Shouhuai Xu
Orcid: 0000-0001-8034-0942
According to our database1,
Shouhuai Xu
authored at least 216 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proc. IEEE, March, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Characterizing the Evolution of Psychological Tactics and Techniques Exploited by Malicious Emails.
CoRR, 2024
CoRR, 2024
CoRR, 2024
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
Auton. Agents Multi Agent Syst., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study.
Proceedings of the IEEE Conference on Communications and Network Security, 2023
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Parallel Distributed Comput., 2022
J. Circuits Syst. Comput., 2022
CoRR, 2022
Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study.
CoRR, 2022
SAND: semi-automated adaptive network defense via programmable rule generation and deployment.
Sci. China Inf. Sci., 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching.
ACM Trans. Softw. Eng. Methodol., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive.
IEEE Trans. Netw. Sci. Eng., 2021
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity.
IEEE Trans. Inf. Forensics Secur., 2021
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection.
IEEE Trans. Dependable Secur. Comput., 2021
Theor. Comput. Sci., 2021
ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks.
IEEE Internet Things J., 2021
IEEE CAA J. Autom. Sinica, 2021
ACM Comput. Surv., 2021
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges.
IEEE Access, 2021
Proceedings of the Science of Cyber Security - Third International Conference, 2021
A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics.
Proceedings of the Science of Cyber Security - Third International Conference, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
Proceedings of the Frontiers of Algorithmics - International Joint Conference, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study.
EAI Endorsed Trans. Security Safety, 2020
CoRR, 2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
2019
IEEE/ACM Trans. Netw., 2019
EURASIP J. Inf. Secur., 2019
ACM Comput. Surv., 2019
J. Complex Networks, 2019
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
iDev: Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
Dataset, November, 2018
J. Comput. Virol. Hacking Tech., 2018
IEEE Trans. Netw. Sci. Eng., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment.
IEEE Trans. Cloud Comput., 2018
EAI Endorsed Trans. Security Safety, 2018
IEEE Internet Things J., 2018
Int. J. Parallel Program., 2018
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge.
CoRR, 2018
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples.
CoRR, 2018
CoRR, 2018
Concurr. Comput. Pract. Exp., 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
A safety and security architecture for reducing accidents in intelligent transportation systems.
Proceedings of the International Conference on Computer-Aided Design, 2018
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Protecting Election from Bribery: New Approach and Computational Complexity Characterization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Technometrics, 2017
Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization.
Reliab. Eng. Syst. Saf., 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
A dataset generator for next generation system call host intrusion detection systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017
2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2016 International Conference on Cyber Conflict, 2016
VulPecker: an automated vulnerability detection system based on code similarity analysis.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Future Gener. Comput. Syst., 2015
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
2014
ACM Trans. Auton. Adapt. Syst., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study.
IEEE Trans. Inf. Forensics Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment.
Proceedings of the Computing Frontiers Conference, 2013
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Trans. Data Priv., 2012
ACM Trans. Auton. Adapt. Syst., 2012
An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems.
Internet Math., 2012
IACR Cryptol. ePrint Arch., 2012
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
IEEE Trans. Dependable Secur. Comput., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
Non-interactive multisignatures in the plain public-key model with efficient verification.
Inf. Process. Lett., 2010
Proceedings of the Web-Age Information Management, 11th International Conference, 2010
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Computer Network Security, 2010
Evaluating detection and treatment effectiveness of commercial anti-malware programs.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
J. Syst. Sci. Complex., 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions.
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Protecting Persons While Protecting the People, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Exploiting social networks for threshold signing: attack-resilience vs. availability.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007
Proceedings of the Privacy, 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
J. Comput. Secur., 2006
Ad Hoc Networks, 2006
Proceedings of the 2006 International Symposium on a World of Wireless, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
2005
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication).
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005
2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Proceedings of the Distributed Computing, 17th International Conference, 2003
Proceedings of the Public Key Cryptography, 2003
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2000
Friendly Observers Ease Off-Line E-Cash.
Proceedings of the Smart Card Research and Advanced Applications, 2000
1999
Proceedings of the Information Security, Second International Workshop, 1999
1998
ACM SIGOPS Oper. Syst. Rev., 1998
1997
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.
ACM SIGOPS Oper. Syst. Rev., 1997