Xinming Ou
Orcid: 0009-0007-2501-7991
According to our database1,
Xinming Ou
authored at least 69 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The Impact of Train-Test Leakage on Machine Learning-based Android Malware Detection.
CoRR, 2024
CoRR, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot Ecosystem.
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2021
What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering.
CoRR, 2021
An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
2020
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the Security and Privacy in Communication Networks, 2019
2018
Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps.
ACM Trans. Priv. Secur., 2018
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Enhanced Security of Building Automation Systems Through Microkernel-Based Controller Platforms.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming.
IEEE Trans. Dependable Secur. Comput., 2016
Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
2015
Inf. Secur. J. A Glob. Perspect., 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
Compiling Abstract Specifications into Concrete Systems - Bringing Order to the Cloud.
Proceedings of the 28th Large Installation System Administration Conference, 2014
Proceedings of the Cyber and Information Security Research Conference, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
J. Comput. Secur., 2013
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013
Mission-oriented moving target defense based on cryptographically strong network dynamics.
Proceedings of the Cyber Security and Information Intelligence, 2013
2012
A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow.
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
Proceedings of the 2012 eCrime Researchers Summit, 2012
2011
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-1860-3, 2011
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities.
Proceedings of the Database and Expert Systems Applications, 2011
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
IEEE J. Sel. Areas Commun., 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
Proceedings of the Computer Security, 2008
2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
A Two-Tier Technique for Supporting Quantifiers in a Lazily Proof-Explicating Theorem Prover.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2005
2004
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004
2003
Proceedings of the Computer Aided Verification, 15th International Conference, 2003
2000
Proceedings of the 2000 International Workshop on Parallel Processing, 2000
Proceedings of the 2000 International Workshop on Parallel Processing, 2000