Beijing, China

Xiaoshuan Li


 

Average Co-Inventor Count = 4.0

ph-index = 1

Forward Citations = 1(Granted Patents)


Company Filing History:


Years Active: 2016

where 'Filed Patents' based on already Granted Patents

1 patent (USPTO):

Title: Innovations of Xiaoshuan Li in Cybersecurity

Introduction

Xiaoshuan Li is a notable inventor based in Beijing, China. He has made significant contributions to the field of cybersecurity, particularly in the area of monitoring cross-site scripting attacks. His innovative approach has led to the development of a unique patent that addresses critical security vulnerabilities.

Latest Patents

Xiaoshuan Li holds a patent titled "System and method of monitoring attacks of cross site script." This patent provides techniques for monitoring cross-site scripting attacks by receiving and responding to service requests from client terminals. The system redefines scripting internal functions affected by the attack and returns the redefined information to the client terminal. Additionally, it monitors calling information related to the redefined functions and analyzes the security of this information. The system also tracks the source of the attack, the time period during which it occurred, leakage information, and vulnerability points associated with the attack.

Career Highlights

Xiaoshuan Li is currently employed at Alibaba Group Holding Limited, where he continues to work on innovative solutions in cybersecurity. His expertise in this field has positioned him as a valuable asset to his organization and the broader tech community.

Collaborations

Xiaoshuan Li collaborates with talented individuals such as Rong Zhu and Ziyi Yi. Their combined efforts contribute to the advancement of cybersecurity technologies and the development of effective solutions to combat online threats.

Conclusion

Xiaoshuan Li's work in monitoring cross-site scripting attacks showcases his innovative spirit and dedication to enhancing cybersecurity. His contributions are vital in protecting users from potential threats in the digital landscape.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…