default search action
Shouhuai Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j63]Theodore Tangie Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu:
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey. Proc. IEEE 112(3): 210-246 (2024) - [j62]Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 920-936 (2024) - [c128]James Turner, Shuai Li, Shouhuai Xu:
Jamming-Resistant Communications Via Cryptographic Secret Sharing. ICC 2024: 2682-2687 - [c127]Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. ICSE 2024: 157:1-157:12 - [i70]Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen:
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. CoRR abs/2401.06763 (2024) - [i69]Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. CoRR abs/2401.09767 (2024) - [i68]Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges. CoRR abs/2401.13815 (2024) - [i67]Ekzhin Ear, Brandon Bailey, Shouhuai Xu:
Towards Principled Risk Scores for Space Cyber Risk Management. CoRR abs/2402.02635 (2024) - [i66]Theodore Tangie Longtchi, Shouhuai Xu:
Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. CoRR abs/2408.11584 (2024) - [i65]Theodore Tangie Longtchi, Shouhuai Xu:
Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. CoRR abs/2408.11586 (2024) - [i64]Theodore Tangie Longtchi, Rosana Montañez Rodriguez, Kora Gwartney, Ekzhin Ear, David P. Azari, Christopher P. Kelley, Shouhuai Xu:
Quantifying Psychological Sophistication of Malicious Emails. CoRR abs/2408.12217 (2024) - [i63]Xiaoyu Zhang, Maochao Xu, Shouhuai Xu:
Smart Home Cyber Insurance Pricing. CoRR abs/2408.13681 (2024) - 2023
- [j61]Liangde Tao, Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Electoral manipulation via influence: probabilistic model. Auton. Agents Multi Agent Syst. 37(1): 18 (2023) - [j60]Deqiang Li, Qianmu Li, Yanfang (Fanny) Ye, Shouhuai Xu:
Arms Race in Adversarial Malware Detection: A Survey. ACM Comput. Surv. 55(2): 15:1-15:35 (2023) - [j59]Jian Shi, Deqing Zou, Shouhuai Xu, Xianjun Deng, Hai Jin:
Does OpenBSD and Firefox's Security Improve With Time? IEEE Trans. Dependable Secur. Comput. 20(4): 2781-2793 (2023) - [c126]Keith Paarporn, Philip N. Brown, Shouhuai Xu:
Analysis of Contagion Dynamics with Active Cyber Defenders. CDC 2023: 4990-4995 - [c125]Ekzhin Ear, Jose L. C. Remy, Antonia Feffer, Shouhuai Xu:
Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study. CNS 2023: 1-9 - [c124]Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu:
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. CSR 2023: 329-334 - [c123]Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. ASE 2023: 27-39 - [c122]Zheyuan Sun, Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Alexander Kott, Shouhuai Xu:
Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting. SciSec 2023: 60-81 - [c121]Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen:
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. SciSec 2023: 285-304 - [c120]Rosana Montañez Rodriguez, Theodore Tangie Longtchi, Kora Gwartney, Ekzhin Ear, David P. Azari, Christopher P. Kelley, Shouhuai Xu:
Quantifying Psychological Sophistication of Malicious Emails. SciSec 2023: 319-331 - [c119]Qi Xia, Qian Chen, Shouhuai Xu:
Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone. USENIX Security Symposium 2023: 4589-4606 - [i62]Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. CoRR abs/2302.11328 (2023) - [i61]Keith Paarporn, Shouhuai Xu:
Analysis of Contagion Dynamics with Active Cyber Defenders. CoRR abs/2305.14694 (2023) - [i60]Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu:
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. CoRR abs/2307.04416 (2023) - [i59]Ekzhin Ear, Jose L. C. Remy, Antonia Feffer, Shouhuai Xu:
Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study. CoRR abs/2309.04878 (2023) - [i58]Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. CoRR abs/2309.10644 (2023) - 2022
- [j58]Haoyu Chen, Deqing Zou, Hai Jin, Shouhuai Xu, Bin Yuan:
SAND: semi-automated adaptive network defense via programmable rule generation and deployment. Sci. China Inf. Sci. 65(7): 1-18 (2022) - [j57]Muqing He, Deqing Zou, Weizhong Qiang, Wenbo Wu, Shouhuai Xu, Xianjun Deng, Hai Jin:
Utility-Prioritized Differential Privacy for Quantitative Biomedical Data. J. Circuits Syst. Comput. 31(13): 2250236:1-2250236:23 (2022) - [j56]Songlin He, Eric Ficke, Mir Mehedi Ahsan Pritom, Huashan Chen, Qiang Tang, Qian Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
Blockchain-based automated and robust cyber security management. J. Parallel Distributed Comput. 163: 62-82 (2022) - [j55]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 19(4): 2244-2258 (2022) - [j54]Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector. IEEE Trans. Dependable Secur. Comput. 19(4): 2821-2837 (2022) - [j53]Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. IEEE Trans. Dependable Secur. Comput. 19(6): 3804-3821 (2022) - [c118]Mir Mehedi Ahsan Pritom, Shouhuai Xu:
Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study. CNS 2022: 181-189 - [c117]Nathan Daughety, Marcus Pendleton, Rebeca Perez, Shouhuai Xu, John V. Franco:
Auditing a Software-Defined Cross Domain Solution Architecture. CSR 2022: 96-103 - [c116]Zhen Li, Qian (Guenevere) Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. ICSE 2022: 1906-1918 - [c115]Eric Ficke, Raymond M. Bateman, Shouhuai Xu:
Reducing Intrusion Alert Trees to Aid Visualization. NSS 2022: 140-154 - [c114]Joshua H. Seaton, Sena Hounsinou, Timothy Wood, Shouhuai Xu, Philip N. Brown, Gedare Bloom:
Poster: Toward Zero-Trust Path-Aware Access Control. SACMAT 2022: 267-269 - [c113]Rosana Montanez Rodriguez, Shouhuai Xu:
Cyber Social Engineering Kill Chain. SciSec 2022: 487-504 - [i57]Zhen Li, Guenevere Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. CoRR abs/2202.06043 (2022) - [i56]Rosana Montañez Rodriguez, Adham Atyabi, Shouhuai Xu:
Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study. CoRR abs/2203.04813 (2022) - [i55]Theodore Tangie Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu:
SoK: Why Have Defenses against Social Engineering Attacks Achieved Limited Success? CoRR abs/2203.08302 (2022) - [i54]Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
A Coupling Approach to Analyzing Games with Dynamic Environments. CoRR abs/2207.06504 (2022) - 2021
- [j52]Weizhi Meng, Javier Lopez, Shouhuai Xu, Chunhua Su, Rongxing Lu:
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges. IEEE Access 9: 108846-108850 (2021) - [j51]Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Comput. Surv. 53(3): 67:1-67:43 (2021) - [j50]Zhaofeng Liu, Ren Zheng, Wenlian Lu, Shouhuai Xu:
Using Event-Based Method to Estimate Cybersecurity Equilibrium. IEEE CAA J. Autom. Sinica 8(2): 455-467 (2021) - [j49]Qian Chen, Paul Romanowich, Jorge Castillo, Krishna Chandra Roy, Gustavo Chavez, Shouhuai Xu:
ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks. IEEE Internet Things J. 8(18): 14355-14371 (2021) - [j48]Shouhuai Xu, Moti Yung, Jingguo Wang:
Seeking Foundations for the Science of Cyber Security. Inf. Syst. Frontiers 23(2): 263-267 (2021) - [j47]Lin Chen, Ahmed Imtiaz Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational complexity characterization of protecting elections from bribery. Theor. Comput. Sci. 891: 189-209 (2021) - [j46]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2224-2236 (2021) - [j45]Zijian Fang, Maochao Xu, Shouhuai Xu, Taizhong Hu:
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity. IEEE Trans. Inf. Forensics Secur. 16: 2186-2201 (2021) - [j44]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
A Framework for Enhancing Deep Neural Networks Against Adversarial Malware. IEEE Trans. Netw. Sci. Eng. 8(1): 736-750 (2021) - [j43]Yujuan Han, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive. IEEE Trans. Netw. Sci. Eng. 8(3): 2517-2532 (2021) - [j42]Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, Hengkai Ye:
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching. ACM Trans. Softw. Eng. Methodol. 30(2): 23:1-23:31 (2021) - [c112]Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu:
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? ACSAC 2021: 596-608 - [c111]Wenjun Fan, Sang-Yoon Chang, Xiaobo Zhou, Shouhuai Xu:
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking. CNS 2021: 101-109 - [c110]Liangde Tao, Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi, Dian Huang:
Hardness and Algorithms for Electoral Manipulation Under Media Influence. IJTCS-FAW 2021: 53-64 - [c109]Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
Paying Firms to Share Cyber Threat Intelligence. GameSec 2021: 365-377 - [c108]Nathan Daughety, Marcus Pendleton, Shouhuai Xu, Laurent Njilla, John V. Franco:
vCDS: A Virtualized Cross Domain Solution Architecture. MILCOM 2021: 61-68 - [c107]Shouhuai Xu:
SARR: A Cybersecurity Metrics and Quantification Framework (Keynote). SciSec 2021: 3-17 - [c106]John Charlton, Pang Du, Shouhuai Xu:
A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics. SciSec 2021: 77-92 - [i53]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. CoRR abs/2102.13223 (2021) - [i52]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. CoRR abs/2102.13226 (2021) - [i51]Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin:
Towards Making Deep Learning-based Vulnerability Detectors Robust. CoRR abs/2108.00669 (2021) - [i50]Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu:
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? CoRR abs/2109.09654 (2021) - [i49]Huashan Chen, Richard B. Garcia-Lebron, Zheyuan Sun, Jin-Hee Cho, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Software Diversity. CoRR abs/2111.10090 (2021) - [i48]Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. CoRR abs/2112.07826 (2021) - 2020
- [j41]Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, Yusheng Feng:
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. EAI Endorsed Trans. Security Safety 7(25): e4 (2020) - [c105]Shouhuai Xu:
The Cybersecurity Dynamics Way of Thinking and Landscape. MTD@CCS 2020: 69-80 - [c104]Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. COCOON 2020: 85-97 - [c103]Yiming Zhang, Yujie Fan, Shifu Hou, Yanfang Ye, Xusheng Xiao, Pan Li, Chuan Shi, Liang Zhao, Shouhuai Xu:
Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub. ICKG 2020: 458-465 - [c102]Eric Ficke, Shouhuai Xu:
APIN: Automatic Attack Path Identification in Computer Networks. ISI 2020: 1-6 - [c101]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. ISI 2020: 1-6 - [c100]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. ISI 2020: 1-6 - [i47]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. CoRR abs/2001.02334 (2020) - [i46]Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector. CoRR abs/2001.02350 (2020) - [i45]Yujuan Han, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics with Ergodic Time-dependent Parameters Is Globally Attractive. CoRR abs/2001.07958 (2020) - [i44]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
Enhancing Deep Neural Networks Against Adversarial Malware Examples. CoRR abs/2004.07919 (2020) - [i43]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
SoK: Arms Race in Adversarial Malware Detection. CoRR abs/2005.11671 (2020) - [i42]Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. CoRR abs/2007.02533 (2020) - [i41]Rosana Montanez Rodriguez, Edward Golob, Shouhuai Xu:
Human Cognition through the Lens of Social Engineering Cyberattacks. CoRR abs/2007.04932 (2020) - [i40]Shouhuai Xu:
Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity. CoRR abs/2010.05683 (2020) - [i39]Shouhuai Xu:
On the Security of Group Communication Schemes. CoRR abs/2010.05692 (2020)
2010 – 2019
- 2019
- [j40]Richard Garcia-Lebron, David J. Myers, Shouhuai Xu, Jie Sun:
Node diversification in complex networks by decentralized colouring. J. Complex Networks 7(4): 554-563 (2019) - [j39]Jin-Hee Cho, Shouhuai Xu, Patrick M. Hurley, Matthew MacKay, Trevor Benjamin, Mark R. Beaumont:
STRAM: Measuring the Trustworthiness of Computer-Based Systems. ACM Comput. Surv. 51(6): 128:1-128:47 (2019) - [j38]Xing Fang, Maochao Xu, Shouhuai Xu, Peng Zhao:
A deep learning framework for predicting cyber attacks rates. EURASIP J. Inf. Secur. 2019: 5 (2019) - [j37]Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics Towards Measuring Cyber Agility. IEEE Trans. Inf. Forensics Secur. 14(12): 3217-3232 (2019) - [j36]Zongzong Lin, Wenlian Lu, Shouhuai Xu:
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent. IEEE/ACM Trans. Netw. 27(3): 1098-1111 (2019) - [c99]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. AAAI 2019: 2572-2579 - [c98]Lingwei Chen, Shifu Hou, Yanfang Ye, Thirimachos Bourlai, Shouhuai Xu, Liang Zhao:
iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow. ASONAM 2019: 1097-1104 - [c97]Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi:
KCRS: A Blockchain-Based Key Compromise Resilient Signature System. BlockSys 2019: 226-239 - [c96]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribe-Effect Uncertainty: A Dichotomy Result. IJCAI 2019: 158-164 - [c95]Yujie Fan, Yiming Zhang, Shifu Hou, Lingwei Chen, Yanfang Ye, Chuan Shi, Liang Zhao, Shouhuai Xu:
iDev: Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow. IJCAI 2019: 2272-2278 - [c94]Gabriel C. Fernandez, Shouhuai Xu:
A Case Study on using Deep Learning for Network Intrusion Detection. MILCOM 2019: 1-6 - [c93]Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. MILCOM 2019: 1-6 - [e12]Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11933, Springer 2019, ISBN 978-3-030-34636-2 [contents] - [i38]Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics Towards Measuring Cyber Agility. CoRR abs/1906.05395 (2019) - [i37]Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses. CoRR abs/1908.04507 (2019) - [i36]Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. CoRR abs/1909.08725 (2019) - [i35]Gabriel C. Fernandez, Shouhuai Xu:
A Case Study on Using Deep Learning for Network Intrusion Detection. CoRR abs/1910.02203 (2019) - 2018
- [j35]Miroslaw Kutylowski, Yu Wang, Shouhuai Xu, Laurence T. Yang:
Special issue on social network security and privacy. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j34]Weiqi Dai, Yukun Du, Hai Jin, Weizhong Qiang, Deqing Zou, Shouhuai Xu, Zhongze Liu:
RollSec: Automatically Secure Software States Against General Rollback. Int. J. Parallel Program. 46(4): 788-805 (2018) - [j33]Weiqi Dai, Pengfei Wan, Weizhong Qiang, Laurence T. Yang, Deqing Zou, Hai Jin, Shouhuai Xu, Zirong Huang:
TNGuard: Securing IoT Oriented Tenant Networks Based on SDN. IEEE Internet Things J. 5(3): 1411-1423 (2018) - [j32]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. EAI Endorsed Trans. Security Safety 4(13): e5 (2018) - [j31]Lei Xu, Jong-Hyuk Lee, Seung Hun Kim, Qingji Zheng, Shouhuai Xu, Taeweon Suh, Won Woo Ro, Weidong Shi:
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment. IEEE Trans. Cloud Comput. 6(2): 478-491 (2018) - [j30]Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Modeling and Predicting Cyber Hacking Breaches. IEEE Trans. Inf. Forensics Secur. 13(11): 2856-2871 (2018) - [j29]Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. IEEE Trans. Inf. Forensics Secur. 13(12): 2965-2980 (2018) - [j28]Ren Zheng, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics Is Globally Stable. IEEE Trans. Netw. Sci. Eng. 5(2): 156-170 (2018) - [j27]Moustafa Saleh, Tao Li, Shouhuai Xu:
Multi-context features for detecting malicious programs. J. Comput. Virol. Hacking Tech. 14(2): 181-193 (2018) - [c92]Yanfang Ye, Shifu Hou, Lingwei Chen, Xin Li, Liang Zhao, Shouhuai Xu, Jiabin Wang, Qi Xiong:
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. ACSAC 2018: 542-552 - [c91]Lingwei Chen, Shifu Hou, Yanfang Ye, Shouhuai Xu:
DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks. ASONAM 2018: 782-789 - [c90]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Nolan Shah, Yang Lu, Weidong Shi:
Protecting Election from Bribery: New Approach and Computational Complexity Characterization. AAMAS 2018: 1894-1896 - [c89]Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of firewalls and DMZs. HotSoS 2018: 9:1-9:11 - [c88]Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of network diversity: poster. HotSoS 2018: 24:1 - [c87]Qian Chen, Azizeh Khaled Sowan, Shouhuai Xu:
A safety and security architecture for reducing accidents in intelligent transportation systems. ICCAD 2018: 95 - [c86]Richard B. Garcia-Lebron, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs. MILCOM 2018: 70-75 - [c85]