Xin Hu

Affiliations:
  • Pinterest, San Francisco, CA, USA
  • IBM T. J. Watson Research Center, IBM Research Division, Yorktown Heights, NY, USA (former)
  • University of Michigan, Department of Electrical Engineering and Computer Science, Ann Arbor, MI, USA (PhD 2011)


According to our database1, Xin Hu authored at least 39 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017

Android Malware Clustering Through Malicious Payload Mining.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Password correlation: Quantification, evaluation and application.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016

Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016

Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev., 2016

Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev., 2016

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015

Rateless and pollution-attack-resilient network coding.
Proceedings of the IEEE International Symposium on Information Theory, 2015

FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014

Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Reconciling malware labeling discrepancy via consensus learning.
Proceedings of the Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, 2014

Outsourcing multi-version key-value stores with verifiable data freshness.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Lightweight authentication of freshness in outsourced key-value stores.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
MutantX-S: Scalable Malware Clustering Based on Static Features.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

LISA: Location information ScrAmbler for privacy protection on smartphones.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Privacy protection for users of location-based services.
IEEE Wirel. Commun., 2012

Design of SMS commanded-and-controlled and P2P-structured mobile botnets.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Open WiFi networks: Lethal weapons for botnets?
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation.
IEEE Trans. Mob. Comput., 2011

Good guys vs. Bot Guise: Mimicry attacks against fast-flux detection systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Measurement and analysis of global IP-usage patterns of fast-flux botnets.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Detection of botnets using combined host- and network-level information.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Automatic Generation of String Signatures for Malware Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

RB-Seeker: Auto-detection of Redirection Botnets.
Proceedings of the Network and Distributed System Security Symposium, 2009

Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

Large-scale malware indexing using function-call graphs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Containment of network worms via per-process rate-limiting.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Behavioral detection of malware on mobile handsets.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Attack-Tolerant Time-Synchronization in Wireless Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008


  Loading...