Li Yongjian Chinese

Associate Professor
State Key Laboratory of Computer Science,
Institute of Software,
Chinese Academy of Sciences

P.O. Box 8718
Beijing 100190
CHINA

Tel. (86) (10) 62661645
E-mail:
  lyj238@ios.ac.cn

Education     Employment     Professional Affiliations     Research Interests     Main Projects     Publications    


Education

  • Sep.1998 - July.2001    Dept. of Computer Science & Engineering, Shanghai JiaoTong University, Ph.D., Computer Software & Theory

  • Sep.1995 - July.1998    Dept of Computer Science & Engineering, Shanghai University, M.S., Computer Software & Theory

  • Sep.1991 - July.1995    Dept. of Computer Science & Engineering, B.A., WeiHai Branch of Shandong University, Computer Software

Employment

  • Associate professor,    State Key Laboratory of Computer Science 2007.3-

  • Assistant professor,   State Key Laboratory of Computer Science 2001.9-2007.3

Professional Affiliations

  • Professional Member of China Computer Federation

  • Professional Member of IEEE


Research Interests

  • Hardware verification based on Symbolic Trajectory Evaluation (STE)

  • Theorem proving techniques based on Isabelle

Main Projects

    Projects

Natural Science Founding of China:An Inductive-invariant Based Parameterized Verification of Protocols (61672503,2017.1 -2020.12).


Natural Science Founding of ChinaA First-order Based Symbolic Trajectory Evaluation61170073:2011.1-2013.12.


Natural Science Founding of ChinaA Study on the Formal Semantics and Model-checking Algorithms of Symbolic Trajectory Evaluation606030012007.1 -2009.12.


Basic Research Funding of Institute of Software Institute, Chinese Academy of Sciences. A Study on Applying model Checking to the verification to Authentication Protocols.


Open Funding of the Key Lab of Information Security. A Study on the Strand Space theory.


The theory and Methods of Trusted Software-Concurrency Theory, attending.


Some Frontier Problems in Foundations of Software, attending.


Publications

  • Yongjian Li, Kaiqiang Duan, David N. Jansen, Jun Pang, Lijun Zhang, Yi Lv, and Shaowei Cai An Automatic Proving Approach to Parameterized Verification. ACM transaction on computation logic, 2018.

  • Yongjian Li, Jialun Cao, Jun Pang. L-CMP: An Automatic Learning-based Parameterized Verification Tool. IEEE/ACM International Conference on Automated Software Engineering (ASE-18) Tool-track, 2018.

  • Yongjian Li, Jialun Cao, Kaiqiang Duan. An Automatic Parameterized Verification of the FLASH Cache Coherence Protocol. The 18th IEEE conference on software quality and reliability and security(QRS-2018), 2018.

  • Yongjian Li, Kaiqiang Duan, Yi Lv, Jun Pang and Shaowei Cai. A Novel Approach to Parameterized Verification of Cache Coherence Protocols. IEEE 29th International Conference on Computer Design (ICCD), IEEE Press, 2016.

  • Yongjian Li, Jun Pang, Yi Lv, Dongrui Fan, Shen Cao and Kaiqiang Duan. paraVerifier: An Au- tomatic Framework for Proving Parameterized Cache Coherence Protocols. The 13th International Symposium on Automated Technology for Verification and Analysis (ATVA), Springer, 2015.

  • Yongjian Li, Jun Pang. Foramilzing provable anonymity in Isabelle/HOL. Formal Aspects of Computing, Springer, 2014.

  • Yongjian Li, Xiaoyu Song. On the formal modeling of inductive verification for cryptographical protocols. Accepted in The Thirteen International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT12), IEEE Computer Press, 2012.

  • Yongjian Li, Naiju Zeng, William N. N. Hung, Xiaoyu Song. Combining symmetry reduction with generalized symbolic trajectory evaluation. Accepted in The Computer Journal, Oxford Unversity Press, 2012.

  • Yongjian Li, Naiju Zeng, William N. N. Hung, Xiaoyu Song. Combining Theorem Proving and Symbolic Trajectory Evaluation in THM&STE. Haifa Verification conference (HVC) 2012, LNCS7261: 242-246.

  • Yongjian Li, Jun Pang. An Inductive Approach to Provable Anonymity. Conference on Availability, Reliability and Security (ARES) 2011: 454-459, IEEE Press.

  • Yongjian Li, Naiju Zeng, William N. N. Hung, Xiaoyu Song. Enhanced symbolic simulation of a round-robin arbiter. International conference on computer design (ICCD) 2011:102-107, IEEE Press.

  • Yongjian Li, jun Pang. An inductive approach to strand space theory. Formal Aspects of Computing. Springer.

  • Yongjian li, William N. N. Hung, Xiaoyu Song. Automatically Exploring Structural Symmetry in Symbolic Trajectory Evaluation. Formal Methods in System Design 39(2): 117-143 (2011). Springer.

  • Yongjian li, William N. N. Hung, Xiaoyu Song. A Novel Formalization of Symbolic Trajectory Evaluation Semantics in Isabelle/HOL. Theoretical Computer Science: 2746-2765 (2011). Elsevier. 2011.01

  • Yongjian Li, Jun Pang. Extending the Strand Space Method with Timestamps: Part I the Theory. Jounal of Information Security, Vol.1. 45-55. doi: 10.4236/jis.2010.12007. October 2010.

  • Yongjian Li, Jun Pang. Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V. Jounal of Information Security, Vol.1.56-67. doi:10.4236/jis.2010.12007. October 2010.

  • Li yongjian, Xue rui. Design of a CIL Connector to SPIN. International Journal of Software Engineering and Knowledge Engineering 18(1): 65-91. 2008.

  • Li yongjian, Xue rui. Using SPIN to Model Cryptographic Protocols. In proceedings of International Conference on Information Technology : 741-745, IEEE Press. April 2004.

  • Yongjian Li. The inductive approach to strand space theory. Proceedings of Formal Techniques for Networked and Distributed Systems-FORTE 2005, 25th IFIP WG 6.1 International Conference, Taipei, Taiwan, October 2-5, 2005, Lecture Notes in Computer Science 3731 : 547-552, Springer 2005. October 2005.

  • Yongjian Li, Jun Pang. Generalized Unsolicited Tests for Authentication Protocol Analysis. Proceedings of the International Conference on Parallel and Distributed Computing (PDCAT 2006): 509-514, IEEE CS Press. 2006.

  • Yongjian Li, Jun Pang. Extending the Strand Space Method to Verify Kerberos V. Proceedings of the International Conference on Parallel and Distributed Computing (PDCAT 2007): 437-444IEEE CS Press. 2007.

  • Li yongjian, Liu XinXin. Towards a theory of bisimulation for the Higher-Order process calculi. Journal of computer science and technology, Vol 19(3): 352-363. 2004. 2004.

  • Yongjian Li. Contextual labelled semantics for Higher-Order process calculi. Electronic Notes in Theoretical Computer Science 138, 61-77, 2005. Elsevier. 2005.

  • Yongjian Li. Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocols. 2007 ACM Symposium on Applied Computing (SAC 2007): 1534-1535 ACM Press. 2007.

  • Yongjian Li, Jifeng He, Yongqiang Sun. A Study on the algebraic semantics of Verilog. Journal of SoftwareVol.14. No.3. 2003.

  • Yongjian Li, Jifeng He, Yongqiang Sun. A Study on the operational semantics of Verilog. Journal of SoftwareVol.13 No.10, 2002.

  • Yongjian Li, Jifeng He, Yongqiang Sun. A Study on the formal semantics of Verilog. Journal of SoftwareVol.12. No.10, 2001.

  • Yongjian Li, Jifeng He. Towards a theory of bisimulation for a fragment of Verilog. proceedings of 17th international parallel & distributed processing symposium, 2003IEEE Press. 2003.

  • Yongjian Li, Jifeng He. Formalising Verilog. Proceedings of Applied Informatics (AI 2001) IASTED International Conference, symposium 3, Softare, Acta Press. 2001.



Copyright:ISCAS JING ICP: 05046678