Xiao-chun Yun
Orcid: 0000-0003-2849-1086
According to our database1,
Xiao-chun Yun
authored at least 120 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification.
IEEE Trans. Software Eng., August, 2024
CoRR, 2024
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
2023
IEEE/ACM Trans. Netw., February, 2023
2022
IEEE Trans. Serv. Comput., 2022
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Trans. Cloud Comput., 2022
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Comput. Secur., 2022
Proceedings of the Computational Science - ICCS 2022, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Comput. Networks, 2021
2020
Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data.
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Inf. Forensics Secur., 2020
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics.
Comput. Secur., 2020
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network.
Proceedings of the Computational Science - ICCS 2020, 2020
2019
Fast Wait-Free Construction for Pool-Like Objects with Weakened Internal Order: Stacks as an Example.
IEEE Trans. Parallel Distributed Syst., 2019
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
EAI Endorsed Trans. Security Safety, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Accelerating Real-Time Tracking Applications over Big Data Stream with Constrained Space.
Proceedings of the Database Systems for Advanced Applications, 2019
2018
IEEE Trans. Parallel Distributed Syst., 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
2017
IEEE Trans. Parallel Distributed Syst., 2017
J. Netw. Comput. Appl., 2017
Int. J. Parallel Program., 2017
Comput. Networks, 2017
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
NSIM: A robust method to discover similar trajectories on cellular network location data.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Database Systems for Advanced Applications, 2017
NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
IEEE/ACM Trans. Netw., 2016
Secur. Commun. Networks, 2016
Weighted hierarchical geographic information description model for social relation estimation.
Neurocomputing, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016
2015
Bidirectional Active Learning: A Two-Way Exploration Into Unlabeled and Labeled Data Set.
IEEE Trans. Neural Networks Learn. Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Cloud Comput., 2015
Neurocomputing, 2015
Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Joint Recovery and Representation Learning for Robust Correlation Estimation Based on Partially Observed Data.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Proceedings of the 9th IEEE International Conference on Networking, 2014
2013
IEICE Trans. Inf. Syst., 2013
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
Vis. Comput., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
2010
Adapting information bottleneck method for automatic construction of domain-oriented sentiment lexicon.
Proceedings of the Third International Conference on Web Search and Web Data Mining, 2010
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010
2009
IEICE Trans. Inf. Syst., 2009
Proceedings of the IEEE International Conference on Systems, 2009
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009
2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
2007
Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow Applications.
J. Inf. Sci. Eng., 2007
IEICE Trans. Inf. Syst., 2007
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
Implementation of a Dynamic Failover Technology.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005
An Improved Network Intrusion Detection Method based on VQ-SVM.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Networking, 2005
Proceedings of the Advances in Machine Learning and Cybernetics, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005
2004
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004
A New Vulnerability Taxonomy Based on Privilege Escalation.
Proceedings of the ICEIS 2004, 2004
An improved failure detector based on pull and push approach.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004
2003
Anti-Sniffing in Unbounded Networks.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003