Dr. Dianxiang Xu

Selected Publications

Journal Articles

  1. Zhiyuan Li, Weijia Xing, Samer Khamaiseh, and Dianxiang Xu, Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic, IEEE Transactions on Network and Service Management, Vol. 17, No. 1, March 2020, pp. 607 – 621.
  2. Yan Wu, Anthony Luo, Dianxiang Xu, Identifying Suspicious Addresses in Bitcoin Thefts, Forensic Science International: Digital Investigation, Volume 31, December 2019.
  3. Dazhi Yang, Dianxiang Xu, Jyh-haw Yeh, Yibo Fan. Undergraduate Research Experience in Cybersecurity for Underrepresented Students and Students with Limited Research Opportunities. Journal of STEM Education. Vol. 19, No. 5, Feb. 2019.
  4. Manghui Tu, Liangliang Xiao, Dianxiang Xu. Enhancing Availability for Distributed Replicated Services Considering Network Edge Availability. International Journal of Computer Networks & Communications (IJCNC), Vol.11, No.1, January 2019.
  5. Izzat Alsmadi, Abdallah Khreishah, Dianxiang Xu. Network Slicing to Improve Multicasting in HPC Clusters. Cluster Computing, Vol. 21, No. 3, pp.1493-1506, 2018, Springer.
  6.  Weifeng Xu, Dianxiang Xu, Abdulrahman Alatawi, Omar El Ariss, and Yunkai Liu. Statistical Unigram Analysis for Source Code Repository. International Journal of Semantic Computing, Vol. 12, No. 2, pp. 237-260, 2018.
  7. Dianxiang Xu, Weifeng Xu, Manghui Tu, Ning Shen, William Chu, Chih-Hung Chang. Automated Integration Testing Using Logical Contracts, IEEE Transactions on Reliability, Vol. 65, No. 3, pp.1205-1222, Sept. 2016.
  8. Sandeep Lakkaraju, Dianxiang Xu, Yong Wang. Analysis of Healthcare Workflows in Accordance with Access Control Policies, International Journal of Healthcare Information Systems and Informatics (IJHISI), vol. 11, no. 1, pp.1-20, 2016.
  9. Dianxiang Xu, Ning Shen, Yunpeng Zhang. Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies, International Journal of Software Engineering and Knowledge Engineering, Vol. 25, Nos. 9 & 10 (2015) 1551-1571. Expanded version of the SEKE15 paper.
  10. Izzat Alsmadi and Dianxiang Xu, Security of Software Defined Networks: A Survey, Computers and Security. 53(2015)79-108.
  11. Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, and Yves Le Traon. Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. IEEE Transactions on Computers, Vo. 64, No. 9, pp. 2490-2505, September 2015.
  12. Dianxiang Xu, Weifeng Xu, Michael Kent, Lijo Thomas, Linzhang Wang. An Automated Test Generation Technique for Software Quality Assurance, IEEE Transactions on Reliability, Vol. 64, No. 1, pp. 247-268, March 2015.
  13. Manghui Tu, Hui Ma, Liangliang Xiao, I-Ling Yen, Farokh Bastani, Dianxiang Xu. Data Placement in P2P Data Grids Considering the Availability, Security, Access Performance and Load Balancing. Journal of Grid Computing, 11(1): 103-127 (2013).
  14. Manghui Tu and Dianxiang Xu. Resilience as a New System Engineering for Cloud Systems. Journal of Communications. Vol. 8, No. 4, pp. 267-274, 2013.
  15. Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamarri, Dianxiang Xu, A Threat Model-based Approach to Security Testing, Software: Practice and Experience, Vol. 43, No.2, pp. 241-258, Feb. 2013.
  16. Manghui Tu, Dianxiang Xu, Eugene Butler, and Amanda Schwartz. Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System. Journal of Digital Forensics, Security, and Law. Vol. 7, No. 4, 2012.
  17. Dianxiang Xu, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, and Weifeng Xu, Automated Security Test Generation with Formal Threat Models, IEEE Transactions on Dependable and Secure Computing. Vol. 9, No.4, July/August 2012, pp. 525-539.
  18. Omar El Ariss and Dianxiang Xu. Secure System Modeling: Integrating Security Attacks with Statecharts. International Journal of Software and Informatics, Special issue on Software Modeling and Meta-Modeling. 6(2): 271-306, 2012.
  19.  W. Eric Wong, Vidroha Debroy, Dianxiang Xu. Towards Better Fault Localization: A Crosstab-based Statistical Approach, IEEE Transactions on Systems, Man, and Cybernetics–Part C: Applications and Reviews. Vol. 42, no. 3, pp. 378-396, 2012.
  20. Dianxiang Xu, Omar El-Ariss, Weifeng Xu, Linzhang Wang. Testing Aspect-Oriented Programs with Finite State Machines, Journal of Software Testing, Verification and Reliability, 22: 267-293, 2012.
  21.  Omar El Ariss, Dianxiang Xu, and W. Eric Wong. Integrating Safety Analysis with Functional Modeling, IEEE Transactions on Systems, Man, and Cybernetics–Part A: Systems and Humans, Vol. 41, No. 4, pp. 610-624, July 2011.
  22. Jun Kong, Dianxiang Xu, and Xiaoqin Zeng. UML-based Modeling and Analysis of Security Threats. International Journal of Software Engineering and Knowledge Engineering, 20(6):875-897, Sept. 2010.
  23. Dianxiang Xu, Omar El Ariss, Weifeng Xu, Linzhang Wang, Aspect-Oriented Modeling and Verification with Finite State Machines, Journal of Computer Science and Technology, 24(5): 949-961, Sept. 2009.
  24. Dianxiang Xu, Weifeng Xu, and W. Eric Wong, Automated Test Code Generation from Class State Models, International Journal of Software Engineering and Knowledge Engineering, 19(4): 599-623, June 2009.
  25. Jun Kong, Kang Zhang, Jing Dong, and Dianxiang Xu, Specifying Behavioral Semantics of UML Diagrams through Graph Transformations, Journal of Systems and Software, 82(2): 292-306 (2009).
  26. Dianxiang Xu, Weifeng Xu, and W. Eric Wong, Testing Aspect-Oriented Programs with UML Design Models, International Journal of Software Engineering and Knowledge Engineering, Vol. 18, No. 3, pp. 413-437, May 2008.
  27. Dianxiang Xu, Vivek Goel, Kendall Nygard, and W. Eric Wong. Aspect-Oriented Specification of Threat-Driven Security Requirements, International Journal of Computer Applications in Technology, Special Issue on Concern Oriented Software Evolution. Vol. 31, Nos. 1/2, pp. 131-140, 2008.
  28.  Martin C. Lundell, Dianxiang Xu, Denver Tolliver, and Kendall E. Nygard. A Multi-Agent Design for Sense and Respond Logistics Simulation, World Review of Intermodal Transportation Research, Special Issue on Computer Simulation in Transportation Research, Vol. 1, No. 4, 2007, pp. 459-471.
  29.  Junhua Ding, Peter J. Clarke, Dianxiang Xu, Yi Deng, Xudong He. A Formal Model-Based Approach for Developing an Interoperable Mobile Agent System. Multi-Agent and Grid Systems: An International Journal. Special Issue on Agent-oriented Software Development Methodologies, Volume 2, Number 4, pp. 401-412, 2006.
  30.  Dianxiang Xu and Joshua Pauli. Threat-Driven Design and Analysis of Secure Software Architectures. Journal of Information Assurance and Security, Vol.1, No. 3, pp. 171-180, 2006.
  31.  Dianxiang Xu and Kendall E. Nygard. Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. IEEE Transactions on Software Engineering. Vol. 32, No. 4, pp. 265-278, April 2006.
  32. Dianxiang Xu, Richard A. Volz, Michael S. Miller, and Jesse Plymale. Knowledge-Based Human-Agent Teamwork for Distributed Training. International Journal of Intelligent Control and Systems. Vol. 11, No. 1, pp. 1-10, March 2006.
  33.  Junhua Ding, Dianxiang Xu, Xudong He, and Yi Deng. Modeling and Analyzing a Mobile Agent-based Clinical Information System. International Journal of Intelligent Control and Systems. Vol. 10, No. 2, pp.143-151, June 2005.
  34. Sen Cao, Richard. A. Volz, Jamison Johnson, Maitreyi Nanjanath, Jonathan Whetzel, and Dianxiang Xu, Development of a Distributed Multi-Player Computer Game for Scientific Experiment of Team-Training Protocols. The Electronic Library – The Int. J. for the Applications of Technology in Information Environments. Vol. 22 No. 1, pp. 43-54, 2004.
  35. Dianxiang Xu, Jianwen Yin, Yi Deng, and Junhua Ding,  A Formal Architectural Model for Logical Agent Mobility , IEEE Transactions on Software Engineering, vol. 29, no.1, pp. 31-45, January 2003.
  36. Dianxiang Xu, Richard A. Volz, Thomas R. Ioerger, and John Yen,  Modeling and Analyzing Multi-Agent Behaviors Using Predicate/Transition Nets, International Journal of Software Engineering and Knowledge Engineering, vol. 13, no. 1, pp.103-124, February 2003.
  37. Dianxiang Xu, Xudong He, and Yi Deng,  Compositional Schedulability Analysis of Real Time Systems Using Time Petri Nets , IEEE Transactions on Software Engineering, vol.28, no. 10, pp. 984-996, October 2002.
  38. Xiaocong Fan, Dianxiang Xu, Jianmin Hou, and Guoliang Zheng, Reasoning about Concurrent Actions in Multi-Agent Systems, Journal of Computer Science and Technology, vol.14, no.4, pp. 422-428, July 1999.
  39. Dianxiang Xu, Guoliang Zheng, and Xiaocong Fan, A Logic Based Language for Networked Agents, Information and Software Technology, vol.40, no.8, pp. 435-442, August 1998.
  40.  Dianxiang Xu, Towards an Object-Oriented Logic Framework for Knowledge Based Systems, Knowledge Based Systems, vol.10, no.6, pp. 351-358, April 1998.
  41. Dianxiang Xu and Guoliang Zheng, Towards a Declarative Semantics of Inheritance with Exceptions, Journal of Computer Science and Technology, Vol.11, No.1, pp. 61-71, 1996.

Conference/Workshop Papers

  1. Dianxiang Xu, Roshan Shrestha, Ning Shen. Automated Strong Mutation Testing of XACML Policies, Proc. of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020.
  2. Samer Khamaiseh, Edoardo Serra, and Dianxiang Xu, vSwitchGuard: Defending OpenFlow Switches against Saturation Attacks. Proc. of the 2020 IEEE Computers, Software, and Applications Conference (COMPSAC’2020).
  3. Abdulrahman Alatawi, Weifeng Xu and Dianxiang Xu. A Bigram-based Inference Model for Retrieving Abbreviated Phrases in Source Code. Proc. of the International Conference on Evaluation and Assessment in Software Engineering (EASE). April 2020, Trondheim, Norway.
  4. Samer Khamaiseh, Edoardo Serra, Zhiyuan Li, Dianxiang Xu, Detecting Saturation Attacks in SDN via Machine Learning, Proc. of the 4th IEEE International Conference on Computing, Communications and Security (ICCCS 2019), Rome, Italy, October 2019. Runner Up for the Best Paper Award.
  5. Patrick Chapman, Dianxiang Xu, Lin Deng, and Yin Xiong. Deviant: A Mutation Testing Tool for Solidity Smart Contracts, Proc. of the 2nd IEEE International Conference on Blockchain (Blockchain-2019), Atlanta, USA, July 2019.
  6. Yan Wu, Anthony Luo, Dianxiang Xu, Forensic Analysis of Bitcoin Transactions, Proc. of the 2019 IEEE Conference on Intelligence and Security Informatics (ISI’19), Shenzhen, China, July 2019.
  7. Zhiyuan Li, Weijia Xing and Dianxiang Xu, Detecting Saturation Attacks in Software-Defined Networks, of the 2018 IEEE Conference on Intelligence and Security Informatics (ISI’18), Miami, Florida, November 2018.
  8. Dianxiang Xu, Roshan Shrestha, Ning Shen. Automated Coverage-Based Testing of XACML Policies, of the 23rd ACM Symposium on Access Control Models and Technologies (SACMAT’18), pp. 3-14, Indianapolis, USA, June 2018. Best Paper Award.
  9. Samer Khamaiseh, Patrick Chapman, Dianxiang Xu. Model-Based Testing of Obligatory ABAC Systems, of the 18th International Conference on Software Quality, Reliability and Security (QRS’18), Lisbon, Portugal. July 2018.
  10. Roshan Shrestha, Shuai Peng, Turner Lehmbecker, Dianxiang Xu, XPA: An Open Source IDE for XACML Policies, of the 30th International Conference on Software Engineering and Knowledge Engineering (SEKE’18), San Francisco Bay, July 2018.
  11. Yan Wu, Nitish Dhakal, Dianxiang Xu, Jin-Hee Cho. Analysis and Prediction of Endorsement-based Skill Assessment in LinkedIn. of the 42nd IEEE Computer Software and Applications Conference (COMPSAC’18), Tokyo, Japan, July 2018.
  12. Abdulrahman Alatawi, Weifeng Xu, Dianxiang Xu. Bayesian Unigram-Based Inference for Expanding Abbreviations in Source Code. of the 29th IEEE International Conference on Tools with Artificial Intelligence (ICTAI’17), Boston, MA, November 2017.
  13. Samer Khamaiseh and Dianxiang Xu, Software Security Testing via Misuse Case Modeling, of the 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’17), Orlando, Florida, Nov. 2017.
  14. Nitish Dhakal, Francesca Spezzano, Dianxiang Xu. Predicting Friendship Strength for Privacy Preserving: A Case Study on Facebook. International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI’17), in conjunction with IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM 2017), Sydney, Australia, 2017.
  15. Weifeng Xu, Dianxiang Xu, Lin Deng. Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names. of the 41st IEEE Computer Software and Applications Conference (COMPSAC’17), Torino, Italy, July 2017.
  16. Weifeng Xu, Dianxiang Xu, Omar El Ariss, Abdulrahman Alatawi. Ultra-Large-Scale Analysis of Unigrams Collected from Source Code Repository. of the Third IEEE International Conference on Multimedia Big Data (BigMM’2017), Laguna Hills, California, USA, April 2017.
  17. Izzat Alsmadi, Samer Khamaiseh, Dianxiang Xu. Network Parallelization in HPC Clusters. The 2016 International Conference on Computational Science and Computational Intelligence (CSCI’16), Symposium of Parallel and Distributed Computing and Computational Science CSCI-ISPD). December 15-17, 2016, Las Vegas, USA.
  18. Dianxiang Xu and Shuai Peng. Towards Automatic Repair of Access Control Policies. of the 14th IEEE Conference on Privacy, Security and Trust (PST’16), Auckland, New Zealand, December 2016.
  19. Jin-Hee Cho, Izzat Alsmadi, Dianxiang Xu. Privacy and Social Capital in Online Social Networks, IEEE GLOBECOM’16, Washington, DC, USA, December 2016.
  20. Sung-Ju Fan Chiang, Daniel Chen and Dianxiang Xu. Conformance Testing of Balana: An Open Source Implementation of the XACML3.0 Standard. of the 28th International Conf. on Software Engineering and Knowledge Engineering (SEKE’16), San Francisco Bay, July 2016.
  21. Dianxiang Xu, Zhenyu Wang, Shuai Peng, Ning Shen. Automated Fault Localization of XACML Policies, of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT’16), pp. 137-147, Shanghai, China, June 2016.
  22. Izzat Alsmadi, Dianxiang Xu and Jin-Hee Cho. Interaction-Based Reputation Model in Online Social Networks, of the 2nd International Conference on Information Systems Security and Privacy (ICISSP’16), pp. 265-272, Short paper. Feb. 2016, Rome, Italy.
  23. Dianxiang Xu, Yunpeng Zhang, Ning Shen. Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies, of the 2015 International Conference on Software Quality, Reliability and Security (QRS15), Vancouver, Canada. August 2015. Honorable Recognition of Paper.
  24. Dianxiang Xu, Ning Shen, Yunpeng Zhang. Fault-Based Testing of Combining Algorithms in XACML3.0 Policies. of the 27th International Conf. on Software Engineering and Knowledge Engineering (SEKE’15), Pittsburg, July 2015.
  25. Izzat Alsmadi, Milson Munakami, Dianxiang Xu. Model-Based Testing of SDN Firewalls: A Case Study, of the second International Conference on Trustworthy Systems and Their Applications (TSA’15), Taiwan, July 2015.
  26. Dianxiang Xu, Weifeng Xu, and Manghui Tu. Automated Generation of Integration Test Sequences from Logical Contracts, of the 6th IEEE International Workshop on Software Test Automation (STA’14), in conjunction with COMPSAC14, Sweden, July 2014.
  27. Dianxiang Xu, Ning Shen. Effectiveness of Automated Function Testing with Petri Nets: A Series of Controlled Experiments. of the 26th International Conf. on Software Engineering and Knowledge Engineering (SEKE’14), July 2014.
  28. Weifeng Xu, Tao Ding, Dianxiang Xu. Rule-based Test Input Generation from Bytecode, of the 8th International Conference on Software Security and Reliability (SERE’14). San Francisco, CA. June 2014.
  29. Dianxiang Xu, Yunpeng Zhang. Specification and Analysis of Attribute-Based Access Control Policies: An Overview. of the International Workshop on Information Assurance, in conjunction with SERE14. San Francisco, CA. June 2014.
  30. Sandeep Lakkaraju and Dianxiang Xu, Integrated Modeling and Analysis of Attribute based Access Control Policies and Workflows in Healthcare, of the 1st International Conference on Trustworthy Systems and Their Applications (TSA’14), Taiwan, June 2014.
  31. Weifeng Xu, Tao Ding, Hanling Wang, Dianxiang Xu, Mining Test Oracles for Test Inputs Generated from Java Bytecode, of the 37th IEEE Computer Software and Applications Conference (COMPSAC’13), pp.27-32, Kyoto, Japan, July 2013.
  32. Junhua Ding, Dianxiang Xu, Jidong Ge, An Approach for Analyzing Software Specifications in Petri Nets. of the 25th International Conf. on Software Engineering and Knowledge Engineering (SEKE’13), Boston, June 2013.
  33. Manghui Tu, Liangliang Xiao, Dianxiang Xu. Maximizing the Availability of Replicated Services in Widely Distributed Systems. of the 7th IEEE International Conference on Software Security and Reliability (SERE’13), Washington DC, USA, June 2013.
  34. Dianxiang Xu. Software Security Testing of an Online Banking System: A Unique Research Experience for Undergraduates and Computer Teachers, of the 44th ACM Technical Symposium on Computer Science Education (SIGCSE’13), Denver, March 2013.
  35. Dianxiang Xu, Michael Sanford, Zhaoliang Liu, Mark Emry, Brad Brockmueller, Spencer Johnson, Michael To. Testing Access Control and Obligation Policies, of the 2013 International Conference on Computing, Networking and Communications (ICNC13), San Diego, January 2013.
  36. Manghui Tu, Dianxiang Xu. System Resilience Modeling and Enhancement for the Cloud, of the 2013 International Conference on Computing, Networking and Communications (ICNC13), San Diego, January 2013.
  37. Dianxiang Xu and William Chu. A Methodology for Building Effective Test Models with Function Nets. of the 36th IEEE Computer Software and Applications Conference (COMPSAC’12), Izmir, Turkey, July 2012.
  38. Dianxiang Xu and Janghwan Tae. Automated Generation of Concurrent Test Code from Function Nets. of the 24th International Conf. on Software Engineering and Knowledge Engineering (SEKE12), San Francisco, July 2012.
  39. Junhua Ding and Dianxiang Xu. Model-Based Metamorphic Testing: A Case Study. of the 24th International Conf. on Software Engineering and Knowledge Engineering (SEKE12), San Francisco, July 2012.
  40. Dianxiang Xu, Weifeng Xu, Bharath K Bavikati, and Eric W. Wong. Mining Executable Specifications of Web Applications from Selenium IDE Tests. of the Sixth IEEE International Conference on Software Security and Reliability (SERE’12), Washington DC, USA, June 2012.
  41. Dianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi, and Yves Le Traon. A Model-Based Approach to Automated Testing of Access Control Policies. of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT12), Newark, USA, June 2012.
  42. Michael Tu, Dianxiang Xu, Zhonghang Xia, Logan Smith. Securing Epidemic based Update Protocol for P2P Systems. of the 23rd IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS’11). Dallas, USA, December. 2011. Best Paper Award.
  43. Michael Tu, Dianxiang Xu, Zhonghang Xia, Jicheng Fu. Modeling and Computing Reach Availability of Replicated Data or Service in Distributed Environments, Proc. of the 35th IEEE Computer Software and Applications Conference (COMPSAC11), Munich, Germany, July 2011.
  44. Lijo Thomas, Weifeng Xu, Dianxiang Xu. Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing, Proc. of the 3rd IEEE International Workshop on Software Test Automation (STA11), in conjunction with COMPSAC 2011, Munich, Germany, July 2011.
  45. Michael Sanford, Daniel Woodraska, Dianxiang Xu. Security Analysis of FileZilla Server Using Threat Models. Proc. of the 23rd International Conf. on Software Engineering and Knowledge Engineering (SEKE11), Miami, July 2011.
  46. Omar El Ariss, Jianfei Wu, Dianxiang Xu. Towards an Enhanced Design Level Security Integrating Attack Trees with Statecharts, Proc. of the 5th IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI11), Jeju Island, South Korea, June 2011.
  47. Dianxiang Xu, A Tool for Automated Test Code Generation from High-Level Petri Nets, Proc. of the 32nd International Conference on Application and Theory of Petri Nets and Concurrency (Petri Nets 2011), Newcastle upon Tyne, UK, June 2011.
  48. Omar El Ariss, Dianxiang Xu. Modeling Security Attacks with Statecharts, 2nd International ACM SigSoft Symposium on Architecting Critical Systems (ISARCS 2011), Federated with CompArch 2011, Boulder, Colorado, June 2011.
  49. Junhua Ding, Tong Wu, Dianxiang Xu, Jun Q. Lu, Xin-Hua Hu. Metamorphic Testing of a Monte Carlo Modeling Program, Sixth International Workshop on the Automation of Software Test (AST11), in conjunction with ICSE11, Honoulu, Hawaii, May 2011.
  50. Daniel Woodraska, Michael Sanford, Dianxiang Xu, Security Mutation Testing of the FileZilla FTP Server, of the 26th ACM Symposium on Applied Computing (SAC’11), Software Engineering Track, Taiwan, March 2011.
  51. Yong Wang, Dianxiang Xu, William M Lively, Dick B. Simmons. A Stochastic Model for Optimizing the Patching Time of Software Bugs, of the 22nd International Conf. on Software Engineering and Knowledge Engineering (SEKE’10), San Francisco Bay, July 2010.
  52. Dianxiang Xu and Junhua Ding, Prioritizing State-Based Aspect Tests, Proc. of the Third International Conference on Software Testing, Verification, and Validation (ICST10), Paris, France, April 2010.
  53. Omar El Ariss, Dianxiang Xu, Santosh Dandey, Brad Vender, Phil McClean, and Brian Slator, A Systematic Capture and Replay Strategy for Testing Complex GUI based Java Applications, Proc. of the 7th International Conference on Information Technology: New Generations (ITNG10), Las Vegas, USA, April 2010.
  54. Jianfei Wu, Anne Denton, Omar El Ariss, and Dianxiang Xu, Mining for Core Patterns in Stock Market Data, The Third International Workshop Mining Multiple Information Sources (MMIS09), In conjunction with ICDM 2009, Miami, USA, December 2009.
  55. Sathish Pinagapani, Dianxiang Xu, and Jun Kong, A Comparative Study of Access Control Languages, Proc. of the 3rd IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI09), Shanghai, China, July 2009.
  56. Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamarri, Dianxiang Xu, Security Test Generation using Threat Trees, Fourth International Workshop on the Automation of Software Test (AST09), in conjunction with ICSE’09, Vancouver, Canada, May 2009.
  57. Weifeng Xu and Dianxiang Xu, Automated Evaluation of Runtime Object States Against Model-Level States for State-Based Test Execution, The 5th Workshop on Advances in Model Based Testing (A-MOST09), in conjunction with ICST’09, Denver, Colorado, USA, April 2009.
  58. Zhanqi Cui, Linzhang Wang, Xuandong Li, and Dianxiang Xu. Modeling and Integrating Aspects with UML Activity Diagrams, Proc. of the 24th ACM Symposium on Applied Computing (SAC09), Software Engineering Track, Hawaii, USA, March 2009.
  59. Omar El-Ariss, Dianxiang Xu, W. Eric Wong, Yuting Chen, Yann-Hang Lee, A Systematic Approach for Integrating Fault Trees into System Statecharts, Proc. of the 32nd IEEE Computer Software and Applications Conference (COMPSAC08), Turku, Finland, July 2008.
  60. Jun Kong and Dianxiang Xu. A UML-based Framework for Design and Analysis of Secure Software, Proc. of the 32nd IEEE Computer Software and Applications Conference (COMPSAC08), Turku, Finland, July 2008.
  61. Martin Lundell, Dianxiang Xu, Jonathan Pikalek, and Kendall E. Nygard, Multi-agent Designs for Ambient Systems, Proc. of the First International Conference on Ambient Media and Systems (Ambi-sys’08), Quebec City, Canada, Feb. 2008.
  62. Dianxiang Xu, Weifeng Xu, and W. Eric Wong. Automated Test Code Generation from UML Protocol State Machines, Proc. of the 19th International Conference on Software Engineering and Knowledge Engineering (SEKE’07), Boston, July 2007.
  63. Dianxiang Xu, Izzat Alsmadi, and Weifeng Xu, Model Checking Aspect-Oriented Design Specification, Proc. of the 31st IEEE International Computer Software and Applications Conference (COMPSAC’07), Vol. 1. pp. 491-500, Beijing, July 2007.
  64. Linzhang Wang, W. Eric Wong, and Dianxiang Xu. A Threat Model Driven Approach for Security Testing, The 3rd International Workshop on Software Engineering for Secure Systems (SESS’07), in conjunction with ICSE07. May 2007, Minneapolis.
  65. Dianxiang Xu and Xudong He. Generation of Test Requirements from Aspectual Use Cases. Proc. of the Third Workshop on Testing Aspect-Oriented Programs (WTAOP’07). In conjunction with AOSD07, pp. 17-22, March 2007, Vancouver, Canada. ACM Press.
  66. Dianxiang Xu, Vivek Goel, and Kendall Nygard. An Aspect-Oriented Approach to Security Requirements Analysis. Proc. of the 30th IEEE International Computer Software and Applications Conference (COMPSAC’06), pp. 79-82, Chicago, Sept. 2006.
  67. Josh Pauli and Dianxiang Xu. Integrating Functional and Security Requirements with Use Case Decomposition. Proc. of the 11th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS06), pp. 57-66, USA, August 2006.
  68. Weifeng Xu and Dianxiang Xu. State-Based Testing of Integration Aspects. Second Workshop on Testing of Aspect-Oriented Programs (WTAOP06). In conjunction with ISSTA06, July 2006, USA. ACM Press.
  69. Josh Pauli and Dianxiang Xu. Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems. Proc. of the 18th International Conference on Software Engineering and Knowledge Engineering (SEKE’06), CA., USA, July 2006.
  70. Dianxiang Xu and Weifeng Xu. State-Based Incremental Testing of Aspect-Oriented Programs. Proc. of the 5th International Conference on Aspect-Oriented Software Development (AOSD06), pp. 180-189, March 20-24, 2006. Bonn, Germany. (Slides)
  71. Dianxiang Xu and Kendall Nygard. A Threat-Driven Approach to Modeling and Verifying Secure Software. Proc. of the 2005 IEEE/ACM International Conference on Automated Software Engineering (ASE’05), pp. 342-346, November 7-11, 2005. California, USA.
  72. Dianxiang Xu, Weifeng Xu, and Kendall Nygard. A State-Based Approach to Testing Aspect-Oriented Programs. Proc. of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE’05), pp. 366-371, July 14-16, Taiwan.
  73. Junhua Ding, Dianxiang Xu, Yi Deng, Peter J. Clarke, Xudong He. Design an Interoperable Mobile Agent System Based on Predicate Transition Net Models. Proc. of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE’05), pp. 560-565, July 14-16, Taiwan.
  74. Josh Pauli and Dianxiang Xu. Threat-Driven Architectural Design of Secure Information Systems. Proc. of the 7th International Conference on Enterprise Information Systems (ICEIS05), pp. 136-143. Miami, May 2005.
  75. Josh Pauli and Dianxiang Xu. Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study. Proc. of the 3rd International Workshop on Modeling, Simulation, Verification and Validation of Enterprise Information Systems (MSVVEIS’05), pp. 89-95, Miami, May 2005. INSTICC Press.
  76. Wujun Li, Chongjun Wang, Dianxiang Xu, Bin Luo, and Zhaoqian Chen. A Study on Illumination Invariant Face Recognition Methods Based on Multiple Eigenspaces. Proc. of the Second International Symposium on Neural Networks (ISNN’05), China, May 2005. LNCS 3497, Springer-Verlag.
  77. Dianxiang Xu and Vivek Goel. An Aspect-Oriented Approach to Mobile Agent Access Control. Proc. of the International Conference on Information Technology: Coding and Computing (ITCC’05), Vol. I, pp. 668-673. IEEE Computer Society, April 2005.
  78. Josh Pauli and Dianxiang Xu. Misuse Case-Based Design and Analysis of Secure Software Architecture. Proc. of the International Conference on Information Technology: Coding and Computing (ITCC’05), Vol. II, pp. 398-403, IEEE Computer Society, April 2005.
  79. Weifeng Xu and Dianxiang Xu. A Model-Based Approach to Test Generation for Aspect-Oriented Programs. First Workshop on Testing Aspect-Oriented Programs (WTAOP’05). In conjunction with AOSD’05, Chicago, March 2005.
  80. Wujun Li, Chongjun Wang, Dianxiang Xu, and Shifu Chen. Illumination Invariant Face Recognition Based on Neural Network Ensemble. Proc. of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI04), pp.486-490, IEEE Computer Society, Nov. 2004.
  81. Dianxiang Xu, Priti Borse, Ken Grigsby, and Kendall. E. Nygard. A Petri Net Based Software Architecture for UAV Simulation. Proc. of the  International Conference on Software Engineering Research and Practice (SERP04), pp. 227-232, June 2004.
  82. Dianxiang Xu, Richard A. Volz, and Michael S. Miller, and Jesse Plymale. Human-Agent Teamwork for Distributed Team Training, Proc. of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI03), pp. 602-607, IEEE Computer Society, Sacramento, Nov. 2003.
  83. Sen Cao, Richard. A. Volz, Jamison Johnson, Maitreyi Nanjanath, Jonathan Whetzel, and Dianxiang Xu, Development of a Distributed Multi-Player Computer Game for Scientific Experiment of Team-Training Protocols, Proc. of the 2nd International Conference on Application and Development of Computer Games (ADCOG’03), Hong Kong, January 2003.
  84. Dianxiang Xu, Richard A. Volz, Thomas R. Ioerger, and John Yen,  Modeling and Verifying Multi-Agent Behaviors Using Predicate/Transition Nets, Proc. of the 14th International Conference on Software Engineering and Knowledge Engineering (SEKE’02), pp.193-200, Italy, July 2002.
  85. John Yen, Jianwen Yin, Thomas R. Ioerger, Michael S. Miller, Dianxiang Xu, and Richard A. Volz, CAST: Collaborative Agents for Simulating Teamwork, Proc. of the 17th International Joint Conference on Artificial Intelligence (IJCAI ’01), pp. 1135-1142, Seattle, August 2001.
  86. Dianxiang Xu and Yi Deng, Modeling Mobile Agent Systems with High Level Petri Nets, Proc. of the IEEE International Conference on Systems, Man, and Cybernetics (SMC’00), pp. 3177-3182, Nashville, October 2000.

Book Chapters

  1. Omar El Ariss and Dianxiang Xu. System Modeling with UML State Machines. Handbook on Finite State Based Models and Applications, J. Wang et al. (Eds.), CRC Press, 2012.
  2. Dianxiang Xu, Software Security, Wiley Encyclopedia of Computer Science and Engineering, B. W. Wah (Editor-In-Chief), Volume 5, pages 2703-2716, John Wiley & Sons, Inc., Hoboken, NJ, January 2009.