Dingbang Xu

According to our database1, Dingbang Xu authored at least 15 papers between 2000 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015

2013
On Feasibility of Fingerprinting Wireless Sensor Nodes Using Physical Properties.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

2012
User identification and anonymization in 802.11 wireless LANs.
Secur. Commun. Networks, 2012

L2P2: Location-aware location privacy protection for location-based services.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2010
802.11 User Anonymization.
Proceedings of the Global Communications Conference, 2010

2009
Enhanced Feature Selection and Generation for 802.11 User Identification.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2006
A Flexible Approach to Intrusion Alert Anonymization and Correlation.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

2005
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Hypothesizing and reasoning about attacks missed by intrusion detection systems.
ACM Trans. Inf. Syst. Secur., 2004

Techniques and tools for analyzing intrusion alerts.
ACM Trans. Inf. Syst. Secur., 2004

Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
Proceedings of the Network and Distributed System Security Symposium, 2004

Alert Correlation through Triggering Events and Common Resources.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Adapting Query Optimization Techniques for Efficient Alert Correlation.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Learning attack strategies from intrusion alerts.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2000
A Strategy for Persistent Object Service under CORBA and WEB Environment.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000


  Loading...