Xin Hu
Affiliations:- Pinterest, San Francisco, CA, USA
- IBM T. J. Watson Research Center, IBM Research Division, Yorktown Heights, NY, USA (former)
- University of Michigan, Department of Electrical Engineering and Computer Science, Ann Arbor, MI, USA (PhD 2011)
According to our database1,
Xin Hu
authored at least 39 papers
between 2008 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016
Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016
Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev., 2016
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev., 2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 2013 USENIX Annual Technical Conference, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
IEEE Trans. Mob. Comput., 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the 6th International Conference on Mobile Systems, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008