default search action
Tong Li 0001
Person information
- affiliation: Beijing University of Technology, China
- affiliation (PhD 2016): University of Trento, Italy
- affiliation (former): Tsinghua University, School of Software, Beijing, China
Other persons with the same name
- Tong Li — disambiguation page
- Tong Li 0002 — PLA Engineering Academy of Armored Forces, Beijing
- Tong Li 0003 — Lenovo (and 2 more)
- Tong Li 0004 — Yunnan University, School of Software, Kunming, China
- Tong Li 0005 — University of Iowa, Department of Mathematics, Iowa City, IA, USA
- Tong Li 0006 — Beijing Institute of Technology, Civil Aviation Management Institute of China, Beijing, China
- Tong Li 0007 — Shenzhen University, China
- Tong Li 0008 — Queensland University of Technology, Brisbane, QLD, Australia (and 1 more)
- Tong Li 0009 — Zhejiang University, Department of Mechanical Engineering, Hangzhou, China
- Tong Li 0010 — Harbin Institute of Technology, Department of Information Engineering, China
- Tong Li 0011 — Guangzhou University, School of Computer Science, China (and 1 more)
- Tong Li 0012 — University of Chinese Academy of Sciences, School of Engineering Science, Beijing, China
- Tong Li 0013 — University of Helsinki, Finland (and 2 more)
- Tong Li 0014 — Renmin University of China, Beijing, China (and 2 more)
- Tong Li 0015 — De Montfort University, Leicester, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Hao Yue, Tong Li, Di Wu, Runzi Zhang, Zhen Yang:
Detecting APT attacks using an attack intent-driven and sequence-based learning approach. Comput. Secur. 140: 103748 (2024) - [j36]Di Wu, Zhen Yang, Tong Li, Junrui Liu:
JOCP: A jointly optimized clustering protocol for industrial wireless sensor networks using double-layer selection evolutionary algorithm. Concurr. Comput. Pract. Exp. 36(4) (2024) - [j35]Junrui Liu, Tong Li, Zhen Yang, Di Wu, Huan Liu:
Fusion learning of preference and bias from ratings and reviews for item recommendation. Data Knowl. Eng. 150: 102283 (2024) - [j34]Zifang Tang, Tong Li, Di Wu, Junrui Liu, Zhen Yang:
A Systematic Literature Review of Reinforcement Learning-based Knowledge Graph Research. Expert Syst. Appl. 238(Part B): 121880 (2024) - [j33]Di Wu, Tong Li, Yiran Zhao, Junrui Liu, Zifang Tang, Zhen Yang:
A Novel Entity and Relation Joint Interaction Learning Approach for Entity Alignment. Int. J. Softw. Eng. Knowl. Eng. 34(5): 821-843 (2024) - [j32]Tong Li, Xinran Zhang, Yunduo Wang, Qixiang Zhou, Yiting Wang, Fangqi Dong:
Machine learning for requirements engineering (ML4RE): A systematic literature review complemented by practitioners' voices from Stack Overflow. Inf. Softw. Technol. 172: 107477 (2024) - [j31]Tong Li, Yiting Wang, Xiang Wei, Xueying Zhang, Yu Liu:
MUREQ: a multilayer framework for analyzing and operationalizing visualization requirements. Softw. Syst. Model. 23(5): 1123-1155 (2024) - [c70]Yiran Zhao, Di Wu, Shuqi Dai, Tong Li:
Integrating Dependency Type and Directionality into Adapted Graph Attention Networks to Enhance Relation Extraction. ICDAR (4) 2024: 287-305 - [c69]Mohamad Gharib, Katrien De Moor, Tong Li:
1st International Usable Security and Privacy for Emerging Technologies Workshop (ASPIRING 2024): Preface. RCIS Workshops 2024 - [e3]João Araújo, Jose Luis de la Vara, Nelly Condori-Fernández, Jean-Michel Bruel, Maribel Yasmina Santos, Saïd Assar, Katrien De Moor, Mohamad Gharib, Tong Li, João Paulo Barros, Isabel Sofia Brito, Ivan Machado, Dimitris Karagiannis, Tiago Prince Sales, Camille Salinesi:
Joint Proceedings of RCIS 2024 Workshops and Research Projects Track co-located with the 18th International Conferecence on Research Challenges in Information Science (RCIS 2024), Guimarães, Portugal, May 14-17, 2024. CEUR Workshop Proceedings 3674, CEUR-WS.org 2024 [contents] - 2023
- [j30]Di Wu, Weite Feng, Tong Li, Zhen Yang:
Evaluating the intelligence capability of smart homes: A conceptual modeling approach. Data Knowl. Eng. 148: 102218 (2023) - [j29]Rui Song, Tong Li, Xin Dong, Zhiming Ding:
An effective points of interest recommendation approach based on embedded meta-path of spatiotemporal data. Expert Syst. J. Knowl. Eng. 40(2) (2023) - [j28]Tong Li, Chuanyong Song, Qinyu Pang:
Defending against social engineering attacks: A security pattern-based analysis framework. IET Inf. Secur. 17(4): 703-726 (2023) - [j27]Meira Levy, Irit Hadar, Jennifer Horkoff, Jane Huffman Hayes, Barbara Paech, Alex Dekhtyar, Gunter Mussbacher, Elda Paja, Tong Li, Seok-Won Lee, Dongfeng Fang:
Philanthropic conference-based requirements engineering in time of pandemic and beyond. Requir. Eng. 28(2): 213-227 (2023) - [j26]Xiaohong Chen, Juan Zhang, Zhi Jin, Min Zhang, Tong Li, Xiang Chen, Tingliang Zhou:
Empowering Domain Experts With Formal Methods for Consistency Verification of Safety Requirements. IEEE Trans. Intell. Transp. Syst. 24(12): 15146-15157 (2023) - [c68]Tong Li, Xiang Wei, Yiting Wang:
A Requirements-Driven Framework for Automatic Data Visualization. BPMDS/EMMSAD@CAiSE 2023: 297-311 - [c67]Zhen Yang, Junrui Liu, Tong Li, Di Wu, Shiqiu Yang, Huan Liu:
A Two-tier Shared Embedding Method for Review-based Recommender Systems. CIKM 2023: 2928-2938 - [c66]Jinyi Wang, Tong Li, Hongyu Gao:
Application Recommendation based on Metagraphs: Combining Behavioral and Published Information. COMPSAC 2023: 250-259 - [c65]Tong Li, Lu Han:
Dealing with Explainability Requirements for Machine Learning Systems. COMPSAC 2023: 1203-1208 - [c64]Yu Liu, Tong Li, Zheqing Huang, Zhen Yang:
BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation. SEET@ICSE 2023: 141-152 - [c63]Lu Han, Qixiang Zhou, Tong Li:
Improving Requirements Classification Models Based on Explainable Requirements Concerns. REW 2023: 95-101 - [c62]Tong Li, Xinran Zhang, Yiting Wang:
Discovering Runtime Requirements from User Interactions: Ideas and Preliminary Studies. RE 2023: 323-328 - [c61]Lidan Zhao, Tong Li, Zhen Yang, Junrui Liu:
A novel subjective bias detection method based on multi-information fusion. SEKE 2023: 449-455 - [c60]Jiacheng Li, Tong Li, Runzi Zhang, Di Wu, Hao Yue, Zhen Yang:
APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning. TrustCom 2023: 10-19 - 2022
- [j25]Yongheng Liu, Zhen Yang, Tong Li, Di Wu:
A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction. Appl. Intell. 52(5): 5310-5324 (2022) - [j24]Yuran Zhu, Tong Li:
An object detection-based framework for automatically recognizing iStar hand drafts. Autom. Softw. Eng. 29(2): 57 (2022) - [j23]Yu Du, Tong Li, Muhammad Salman Pathan, Hailay Kidu Teklehaymanot, Zhen Yang:
An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits. Cogn. Comput. 14(1): 78-90 (2022) - [j22]Zhen Yang, Xiaodong Liu, Tong Li, Di Wu, Jinjiang Wang, Yunwei Zhao, Han Han:
A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput. Secur. 116: 102675 (2022) - [j21]Zhi Cai, Jiawei Wang, Tong Li, Bowen Yang, Xing Su, Limin Guo, Zhiming Ding:
A Novel Trajectory Based Prediction Method for Urban Subway Design. ISPRS Int. J. Geo Inf. 11(2): 126 (2022) - [j20]Weite Feng, Junrui Liu, Tong Li, Zhen Yang, Di Wu:
FAC: A Music Recommendation Model Based on Fusing Audio and Chord Features (115). Int. J. Softw. Eng. Knowl. Eng. 32(11&12): 1753-1770 (2022) - [j19]Tong Li, Xiaowei Wang, Yeming Ni:
Aligning social concerns with information system security: A fundamental ontology for social engineering. Inf. Syst. 104: 101699 (2022) - [j18]Junrui Liu, Zhen Yang, Tong Li, Di Wu, Ruiyi Wang:
SPR: Similarity pairwise ranking for personalized recommendation. Knowl. Based Syst. 239: 107828 (2022) - [c59]Tong Li, Yiting Wang, Congkai Geng:
Detection of anomalous modeling behavior: a goal-driven data mining approach. MoDELS (Companion) 2022: 142-145 - [c58]Qixiang Zhou, Tong Li, Yunduo Wang:
Assisting in requirements goal modeling: a hybrid approach based on machine learning and logical reasoning. MoDELS 2022: 199-209 - [c57]Tong Li, Tianai Zhang:
Continuous Usability Requirements Evaluation based on Runtime User Behavior Mining. QRS 2022: 1036-1045 - [c56]Qixiang Zhou, Tong Li:
A User-friendly Semi-automatic iStar Modeling Approach. RE 2022: 259 - [c55]Haonan Xiong, Yunduo Wang, Tong Li:
BiStar: A Template-Based iStar Modeling Tool Combining Graphical and Textual Modeling. RE 2022: 260-261 - [c54]Rongchen Li, Tong Li:
Telling Us Your Needs with Your Eyes. RE 2022: 323-329 - [c53]Zhanshi Li, Tong Li, Runzi Zhang, Di Wu, Zhen Yang:
A Novel Network Alert Classification Model based on Behavior Semantic. SEKE 2022: 553-558 - [c52]Weite Feng, Tong Li, Zhen Yang:
COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms. SEKE 2022: 616-621 - [e2]Alejandro Maté, Tong Li, Enyo J. T. Gonçalves:
Proceedings of the 15th International iStar Workshop (iStar 2022) co-located with 41th International Conference on Conceptual Modeling (ER 2022), Virtual Event, Hyderabad, India, October 17, 2022. CEUR Workshop Proceedings 3231, CEUR-WS.org 2022 [contents] - 2021
- [j17]Yunduo Wang, Tong Li, Qixiang Zhou, Jinlian Du:
Toward practical adoption of i* framework: an automatic two-level layout approach. Requir. Eng. 26(3): 301-323 (2021) - [j16]Xiaodong Liu, Tong Li, Runzi Zhang, Di Wu, Yongheng Liu, Zhen Yang:
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection. Secur. Commun. Networks 2021: 9947059:1-9947059:15 (2021) - [j15]Xin Dong, Tong Li, Rui Song, Zhiming Ding:
Profiling users via their reviews: an extended systematic mapping study. Softw. Syst. Model. 20(1): 49-69 (2021) - [j14]Zhi Cai, Gongyu Sun, Xing Su, Tong Li, Limin Guo, Zhiming Ding:
Visual Analysis of Land Use Characteristics Around Urban Rail Transit Stations. IEEE Trans. Intell. Transp. Syst. 22(10): 6221-6231 (2021) - [c51]Guodi Wang, Tong Li, Hao Yue, Zhen Yang, Runzi Zhang:
Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis. COMPSAC 2021: 714-724 - [c50]Wenxing Liu, Yunduo Wang, Qixiang Zhou, Tong Li:
Graphical Modeling VS. Textual Modeling: An Experimental Comparison Based on iStar Models. COMPSAC 2021: 844-853 - [c49]Hailay Kidu, Haile Misgna, Tong Li, Zhen Yang:
User Response-Based Fake News Detection on Social Media. ICAI 2021: 173-187 - [c48]Yilong Yang, Younggi Bok, Zhuoxi Yang, Eric Sheriff, Tong Li:
Goal2UCM: Automatic Generation of Use Case Model from iStar Model. iStar 2021: 21-27 - [c47]Yunduo Wang, Jinlian Du, Tong Li:
A Learner-Friendly Approach for Using the iStar Modeling Framework: an Ongoing Study. iStar 2021: 42-48 - [c46]Weite Feng, Tong Li, Haiyang Yu, Zhen Yang:
A Hybrid Music Recommendation Algorithm Based on Attention Mechanism. MMM (1) 2021: 328-339 - [c45]Yinghao Zhi, Tong Li, Zhen Yang:
Extracting features from app descriptions based on POS and dependency. SAC 2021: 1354-1358 - [e1]Marcela Ruiz, Tong Li, Vik Pant:
Proceedings of the 14th International iStar Workshop (iStar 2021), co-located with 40th International Conference on Conceptual Modeling (ER 2021), St. Johns (NL), Canada, October 18, 2021. CEUR Workshop Proceedings 2983, CEUR-WS.org 2021 [contents] - 2020
- [j13]Jinli Zhang, Zongli Jiang, Yongping Du, Tong Li, Yida Wang, Xiaohua Hu:
Hierarchy construction and classification of heterogeneous information networks based on RSDAEf. Data Knowl. Eng. 127: 101790 (2020) - [j12]Rui Song, Tong Li, Xin Dong, Zhiming Ding:
Identifying Similar Users Based on Their Check-in Data: A Graph Embedding Approach. Int. J. Softw. Eng. Knowl. Eng. 30(11&12): 1735-1757 (2020) - [j11]Tong Li, Zhishuai Chen:
An ontology-based learning approach for automatically classifying security requirements. J. Syst. Softw. 165: 110566 (2020) - [j10]Zhi Cai, Tong Li, Xing Su, Limin Guo, Zhiming Ding:
Research on Analysis Method of Characteristics Generation of Urban Rail Transit. IEEE Trans. Intell. Transp. Syst. 21(9): 3608-3620 (2020) - [c44]Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery: Extended Abstract. AIRE@RE 2020: 22 - [c43]Rui Song, Tong Li, Zhiming Ding:
Automatically Identifying Requirements-Oriented Reviews Using a Top-Down Feature Extraction Approach. APSEC 2020: 450-454 - [c42]Ruiyi Wang, Tong Li, Zhen Yang, Haiyang Yu:
Predicting Polypharmacy Side Effects Based on an Enhanced Domain Knowledge Graph. ICAI 2020: 89-103 - [c41]Jennifer Horkoff, Tong Li:
Using the Doughnut Model to Support Sustainable Quality Requirements in iStar. iStar 2020: 1-6 - [c40]Yuran Zhu, Tong Li:
A Preliminary Framework for Recognizing iStar Hand Drafts. iStar 2020: 7-12 - [c39]Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery. SEKE 2020: 77-82 - [c38]Rui Song, Tong Li, Xin Dong, Zhiming Ding:
Identifying Similar Users Based on Metagraph of Check-in Trajectory Data. SEKE 2020: 525-531
2010 – 2019
- 2019
- [j9]Ping Yang, Dan Wang, Zhuojun Wei, Xiaolin Du, Tong Li:
An Outlier Detection Approach Based on Improved Self-Organizing Feature Map Clustering Algorithm. IEEE Access 7: 115914-115925 (2019) - [j8]Affan Yasin, Lin Liu, Tong Li, Rubia Fatima, Jianmin Wang:
Improving software security awareness using a serious game. IET Softw. 13(2): 159-169 (2019) - [j7]Jennifer Horkoff, Fatma Basak Aydemir, Evellin Cardoso, Tong Li, Alejandro Maté, Elda Paja, Mattia Salnitri, Luca Piras, John Mylopoulos, Paolo Giorgini:
Goal-oriented requirements engineering: an extended systematic mapping study. Requir. Eng. 24(2): 133-160 (2019) - [j6]Yu Wang, Tong Li, Congkai Geng, Yihan Wang:
Recognizing patterns of student's modeling behaviour patterns via process mining. Smart Learn. Environ. 6(1): 26 (2019) - [c37]Shiheng Wang, Tong Li, Zhen Yang:
Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach. APSEC 2019: 39-46 - [c36]Xin Dong, Tong Li, Xiangyang Li, Rui Song, Zhiming Ding:
Review-Based User Profiling: A Systematic Mapping Study. BPMDS/EMMSAD@CAiSE 2019: 229-244 - [c35]Tong Li, Yeming Ni:
Paving Ontological Foundation for Social Engineering Analysis. CAiSE 2019: 246-260 - [c34]Xin Dong, Tong Li, Zhiming Ding:
An Ontology Enhanced User Profiling Algorithm Based on Application Feedback. COMPSAC (1) 2019: 316-325 - [c33]Yu Wang, Tong Li, Congkai Geng, Yihan Wang:
Evaluating Student Learning Effect Based on Process Mining. ICAI 2019: 59-72 - [c32]Shiheng Wang, Tong Li, Zhen Yang:
Using Graph Embedding to Improve Requirements Traceability Recovery. ICAI 2019: 533-545 - [c31]Xiaohong Chen, Zhiwei Zhong, Zhi Jin, Min Zhang, Tong Li, Xiang Chen, Tingliang Zhou:
Automating Consistency Verification of Safety Requirements for Railway Interlocking Systems. RE 2019: 308-318 - [c30]Tong Li, Kaiyuan Wang, Jennifer Horkoff:
Towards Effective Assessment for Social Engineering Attacks. RE 2019: 392-397 - 2018
- [j5]Affan Yasin, Lin Liu, Tong Li, Jianmin Wang, Didar Zowghi:
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Inf. Softw. Technol. 95: 179-200 (2018) - [j4]Yang Cao, Zhi Cai, Fei Xue, Tong Li, Zhiming Ding:
Semantic Trajectory Based Behavior Generation for Groups Identification. KSII Trans. Internet Inf. Syst. 12(12): 5782-5799 (2018) - [j3]Tong Li, Jennifer Horkoff, John Mylopoulos:
Holistic security requirements analysis for socio-technical systems. Softw. Syst. Model. 17(4): 1253-1285 (2018) - [c29]Yunduo Wang, Tong Li, Haoyuan Zhang, Jiayi Sun, Yeming Ni, Congkai Geng:
A Prototype for Generating Meaningful Layout of iStar Models. ER Workshops 2018: 49-53 - [c28]Haoyuan Zhang, Tong Li, Yunduo Wang:
Design of an Empirical Study for Evaluating an Automatic Layout Tool. ER Workshops 2018: 206-211 - [c27]Jinli Zhang, Zongli Jiang, Tong Li:
CHIN: Classification with META-PATH in Heterogeneous Information Networks. ICAI 2018: 63-74 - [c26]Tong Li, Fan Zhang, Dan Wang:
Automatic User Preferences Elicitation: A Data-Driven Approach. REFSQ 2018: 324-331 - [c25]Roxana Lisette Quintanilla Portugal, Tong Li, Lyrene Fernandes da Silva, Eduardo Almentero, Julio César Sampaio do Prado Leite:
NFRfinder: a knowledge based strategy for mining non-functional requirements. SBES 2018: 102-111 - 2017
- [c24]Roxana Lisette Quintanilla Portugal, Marco Antonio Casanova, Tong Li, Julio César Sampaio do Prado Leite:
GH4RE: Repository Recommendation on GitHub for Requirements Elicitation Reuse. CAiSE-Forum-DC 2017: 113-120 - [c23]Xiaolin Du, Tong Li, Dan Wang:
An Automatic Layout Approach for iStar Models. iStar 2017: 61-66 - [c22]Elias A. Seid, Kazi Robin, Tong Li, John Mylopoulos:
Evaluation of MUSER, a holistic security requirements analysis framework. RCIS 2017: 293-304 - 2016
- [b1]Tong Li:
Holistic Security Requirements Engineering for Socio-Technical Systems. University of Trento, Italy, 2016 - [c21]Tong Li, Alicia M. Grubb, Jennifer Horkoff:
Understanding Challenges and Tradeoffs in iStar Tool Development. iStar 2016: 49-54 - [c20]Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, Kristian Beckers:
Security attack analysis using attack patterns. RCIS 2016: 1-13 - [c19]Jennifer Horkoff, Fatma Basak Aydemir, Evellin Cardoso, Tong Li, Alejandro Maté, Elda Paja, Mattia Salnitri, John Mylopoulos, Paolo Giorgini:
Goal-Oriented Requirements Engineering: A Systematic Literature Map. RE 2016: 106-115 - 2015
- [j2]Jennifer Horkoff, Tong Li, Feng-Lin Li, Mattia Salnitri, Evellin Cardoso, Paolo Giorgini, John Mylopoulos:
Using Goal Models Downstream: A Systematic Roadmap and Literature Review. Int. J. Inf. Syst. Model. Des. 6(2): 1-42 (2015) - [c18]Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, John Mylopoulos:
Analyzing Attack Strategies Through Anti-goal Refinement. PoEM 2015: 75-90 - [c17]Tong Li, Jennifer Horkoff, Kristian Beckers, Elda Paja, John Mylopoulos:
A Holistic Approach to Attack Modeling and Analysis. iStar 2015: 49-54 - [c16]Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, Kristian Beckers:
Holistic security requirements analysis: An attacker's perspective. RE 2015: 282-283 - [c15]Tong Li, Jennifer Horkoff, John Mylopoulos:
Analyzing and Enforcing Security Mechanisms on Requirements Specifications. REFSQ 2015: 115-131 - 2014
- [c14]Tong Li, Jennifer Horkoff, John Mylopoulos:
A Prototype Tool for Modeling and Analyzing Security Requirements from A Holistic Viewpoint. CAiSE (Forum/Doctoral Consortium) 2014: 185-192 - [c13]Tong Li, Jennifer Horkoff:
Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach. CAiSE 2014: 285-300 - [c12]Jennifer Horkoff, Fatma Basak Aydemir, Feng-Lin Li, Tong Li, John Mylopoulos:
Evaluating Modeling Languages: An Example from the Requirements Domain. ER 2014: 260-274 - [c11]Tong Li, Jennifer Horkoff, John Mylopoulos:
Integrating Security Patterns with Security Requirements Analysis Using Contextual Goal Models. PoEM 2014: 208-223 - [c10]Tong Li, John Mylopoulos:
Modeling and Applying Security Patterns Using Contextual Goal Models. iStar 2014 - [c9]Jennifer Horkoff, Tong Li, Feng-Lin Li, Mattia Salnitri, Evellin Cardoso, Paolo Giorgini, John Mylopoulos, João Pimentel:
Taking goal models downstream: A systematic roadmap. RCIS 2014: 1-12 - 2011
- [j1]He Zhang, Lin Liu, Tong Li:
Designing IT systems according to environmental settings: A strategic analysis framework. J. Strateg. Inf. Syst. 20(1): 80-95 (2011) - [c8]Golnaz Elahi, Eric S. K. Yu, Tong Li, Lin Liu:
Security Requirements Engineering in the Wild: A Survey of Common Practices. COMPSAC 2011: 314-319 - [c7]Tianying Li, Tong Li, Haihua Xie, Lin Liu:
I*-Prefer: A Tool for Preference Model-Driven Decision Making. iStar 2011: 151-153 - [c6]Yudistira Asnar, Tong Li, Fabio Massacci, Federica Paci:
Computer Aided Threat Identification. CEC 2011: 145-152 - 2010
- [c5]Tuoye Xu, Tong Li, Lin Liu, Barrett R. Bryant:
Negotiating Service Requirements among Strategic Actors. COMPSAC Workshops 2010: 31-36 - [c4]Tong Li, Lin Liu, Golnaz Elahi, Eric S. K. Yu, Barrett R. Bryant:
Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint. COMPSAC Workshops 2010: 127-133 - [c3]Tong Li, Golnaz Elahi, Lin Liu, Eric S. K. Yu:
Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report. iStar 2010: 57-61 - [c2]Yunsong Jian, Tong Li, Lin Liu, Eric S. K. Yu:
Goal-oriented requirements modelling for running systems. RE@RunTime 2010: 1-8 - [c1]Lin Liu, Tong Li, Fei Peng:
Why Requirements Engineering Fails: A Survey Report from China. RE 2010: 317-322
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint