Welcome to Dr. Xu’s Page
Useful Links and Opportunities
- M.S. in Forensic Science–Cyber Investigations Program
- Degree Requirements
- Admission Requirements
- I am Hiring!
- Contact Information
Teaching
Teaching Interests
Digital Forensics, Cybersecurity, Artificial Intelligence
Courses
- FSCS 630 Introduction to Cryptography
- FSCS 727 Computer and Digital Forensics
- FSCS 728 Information Systems, Threats, Attacks and Defense Strategies
Research
Research Interests
Software Security, Digital Forensics, and Applying Artificial Intelligence to Solve Security Problems
Grant
- Department of Homeland Security, Faculty Research Fellowship, Shared CTI for Detecting Post-Compromise of Advanced Persistent Threats, 2020, Awarded.
- Department of Energy, Faculty Research Fellowship, Building Secure Design Models for Smart Contracts with Formal Methods, 2018, Awarded.
- Department of Defense, Faculty Research Fellowship, Detecting AI training algorithm vulnerabilities, 2018, Awarded.
- National Science Foundation, Developing a Cloud-based Cryptographic Simulator for Enhancing Undergraduates’ Learning Experience in Cybersecurity Education, PI, $399,000, 2017-2021, Awarded.
- U.S. Department of Justice, Developing a Cyber Investigation Case Simulator for Enhancing Students’ Learning Experience at the University of Baltimore and Towson University, PI, $450,000, 2019-2021, Funded.
- U.S. Department of Justice, Developing a Cyber Investigation Case Simulator for Enhancing Students’ Learning Experience at the University of Baltimore and Towson University (Supplement Award), PI, $436,000, 2020-2023, Pending.
- National Science Foundation, Visualized and Explainable AI to Improve Students’ Learning Experience in Digital Forensics Education, PI, $300K, Pending, 2020-2023, Pending.
Journal Publications
- W. Xu, D. Xu, A. Alatawi, O. E. Ariss, and Y. Liu, “Statistical unigram analysis for source code repository,” International Journal of Semantic Computing, vol. 12, pp. 230-260, Jun. 2018, (The extension of the BigMM2017 conference paper).
- D. Xu, W. Xu, M. Tu, N. Shen, W. Chu, and C. H. Chang, “Automated integration testing using logical contracts,” IEEE Transactions on Reliability, vol. 65, no. 3, pp. 1205-1222, 2016.
- W. Xu, T. Ding, D. Xu, and O. El Ariss, “Mining decision trees as test oracles for java bytecode,” International Journal of Computers and Their Applications, vol. 23, pp. 141-159, 2016.
- O. El Ariss, S. Bou Ghosn, and W. Xu, “Testing software using swarm intelligence: A bee colony optimization approach” (the extended version of the conference paper), EAI Endorsed Transactions on Collaborative Computing, vol. 2, 12 2016.
- D. Xu, W. Xu, M. Kent, L. Thomas, and L. Wang, “An automated test generation technique for software quality assurance,” IEEE Transactions on Reliability, vol. 64, no. 1, pp. 247-268, 2015.
- W. Xu, L. Deng, Q. Zheng, and S. Frezza, “Using stereo vision to construct 3-d surface models,” IEEE Potentials, vol. 31, no. 2, pp. 31-37, 2012.
- D. Xu, M. Tu, M. Sanford, L. Thomas, D.Woodraska, and W. Xu, “Automated security test generation with formal threat models,” IEEE transactions on dependable and secure computing, vol. 9, no. 4, pp.526-540, 2012.
- D. Xu, O. El-Ariss, W. Xu, and L. Wang, “Testing aspect-oriented programs with finite state machines,” Software Testing, Verication and Reliability, vol. 22, no. 4, pp. 267-293, 2012.
- W. Xu, W. R. Betz, S. T. Frezza, and Y. Liu, “A system design for studying geriatric patients with dementia and hypertension based on daily living information,” IAENG Transactions on Engineering Technologies,, vol. 1373, no. 1, pp. 186-198, 2011.
- D. Xu, W. Xu, and W. E. Wong, “Automated test code generation from class state models,” International Journal of Software Engineering and Knowledge Engineering, vol. 19, no. 04, pp. 599-623, 2009.
- D. Xu, O. El Ariss, W. Xu, and L. Wang, “Aspect-oriented modeling and verication with finite statemachines,” Journal of computer science and technology, vol. 24, no. 5, pp. 949-961, 2009.
- D. Xu, W. Xu, and W. E. Wong, “Testing aspect-oriented programs with uml design models,” International Journal of Software Engineering and Knowledge Engineering, vol. 18, no. 03, pp. 413-437, 2008.
- A. Alatawi, W. Xu, and D. Xu, “A bigram-based inference model for retrieving abbreviated phrases in source code,” in The 24th International Conference on Evaluation and Assessment in Software Engineering (EASE2020), Trondheim, Norway, Apr. 2020, (acceptance rates 27/115=23.5%).
- W. Xu, J. Yan, and H. Chi, “A forensic evidence acquisition model for data leakage attacks,” in The 17th IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, Jul. 2019, pp. 53-58.
Conference Publications
- A. Alatawi, W. Xu, and D. Xu, “A bigram-based inference model for retrieving abbreviated phrases in source code,” in The 24th International Conference on Evaluation and Assessment in Software Engineering (EASE2020), Trondheim, Norway, Apr. 2020, pp. 11-20, (acceptance rates 27/115=23.5%).
- W. Xu, J. Yan, and H. Chi, “A forensic evidence acquisition model for data leakage attacks,” in The 17th IEEE International Conference on Intelligence and Security Informatics (ISI). Shenzhen, China: IEEE, Jul. 2019, pp. 53-58.
- R. Tiwang, T. Oladunni, and W. Xu, “A deep learning model for source code generation,” Alabama, USA: IEEE SoutheastCon, 2019.
- W. Xu and A. G. Fink, “Building executable secure design models for smart contracts with formal methods,” in The 3rd Workshop on Trusted Smart Contracts In Association with Financial Cryptography 2019, St. Kitts, Feb. 2019.
- A. Alatawi, W. Xu, and J. Yan, “The expansion of source code abbreviations using a language model,” in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). Tokyo, Japan: IEEE, Jul. 2018, pp. 370-375.
- R. Agada, J. Yan, and W. Xu, “An effective sensitive tutoring system for improving students engagement in cs,” in Proceedings of the Future Technologies Conference. Springer, 2018, pp. 1151-1163.
- R. Agada, J. Yan, and W. Xu, “A virtual animated commentator architecture for cybersecurity competitions,” in The 15th International Conference on Information Technology-New Generations. Springer, 2018, pp. 43-50.
- A. Alatawi, W. Xu, and D. Xu, “Bayesian unigram based inference for expanding abbreviations in source code,” in 29th IEEE International Conference on Tools with Artificial Intelligence. Boston, Massachusetts: IEEE, Nov. 2017.
- W. Xu, D. Xu, and L. Deng, “Measurement of source code readability using word concreteness and memory retention of variable names,” in The 41st Annual IEEE Computer Software and Applications Conference (COMPSAC 2017). Turin, Italy: IEEE, Jul. 2017.
- Y. Liu and W. Xu, “An Empirical Study to Compare Real-Time Database Transaction Processing,” in The International Conference On Artificial and Computer Engineering. Jiangsu, China, June 2017.
- W. Xu, D. Xu, O. E. Ariss, Y. Liu, and A. Alatawi, “Statistical unigram analysis for source code repository,” in The Third IEEE International Conference on Multimedia Big Data. Laguna Hills, California, USA: IEEE, Apr. 2017, (acceptance rate 23.9%).
- W. Xu, O. E. Ariss, and Y. Liu, “An empirical study of control flow graphs for unit testing,” in The 14th International Conference on Information Technology: New Generations. Las Vegas, Nevada, USA: Springer, Apr. 2017.
- Q. Zheng, B. Li, and W. Xu, “United discrete-time optimal control for mems gyroscope,” in American Control Conference (ACC), 2016. Boston, USA: IEEE, Jul. 2016, pp. 1548-1553.
- O. El Ariss, W. Xu et al., “Testing software using swarm intelligence: A bee colony optimization approach,” in The 9th EAI International Conference on Bio-inspired Information and Communications Technologies, New York, USA, Dec. 2016, pp. 205-213.
- W. Xu and O. El Ariss, “A JVM-based testing harness for improving component testability.” in The International Conference on Software Engineering and Knowledge Engineering, Pittsburgh, USA, 2015, pp. 421-426, (acceptance rates: 29%).
- W. Xu and O. el Ariss, “A force-directed program graph visualizer for teaching white-box testing techniques,” in The 2015 ASEE Annual Conference & Exposition, Seattle Washington, USA, Jun. 2015.
- W. Xu, T. Ding, and D. Xu, “Rule-based test input generation from bytecode,” in The Eighth International Conference on Software Security and Reliability. San Francisco, CA: IEEE, Jun. 2014, pp. 108-117.
- D. Xu, W. Xu, and M. Tu, “Automated generation of integration test sequences from logical contracts,” in The 38th International Computer Software and Applications Conference Workshops (COMPSACW). Sweden: IEEE, Jul. 2014, pp. 632-637.
- W. Xu, T. Ding, H. Wang, and D. Xu, “Mining test oracles for test inputs generated from Java bytecode,” in The IEEE 37th Annual Computer Software and Applications Conference (COMPSAC). Kyoto, Japan: IEEE, Jul. 2013, pp. 27-32, (Acceptance rates: 44/201 = 22%).
- W. Xu, H. Wang, and T. Ding, “Mining auto-generated test inputs for test Oracle,” in Tenth International Conference on Information Technology: New Generations (ITNG). Las Vegas: IEEE, Apr. 2013, pp. 89-94, (Acceptance rates: 132/ 455 = 29%).
- Y. Liu, M. Vagula, W. Xu, and T. Ding, “Gene expression games: A case study of the integration between game programming and bioinformatics education,” in The Great Lakes Bioinformatics Conference, Ann Arbor, MI, May 2012.
- W. Xu, L. Deng, and T. Ding, “Detecting web security risks with UML design models,” in The 7th IASTED International Conference on Communication, Internet, and Information Technology, Baltimore, USA, May 2012.
- D. Xu, W. Xu, B. K. Bavikati, and W. E. Wong, “Mining executable specifications of web applications from selenium ide tests,” in IEEE Sixth International Conference on Software Security and Reliability (SERE). Washington DC, USA: IEEE, Jun. 2012, pp. 263–272, (Acceptance rates: 31/103 = 30%).
- Q. Zheng, A. Daluom, W. Xu, and Y. Zheng, “Reduced-order active disturbance rejection control for multivariable chemical processes,” in 2012 IEEE Industry Applications Society Annual Meeting (IAS). Las Vegas, NV, USA: IEEE, Oct. 2012, pp. 1–7.
- W. Xu, L. Deng, and Q. Zheng, “Annotating resources in sequence diagrams for testing web security,” in Information Technology: New Generations (ITNG), 2012 Ninth International Conference on. Las Vegas: IEEE, Apr. 2012, pp. 873–874.
- Q. Zheng, K. K. Chedella, W. Xu, and L. Wu, “Reduced-order active disturbance rejection control for induction motors,” in IEEE International Conference on Control Applications (CCA). Denver, Colorado, USA: IEEE, Sep. 2011, pp. 1139–1144.
- L. Thomas, W. Xu, and D. Xu, “Mutation analysis of Magento for evaluating threat model-based security testing,” in Computer Software and Applications Conference Workshops (COMPSACW), 2011 IEEE 35th Annual. IEEE, 2011, pp. 184–189.
- L. Deng, W. Xu, and S. Frezza, “A resource-based approach to extend UML diagrams for web applications,” in International Conference on Computer Science and Service System. Nanjing, China: IEEE, Jun. 2011, pp. 103–106.
- W. Xu and S. T. Frezza, “A case study: Integrating a game application-driven approach and social collaborations into software engineering education.” in The 13th International Conference on Enterprise Information Systems, Beijing, China, Jun. 2011, pp. 23–32, (Acceptance rates: 43/448 = 14% ).
- W. Xu, W. R. Betz, S. T. Frezza, and W. Lee, “Letting patients’ daily living information speak: A novel approach to study geriatric patients with dementia and hypertension,” in Proceedings of the World Congress on Engineering and Computer Science, vol. 2, San Francisco, USA, Oct. 2010.
- W. Xu, B. Luebbert, S. Frezza, Q. Zheng, and T. Dinner, “Visual manipulation for grid-based 3d surface models,” in 36th Annual Conference on IEEE Industrial Electronics Society. Phoenix, AZ: IEEE, Nov. 2010, pp. 1203–1208.
- W. Xu, L. Deng, and Y. Liu, “A resource-based approach to formalizing use case specification for web applications,” in IEEE International Conference on Progress in Informatics and Computing (PIC), vol. 2. Shanghai, China: IEEE, Dec. 2010, pp. 1072–1076.
- W. Xu, B. Luebbert, S. Frezza, S. Sasi, and T. Dinner, “Building customized cushion seats using stereo visions for disabled,” in The Seventh International Conference on Information Technology: New Generations (ITNG),. Las Vegas: IEEE, Apr. 2010, pp. 275–280.
- W. Xu and D. Xu, “Automated evaluation of runtime object states against model-level states for state-based test execution,” in Software Testing, Verification and Validation Workshops, 2009. ICSTW’09. International Conference on. Denver, Colorado: IEEE, Apr. 2009, pp. 3–9.
- D. Xu, I. Alsmadi, and W. Xu, “Model checking aspect-oriented design specification,” in The 31st Annual International Conference on Computer Software and Applications (COMPSAC 2007), vol. 1. Beijing, China: IEEE, Jul. 2007, pp. 491–500, (Acceptance rates: 29%).
- D. Xu, W. Xu, and W. E. Wong, “Automated test code generation from UML protocol state machines.” in The Nineteenth International Conference on Software Engineering and Knowledge Engineering, Boston, USA, Jul. 2007, pp. 99–104.
- W. Xu and D. Xu, “State-based testing of integration aspects,” in The 2nd workshop on Testing aspect-oriented programs. Portland, Maine: ACM, Jul. 2006, pp. 7–14.
- D. Xu and W. Xu, “State-based incremental testing of aspect-oriented programs,” in Proceedings of the 5th international conference on Aspect-oriented software development. Bonn, Germany: ACM, Jun. 2006, pp. 180–189, (Acceptance rates: 23/96 = 24%).
- W. Xu and D. Xu, “A model-based approach to test generation for aspect-oriented programs,” in AOSD 2005 Workshop on Testing Aspect-Oriented Programs, Chicago, USA, 2005.
- D. Xu, W. Xu, and K. E. Nygard, “A state-based approach to testing aspect-oriented programs.” in International Conference on Software Engineering and Knowledge Engineering, Taiwan, Jul. 2005, pp. 366–371.
Service
Committee
- Program Co-Chair, SEPT Symposium for the IEEE Computer Society Signature Conference on Computers, Software and Applications, 2020
- Session Chair, the 17th IEEE International Conference on Intelligence and Security Informatics, 2019
- Organizing Committee Member, the 9th International Symposium on Cybersecurity, Las Vegas, Nevada, USA, 2018
- PC member, the International Conference on Software Engineering and Knowledge Engineering, 2013-2020
- PC member, the Symposium On Applied Computing (Software Engineering Track), 2013-2020
- Reviewer, the Journal of Education and Information Technologies,2016-2020
- Reviewer, the International Journal of Software Engineering and Knowledge Engineering, 2015-
- Member Chair, the IEEE Executive Committee, 2011 - 2014
- PC member, the 22nd IEEE WETICE International Conference(Validation of Safety Critical Collaboration Systems Track), 2013
- Editorial Board Member, the ACTA Press (Software Engineering Track), 2012
- Session Chair, the International Conference on Software Security and Reliability, 2012
- Committee Member, the International Association of Science and Technology(Software Engineering Track), 2009 - 2012
- Session Chair, the 13th International Conference on Enterprise Information Systems, 2011
I am hiring!
I am looking for self-motivated students to work on research projects. These projects focus on applying Artificial Intelligence to address real-world challenges in the areas of digital forensics and cybersecurity. Please email me your resume at wxu at ubalt dot edu.
Requirments:
- Basic programming skills in any one of languages, e.g., Java, C++, Python
- Basic concepts on cybersecurity and digital forensics
- At least GPA 3.0
- Self-motivated
- Task-driven and can complete tasks in a timely manner
Contact Information
Dr. Frank Xu. Associate Professor
Director of the MS in Forensic Sciences: Cyber Investigations program (Baltimore Campus)
College of Public Affairs
University of Baltimore
1420 N. Charles Street, LAP 506
Baltimore, MD 21201
410-837-5302
wxu at ubalt.edu