Juan Jenny Li, Ph.D.

     Office of Advanced Cyberinfrastructure                                                       Office:  (703)292-2625

     National Science Foundation                                                                         Fax:  (703)292-9060

     2415 Eisenhower Avenue                                                                               Email:   jjli@nsf.gov 

     Alexandria, Virginia 22314                     https://scholar.google.com/citations?user=KX0EE1MAAAAJ

Experience:

National Science Foundation (NSF)                                                                       Alexandria, VA

Program Director, Office of Advanced Cyberinfrastructure (OAC)        January 2022 – Present

Expert, Office of Advanced Cyberinfrastructure                         September 2021 – January 2022

    Directorate for Computer and Information Science and Engineering (CISE) programs: CAREER,    CORE,             
  CyberTraining, CRII, and other programs in Learning and Workforce Development (LWD)

 

           Kean University, Department of Computer Science                                                  Union, NJ

            Full Professor of Computer Science                                                                   September 2013 – Present

            Teaching courses:         Introduction to CS, Data Structure and Algorithms, Artificial Intelligence,
                                      Machine Learning, Algorithmic Thinking, Computer Systems and Web Programming/Security.

            Research interests: Artificial Intelligence and Machine Learning and their applications, e.g.Security.

 

Google Research                                                                                                 Mountain View, CA

Faculty in Residence Program                                                                                       June 2021

AI and Machine Learning Research and Education

 

Avaya Labs (formerly part of Bell Labs)                                                   Basking Ridge, NJ

Lead Computer Research Scientist                                                           January 2001 - June 2013

      Inventor, technical lead, architect, and primary developer of the following projects:

·         Researched Machine Learning solutions to evaluate the capacity and performance of an emergency notification service. Supervised a team on the trial of the solution to multi-modal channels, including land phones, wireless, IM, SMS, video, and conferencing, an enterprise network failure detection and restoration server. (Currently, continuing the research with Google/Facebook)

·         Conducted research on automated diagnosis and trouble-shooting technology for Avaya communication manager and contact center installation on Cox Communication networks. Invented, designed, and implemented a SoftWare IMmunization (SWIM) technology for static and dynamic code analysis of both C/C++ and Java bytecode to automatically detect and prevent bugs and security intrusions.

·         Led a multinational team of 20 developers for full-lifecycle software development of a product line for automatic software testing tools that prioritize code for testing, generate automatic tests, and analyze the results on Windows, Linux, VxWorks, and iOS. An over 200Kloc implementation of my invention (eXVantage/PolyFlow) is available on an open-source website.

Bellcore (formerly Telcordia, now Applied Communication Science)                     Morristown, NJ

Software Research Scientist                                                            February 1996 - December 2000

      Creator and lead developer of the following prototypes/products:

·         Invented and implemented a software engineering tool xSuds-SDL for visualization and analysis of system specification in SDL. Created a tool (flow2SDL) for extracting design models from workflows and a simulation tool for dynamic system design analysis of reliability and performance.

 

      New Jersey Institute of Technology (NJIT)                                                                     Newark, NJ

Adjunct Professor                                                                     September 1997 - December 1999
Courses taught: Client-Server Computing (09/99—12/99), Data Communication (05/97—08/97), and Object-Oriented Software Engineering (09/97—12/97).

Awards and Honors:

PI of NSF Award Number: 2208802

      IPA Agreement with Kean University 1st and 2nd Year: (~$164,343.00/year) (2022-2024)

Co-PI of NSF DUE-2129795 ($1,641,645)                                                            (2021-2026)

Applying Student Knowledge for Success in Cybersecurity and Data Science

ASEE CISE-MSI mini-grant ($7,000)                                                                    (2021-2022)

CURM mini-grant ($5,250)                                                                                    (2021-2022)

Co-PI of NSF HRD-1928452 ($1,684,277)                                                         (2019-2024)

Pathway to Success for Students and Faculty in Computing

Google exploreCSR research grant (15K + 24K)                                                  (2020-2022)

Google AI Machine Learning Research Grant ($8K)                                            (2019-2021)

US National Undergraduate Research Mentoring Award 2018 ($5K)                  (May 2018)

NCWIT AspirationInIT award ($1.5K+$1.735K)                                                 (Summer 2018)

NCWIT AspirationInComputing outreach fund award ($8.1K*2+$7K)              (Spring 2018-20)

CRA-W Distinguished Lecture ($3.5K to support 2 speakers)                       (Spring 2018)

Google CS4HS award ($12K)                                                                                (Summer 2018)

Google CS4HS Ambassador                                                                              (Summer 2017)

NCWIT Outreach ($5.1K), Affiliate and ACM-W Seed funds ($3K)                   (2017 -- 2018)

NJ Tech Council Selected Presenter Award (Sole undergraduate winner)            (June 2017)

Google CS4HS award ($18K)                                                                                (2016 -- 2017)

BJC CSP Cohort facilitator (NSF#1346922)                                                           (2016 -- 2019)                                          

Mobile CSP Cohort (~$60K funded by Google&NSF#1240841&#1440947)      (2016 -- 2018)

Posters on the Hill (Sole winner of New Jersey State)                                          (April 2016)

Google CS Engagement Award ($5K, Sole winner of New Jersey State)            (Jan 2015)

Co-PI of NSF DUE S-STEM Grant #1355582 (co-PI: Li)                                  (2014-2019)

In March 2014, Kean University was awarded $621,925 for a 5-year program to recruit and support 40 S-STEM scholars for 2 years (4 semesters).  My role includes identification and mentoring of candidates, and serving as a Research Mentor and Faculty Advisor to students.

Total external grant awarded for Kean: $ 4,808,500

Kean University Summer Research Fellowship Program                                      (2021)

Kean University McNair Research Grant                                                              (2018-2020)

Kean University StemPact Research Grant                                                            (2017-2021)

Kean University Quality First Initiative (QFI) Grant                                             (October 2017)

Kean Student Partner with Faculty research award (SpF)                              (2015-2021)

               A Chatterbot and an AI tutor

               Fuzzy Logic Enhancement to Decision Tree Machine Learning                    

         Automatic Posting Readers                                                                       

         Wireless Security Attack Detection (WSAD)                                         

         Notification Service Attack Detection and Shielding -- Mobile Devices

Kean Faculty Research Initiative Award (UFRI)                                          (2014-2017)

         Investigation of Machine Learning Models for Social Media and Social Networks 

         Machine Learning for Chatters Supporting Multiple Languages

         Software Product Line Engineering (SPLE) for Developing

                                 Large Complex Software Efficiently and Reliably

Avaya Inventor quarterly awards                                                                      (2002-2012)

Bellcore Rising-Star employee award                                                                   2000

Canadian NSERC (NSF) Graduate Scholarship ($32K)                                        (1991-1995)

Education:

     University of Waterloo,                                                                            Waterloo Ontario, Canada
Ph.D. in Electrical Engineering (Software), 1996. GPA 3.9 (out of 4.0).
Dissertation: A Real-Time Software Supervision Approach for Automatic Failure Detection.

     Dalhousie University (formerly Technical University of Nova Scotia, TUNS),     Halifax NS, Canada
B.S. 1991 with distinction, major: Computer Science, minor: Industrial/System Engineering. GPA in Computer Science: 3.8 (out of 4.0).

US Patents:

1)      System and method to improve the resiliency and performance of enterprise networks by utilizing in-built network redundancy. Avaya Technology March 2007: US 07188189 (20 worldwide citation)

2)      System and method for notification of internet users about faults detected on an IP network. Avaya December 2008: US 07463652 (4 worldwide citation)

3)      Rapid fault detection and recovery for internet protocol telephony. Avaya August 2010: US 07782787 (3 worldwide citation)

4)      Method and apparatus for secure wireless delivery of converged services. Avaya Technology March 2008: US 07346168 (3 worldwide citation)

5)      Secure interaction between a mobile client device and an enterprise application in a communication system. Avaya April 2011: US 07925717 (3 worldwide citation)

6)      Program structure recovery, Avaya October 2012: US 08291399 (1 worldwide citation)

7)      Code-coverage guided prioritized test generation. Avaya January 2012: US 08108826 (2 worldwide citation)

8)      Efficient encoding of instrumented data in real-time concurrent systems. Avaya January 2013: US 08356289 (1 worldwide citation)

9)      Efficient program instrumentation. Avaya August 2013: US 08484623

10)  Secure interaction between a mobile client device and an enterprise application in a communication system. June 2004:US 20040122907-A1

11)  Web services and session initiation protocol endpoint for converged communication over internet protocol networks. US8799478

12)  Code-coverage guided prioritized test generation. Avaya Technology March 2006: US 20060070048-A1

13)  Linking Software Users Sharing Common Traits. Avaya November 2010: US 20100287109-A1

14)   Automatic Generation of Run-Time Instrumenter. Avaya Technology October 2009: US 8752007

15)   Program structure recovery using multiple languages. Avaya December 2011: US 20110302563-A1

16)  System and Method for Software Immunization (SWIM) based on Static and Dynamic Analysis,  Granted Dec 31, 2013: US 8621441

17)  Super Nested Block Method to Minimize Coverage Testing Overhead. Granted May 27, 2014: US 8739145

18)  Capacity Evaluation of Multi-Factor Systems Using Escalation Analysis, Jan 2014: US20120167060

Publications (from Fall 2017):

Book Chapters:

[1]               Tellez, N., Serra, J., Kumar, Y., Li, J. J., and Morreale, P., “Gauging Biases in Deep Learning and Various AI Models”, Springer Lecture Series on Advances in Intelligent Systems, October 2022.

[2]               Li, J. J., Silva, T., and et al., “Evaluating Deep Learning Biases Based on Grey-Box Testing Results”, Springer Lecture Series on Advances in Intelligent Systems and Computing, Sept 2020.

Journal Articles:

[3]               Kumar, Y., Morreale P, Sorial P, Delgado J, Li, J. J., Martins P. A Testing Framework for AI Linguistic Systems (testFAILS). Electronics Journal. 2023; 12(14):3095.

[4]               Li, J. J., Bai, X., and Ulrich, A., editorial remarks of a special issue on “Test Automation for and with AI”, Springer Software Quality Journal, March 2020. 

[5]               Li, J. J., Honutse, V., and Morejon, L., “Convolutional Neural Networks for Molecular Structure Recognition”, UCC Research Journal, Jan 2020, pp. 10-16.

[6]               Compion, S., Croft, P., Li, J. J., Ngoy, K. and Qi, F. (alphabetic order), “Tweet Semantic Classification in Civic Engagement Research”, International Journal on Machine Learning and Computing, Vol.8(6), Jan 2019, pp. 595-599.

[7]               Li, J. J., Ting, I-Hsien, Perez, C., "Guest editorial", Information Discovery and Delivery, Vol. 45 Issue: 3, pp.109-109, Oct 2017.

[8]               Li, J. J. and Liou J-C., “An experiment of hit-and-run wireless attacks”, Int. J. Information Privacy, Security and Integrity, September 2017, pp. 58-74.

[9]               Li, J. J. and Savor, T., “Automatic detection of DDoS attacks to notification services”, Int. J. Information Privacy, Security and Integrity, September 2017, pp1-17.

[10]           Cabrera, K., Morreale P., and Li, J. J., “Computer Science Education: An Assessment of CS Professional Development”, Journal of Computing Sciences in Colleges, July 2017, pp 141-147.

[11]           Li, J. J. and S. Ghosh, “Special Issue on Program Debugging Editorial”, Software Quality Journal, Springer, March 2017, pp 3-5.

[12]           Li, J. J., Rossikova, Y., and et al., “Natural Language Translator Correctness Prediction“, Journal of Computer Science Applications and Information Technology, published by Symbiosis Group, ISSN Number: 2474-9257, Jan 2017.

Conference Proceeding:

[13]           E. Kupershtein, Y. Kumar, A. Manikandan, P. Morreale, and Li, J. J., (2023) ChatGPT: A Game-Changer for Embedding Emojis in Faculty Feedback. In proceeding of the 19th International Conference on Frontiers in Education: Computer Science & Computer Engineering (FECS 2023, presented, in press).

[14]           Y. Kumar, Z. Gordon, P. Morreale, Li, J. J., B. Hannon. (2023) Love the Way You Lie: Unmasking the Deceptions of LLMs. (QRS 2023, presented, in press)

[15]           Y. Kumar, P. Morreale, P. Sorial, J. Delgado, Li, J. J., and P. Martins, "A Testing Framework for AI Linguistic Systems (testFAILS)," 2023 IEEE International Conference On Artificial Intelligence Testing (AITest), Athens, Greece, 2023, pp. 51-54, doi: 10.1109/AITest58265.2023.00017, https://ieeexplore.ieee.org/document/10229447.

[16]           B. Hannon, Y. Kumar, P. Sorial, Li, J. J., and P. Morreale (2023) From Vulnerabilities to Improvements: A Deep Dive into Adversarial Testing of AI Models. In proceedings of the 21st International Conference on Software Engineering Research & Practice (SERP 2023).

[17]           A. Balcacer, B. Hannon, Y.Kumar, K. Huang, J. Sarnoski, S. Liu, Li, J. J., P. Morreale (2023) Mechanics of a Drone-Based System for Algal Bloom Detection Utilizing Deep Learning and LLMs (URTC 2023).

[18]           Abduljabbar, A., Gupta, N., Healy, L., Kumar, Y., Li, J. J., and Morreale, P., "A Self-Served AI Tutor for Growth Mindset Teaching," 2022 5th International Conference on Information and Computer Technologies (ICICT), 2022, pp. 55-59, doi: 10.1109/ICICT55905.2022.00018.

[19]           Tellez, N., Li, J. J., et al., "An Assure AI Bot (AAAI bot)," 2022 International Symposium on Networks, Computers and Communications (ISNCC), 2022, pp. 1-5, doi: 10.1109/ISNCC55209.2022.9851759.

[20]           Serra, J., Fortes, S., Allaico, A., Landaverde, E., Quezada, R., Kumar, Y., Li, J. J., and Morreale, P, “Validation of AI models for ITCZ Detection from Climate Data”, In the Proceedings of International Conference on Data Science and Information Technology (DSIT 2022, July 2022).

[21]           Waldron, J., Serra, J., Abduljabbar, A., Kumar, Y., Morreale, P. and  Li, J. J., “Assessment of an Integrated Development Environment for Usability and Inclusion”, In Proceedings of International Conference on Data Analytics and Computing (ICDAC 2022, presented Aug 2022)

[22]           Waldron, J., Serra, J., Abduljabbar, A., Kumar, Y., Morreale, P., Li, J. J., and Kwak, D., “Assessment of the modern IDE through the prism of GenderMag”, In the Proceedings of International Conference  on Computer Science and Software Engineering (CSSE 2022, to appear Oct 2022)

[23]           Tellez, N., Serra, J., Kumar, Y., Li, J. J. and Morreale, P., “Introspective Analysis of AI/ML Architecture to Gauge and Mitigate biases”, NCUR 2022 (presented May 2022).

[24]           Abduljabbar, A., Gupta, N., Healy, L., Kumar, Y., Li, J. J., and Morreale, P., “Growth Mindset Educational Recommendation System”, NCUR 2022 (presented May 2022).

[25]           Tellez, N., Serra, J., Kumar, Y., Li, J. J., and Morreale, P., “An Assure AI Bot (AAAI bot)”, The 4th International Workshop onvBots in Software Engineering (BotSE 2022,  virtual,  presented May 9, 2022)

[26]           Healy, L., Kumar, Y. and Li, J. J., "AI Human Interface For Growth Mindset Tutor" [Online]. 2021.Proceedings of the First symposium of the CS department @WKU. Available: https://flbook.com.cn/c/YS6kQkTJ4q#page/12

[27]           Morreale, P., Li, J. J., and et al, “Evaluation of the Use of Growth Mindset in the Computer Science Classroom”, SIGCSE2022. Proceedings of the 53rd ACM Technical Symposium on Computer Science Education

[28]           Fortes, S., Kulesza, R. and Li, J. J., “A Case Study of Object Recognition from Drone Videos”, Proceeding of IEEE/ACM international conference on Information and Computer Technology, March 2021.

[29]           Kulesza, R., Li, J. J. and et. al., “Investigating Deep Learning for Predicting Multi-linguistic Interactions with a Chatterbot”, Proceeding of IEEE International Conference on Big Data and Analysis, Nov 2020.

[30]           Morreale, P., Li, J. J., and et al, “Framework for a Growth Mindset Classroom”, SIGCSE2020. Proceedings of the 51st ACM Technical Symposium on Computer Science Education.

[31]           Li, J. J., Kenny, P., and Krivoshik, P., “Autonomous Detector of Dangerous Situations”, HENAAC, Oct 2018.

[32]           Li, J. J., Krivoshik, P., Suvorov, A., Fortes, C. and Kenny, P., “LifeLine: A Device for Detecting Abnormal Patterns”, in the proceeding of International Conference on Pattern Recognition and Artificial Intelligence (PRAI), pp 76-81, Aug. 2018.

[33]           Jacobson, V., Li, J. J., Tapia, K. and Morreale, P., “Visualizing Neural Networks for Pattern Recognition”, in the proceeding of International Conference on Pattern Recognition and Artificial Intelligence (PRAI), pp 18-22, Aug. 2018.

[34]           Wang, Q. and Li, J. J., “Semantics Processing for Search Engines”, in the proceeding of International Conference on Pattern Recognition and Artificial Intelligence (PRAI), pp 124-126, Aug. 2018.

[35]           Copeland, C., Morreale, P. and Li, J. J., “M-Health Application Interface Design for Symptom Checking”, Proceedings of the 10th International Conference on e-Health 2018 (EH 2018), Madrid, Spain, July 17-19, 2018, pp. 210-214.

[36]           Li, J. J., Bai, X. and Ulrich, A., “Test Automation (TA) for and with Artificial Intelligence (AI)”, in the proceeding of ACM/IEEE ICSE, June 2018.

[37]           Acosta, M., Cabrera, K., Tonaco, E. and Li, J. J., “Endocus: Endeavor Focus Student Course Advisor”, in the proceeding of IEEE the MIT conference, Nov. 2017.

[38]           Cabrera, K., Suvorov, A. Li, J. J. and Ness, L., “Dyadic Product Formula Representations for Data Visualization”, in the proceeding of NYIT Cybersecurity conference, August 2017.

[39]           P. Krivoshik*, A. Suvorov*, C. Fortes*, and J. J. Li, “LifeLine-An Autonomous Live Saving Device”, presentation at NJ Tech council on “What is next in medical devices”, presenter award, Princeton University, June 2017.

Previous Publications (before Fall 2017):

[40]           Nelson, J., Li, J.J. and et al. “Social Engineering for Security Attacks”, MISNC2016, Kean University, published by ACM, Aug 2016.

[41]           Li, J. J., Chen, C., and et al. “Facebook Traffic Pattern Analytics”, MISNC2016, Kean University, published by ACM, Aug 2016.

[42]           Li, J. J. and Neto, F., “Clouds for Hit-and-Run Attacks”, invited paper for IEEE International Conference on Big Data Security on Cloud (BigDataSecurity2016), Columbia University, Apr 2016.

[43]           Rossikova, Y., Li, J. J., and et al.“Intelligent Data Mining for Translator Correctness Prediction”, IEEE international conference on Intelligent Data Systems (IDS) 2016, April 2016.

[44]           Li, J. J., Rossikova, Y., and Vega, B., “RN-Chatter: A Swift Way to Understanding”, CUR’s Posters on the Hill handbook, April 2016.

[45]           Li, J. J. and Morreale, P., “Enhancing CS1 Curriculum with Testing Concepts”, Journal of Computing Sciences in Colleges, by the Consortium for Computing Sciences in Colleges, Eastern Region (CCSC-EA), Oct 2015.

[46]           Li, J. J., Abbate, P., and Vega, B., “Detecting Security Threats Using Mobile Devices”, proceeding of the International Conference on Software Quality, Reliability and Security (QRS-C), Aug. 2015.

[47]           Rossikova, Y., Li, J. J., and Morreale, P., “Predicting Google Translator Correctness”, WorldComp2015, proceeding of International Conference on Artificial Intelligence, July 2015.

[48]           Morreale, P., Li, J. J., McAllister, J., Mishra. S., and Dowluri, T., “Mobile Persuasive Design for HEMS Adaptation”, Proc. of the 5th International Conf. on Sustainable Energy Information Technology (SEIT), Procedia Computer Science, Elsevier, Vol. 52, pp.764-771, July 2015.

[49]           Li, J. J., Vachhani. R. , and et al. "Data Analytic to Predict Notification System Performance ", presented to Grace Hopper Celebration (GHC) Oct 2014.

[50]           Li, J. J. and Savor, T., “Detecting DoS Attacks on Notification Services,” proceeding of the 8th International Conference on Software Security and Reliability (SERE-C), July 2014, pp. 64-70.

[51]           Li, J.J. and Morreale, P., “Diagnosis-Guided Regression Test Refinement,” proceeding of the 8th International Conference on Software Security and Reliability (SERE-C), July 2014, pp.192-198.

[52]           Li, J. J. and Morreale, P., “Enhancing Computer Science Programming Courses to Prepare Students for Software Engineering,” proceeding of International Annual Conference on Software Engineering Education by ASEE,  June 2014.

[53]           Li, J. J., Heer, D., and et al., “An Evaluation Comparing Product Line Feature Model and Decision Model,” proceeding of the 9th International Conference on Evaluation of Novel Approaches to Software Engineering, March 2014.

[54]           Bertolino, A., Foster, H., Li, J. J., and Zhu, H., “Special section on automation of software test”, The Journal of System and Software (JSS), pp. 1977-2220, editorial Volume 86, Issue 8, Dec. 2013.

[55]           Li, J. J., Yang, Q., and Weiss, D. M., “Software Testing Tools,” a book chapter in Software Engineering Encyclopedia, Sept 2010.

[56]           Li, J. J., “Use of Visualization to Aid Redesign and Testing,” a book chapter in Software Visualization – From Theory to Practice, Kluwer Academic Publishers 2003

[57]           Li, J. J., “Using Testing Trace for Automatic User Categorization” (extended journal version), IET Software journal, Aug. 2009.

[58]           Li, J. J., “An Automatically-Generated Run-Time Instrumenter to Reduce Coverage Testing Overhead”, Journal of Software Technology May 2008.

[59]           Li, J. J., and Weiss, D. M., “A Survey of Coverage Based Testing Tools” (extended journal version), The Computer Journal, Dec 2006.

[60]           Li, J. J., Yee, H. and Weiss, D. M., “Code-Coverage Guided Prioritized Test Generation,” Information and Software Technology Journal, March 2006.

[61]           Li, J. J., Krishnan, P. and Karol, P., “VoIP Protection and Performance Improvement,” Communication Systems journal, 2004.

[62]           Li, J. J. and Wong, E., “Redesigning Legacy Systems into the Object-Oriented Paradigm,” Software Engineering and Knowledge Engineering (SEKE) journal, 2004.

[63]           Li, J. J., “Coverage Testing Software Design in SDL,” Journal of Computer Networks, Elsevier, 2003.

[64]           Li, J. J., “A scalable tool for protocol testing and validation”, Journal of Computer Communication, Elsevier, Dec 2002.

[65]           Li, J. J., and Horgan, J. R., “Applying Formal Description Technique to Software Architecture”, Journal of Computer Communication, Elsevier, July 2000.

[66]           Li, J. J., and Horgan, J. R., “A Toolsuite for Testing Software Architectural Specification”, Software Quality Journal, vol. 8, no. 4, June 2000.

[67]           Li, J. J., and Horgan, J. R., “A Tool for Software Performance Profiling”, Lecture Notes in Computer Science, no. 1786, Springer, March 2000.

[68]           Agrawal, H; Alberi, J.; Horgan, J. R.; Li, J. J.; et al., “Mining System Tests to Aid Software Maintenance”, IEEE Computer, July 1998.

[69]           Li, J. J., Mallows, C., and Landwehr, J., “Capacity Evaluation of Multi-Modal Network Notification Service”, Proc. of IEEE COMPSAC2012, July 2012.

[70]           Devine, T. R., Goseva, K. Krishnan, S., Lutz, R. R. and Li, J. J.,“An empirical study of pre-release software faults in an industrial product line”, Proc. of IEEE ICST2012, April. 2012.

[71]           Li, J. J., Palframan, J. and Landwehr, J., “SoftWare IMmunization (SWIM) – A Combination of Static Analysis and Automatic Testing”, Proc. of IEEE COMPSAC2011, Aug. 2011.

[72]           Li, J. J., Palframan, J. and Landwehr, J., “Towards a common coverage testing tool for multiple programming languages”, Proc. of IEEE ISSRE2010, Nov. 2010.

[73]           Li, J. J., Palframan, J. and Landwehr, J., “A program structure recovery tool for various programming languages”, Proc. of IEEE COMPSAC 2010, July 2010.

[74]           Bertolino, A., Foster, H. and Li, J. J., “Automation of Software Test”, Proc. of IEEE ICSE2011-AST, co-chair editorial, May 2011.

[75]           Li, J. J., “Using Testing Trace for Automatic User Categorization”, Proc. of IEEE ICSE2009-AST, May 2009.

[76]           Li, J. J., Slye, H., Trung, D. and Weiss, D. M.,Decision-model-based Code Generation for PLE”, Proc. of IEEE SPLC2008, Sept 2008.

[77]           Li, J. J., Geppert, B.,  Roessler, F., and Trung, D.,Looking for more Confidence in Refactoring? How to Assess Adequacy of Your Refactoring Test”, Proc. of IEEE QSIC2008, July 2008.

[78]           Li, J. J., Weiss, D. M. and Slye, H.,Automatic Integration Test Generation for eXVantage Product Family”, Proc. of IEEE SPLC-SPLiT2007, Sept 2007.

[79]           Li, J. J., Geppert, B. and Roessler, F., “Reuse Trace to Reduce Software Product Line Testing”, Proc. of IEEE SPLC-SPLiT2007, Sept 2007.

[80]           Li, J. J., Weiss, D. M. and Wu, D., “Coverage-Based Testing on Embedded Systems”, Proc. of IEEE ICSE2007-AST, May 2007.

[81]           Li, J. J., Ma, X., and Weiss, D. M., “Prioritized Constraints with Data Sampling Scores for Automatic Test Data Generation”, Proc. of IEEE SNPD2007, March 2007.

[82]           Yang, Q., Li, J. J. and Weiss, D. M., “A Survey of Coverage Based Testing Tools”, Proc. of IEEE ICSE-AST2006, May 2006.

[83]           Li, J. J., “Prioritize Code for Testing to Improve Code Coverage of Complex Software”, Proc. of IEEE ISSRE2005, Nov 2005.

[84]           Li, J. J., Ma, X. and Weiss, D. M., “An Integrated Solution for Testing and Analyzing Java Applications in an Industrial Setting”, Proc. of IEEE  APSEC2005, Sept 2005.

[85]           Li, J. J., Yee, H. and Weiss, D. M., “A Study of Software Instrumentation Overhead in Coverage Testing”, Proc. of IEEE COMPSAC2005, July 2005)

[86]           Li, J. J., Yee, H. and Weiss, D. M., “A Constraint Solver for Automatic Test Generation”, Proc. of IEEE SEKE2005, March 2005.

[87]           Li, J. J., Yee, H. and Weiss, D. M., “Code-Coverage Guided Prioritized Test Generation”, Proc. of IEEE COMPSAC2004, Aug 2004.

[88]           Li, J. J., Krishnan, P. and Karol, P., “Using Overlay Networks to Improve VoIP Reliability”, Proc. of IEEE ATVA2004.

[89]           Li, J. J., Krishnan, P. and Karol, P., “Rapid Fault Detection and Recovery for IP Telephony”, Proc. of IEEE ICC2004, June 2004.

[90]           Li, J. J. and Wong, E., “Case Study of a Multimedia Wireless System”, Proc. of IEEE ICME2004.

[91]           Li, J. J., Chou, W. and Liu, F., “WSIP – Web Service SIP Endpoint for Converged Communication over IP” Proc. of IEEE ICWS2004.

[92]           Li, J. J., Chou, W. and Liu, F., “An Architecture of Wireless Web and Dialogue System Convergence for Multimodal Service Interaction Over Converged Networks” Proc. of IEEE COMPSAC2003, Nov 2003.

[93]           Li, J. J., Krishnan, P. and Karol, P., “VoIP Network Failure Detection and User Notification” Proc. of IEEE IC3N2003, Oct 2003.

[94]           Li, J. J., Krishnan, P. and Karol, M., “VoIP Protection and Performance Improvement”, Proc. of IEEE IC3N2003, Oct 2003.

[95]           Li, J. J., “An Adaptable Architecture for Secure Delivery of Converged Services,” ISADS’03, April 8-11, 2003.

[96]           Li, J. J., “Performance Evaluation of Predictive Handoff Scheme with Cellular Channel Borrowing,” IPCCC’03, April 9-11, 2003.

[97]           Li, J. J., Krishnan, P. and Karol, M., “enProtect: Enterprise-Based Network Protection and Performance Improvement” Proc. of IEEE ICC2003.

[98]           Li, J. J., Krishnan, P. and Karol, M., “Notification of VoIP Users About Transient Faults in Converged Networks”, Proc. of IEEE IC3N2002, Oct 2002.

[99]           Li, J. J. and et al., “An Architecture of Wireless Web and Dialogue System Convergence for Multimodal Service Interaction Over Converged Networks”, Proc. of IEEE IC3N2002, Oct 2002.

[100]       Li, J. J. and Xueshan Shan, “A Case Study of Dependable On-Line Upgrade”, Proc. of IEEE COMPSAC2002, Oxford, UK, Aug. 2002.

[101]       Li, J. J. and E. Wong, “Automatic test generation from CEFSM models”, Proc. of IEEE ISORC2002, Washington DC, May 2002.

[102]       Li, J. J and Xueshan Shan, “Real-time wireless network monitoring system”, Proc. of IEEE IC3N2001, Pheonix AZ, Oct. 2001.

[103]       Li, J. J., E. Wong and et al., “Automatic model construction for on-line simulation”, Proc. of IEEE IC3N2001, Pheonix AZ, Oct. 2001.

[104]       Li, J. J., “A Tool For Efficient Protocol Validation and Testing”, Proc. of IEEE International Conference of Computer Communication and Networking (IC3N2000), Oct 2000.

[105]       Li, J. J., and Mulcare, D., “Dependability of Complex Software Systems with Component Upgrading”, Proc. of COMPSAC2000, Oct 2000.

[106]       Li, J. J., and Horgan, J. R., “A Tool Suite for Diagnosis and Testing Software Design Specifications”, Proc. of Dependable Systems and Networks 2000 (FTCS31), June 2000.

[107]       Li, J. J., and Horgan, J. R., “Simulation-Trace-Based Software Component Performance Prediction”, Proc. 33rd Annual Simulation Symposium, April 2000.

[108]       Li, J. J., and Horgan, J. R., “Using SDL to Model an Object-Oriented Real-Time System”, Proc. of IEEE/OMG International Symposium of Object-Oriented Real-Time Computing (ISORC2000), March 2000.

[109]       Li, J. J., and Horgan, J. R., “A Supervision Approach for Reused Component Performance Modeling”, Proc. of IEEE IPCCC2000, Feb. 2000.

[110]       Li, J. J., and Horgan, J. R., “Applying Formal Description Technique to Software Architecture”, Proc. of Asian Pacific Software Engineering Conference (APSEC99), Nov. 1999

[111]       Li, J. J., and Segal, M., “Abstracting Security Specifications for Building Survivable Systems”, Proc. of 22nd National Information System Security Conference, Oct. 1999.

[112]       Li, J. J., “Performance Prediction Based on Semi-Formal Architecture Description”, Proc. of IEEE International Performance, Computer, Communication Conference, Feb. 98, Phoenix, AZ.

[113]       Li, J. J., “On-Line Simulation to Improve Fault-Tolerance”, Proc. of SCS International Conference on Computer Network and Distributed Systems, pp. 81-86, Jan. 1998, San Diego, CA.

[114]       Li, J. J., et al., “Reliability Prediction based on Software Architecture”, Proc. of ISSRE97, Nov. 1997.

[115]       Li, J. J., et al., “Interface Fault Injection to Measure Fault-Tolerance”, Proc. of First European Software Quality Week (QWE97), Nov. 1997.

[116]       Li, J. J.; Liu, H.; et al. “An Automated Protocol Testing Oracle”, Proc. of 1997 IEEE International Conference of Computer Communication Network (IC3N), Sept. 1997, Las Vagas, NV.

[117]       Li, J. J.; Micallef, J.; and Horgan, J. R., “Automatic Simulation from a Macro Software Architecture Description” Proc. 1997 Summer Computer Simulation Conference, May 1997.

[118]       Li, J. J., and Seviora, R. E., “Automatic Failure Detection with Conditional-Belief Supervisors”, Proc. of the 7th International Symposium on Software Reliability Engineering (ISSRE’96), pp. 4-13, Oct. 1996.

[119]       Li, J. J., “Real-Time Software Component Supervision”, invited paper, Proc. of the Conference on Performability in Computing Systems, pp. 63-78, April 1996.

[120]       Hlady, M.; Kovacevic, R.; Li, J. J., et al., “An Approach to Automatic Detection of Software Failures”, Proc. 6th International Symposium on Software Reliability Engineering (ISSRE’95), pp. 314-323, Oct. 1995.

[121]       Simser, D.A.; Li, J. J.; and Seviora, R. E., “Real-Time Supervision of Software Systems Using the Belief Method”, Proc. IEEE Globecom’94, pp. 1586-1591, Nov. 1994.

[122]       Li, J. J., and Seviora, R. E., “An Extension to a Real-Time Supervisor for Complex Software”, Proc. of the 3rd International Conference on Reliability, Quality and Risk Assessment, pp. 72-77, Oct. 1994.

[123]       Li, J. J., and Seviora, R. E., “A Real-Time Supervision Approach to the Improvement of Software Reliability”, Proc. 2nd International Conference on Reliability, Quality and Risk Assessment, pp. 38-43, Oct. 1993.

[124]       Li, J. J., and Seviora, R. E., “A Real-Time Supervisor with Reduced Space&Time Requirements”, Proc. IEE International Workshop on Systems Engineering for Real-Time Applications, pp. 90-95, Sept. 1993.