关注
Shouhuai Xu
标题
引用次数
年份
(How) Can We Manage the Trustworthiness of Security Infrastructures and Services?
S Xu
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 6-6, 2008
22008
{Near-Ultrasound} Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone
Q Xia, Q Chen, S Xu
32nd USENIX Security Symposium (USENIX Security 23), 4589-4606, 2023
52023
VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
D Zou, S Wang, S Xu, Z Li, H Jin
IEEE Transactions on Dependable and Secure Computing 18 (5), 2224-2236, 2019
2952019
A case study on using deep learning for network intrusion detection
GC Fernández, S Xu
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 1-6, 2019
572019
A Characterization of Complex Network Attack Resilience
A Tyra
University of Texas at San Antonio, 2012
22012
A characterization of cybersecurity posture from network telescope data
Z Zhan, M Xu, S Xu
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
322015
A characterization of the problem of secure provenance management
S Xu, Q Ni, E Bertino, R Sandhu
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
292009
A control flow graph-based signature for packer identification
M Saleh, EP Ratazzi, S Xu
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 683-688, 2017
132017
A Coupling Approach to Analyzing Games with Dynamic Environments
BC Collins, S Xu, PN Brown
arXiv preprint arXiv:2207.06504, 2022
2022
A dataset generator for next generation system call host intrusion detection systems
M Pendleton, S Xu
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 231-236, 2017
222017
A deep learning framework for predicting cyber attacks rates
X Fang, M Xu, S Xu, P Zhao
EURASIP Journal on Information security 2019, 1-11, 2019
1062019
A first step towards characterizing stealthy botnets
J Leonard, S Xu, R Sandhu
2009 International Conference on Availability, Reliability and Security, 106-113, 2009
102009
A Flexible Framework for Secret Handshakes: Multi-party Anonymous and Un-observable Authentication
G Tsudik, S Xu
Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006
832006
A Framework for Characterizing Cyber Attack Reconnaissance Behaviors
R Garcia-Lebron
University of Texas at San Antonio, 2019
2019
A framework for characterizing the evolution of cyber attacker-victim relation graphs
RB Garcia-Lebron, KM Schweitzer, RM Bateman, S Xu
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 70-75, 2018
102018
A framework for enhancing deep neural networks against adversarial malware
D Li, Q Li, Y Ye, S Xu
IEEE Transactions on Network Science and Engineering 8 (1), 736-750, 2021
72*2021
A framework for predicting data breach risk: Leveraging dependence to cope with sparsity
Z Fang, M Xu, S Xu, T Hu
IEEE Transactions on Information Forensics and Security 16, 2186-2201, 2021
412021
A Framework for Quantifying Security Effectiveness of Cyber Defenses
H Chen, S Xu
University of Texas at San Antonio, 2021
2021
A framework for understanding botnets
J Leonard, S Xu, R Sandhu
2009 International Conference on Availability, Reliability and Security, 917-922, 2009
612009
A method for safekeeping cryptographic keys from memory disclosure attacks
TP Parker, S Xu
Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010
352010
系统目前无法执行此操作,请稍后再试。
文章 1–20