Publications

Journal Publications
  • Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun.
    “Locating Need-to-Externalize Constant Strings for Software Internationalization with Generalized String Taint Analysis”,
    IEEE Transactions on Software Engineering (To Appear)
  • Ram Krishnan, Jianwei Niu, Ravi Sandhu, and William H. Winsborough.
    “Group-Centric Secure Information Sharing Models for Isolated Groups”,
    ACM Transactions on Information and System security, vol.14, no.3,
    pages 23:1-23:29, November 2011.
    (pdf)
  • Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, and Jianwei Niu.
    “Deconstructing the Semantics of Big-Step Modeling Languages”,
    Requirements Engineering Journal 15(2) ,
    pages 235-265, April 2010.
    (pdf)
  • Jianwei Niu, Joanne M. Atlee, and Nancy A. Day.
    “Template Semantics for Model-Based Notations”,
    IEEE Transactions on Software Engineering,
    vol. 29, no.10, pages 866-882, October 2003.
    (pdf)

    Book Chapters
  • Mark Robinson, Hui Shen, and Jianwei Niu.
    “High Assurance BPEL Process Models”, Book Chapter in
    High Assurance Services Computing,
    pages 219–240 (Chapter 11), Springer, 2009.
    (pdf)

    Refereed Conference and Workshop Publications
  • Rocky Slavin, Jean-Michel Lehker, Jianwei Niu, and Travis D. Breaux. “Managing Security Requirements Patterns using Feature Diagram Hierarchies”, The 22nd IEEE International Requirements Engineering Conference (RE), 2014.
    (pdf)
  • Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song.
    “NetworkProfiler: Towards Automatic Fingerprinting of Android Apps”,
    The 32nd IEEE International Conference on Computer Communications (INFOCOM) (To Appear)
    (pdf)
  • Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne,
    Jared Bennatttt, Anupam Datta, and Limin Jia. ” Privacy Promises
    That Can Be Kept: A Policy Analysis Method with Application to the
    HIPAA Privacy Rule”, Proceedings of the 18th ACM SIGSAC
    Symposium on Access Control Models and Technologies
    (SACMAT)
    , pages 3–14, June 2013.
    (pdf)
  • Xiaoyin Wang, Lu Zhang, Tao Xie, Yingfei Xiong, Hong Mei.
    “Automating Presentation Changes in Dynamic Web Applications via Collaborative Hybrid Analysis”,
    The 20th ACM SIGSOFT Symposium on Foundations of Software Engineering (FSE), page 16:1-16:11, November 2012.
    (pdf)
  • Kevin Baldor and Jianwei Niu. “Monitoring
    Dense-Time, Continuous-Semantics, Metric Temporal
    Logic”, Lecture Notes in Computer Science Vol. 7687,
    Proceedings of the 3rd International Conference on
    Runtime Verification (RV)
    , pages 245–259, September 2012, Turkey.
  • Rocky Slavin, Hui Shen, and Jianwei Niu.
    “Characterizations and Boundaries of Security
    Requirements Patterns”, Second International
    Workshop on Requirements Patterns (RePa)
    , 6 pages,
    September 2012, Chicago.
  • Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Eric Lan, Hong Mei.
    “Can I Clone This Piece of Code Here?”,
    The 27th IEEE/ACM Conference on Automated Software Engineering (ASE) , page 170-179, September 2012.
    (pdf)
  • Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui
    Li, and Elisa Bertino. “On XACML’s Adequacy to Specify
    and to Enforce HIPAA”, Proceedings of the 3rd
    USENIX Workshop on Health Security and Privacy
    (HealthSec)
    , 10 pages, August 2012, Seattle.
    (pdf)
  • Hui Shen, Mark Robinson, and Jianwei Niu. “Formal
    Analysis of Sequence Diagram with Combined Fragments”,
    Proceedings of the 7th International Conference
    on Software Paradigm Trends (ICSOFT)
    , pages 44–54,
    July 2012, Italy.
    (pdf)
  • Omar Chowdhury, Murillo Pontual, William H.
    Winsborough, Ting Yu, Keith Irwin, and Jianwei Niu.
    “Ensuring Authorization Privileges for Cascading User
    Obligations”, Proceedings of the 17th ACM SIGSAC
    Symposium on Access Control Models and Technologies
    (SACMAT)
    , pages 33–44, June 2012. (Best Paper Award)
    (pdf)
  • Sichen Meng, Xiaoyin Wang, Lu Zhang, Hong Mei.
    “A History-Based Matching Approach to Identification of Framework Evolution”,
    The 34th International Conference on Software Engineering (ICSE), page 353-363, June 2012 .
    (pdf)
  • Chengnian Sun, David Lo, Xiaoyin Wang, Jing Jiang, Siau-Cheng Khoo.
    “A discriminative model approach for accurate duplicate bug report retrieval”,
    The 32nd International Conference on Software Engineering (ICSE), page 45-54, May 2010.
    (pdf)
  • Wanying Zhao, Jianwei Niu, and William H. Winsborough.
    “Refinement-Based Design of a Group-Centric Secure Information Sharing Model”,
    Proceedings of the 2nd ACM SIGSAC Conference on Data and
    Application Security and Privacy (CODASPY)
    , pages 149–156, February 2012.
    (pdf)
  • Mark Robinson, Jianwei Niu, and Macneil Shonle.
    “GitBAC: Flexible Access Control for Non-Modular Concerns”,
    Proceedings of the 26th IEEE/ACM International
    Conference on Automated Software Engineering (ASE)
    ,
    pages 500-503, November 2011.
    (pdf)
  • Qing Yi, Jianwei Niu, and Anitha R. Marneri.
    “Collective Specification and Verification of Behavior Models and Object-Oriented Implementations”,
    Proceedinds of the 6th International Conference on Software and Data
    Engineering (ICSOFT)
    ,
    pages 15-24, July 2011.
    (pdf)
  • Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu Sun.
    “Locating Need-to-Translate Constant Strings in Web Applications”,
    The 18th ACM SIGSOFT Symposium on Foundations of Software Engineering (FSE), page 87-96, November 2010.
    (pdf)
  • Ravi Sandhu, Ram Krishnan, Jianwei Niu, and William H. Winsborough.
    “Group-Centric Models for Secure and Agile Information Sharing”,
    Proceedings of the 5th IEEE International Conference on Mathematical
    Methods, Models, and Architectures for Computer Network Security (MMM-ACNS),
    Lecture Notes in Computer Science, series 6258
    ,
    pages 55-69, September 2010.
    (pdf)
  • Xiaoyin Wang, David Lo, Jiefeng Cheng, Lu Zhang, Hong Mei, Jeffery Xu Yu.
    “Matching dependence-related queries in the system dependence graph”,
    The 25th IEEE/ACM Conference on Automated Software Engineering (ASE), page 457-466, September 2010 .
    (pdf)
  • Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough.
    “Towards a Framework for Group-Based Secure Collaboration”,
    Proceedings of the 5th IEEE International Conference on Collaborative
    Computing: Networking, Applications and Worksharing (CollaborateCom)
    ,
    November 2009.
    (pdf)
  • Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, and Jianwei Niu.
    “Semantic Criteria for Choosing a Language for Big-Step Models”,
    Proceedings of the 17th IEEE International Requirements Engineering
    Conference (RE)
    ,
    September 2009.
    (pdf)
  • Xiaoyin Wang, David Lo, Jing Jiang, Lu Zhang, Hong Mei.
    “Extracting Paraphrases of Technical Terms from Noisy Parallel Software Corpora”,
    The 2009 Annual Meeting of Association of Computational Linguistics (ACL-IJCNLP), page 197-200, August 2009 .
    (pdf)
  • Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xifeng Yan.
    “Identifying Bug Signatures Using Discriminative Graph Mining”,
    The 2009 International Symposium on Software Testing and Analysis (ISSTA), page 141-152, July 2009.
    (pdf)
  • Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough.
    “Foundations for Group-Centric Secure Information Sharing Models”,
    Proceedings of the 14th ACM SIGSAC Symposium on Access Control Models
    and Technologies (SACMAT)
    ,
    pages 115-124, June 2009.
    (pdf)
  • Mark Reith, Jianwei Niu, and William H. Winsborough.
    “Towards Practical Analysis for Trust Management Policy”,
    Proceedings of the 4th ACM SIGSAC Symposium on Information, Computer
    and Communications Security (ASIACCS)
    ,
    pages, 310-321, March 2009.
    (pdf)
  • Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough.
    “A Conceptual Framework for Group-Centric Secure Information Sharing”,
    Proceedings of the 4th ACM SIGSAC Symposium on Information, Computer
    and Communications Security (ASIACCS)
    ,
    pages 384-387, March 2009.
    (pdf)
  • Hui Shen, Aliya Virani, and Jianwei Niu.
    “Formalizing UML2 Sequence Diagrams”,
    Proceedings of the 11th IEEE High Assurance Systems Engineering
    Symposium (HASE)
    ,
    pages 437-440, December 2008.
    (pdf)
  • Ram Krishnan, Jianwei Niu, Ravi Sandhu, and William H. Winsborough.
    “Stale-Safe Security Properties for Group-Based Secure Information Sharing”,
    Proceedings of the 6th ACM Workshop on Formal Methods in Security
    Engineering (FMSE)
    co-located with the ACM Conference on Computer
    and Communications Security (CCS),
    pages 53-62, October 2008.
    (pdf)
  • T. Finin, A. Joshi, L. Kagal, Jianwei Niu, R. Sandhu, W. Winsborough,
    and B. Thuraisingham.
    “ROWLBAC – Representing Role Based Access Control in OWL”,
    Proceedings of the 13th ACM symposium on Access Control Models
    and Technologies (SACMAT)
    ,
    pages 73-82, June 2008.
    (pdf)
  • Mark Reith, Jianwei Niu, and William H. Winsborough.
    “Role-Based Trust Management Security Policy Analysis and Correction
    Environment (RT-SPACE)”,
    Proceedings of the 30th ACM/IEEE International Conference on Software
    Engineering (ICSE) Research Demonstration
    , pages 929-930, May 2008.
    (pdf)
  • Xiaoyin Wang, Lu Zhang, Tao Xie, John Anvik, Jiasu Sun.
    “An Approach to Detecting Duplicate Bug Reports Using Natural Language and Execution Information”
    The 30th International Conference on Software Engineering (ICSE), page 461-470, May 2008.
    (pdf)
  • Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu,
    Ravi Sandhu, William H. Winsborough, and Bhavani Thuraisingham.
    “Role Based Access Control and OWL”,
    Proceedings of the fourth International Workshop in The OWL:
    Experiences and Directions (OWLED)
    , 12 pages, April 2008.
    (pdf)
  • Mark Reith, Jianwei Niu, and William H. Winsborough.
    “Engineering Trust Management into Software Models”,
    Proceedings of ICSE Workshop on Modeling in Software Engineering
    (MISE07)
    ,
    6 pages, May 2007.
    (pdf)
  • Mark Reith, Jianwei Niu, William H. Winsborough.
    “Apply Model Checking to Security Analysis in Trust Management”,
    Proceedings of the ICDE Workshop SECOBAP,
    10 pages, April 2007.
    (pdf)
  • Yun Lu, Joanne M. Atlee, Nancy A. Day, and Jianwei Niu.
    “Mapping Template Semantics to SMV”,
    Proceedings of the 19th IEEE International Conference on Automated
    Software Engineering (ASE)
    ,
    pages 320-325, September 2004.
    (pdf)
  • Jianwei Niu, Joanne M. Atlee, and Nancy A. Day.
    “Comparing and Understanding Model-Based Specification Notations”,
    Proceedings of the 11th IEEE International Requirements Engineering
    Conference(RE)
    ,
    pages 188-199, September 2003.
    (pdf)
  • Jianwei Niu.
    “A Semantics-Based Approach for Mapping Specification Notations to Analysis
    Tools” (abstract),
    Proceedings of the IEEE International Conference on Software Engineering
    (ICSE) Doctoral Symposium
    ,
    page 762, May 2003.
    (pdf)
  • Jianwei Niu, Joanne M. Atlee, and Nancy A. Day.
    “Composable Semantics for Model-Based Notations”,
    Proceedings of the 10th ACM SIGSOFT International Symposium on the
    Foundations of Software Engineering (FSE)
    ,
    pages 149-158, November 2002.
    (pdf)