Xiaoqi Jia
Orcid: 0000-0002-8376-3235
According to our database1,
Xiaoqi Jia
authored at least 69 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services.
IEEE Trans. Dependable Secur. Comput., 2024
MDGraph: A novel malware detection method based on memory dump and graph neural network.
Expert Syst. Appl., 2024
Comput. Secur., 2024
LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024
Proceedings of the 24th IEEE International Symposium on Cluster, 2024
2023
IEEE/ACM Trans. Netw., December, 2023
J. Inf. Secur. Appl., June, 2023
Peer Peer Netw. Appl., May, 2023
Container Privilege Escalation and Escape Detection Method Based on Security-First Architecture.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Refining Use-After-Free Defense: Eliminating Dangling Pointers in Registers and Memory.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
J. Inf. Secur. Appl., 2022
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning.
J. Grid Comput., 2022
Trans. Emerg. Telecommun. Technol., 2022
Proceedings of the IEEE International Conference on Trust, 2022
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022
Proceedings of the IEEE International Conference on Communications, 2022
2021
Expert Syst. Appl., 2021
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021
2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020
Comput. Networks, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
ET-GAN: Cross-Language Emotion Transfer Based on Cycle-Consistent Generative Adversarial Networks.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Future Gener. Comput. Syst., 2019
Powerful Speaker Embedding Training Framework by Adversarially Disentangled Identity Representation.
CoRR, 2019
EG-GAN: Cross-Language Emotion Gain Synthesis based on Cycle-Consistent Adversarial Networks.
CoRR, 2019
IEEE Access, 2019
2018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018
2017
J. Inf. Sci. Eng., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
2016
Towards service continuity for transactional applications via diverse device drivers.
Int. J. Inf. Comput. Secur., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016
2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
2013
Secur. Commun. Networks, 2013
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Information Security Practice and Experience, 2011
Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Information Security, 2010
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control.
Proceedings of the Computational Science and Its Applications, 2010
Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008