default search action
Shouhuai Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Keith Paarporn, Shouhuai Xu:
Preventive-Reactive Defense Tradeoffs in Resource Allocation Contests. IEEE Control. Syst. Lett. 8: 2421-2426 (2024) - [j63]Theodore Tangie Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu:
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey. Proc. IEEE 112(3): 210-246 (2024) - [j62]Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 920-936 (2024) - [c128]James Turner, Shuai Li, Shouhuai Xu:
Jamming-Resistant Communications Via Cryptographic Secret Sharing. ICC 2024: 2682-2687 - [c127]Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. ICSE 2024: 157:1-157:12 - [i71]Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen:
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. CoRR abs/2401.06763 (2024) - [i70]Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. CoRR abs/2401.09767 (2024) - [i69]Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges. CoRR abs/2401.13815 (2024) - [i68]Ekzhin Ear, Brandon Bailey, Shouhuai Xu:
Towards Principled Risk Scores for Space Cyber Risk Management. CoRR abs/2402.02635 (2024) - [i67]Theodore Tangie Longtchi, Shouhuai Xu:
Characterizing the Evolution of Psychological Factors Exploited by Malicious Emails. CoRR abs/2408.11584 (2024) - [i66]Theodore Tangie Longtchi, Shouhuai Xu:
Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails. CoRR abs/2408.11586 (2024) - [i65]Theodore Tangie Longtchi, Rosana Montañez Rodriguez, Kora Gwartney, Ekzhin Ear, David P. Azari, Christopher P. Kelley, Shouhuai Xu:
Quantifying Psychological Sophistication of Malicious Emails. CoRR abs/2408.12217 (2024) - [i64]Xiaoyu Zhang, Maochao Xu, Shouhuai Xu:
Smart Home Cyber Insurance Pricing. CoRR abs/2408.13681 (2024) - [i63]Eric Ficke, Raymond M. Bateman, Shouhuai Xu:
AutoCRAT: Automatic Cumulative Reconstruction of Alert Trees. CoRR abs/2409.10828 (2024) - 2023
- [j61]Liangde Tao, Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Electoral manipulation via influence: probabilistic model. Auton. Agents Multi Agent Syst. 37(1): 18 (2023) - [j60]Deqiang Li, Qianmu Li, Yanfang (Fanny) Ye, Shouhuai Xu:
Arms Race in Adversarial Malware Detection: A Survey. ACM Comput. Surv. 55(2): 15:1-15:35 (2023) - [j59]Jian Shi, Deqing Zou, Shouhuai Xu, Xianjun Deng, Hai Jin:
Does OpenBSD and Firefox's Security Improve With Time? IEEE Trans. Dependable Secur. Comput. 20(4): 2781-2793 (2023) - [c126]Keith Paarporn, Philip N. Brown, Shouhuai Xu:
Analysis of Contagion Dynamics with Active Cyber Defenders. CDC 2023: 4990-4995 - [c125]Ekzhin Ear, Jose L. C. Remy, Antonia Feffer, Shouhuai Xu:
Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study. CNS 2023: 1-9 - [c124]Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu:
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. CSR 2023: 329-334 - [c123]Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. ASE 2023: 27-39 - [c122]Zheyuan Sun, Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Alexander Kott, Shouhuai Xu:
Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting. SciSec 2023: 60-81 - [c121]Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen:
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. SciSec 2023: 285-304 - [c120]Rosana Montañez Rodriguez, Theodore Tangie Longtchi, Kora Gwartney, Ekzhin Ear, David P. Azari, Christopher P. Kelley, Shouhuai Xu:
Quantifying Psychological Sophistication of Malicious Emails. SciSec 2023: 319-331 - [c119]Qi Xia, Qian Chen, Shouhuai Xu:
Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone. USENIX Security Symposium 2023: 4589-4606 - [i62]Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. CoRR abs/2302.11328 (2023) - [i61]Keith Paarporn, Shouhuai Xu:
Analysis of Contagion Dynamics with Active Cyber Defenders. CoRR abs/2305.14694 (2023) - [i60]Ekzhin Ear, Jose L. C. Remy, Shouhuai Xu:
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies. CoRR abs/2307.04416 (2023) - [i59]Ekzhin Ear, Jose L. C. Remy, Antonia Feffer, Shouhuai Xu:
Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study. CoRR abs/2309.04878 (2023) - [i58]Zhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin:
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers. CoRR abs/2309.10644 (2023) - 2022
- [j58]Haoyu Chen, Deqing Zou, Hai Jin, Shouhuai Xu, Bin Yuan:
SAND: semi-automated adaptive network defense via programmable rule generation and deployment. Sci. China Inf. Sci. 65(7): 1-18 (2022) - [j57]Muqing He, Deqing Zou, Weizhong Qiang, Wenbo Wu, Shouhuai Xu, Xianjun Deng, Hai Jin:
Utility-Prioritized Differential Privacy for Quantitative Biomedical Data. J. Circuits Syst. Comput. 31(13): 2250236:1-2250236:23 (2022) - [j56]Songlin He, Eric Ficke, Mir Mehedi Ahsan Pritom, Huashan Chen, Qiang Tang, Qian Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
Blockchain-based automated and robust cyber security management. J. Parallel Distributed Comput. 163: 62-82 (2022) - [j55]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 19(4): 2244-2258 (2022) - [j54]Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector. IEEE Trans. Dependable Secur. Comput. 19(4): 2821-2837 (2022) - [j53]Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. IEEE Trans. Dependable Secur. Comput. 19(6): 3804-3821 (2022) - [c118]Mir Mehedi Ahsan Pritom, Shouhuai Xu:
Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study. CNS 2022: 181-189 - [c117]Nathan Daughety, Marcus Pendleton, Rebeca Perez, Shouhuai Xu, John V. Franco:
Auditing a Software-Defined Cross Domain Solution Architecture. CSR 2022: 96-103 - [c116]Zhen Li, Qian (Guenevere) Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. ICSE 2022: 1906-1918 - [c115]Eric Ficke, Raymond M. Bateman, Shouhuai Xu:
Reducing Intrusion Alert Trees to Aid Visualization. NSS 2022: 140-154 - [c114]Joshua H. Seaton, Sena Hounsinou, Timothy Wood, Shouhuai Xu, Philip N. Brown, Gedare Bloom:
Poster: Toward Zero-Trust Path-Aware Access Control. SACMAT 2022: 267-269 - [c113]Rosana Montanez Rodriguez, Shouhuai Xu:
Cyber Social Engineering Kill Chain. SciSec 2022: 487-504 - [i57]Zhen Li, Guenevere Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. CoRR abs/2202.06043 (2022) - [i56]Rosana Montañez Rodriguez, Adham Atyabi, Shouhuai Xu:
Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study. CoRR abs/2203.04813 (2022) - [i55]Theodore Tangie Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu:
SoK: Why Have Defenses against Social Engineering Attacks Achieved Limited Success? CoRR abs/2203.08302 (2022) - [i54]Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
A Coupling Approach to Analyzing Games with Dynamic Environments. CoRR abs/2207.06504 (2022) - 2021
- [j52]Weizhi Meng, Javier Lopez, Shouhuai Xu, Chunhua Su, Rongxing Lu:
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges. IEEE Access 9: 108846-108850 (2021) - [j51]Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Comput. Surv. 53(3): 67:1-67:43 (2021) - [j50]Zhaofeng Liu, Ren Zheng, Wenlian Lu, Shouhuai Xu:
Using Event-Based Method to Estimate Cybersecurity Equilibrium. IEEE CAA J. Autom. Sinica 8(2): 455-467 (2021) - [j49]Qian Chen, Paul Romanowich, Jorge Castillo, Krishna Chandra Roy, Gustavo Chavez, Shouhuai Xu:
ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks. IEEE Internet Things J. 8(18): 14355-14371 (2021) - [j48]Shouhuai Xu, Moti Yung, Jingguo Wang:
Seeking Foundations for the Science of Cyber Security. Inf. Syst. Frontiers 23(2): 263-267 (2021) - [j47]Lin Chen, Ahmed Imtiaz Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational complexity characterization of protecting elections from bribery. Theor. Comput. Sci. 891: 189-209 (2021) - [j46]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2224-2236 (2021) - [j45]Zijian Fang, Maochao Xu, Shouhuai Xu, Taizhong Hu:
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity. IEEE Trans. Inf. Forensics Secur. 16: 2186-2201 (2021) - [j44]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
A Framework for Enhancing Deep Neural Networks Against Adversarial Malware. IEEE Trans. Netw. Sci. Eng. 8(1): 736-750 (2021) - [j43]Yujuan Han, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive. IEEE Trans. Netw. Sci. Eng. 8(3): 2517-2532 (2021) - [j42]Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, Hengkai Ye:
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching. ACM Trans. Softw. Eng. Methodol. 30(2): 23:1-23:31 (2021) - [c112]Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu:
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? ACSAC 2021: 596-608 - [c111]Wenjun Fan, Sang-Yoon Chang, Xiaobo Zhou, Shouhuai Xu:
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking. CNS 2021: 101-109 - [c110]Liangde Tao, Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi, Dian Huang:
Hardness and Algorithms for Electoral Manipulation Under Media Influence. IJTCS-FAW 2021: 53-64 - [c109]Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
Paying Firms to Share Cyber Threat Intelligence. GameSec 2021: 365-377 - [c108]Nathan Daughety, Marcus Pendleton, Shouhuai Xu, Laurent Njilla, John V. Franco:
vCDS: A Virtualized Cross Domain Solution Architecture. MILCOM 2021: 61-68 - [c107]Shouhuai Xu:
SARR: A Cybersecurity Metrics and Quantification Framework (Keynote). SciSec 2021: 3-17 - [c106]John Charlton, Pang Du, Shouhuai Xu:
A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics. SciSec 2021: 77-92 - [i53]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. CoRR abs/2102.13223 (2021) - [i52]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. CoRR abs/2102.13226 (2021) - [i51]Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin:
Towards Making Deep Learning-based Vulnerability Detectors Robust. CoRR abs/2108.00669 (2021) - [i50]Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu:
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? CoRR abs/2109.09654 (2021) - [i49]Huashan Chen, Richard B. Garcia-Lebron, Zheyuan Sun, Jin-Hee Cho, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Software Diversity. CoRR abs/2111.10090 (2021) - [i48]Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. CoRR abs/2112.07826 (2021) - 2020
- [j41]Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, Yusheng Feng:
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. EAI Endorsed Trans. Security Safety 7(25): e4 (2020) - [c105]Shouhuai Xu:
The Cybersecurity Dynamics Way of Thinking and Landscape. MTD@CCS 2020: 69-80 - [c104]Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. COCOON 2020: 85-97 - [c103]Yiming Zhang, Yujie Fan, Shifu Hou, Yanfang Ye, Xusheng Xiao, Pan Li, Chuan Shi, Liang Zhao, Shouhuai Xu:
Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub. ICKG 2020: 458-465 - [c102]Eric Ficke, Shouhuai Xu:
APIN: Automatic Attack Path Identification in Computer Networks. ISI 2020: 1-6 - [c101]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. ISI 2020: 1-6 - [c100]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. ISI 2020: 1-6 - [i47]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. CoRR abs/2001.02334 (2020) - [i46]Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector. CoRR abs/2001.02350 (2020) - [i45]Yujuan Han, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics with Ergodic Time-dependent Parameters Is Globally Attractive. CoRR abs/2001.07958 (2020) - [i44]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
Enhancing Deep Neural Networks Against Adversarial Malware Examples. CoRR abs/2004.07919 (2020) - [i43]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
SoK: Arms Race in Adversarial Malware Detection. CoRR abs/2005.11671 (2020) - [i42]Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. CoRR abs/2007.02533 (2020) - [i41]Rosana Montanez Rodriguez, Edward Golob, Shouhuai Xu:
Human Cognition through the Lens of Social Engineering Cyberattacks. CoRR abs/2007.04932 (2020) - [i40]Shouhuai Xu:
Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity. CoRR abs/2010.05683 (2020) - [i39]Shouhuai Xu:
On the Security of Group Communication Schemes. CoRR abs/2010.05692 (2020)
2010 – 2019
- 2019
- [j40]Richard Garcia-Lebron, David J. Myers, Shouhuai Xu, Jie Sun:
Node diversification in complex networks by decentralized colouring. J. Complex Networks 7(4): 554-563 (2019) - [j39]Jin-Hee Cho, Shouhuai Xu, Patrick M. Hurley, Matthew MacKay, Trevor Benjamin, Mark R. Beaumont:
STRAM: Measuring the Trustworthiness of Computer-Based Systems. ACM Comput. Surv. 51(6): 128:1-128:47 (2019) - [j38]Xing Fang, Maochao Xu, Shouhuai Xu, Peng Zhao:
A deep learning framework for predicting cyber attacks rates. EURASIP J. Inf. Secur. 2019: 5 (2019) - [j37]Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics Towards Measuring Cyber Agility. IEEE Trans. Inf. Forensics Secur. 14(12): 3217-3232 (2019) - [j36]Zongzong Lin, Wenlian Lu, Shouhuai Xu:
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent. IEEE/ACM Trans. Netw. 27(3): 1098-1111 (2019) - [c99]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. AAAI 2019: 2572-2579 - [c98]Lingwei Chen, Shifu Hou, Yanfang Ye, Thirimachos Bourlai, Shouhuai Xu, Liang Zhao:
iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow. ASONAM 2019: 1097-1104 - [c97]Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi:
KCRS: A Blockchain-Based Key Compromise Resilient Signature System. BlockSys 2019: 226-239 - [c96]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribe-Effect Uncertainty: A Dichotomy Result. IJCAI 2019: 158-164 - [c95]Yujie Fan, Yiming Zhang, Shifu Hou, Lingwei Chen, Yanfang Ye, Chuan Shi, Liang Zhao, Shouhuai Xu:
iDev: Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow. IJCAI 2019: 2272-2278 - [c94]Gabriel C. Fernandez, Shouhuai Xu:
A Case Study on using Deep Learning for Network Intrusion Detection. MILCOM 2019: 1-6 - [c93]Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. MILCOM 2019: 1-6 - [e12]Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11933, Springer 2019, ISBN 978-3-030-34636-2 [contents] - [i38]Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics Towards Measuring Cyber Agility. CoRR abs/1906.05395 (2019) - [i37]Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses. CoRR abs/1908.04507 (2019) - [i36]Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. CoRR abs/1909.08725 (2019) - [i35]Gabriel C. Fernandez, Shouhuai Xu:
A Case Study on Using Deep Learning for Network Intrusion Detection. CoRR abs/1910.02203 (2019) - 2018
- [j35]Miroslaw Kutylowski, Yu Wang, Shouhuai Xu, Laurence T. Yang:
Special issue on social network security and privacy. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j34]Weiqi Dai, Yukun Du, Hai Jin, Weizhong Qiang, Deqing Zou, Shouhuai Xu, Zhongze Liu:
RollSec: Automatically Secure Software States Against General Rollback. Int. J. Parallel Program. 46(4): 788-805 (2018) - [j33]Weiqi Dai, Pengfei Wan, Weizhong Qiang, Laurence T. Yang, Deqing Zou, Hai Jin, Shouhuai Xu, Zirong Huang:
TNGuard: Securing IoT Oriented Tenant Networks Based on SDN. IEEE Internet Things J. 5(3): 1411-1423 (2018) - [j32]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. EAI Endorsed Trans. Security Safety 4(13): e5 (2018) - [j31]Lei Xu, Jong-Hyuk Lee, Seung Hun Kim, Qingji Zheng, Shouhuai Xu, Taeweon Suh, Won Woo Ro, Weidong Shi:
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment. IEEE Trans. Cloud Comput. 6(2): 478-491 (2018) - [j30]Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Modeling and Predicting Cyber Hacking Breaches. IEEE Trans. Inf. Forensics Secur. 13(11): 2856-2871 (2018) - [j29]Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. IEEE Trans. Inf. Forensics Secur. 13(12): 2965-2980 (2018) - [j28]Ren Zheng, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics Is Globally Stable. IEEE Trans. Netw. Sci. Eng. 5(2): 156-170 (2018) - [j27]Moustafa Saleh, Tao Li, Shouhuai Xu:
Multi-context features for detecting malicious programs. J. Comput. Virol. Hacking Tech. 14(2): 181-193 (2018) - [c92]Yanfang Ye, Shifu Hou, Lingwei Chen, Xin Li, Liang Zhao, Shouhuai Xu, Jiabin Wang, Qi Xiong:
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. ACSAC 2018: 542-552 - [c91]Lingwei Chen, Shifu Hou, Yanfang Ye, Shouhuai Xu:
DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks. ASONAM 2018: 782-789 - [c90]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Nolan Shah, Yang Lu, Weidong Shi:
Protecting Election from Bribery: New Approach and Computational Complexity Characterization. AAMAS 2018: 1894-1896 - [c89]Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of firewalls and DMZs. HotSoS 2018: 9:1-9:11 - [c88]Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of network diversity: poster. HotSoS 2018: 24:1 - [c87]Qian Chen, Azizeh Khaled Sowan, Shouhuai Xu:
A safety and security architecture for reducing accidents in intelligent transportation systems. ICCAD 2018: 95 - [c86]Richard B. Garcia-Lebron, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs. MILCOM 2018: 70-75 - [c85]Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Characterizing the Effectiveness of Network-Based Intrusion Detection Systems. MILCOM 2018: 76-81 - [c84]John Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu:
Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth. MILCOM 2018: 450-455 - [c83]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. NDSS 2018 - [e11]David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5 [contents] - [e10]Feng Liu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11287, Springer 2018, ISBN 978-3-030-03025-4 [contents] - [d1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE DataPort, 2018 - [i34]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. CoRR abs/1801.01681 (2018) - [i33]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. CoRR abs/1807.06756 (2018) - [i32]Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu:
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples. CoRR abs/1809.06498 (2018) - [i31]Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. CoRR abs/1810.07260 (2018) - [i30]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. CoRR abs/1811.03158 (2018) - [i29]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. CoRR abs/1811.04900 (2018) - [i28]Richard Garcia-Lebron, David J. Myers, Shouhuai Xu, Jie Sun:
Node Diversification in Complex Networks by Decentralized Coloring. CoRR abs/1811.11197 (2018) - [i27]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge. CoRR abs/1812.08108 (2018) - 2017
- [j26]Marcus Pendleton, Richard Garcia-Lebron, Jin-Hee Cho, Shouhuai Xu:
A Survey on Systems Security Metrics. ACM Comput. Surv. 49(4): 62:1-62:35 (2017) - [j25]Xiaoxiao Hu, Maochao Xu, Shouhuai Xu, Peng Zhao:
Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization. Reliab. Eng. Syst. Saf. 159: 119-133 (2017) - [j24]Maochao Xu, Lei Hua, Shouhuai Xu:
A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning. Technometrics 59(4): 508-520 (2017) - [c82]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
EPBC: Efficient Public Blockchain Client for lightweight users. SERIAL@Middleware 2017: 1:1-1:6 - [c81]Marcus Pendleton, Shouhuai Xu:
A dataset generator for next generation system call host intrusion detection systems. MILCOM 2017: 231-236 - [c80]Moustafa Saleh, E. Paul Ratazzi, Shouhuai Xu:
A control flow graph-based signature for packer identification. MILCOM 2017: 683-688 - 2016
- [c79]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu:
VulPecker: an automated vulnerability detection system based on code similarity analysis. ACSAC 2016: 201-213 - [c78]Jose David Mireles, Jin-Hee Cho, Shouhuai Xu:
Extracting attack narratives from traffic datasets. CyCon U.S. 2016: 118-123 - [c77]Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics and measurement of trustworthy systems. MILCOM 2016: 1237-1242 - [i26]Marcus Pendleton, Richard Garcia-Lebron, Shouhuai Xu:
A Survey on Security Metrics. CoRR abs/1601.05792 (2016) - [i25]Ren Zheng, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics Is Globally Stable. CoRR abs/1602.06807 (2016) - [i24]Shouhuai Xu, Wenlian Lu, Li Xu:
Push- and Pull-based Epidemic Spreading in Networks: Thresholds and Deeper Insights. CoRR abs/1603.07425 (2016) - [i23]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Predicting Cyber Attack Rates with Extreme Values. CoRR abs/1603.07432 (2016) - [i22]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study. CoRR abs/1603.07433 (2016) - [i21]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
A Characterization of Cybersecurity Posture from Network Telescope Data. CoRR abs/1603.07438 (2016) - [i20]Yu-Zhong Chen, Zi-Gang Huang, Shouhuai Xu, Ying-Cheng Lai:
Spatiotemporal patterns and predictability of cyberattacks. CoRR abs/1603.07439 (2016) - [i19]Xiaohu Li, T. Paul Parker, Shouhuai Xu:
A Stochastic Model for Quantitative Security Analyses of Networked Systems. CoRR abs/1603.08300 (2016) - [i18]Maochao Xu, Shouhuai Xu:
An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems. CoRR abs/1603.08304 (2016) - [i17]Gaofeng Da, Maochao Xu, Shouhuai Xu:
A New Approach to Modeling and Analyzing Security of Networked Systems. CoRR abs/1603.08305 (2016) - [i16]Maochao Xu, Gaofeng Da, Shouhuai Xu:
Cyber Epidemic Models with Dependences. CoRR abs/1603.08307 (2016) - [i15]Shouhuai Xu, Wenlian Lu, Hualun Li:
A Stochastic Model of Active Cyber Defense Dynamics. CoRR abs/1603.08309 (2016) - [i14]Wenlian Lu, Shouhuai Xu, Xinlei Yi:
Optimizing Active Cyber Defense. CoRR abs/1603.08312 (2016) - [i13]Ren Zheng, Wenlian Lu, Shouhuai Xu:
Active Cyber Defense Dynamics Exhibiting Rich Phenomena. CoRR abs/1603.08314 (2016) - 2015
- [j23]Weiqi Dai, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi, Laurence Tianruo Yang:
TEE: A virtual DRTM based execution environment for secure cloud-end computing. Future Gener. Comput. Syst. 49: 47-57 (2015) - [j22]Shouhuai Xu, Wenlian Lu, Hualun Li:
A Stochastic Model of Active Cyber Defense Dynamics. Internet Math. 11(1): 23-61 (2015) - [j21]Maochao Xu, Gaofeng Da, Shouhuai Xu:
Cyber Epidemic Models with Dependences. Internet Math. 11(1): 62-92 (2015) - [j20]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Predicting Cyber Attack Rates With Extreme Values. IEEE Trans. Inf. Forensics Secur. 10(8): 1666-1677 (2015) - [c76]Ren Zheng, Wenlian Lu, Shouhuai Xu:
Active cyber defense dynamics exhibiting rich phenomena. HotSoS 2015: 2:1-2:12 - [c75]Qingji Zheng, Shouhuai Xu:
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data. IC2E 2015: 175-184 - [e9]Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang:
Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings. Lecture Notes in Computer Science 9408, Springer 2015, ISBN 978-3-319-25644-3 [contents] - [i12]Shouhuai Xu:
Cybersecurity Dynamics. CoRR abs/1502.05100 (2015) - [i11]Shouhuai Xu:
Emergent Behavior in Cybersecurity. CoRR abs/1502.05102 (2015) - 2014
- [j19]Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi S. Sandhu, Salmin Sultana, Bhavani Thuraisingham, Shouhuai Xu:
A roadmap for privacy-enhanced secure data provenance. J. Intell. Inf. Syst. 43(3): 481-501 (2014) - [j18]Shouhuai Xu, Wenlian Lu, Li Xu, Zhenxin Zhan:
Adaptive Epidemic Dynamics in Networks: Thresholds and Control. ACM Trans. Auton. Adapt. Syst. 8(4): 19:1-19:19 (2014) - [c74]Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye:
An evasion and counter-evasion study in malicious websites detection. CNS 2014: 265-273 - [c73]Ziyi Liu, Weidong Shi, Shouhuai Xu, Zhiqiang Lin:
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy. DATE 2014: 1-6 - [c72]Gaofeng Da, Maochao Xu, Shouhuai Xu:
A new approach to modeling and analyzing security of networked systems. HotSoS 2014: 6 - [c71]Yujuan Han, Wenlian Lu, Shouhuai Xu:
Characterizing the power of moving target defense via cyber epidemic dynamics. HotSoS 2014: 10 - [c70]Shouhuai Xu:
Emergent behavior in cybersecurity. HotSoS 2014: 13 - [c69]Shouhuai Xu:
Cybersecurity dynamics. HotSoS 2014: 14 - [c68]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. INFOCOM 2014: 522-530 - [c67]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
A Characterization of Cybersecurity Posture from Network Telescope Data. INTRUST 2014: 105-126 - [c66]Moustafa Saleh, E. Paul Ratazzi, Shouhuai Xu:
Instructions-Based Detection of Sophisticated Obfuscation and Packing. MILCOM 2014: 1-6 - [e8]Dongdai Lin, Shouhuai Xu, Moti Yung:
Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8567, Springer 2014, ISBN 978-3-319-12086-7 [contents] - [i10]Yujuan Han, Wenlian Lu, Shouhuai Xu:
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics. CoRR abs/1404.6785 (2014) - [i9]Li Xu, Zhenxin Zhan, Shouhuai Xu, Keyin Ye:
An Evasion and Counter-Evasion Study in Malicious Websites Detection. CoRR abs/1408.1993 (2014) - [i8]Qingji Zheng, Shouhuai Xu:
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data. IACR Cryptol. ePrint Arch. 2014: 178 (2014) - 2013
- [j17]Zhenxin Zhan, Maochao Xu, Shouhuai Xu:
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study. IEEE Trans. Inf. Forensics Secur. 8(11): 1775-1789 (2013) - [c65]Weiliang Luo, Shouhuai Xu, Xuxian Jiang:
Real-time detection and prevention of android SMS permission abuses. SESP@CCS Asia 2013: 11-18 - [c64]Yuanfeng Wen, Jong-Hyuk Lee, Ziyi Liu, Qingji Zheng, Weidong Shi, Shouhuai Xu, Taeweon Suh:
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment. Conf. Computing Frontiers 2013: 25:1-25:10 - [c63]Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye:
Cross-layer detection of malicious websites. CODASPY 2013: 141-152 - [c62]Wenlian Lu, Shouhuai Xu, Xinlei Yi:
Optimizing Active Cyber Defense. GameSec 2013: 206-225 - [e7]Kefei Chen, Qi Xie, Weidong Qiu, Shouhuai Xu, Yunlei Zhao:
Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2069-6 [contents] - [i7]Shouhuai Xu, Wenlian Lu, Li Xu, Zhenxin Zhan:
Adaptive Epidemic Dynamics in Networks: Thresholds and Control. CoRR abs/1311.2180 (2013) - [i6]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data. IACR Cryptol. ePrint Arch. 2013: 462 (2013) - 2012
- [j16]Maochao Xu, Shouhuai Xu:
An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems. Internet Math. 8(3): 288-320 (2012) - [j15]Shouhuai Xu, Wenlian Lu, Li Xu:
Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights. ACM Trans. Auton. Adapt. Syst. 7(3): 32:1-32:26 (2012) - [j14]Hongwei Tian, Weining Zhang, Shouhuai Xu, Patrick Sharkey:
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining. Trans. Data Priv. 5(2): 433-467 (2012) - [j13]Shouhuai Xu, Wenlian Lu, Zhenxin Zhan:
A Stochastic Model of Multivirus Dynamics. IEEE Trans. Dependable Secur. Comput. 9(1): 30-45 (2012) - [j12]Weiqi Dai, T. Paul Parker, Hai Jin, Shouhuai Xu:
Enhancing Data Trustworthiness via Assured Digital Signing. IEEE Trans. Dependable Secur. Comput. 9(6): 838-851 (2012) - [c61]Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung:
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. AsiaCCS 2012: 57-58 - [c60]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient query integrity for outsourced dynamic databases. CCSW 2012: 71-82 - [c59]Qingji Zheng, Shouhuai Xu:
Secure and efficient proof of storage with deduplication. CODASPY 2012: 1-12 - [i5]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient Query Integrity for Outsourced Dynamic Databases. IACR Cryptol. ePrint Arch. 2012: 493 (2012) - 2011
- [j11]Xiaohu Li, Timothy Paul Parker, Shouhuai Xu:
A Stochastic Model for Quantitative Security Analyses of Networked Systems. IEEE Trans. Dependable Secur. Comput. 8(1): 28-43 (2011) - [j10]Shouhuai Xu, Xiaohu Li, Timothy Paul Parker, Xueping Wang:
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data. IEEE Trans. Inf. Forensics Secur. 6(1): 39-52 (2011) - [c58]Haifeng Qian, Shouhuai Xu:
Non-interactive editable signatures for assured data provenance. CODASPY 2011: 145-156 - [c57]Qingji Zheng, Shouhuai Xu:
Fair and dynamic proofs of retrievability. CODASPY 2011: 237-248 - [c56]Jose Andre Morales, Michael Main, Weiliang Luo, Shouhuai Xu, Ravi S. Sandhu:
Building malware infection trees. MALWARE 2011: 50-57 - [e6]Yan Chen, Shouhuai Xu, Ahmad-Reza Sadeghi, Xinwen Zhang:
Proceedings of the sixth ACM workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011. ACM 2011, ISBN 978-1-4503-1001-7 [contents] - [i4]Qingji Zheng, Shouhuai Xu:
Secure and Efficient Proof of Storage with Deduplication. IACR Cryptol. ePrint Arch. 2011: 529 (2011) - 2010
- [j9]Haifeng Qian, Shouhuai Xu:
Non-interactive multisignatures in the plain public-key model with efficient verification. Inf. Process. Lett. 111(2): 82-89 (2010) - [c55]Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi S. Sandhu:
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. ACNS 2010: 511-528 - [c54]Weiqi Dai, Hai Jin, Deqing Zou, Shouhuai Xu, Weide Zheng, Lei Shi:
TEE: a virtual DRTM based execution environment for secure cloud-end computing. CCS 2010: 663-665 - [c53]Jose Andre Morales, Ravi S. Sandhu, Shouhuai Xu:
Evaluating detection and treatment effectiveness of commercial anti-malware programs. MALWARE 2010: 31-38 - [c52]Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai Xu, Ravi S. Sandhu:
Symptoms-Based Detection of Bot Processes. MMM-ACNS 2010: 229-241 - [c51]Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing and Exploiting Network Behaviors of Malware. SecureComm 2010: 20-34 - [c50]Jonathan Z. Sun, Shaoen Wu, Shouhuai Xu:
Assigning applications to servers: a simulation study. SpringSim 2010: 171 - [c49]Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi S. Sandhu:
Trustworthy Information: Concepts and Mechanisms. WAIM 2010: 398-404 - [e5]Shouhuai Xu, N. Asokan, Ahmad-Reza Sadeghi:
Proceedings of the fifth ACM workshop on Scalable trusted computing, STC@CCS 2010, Chicago, IL, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0095-7 [contents]
2000 – 2009
- 2009
- [j8]Xuhua Ding, Gene Tsudik, Shouhuai Xu:
Leak-free mediated group signatures. J. Comput. Secur. 17(4): 489-514 (2009) - [j7]Xiaohu Li, T. Paul Parker, Shouhuai Xu:
A probabilistic characterization of a fault-tolerant gossiping algorithm. J. Syst. Sci. Complex. 22(1): 88-108 (2009) - [c48]Justin Leonard, Shouhuai Xu, Ravi S. Sandhu:
A First Step towards Characterizing Stealthy Botnets. ARES 2009: 106-113 - [c47]Justin Leonard, Shouhuai Xu, Ravi S. Sandhu:
A Framework for Understanding Botnets. ARES 2009: 917-922 - [c46]Shouhuai Xu, Moti Yung:
Expecting the Unexpected: Towards Robust Credential Infrastructure. Financial Cryptography 2009: 201-221 - [c45]Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino:
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. IFIPTM 2009: 164-175 - [c44]T. Paul Parker, Shouhuai Xu:
A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks. INTRUST 2009: 39-59 - [c43]Shouhuai Xu, Moti Yung:
SocialClouds: Concept, Security Architecture and Some Mechanisms. INTRUST 2009: 104-128 - [c42]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. ISI 2009: 307-309 - [c41]Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu:
A Characterization of the problem of secure provenance management. ISI 2009: 310-314 - [c40]Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu, Ravi S. Sandhu:
Analyzing DNS activities of bot processes. MALWARE 2009: 98-103 - [c39]Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han:
An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 - [e4]Shouhuai Xu, N. Asokan, Cristina Nita-Rotaru, Jean-Pierre Seifert:
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-788-2 [contents] - 2008
- [j6]Shouhuai Xu, Srdjan Capkun:
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions. ACM Trans. Inf. Syst. Secur. 12(1): 2:1-2:37 (2008) - [c38]Shouhuai Xu, Xiaohu Li, T. Paul Parker:
Exploiting social networks for threshold signing: attack-resilience vs. availability. AsiaCCS 2008: 325-336 - [c37]Shouhuai Xu:
Collaborative Attack vs. Collaborative Defense. CollaborateCom 2008: 217-228 - [c36]Daryl Walleck, Yingjiu Li, Shouhuai Xu:
Empirical Analysis of Certificate Revocation Lists. DBSec 2008: 159-174 - [c35]Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu:
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 - [c34]Aggelos Kiayias, Shouhuai Xu, Moti Yung:
Privacy Preserving Data Mining within Anonymous Credential Systems. SCN 2008: 57-76 - [e3]Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert:
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-295-5 [contents] - 2007
- [j5]Shouhuai Xu:
On the security of group communication schemes. J. Comput. Secur. 15(1): 129-169 (2007) - [c33]Xiaohu Li, T. Paul Parker, Shouhuai Xu:
Towards Quantifying the (In)Security of Networked Systems. AINA 2007: 420-427 - [c32]Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu:
How to Secure Your Email Address Book and Beyond. CANS 2007: 228-246 - [c31]Shouhuai Xu, Ravi S. Sandhu:
A Scalable and Secure Cryptographic Service. DBSec 2007: 144-160 - [c30]Keith Harrison, Shouhuai Xu:
Protecting Cryptographic Keys from Memory Disclosure Attacks. DSN 2007: 137-143 - [c29]Shouhuai Xu, Moti Yung:
K-Anonymous Multi-party Secret Handshakes. Financial Cryptography 2007: 72-87 - [c28]Xiaohu Li, T. Paul Parker, Shouhuai Xu:
A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm. HASE 2007: 283-290 - [c27]Patrick Sharkey, Hongwei Tian, Weining Zhang, Shouhuai Xu:
Privacy-Preserving Data Mining through Knowledge Model Sharing. PinKDD 2007: 97-115 - [c26]Xiaohu Li, T. Paul Parker, Shouhuai Xu:
Towards an analytic model of epidemic spreading in heterogeneous systems. QSHINE 2007: 24 - [e2]Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung:
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-888-6 [contents] - 2006
- [j4]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) - [j3]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. J. Comput. Secur. 14(4): 301-325 (2006) - [c25]T. Paul Parker, Shouhuai Xu:
Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. DASC 2006: 155-162 - [c24]Jim Dowd, Shouhuai Xu, Weining Zhang:
Privacy-Preserving Decision Tree Mining Based on Random Substitutions. ETRICS 2006: 145-159 - [c23]Gene Tsudik, Shouhuai Xu:
A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315 - [c22]Erhan J. Kartaltepe, Shouhuai Xu:
Towards Blocking Outgoing Malicious Impostor Emails. WOWMOM 2006: 657-661 - [e1]Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung:
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-548-7 [contents] - 2005
- [c21]Shouhuai Xu, Weining Zhang:
Knowledge as a Service and Knowledge Breaching. IEEE SCC 2005: 87-94 - [c20]Erhan J. Kartaltepe, Shouhuai Xu:
On Automatically Detecting Malicious Impostor Emails. IWAP 2005: 33-47 - [c19]Gene Tsudik, Shouhuai Xu:
Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39 - [c18]Shouhuai Xu:
On the security of group communication schemes based on symmetric key cryptosystems. SASN 2005: 22-31 - [i3]Gene Tsudik, Shouhuai Xu:
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication). IACR Cryptol. ePrint Arch. 2005: 34 (2005) - 2004
- [c17]Shouhuai Xu, Moti Yung:
Accountable Ring Signatures: A Smart Card Approach. CARDIS 2004: 271-286 - [c16]Shouhuai Xu, Moti Yung:
k-anonymous secret handshakes with reusable credentials. CCS 2004: 158-167 - [c15]Xuhua Ding, Gene Tsudik, Shouhuai Xu:
Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615 - [c14]Shouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu:
Enhancing Anonymity via Market Competition. ITCC (1) 2004: 30-34 - [c13]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 - 2003
- [c12]Gene Tsudik, Shouhuai Xu:
Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286 - [c11]Shouhuai Xu, Ravi S. Sandhu:
Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. CT-RSA 2003: 355-372 - [c10]Shouhuai Xu, Moti Yung:
Retrofitting Fairness on the Original RSA-Based E-cash. Financial Cryptography 2003: 51-68 - [c9]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- - [c8]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 - [c7]Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:
Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144 - [c6]Amitabha Bagchi, Amitabh Chaudhary, Michael T. Goodrich, Shouhuai Xu:
Constructing Disjoint Paths for Secure Communication. DISC 2003: 181-195 - [i2]Gene Tsudik, Shouhuai Xu:
Accumulating Composites and Improved Group Signing. IACR Cryptol. ePrint Arch. 2003: 112 (2003) - 2002
- [c5]Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:
Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82 - [c4]Shouhuai Xu, Moti Yung:
The Dark Side of Threshold Cryptography. Financial Cryptography 2002: 198-219 - [c3]Shouhuai Xu, Ravi S. Sandhu:
Authenticated multicast immune to denial-of-service attack. SAC 2002: 196-200 - [i1]Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:
Key-Insulated Public-Key Cryptosystems. IACR Cryptol. ePrint Arch. 2002: 77 (2002) - 2000
- [c2]Shouhuai Xu, Moti Yung, Gendu Zhang:
Friendly Observers Ease Off-Line E-Cash. CARDIS 2000: 3-18
1990 – 1999
- 1999
- [c1]Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu:
Money Conservation via Atomicity in Fair Off-Line E-Cash. ISW 1999: 14-31 - 1998
- [j2]Shouhuai Xu, Gendu Zhang, Hong Zhu:
On the Security of Three-Party Cryptographic Protocols. ACM SIGOPS Oper. Syst. Rev. 32(3): 7-20 (1998) - 1997
- [j1]Shouhuai Xu, Gendu Zhang, Hong Zhu:
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics. ACM SIGOPS Oper. Syst. Rev. 31(4): 12-23 (1997)
Coauthor Index
aka: Timothy Paul Parker
aka: Rosana Montanez Rodriguez
aka: Yanfang (Fanny) Ye
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint