Droid-sec: deep learning in android malware detection Z Yuan, Y Lu, Z Wang, Y Xue Proceedings of the 2014 ACM conference on SIGCOMM, 371-372, 2014 | 612 | 2014 |
Droiddetector: android malware characterization and detection using deep learning Z Yuan, Y Lu, Y Xue Tsinghua Science and Technology 21 (1), 114-123, 2016 | 532 | 2016 |
Packet classification algorithms: From theory to practice Y Qi, L Xu, B Yang, Y Xue, J Li IEEE INFOCOM 2009, 648-656, 2009 | 278 | 2009 |
A memory efficient multiple pattern matching architecture for network security T Song, W Zhang, D Wang, Y Xue IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 166-170, 2008 | 112 | 2008 |
An novel hybrid method for effectively classifying encrypted traffic GL Sun, Y Xue, Y Dong, D Wang, C Li 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 103 | 2010 |
Fine-grained android malware detection based on deep learning D Li, Z Wang, Y Xue 2018 IEEE Conference on Communications and Network Security (CNS), 1-2, 2018 | 69 | 2018 |
Traffic classification: Issues and challenges Y Xue, D Wang, L Zhang 2013 International Conference on Computing, Networking and Communications …, 2013 | 56 | 2013 |
Feacan: Front-end acceleration for content-aware network processing Y Qi, K Wang, J Fong, Y Xue, J Li, W Jiang, V Prasanna 2011 Proceedings IEEE INFOCOM, 2114-2122, 2011 | 53 | 2011 |
LiveSec: Towards effective security management in large-scale production networks K Wang, Y Qi, B Yang, Y Xue, J Li 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 47 | 2012 |
Hierarchical cache directory for CMP SL Guo, HX Wang, YB Xue, CM Li, DS Wang Journal of Computer Science and Technology 25 (2), 246-256, 2010 | 47 | 2010 |
A new rumor propagation model and control strategy on social networks Y Bao, C Yi, Y Xue, Y Dong Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 43 | 2013 |
Practical multituple packet classification using dynamic discrete bit selection B Yang, J Fong, W Jiang, Y Xue, J Li IEEE Transactions on Computers 63 (2), 424-434, 2012 | 40 | 2012 |
A3: automatic analysis of android malware Z Luoshi, N Yan, W Xiao, W Zhaoguo, X Yibo 1st International Workshop on Cloud Computing and Information Security, 89-93, 2013 | 36 | 2013 |
DroidChain: A novel Android malware detection method based on behavior chains Z Wang, C Li, Z Yuan, Y Guan, Y Xue Pervasive and Mobile Computing 32, 3-14, 2016 | 34 | 2016 |
Characterizing application behaviors for classifying p2p traffic D Wang, L Zhang, Z Yuan, Y Xue, Y Dong 2014 International Conference on Computing, Networking and Communications …, 2014 | 34 | 2014 |
Memory efficient string matching algorithm for network intrusion management system J Yu, Y Xue, J Li Tsinghua Science and Technology 12 (5), 585-593, 2007 | 32 | 2007 |
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time D Wang, L He, Y Xue, Y Dong 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012 | 26 | 2012 |
UTM-CM: A practical control mechanism solution for UTM system Y Zhang, F Deng, Z Chen, Y Xue, C Lin 2010 International Conference on Communications and Mobile Computing 1, 86-90, 2010 | 26 | 2010 |
Para-snort: A multi-thread snort on multi-core ia platform X Chen, Y Wu, L Xu, Y Xue, J Li Proceedings of Parallel and Distributed Computing and Systems (PDCS), 2009 | 25 | 2009 |
MDH: A high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set Z Zhou, Y Xue, J Liu, W Zhang, J Li Information and Communications Security: 9th International Conference, ICICS …, 2007 | 25 | 2007 |