Li Tong

Name: Li Tong

Gender: Male

Degrees: Doctor

Title: Lecturer

E-mail :

Current Professional Societies

  1. Member of Software Engineering      Technical Committee of China Computer Federation;

  2. Committee member of ISO/IEC JTC1      SC27.;

  3. Co-editor of ISO 24392      "Security Reference Model for Industrial Internet Platform" (WD      1st) ;

  4. Member of Editorial Review Board      of International Journal of Information System Modeling and Design      (IJISMD), IGI Global (ESCI & EI-indexed)

Research Areas

  1. Security Requirements Engineering;

  2. Empirical Software Engineering;

  3. Data Mining


Beijing Excellent Talent Funding - Youth Project


  1. Tong Li*, Zhishuai Chen. “An Ontology-Based Learning Approach for Automatically Classifying Security Requirements.” Journal of Systems and Software (JSS), available online, 2020.

  2. Xin Dong, Tong Li*, Zhiming Ding. “Dealing with User Profiling via Reviews: An Extended Systematic Mapping Study.” Software & Systems Modeling (SoSyM), available online, 2020.

  3. Affan Yasin, Lin Liu, Tong Li, Jianmin Wang, and Didar Zowghi. "Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)." Information and Software Technology (IST) 95 (2018): 179-200.

  4. Tong Li*, Jennifer Horkoff, and John Mylopoulos. “Holistic Security Requirements Analysis for Socio-Technical Systems.” Software & Systems Modeling (SoSyM), 17, no. 4 (2018), 1253-1285.

  5. Tong Li*, Kaiyuan Wang and Jennifer Horkoff. “Towards Effective Assessment for Social Engineering Attacks.” In The 27th IEEE International Requirements Engineering Conference (RE), pp. 392-397, 2019.

  6. Tong Li*, Yeming Ni. “Paving Ontological Foundation for Social Engineering Analysis”, In Advanced Information Systems Engineering (CAiSE), pp. 246-260. Springer, Cham, 2019.


Personal Statement

Dr. Tong Li holds a lecturer position in the Faculty of Information Technology at the Beijing University of Technology, China. His research interests are in the areas of software engineering, security requirements engineering, conceptual modeling and data mining. He is currently focusing on analyzing security requirements for social engineering attacks. He is now hosting a National Natural Science Foundation of China, a subtask of a National Key Research and Development Program of China, and a Beijing Education Science Planning Funding. He has been an author or co-author of more than 50 papers in peer-reviewed journals, conferences, or workshops. He is an expert of ISO/IEC JTC 1/ SC 27/ WG 4 and is serving as a co-editor of ISO 24392.