Xiao-chun Yun

Orcid: 0000-0003-2849-1086

According to our database1, Xiao-chun Yun authored at least 120 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification.
IEEE Trans. Software Eng., August, 2024

CTISum: A New Benchmark Dataset For Cyber Threat Intelligence Summarization.
CoRR, 2024

APIBeh: Learning Behavior Inclination of APIs for Malware Classification.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

2023
Encrypted TLS Traffic Classification on Cloud Platforms.
IEEE/ACM Trans. Netw., February, 2023

2022
iConSnap: An Incremental Continuous Snapshots System for Virtual Machines.
IEEE Trans. Serv. Comput., 2022

A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation.
IEEE Trans. Netw. Serv. Manag., 2022

A Sketching Approach for Obtaining Real-Time Statistics Over Data Streams in Cloud.
IEEE Trans. Cloud Comput., 2022

Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Comput. Secur., 2022

DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph.
Proceedings of the Computational Science - ICCS 2022, 2022

2021
VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison.
IEEE Trans. Inf. Forensics Secur., 2021

Finding disposable domain names: A linguistics-based stacking approach.
Comput. Networks, 2021

2020
Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data.
IEEE Trans. Parallel Distributed Syst., 2020

Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2020

HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics.
Comput. Secur., 2020

Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020

Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Fast Wait-Free Construction for Pool-Like Objects with Weakened Internal Order: Stacks as an Example.
IEEE Trans. Parallel Distributed Syst., 2019

HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
EAI Endorsed Trans. Security Safety, 2019

Framework for risk assessment in cyber situational awareness.
IET Inf. Secur., 2019

A Method of HTTP Malicious Traffic Detection on Mobile Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Accelerating Real-Time Tracking Applications over Big Data Stream with Constrained Space.
Proceedings of the Database Systems for Advanced Applications, 2019

2018
SnapFiner: A Page-Aware Snapshot System for Virtual Machines.
IEEE Trans. Parallel Distributed Syst., 2018

Community Discovery of Attribution Trace Based on Deep Learning Approach.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters.
IEEE Trans. Parallel Distributed Syst., 2017

A nonparametric approach to the automated protocol fingerprint inference.
J. Netw. Comput. Appl., 2017

Introspection-Based Memory Pruning for Live VM Migration.
Int. J. Parallel Program., 2017

Rethinking robust and accurate application protocol identification.
Comput. Networks, 2017

NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Discovering Malicious Domains through Alias-Canonical Graph.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017

MSTM: A novel map matching approach for low-sampling-rate trajectories.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

NSIM: A robust method to discover similar trajectories on cellular network location data.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

LBFM: Multi-Dimensional Membership Index for Block-Level Data Skipping.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Efficient Data Blocking and Skipping Framework Applying Heuristic Rules.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Mining Users' Important Locations and Semantics on Cellular Network Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Supporting Real-Time Analytic Queries in Big and Fast Data Environments.
Proceedings of the Database Systems for Advanced Applications, 2017

NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
A Semantics-Aware Approach to the Automated Network Protocol Identification.
IEEE/ACM Trans. Netw., 2016

Quantitative threat situation assessment based on alert verification.
Secur. Commun. Networks, 2016

Weighted hierarchical geographic information description model for social relation estimation.
Neurocomputing, 2016

Fast Reused Function Retrieval Method Based on Simhash and Inverted Index.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

How to Automatically Identify the Homology of Different Malware.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Retweeting behavior prediction using probabilistic matrix factorization.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Location-based correlation estimation in social network via Collaborative Learning.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Study on Address Blocks with Inaccurate Geolocations of China's Internet.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

A Compact In-memory Index for Managing Set Membership Queries on Streaming Data.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
Bidirectional Active Learning: A Two-Way Exploration Into Unlabeled and Labeled Data Set.
IEEE Trans. Neural Networks Learn. Syst., 2015

SMS Worm Propagation Over Contact Social Networks: Modeling and Validation.
IEEE Trans. Inf. Forensics Secur., 2015

FastRAQ: A Fast Approach to Range-Aggregate Queries in Big Data Environments.
IEEE Trans. Cloud Comput., 2015

Update vs. upgrade: Modeling with indeterminate multi-class active learning.
Neurocomputing, 2015

Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Joint Recovery and Representation Learning for Robust Correlation Estimation Based on Partially Observed Data.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Exploring Efficient and Robust Virtual Machine Introspection Techniques.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
MMD: An Approach to Improve Reading Performance in Deduplication Systems.
Proceedings of the 9th IEEE International Conference on Networking, 2014

2013
Out-of-Sequence Traffic Classification Based on Improved Dynamic Time Warping.
IEICE Trans. Inf. Syst., 2013

Counting sort for the live migration of virtual machines.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks.
Proceedings of the Information Security and Privacy Research, 2012

Online Traffic Classification Based on Co-training Method.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

A General Framework of Trojan Communication Detection Based on Network Traces.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Modeling of Hierarchical Index System for Network Operation Security.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Availability analysis of DNSSEC resolution and validation service.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

A novel weighted combination technique for traffic classification.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Traffic Measurement Based DNSSEC Analysis.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

Research of Network Vulnerability Analysis Based on Attack Capability Transfer.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Graph-based multi-space semantic correlation propagation for video retrieval.
Vis. Comput., 2011

CNSSA: A Comprehensive Network Security Situation Awareness System.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Network Threat Assessment Based on Alert Verification.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

A Propagation Model for Social Engineering Botnets in Social Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

2010
Randomness Testing of Compressed Data
CoRR, 2010

Adapting information bottleneck method for automatic construction of domain-oriented sentiment lexicon.
Proceedings of the Third International Conference on Web Search and Web Data Mining, 2010

Cooperative Work Systems for the Security of Digital Computing Infrastructure.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

A New Weighted Ensemble Model for Detecting DoS Attack Streams.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

A Pseudo-Random Number Generator Based on LZSS.
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010

2009
Fast and Memory-Efficient Regular Expression Matching Using Transition Sharing.
IEICE Trans. Inf. Syst., 2009

A review of classification methods for network vulnerability.
Proceedings of the IEEE International Conference on Systems, 2009

The Block LZSS Compression Algorithm.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009

2008
An Efficient Routing Mechanism in Network Simulation.
Simul., 2008

An Effective Anomaly Detection Method in SMTP Traffic.
Int. J. Netw. Secur., 2008

A Survey of Alert Fusion Techniques for Security Incident.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Design and Implementation of Multi-Version Disk Backup Data Merging Algorithm.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Optimizing Traffic Classification Using Hybrid Feature Selection.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Deadlock-Free Multi-Path Routing for Torus-Based NoCs.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow Applications.
J. Inf. Sci. Eng., 2007

How to construct secure proxy cryptosystem.
Inf. Sci., 2007

A User-Habit Property: Haunting of Users in IP Networks.
IEICE Trans. Inf. Syst., 2007

Handover Cost Optimization in Traffic Management for Multi-homed Mobile Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Optimizing IP Flow Classification Using Feature Selection.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Study on Worm Poisoning Technology.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Analyzing the Characteristics of Gnutella Overlays.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
Anomaly Detection in SMTP Traffic.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Model and Estimation of Worm Propagation Under Network Partition.
Proceedings of the Information Security Practice and Experience, 2006

A Counting-Based Method for Massive Spam Mail Classification.
Proceedings of the Information Security Practice and Experience, 2006

Adaptive Method for Monitoring Network and Early Detection of Internet Worms.
Proceedings of the Intelligence and Security Informatics, 2006

A User Habit Based Approach to Detect and Quarantine Worms.
Proceedings of IEEE International Conference on Communications, 2006

An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Implementation of a Dynamic Failover Technology.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

An Improved Network Intrusion Detection Method based on VQ-SVM.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Worm Detection in Large Scale Network by Traffic.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A New Approach to Automatically Detect Worms.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Computer Vulnerability Evaluation Using Fault Tree Analysis.
Proceedings of the Information Security Practice and Experience, 2005

A High-Performance Network Monitoring Platform for Intrusion Detection.
Proceedings of the Information Networking, 2005

An Anti-worm with Balanced Tree Based Spreading Strategy.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

A Worm Behavioral Approach to Susceptible Host Detection.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Assessment of Windows System Security Using Vulnerability Relationship Graph.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A New User-Habit Based Approach for Early Warning of Worms.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Using Boosting Learning Method for Intrusion Detection.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

2004
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

A New Vulnerability Taxonomy Based on Privilege Escalation.
Proceedings of the ICEIS 2004, 2004

An improved failure detector based on pull and push approach.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2003
Anti-Sniffing in Unbounded Networks.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003


  Loading...