Xiaokui Shu

Orcid: 0000-0002-7381-7041

According to our database1, Xiaokui Shu authored at least 26 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Debugging Malware Classification Models Based on Event Logs with Explainable AI.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Evidential Cyber Threat Hunting.
CoRR, 2021

2020
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Towards an Open Format for Scalable System Telemetry.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2018
Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Anomaly Detection as a Service: Challenges, Advances, and Opportunities
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02354-5, 2017

Long-Span Program Behavior Modeling and Attack Detection.
ACM Trans. Priv. Secur., 2017

Breaking the Target: An Analysis of Target Data Breach and Lessons Learned.
CoRR, 2017

2016
Threat Detection in Program Execution and Data Movement: Theory and Practice.
PhD thesis, 2016

Fast Detection of Transformed Data Leaks.
IEEE Trans. Inf. Forensics Secur., 2016

DECT: Distributed Evolving Context Tree for Mining Web Behavior Evolution.
Proceedings of the 19th International Conference on Extending Database Technology, 2016

Program Anomaly Detection: Methodology and Practices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Privacy-Preserving Detection of Sensitive Data Exposure.
IEEE Trans. Inf. Forensics Secur., 2015

Profiling user-trigger dependence for Android malware detection.
Comput. Secur., 2015

A Formal Framework for Program Anomaly Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Rapid and parallel content screening for detecting transformed data exposure.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2013
Massive distributed and parallel log analysis for organizational security.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Robustness of keystroke-dynamics based biometrics against synthetic forgeries.
Comput. Secur., 2012

Data Leak Detection as a Service.
Proceedings of the Security and Privacy in Communication Networks, 2012


  Loading...