9]Xue Zhang, Jue Hong, Sanglu Lu, Li Xie, Jiannong Cao:
Scoped Bellman-Ford Geographic Routing for Large Dynamic Wireless Sensor Networks. J. Comput. Sci. Technol. 23(6): 944-956 (2008) - [c22]Lei Xie, Lijun Chen, Daoxu Chen, Li Xie:
EEBASS: Energy-Efficient Balanced Storage Scheme for Sensor Networks. GLOBECOM 2008: 719-724 - 2007
- [j8]Jiannong Cao, Yang Zhang, Guohong Cao, Li Xie:
Data Consistency for Cooperative Caching in Mobile Environments. Computer 40(4): 60-66 (2007) - [c21]Zhuzhong Qian, Sanglu Lu, Li Xie:
Colored Petri Net Based Automatic Service Composition. APSCC 2007: 431-438 - [c20]Lei Xie, Lijun Chen, Daoxu Chen, Li Xie:
A Clustering-Based Approximation Scheme for In-Network Aggregation over Sensor Networks. UIC 2007: 503-513 - [c19]Lijun Chen, Daoxu Chen, Li Xie, Jiannong Cao:
Evolution of Wireless Sensor Network. WCNC 2007: 3003-3007 - 2006
- [j7]Yang Zhang, Jiannong Cao, Xiaolin Chen, Sanglu Lu, Li Xie:
Threshold-based admission control for a multimedia Grid: analysis and performance evaluation. Concurr. Comput. Pract. Exp. 18(14): 1747-1758 (2006) - [j6]Jiannong Cao, Yang Zhang, Li Xie, Guohong Cao:
Consistency of cooperative caching in mobile peer-to-peer systems over MANET. Int. J. Parallel Emergent Distributed Syst. 21(3): 151-168 (2006) - [c18]Zhiqiang Lin, Bing Mao, Li Xie:
A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. ARES 2006: 348-357 - [c17]Hai-gang Gong, Ming Liu, Yinchi Mao, Lijun Chen, Li Xie:
Distributed Energy Efficient Data Gathering with Intra-cluster Coverage in Wireless Sensor Networks. APWeb 2006: 109-120 - [c16]Nai Xia, Bing Mao, Qingkai Zeng, Li Xie:
Efficient and Practical Control Flow Monitoring for Program Security. ASIAN 2006: 90-104 - [c15]Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie:
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. ISC 2006: 17-31 - [c14]Hai-gang Gong, Ming Liu, Xiaomin Wang, Li Xie:
An Energy Efficient TDMA Protocol for Event Driven Applications in Wireless Sensor Networks. MSN 2006: 638-649 - [c13]Lei Xie, Lijun Chen, Sanglu Lu, Li Xie, Daoxu Chen:
Energy-Efficient Multi-query Optimization over Large-Scale Sensor Networks. WASA 2006: 127-139 - [c12]Hai-gang Gong, Ming Liu, Xiaomin Wang, Lijun Chen, Li Xie:
An Interference Free Cluster-Based TDMA Protocol for Wireless Sensor Networks. WASA 2006: 217-227 - [c11]Xue Zhang, Sanglu Lu, Daoxu Chen, Li Xie:
PREG: A Practical Power Control Algorithm Based on a Novel Proximity Graph for Heterogeneous Wireless Sensor Networks. WASA 2006: 620-631 - 2005
- [j5]Zhiqiang Lin, Chao Wang, Bing Mao, Li Xie:
A policy flexible architecture for secure operating system. ACM SIGOPS Oper. Syst. Rev. 39(3): 24-33 (2005) - [c10]Zhuzhong Qian, Sanglu Lu, Li Xie:
Mobile-Agent-Based Web Service Composition. GCC 2005: 35-46 - [c9]Hai-gang Gong, Ming Liu, Yinchi Mao, Lijun Chen, Li Xie:
Traffic Adaptive MAC Protocol for Wireless Sensor Network. ICCNMC 2005: 1134-1143 - [c8]Jiannong Cao, Yang Zhang, Li Xie, Guohong Cao:
Consistency of Cooperative Caching in Mobile Peer-to-Peer Systems over MANET. ICDCS Workshops 2005: 573-579 - [c7]Kun Wu, Han Dai, Yang Zhang, Sanglu Lu, Daoxu Chen, Li Xie:
NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations. ISPA Workshops 2005: 520-529 - 2004
- [j4]Jiannong Cao, Ying Liu, Li Xie, Bing Mao, Kang Zhang:
The design and implementation of a runtime system for graph-oriented parallel and distributed programming. J. Syst. Softw. 72(3): 389-399 (2004) - [c6]Yang Zhang, Jiannong Cao, Sanglu Lu, Baoliu Ye, Li Xie:
A QoS-Enabled Services System Framework for Grid Computing. GCC 2004: 8-16 - [c5]Yang Zhang, Jingyang Zhou, Jiannong Cao, Sanglu Lu, Li Xie:
A Novel Admission Control Strategy with Layered Threshold for Grid-Based Multimedia Services Systems. GCC 2004: 687-695 - 2000
- [j3]Sanglu Lu, Li Xie:
Scalable Scheduling on a Network of Workstations. ACM SIGOPS Oper. Syst. Rev. 34(2): 74-83 (2000) - [c4]Jiannong Cao, Y. Liu, Li Xie, Kang Zhang:
Portable Runtime Support for Graph-oriented Parallel and Distributed Programming. ISPAN 2000: 72-77
1990 – 1999
- 1999
- [j2]Sanglu Lu, Xiaobo Zhou, Li Xie:
A model for dynamic adaptive coscheduling. J. Comput. Sci. Technol. 14(3): 267-275 (1999) - [c3]Chengkai Li, Bing Mao, Daoxu Chen, Li Xie:
Object Mapping for Layered Cooperative Systems. TOOLS (31) 1999: 67-76 - [c2]Xin Zhao, Daoxu Chen, Li Xie:
An Object-Oriented Developing Framework of Fault-Tolerance System. TOOLS (31) 1999: 232-238 - 1998
- [j1]Sanglu Lu, Li Xie:
A Scalable Load Balancing System for NOWs. ACM SIGOPS Oper. Syst. Rev. 32(3): 55-63 (1998) - [c1]Sanglu Lu, Li Xie:
Adaptive coscheduling for concurrent systems: Model and performance. CATA 1998: 160-163
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint