Shouhuai Xu

According to our database1, Shouhuai Xu authored at least 133 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent.
IEEE/ACM Trans. Netw., 2019

Metrics Towards Measuring Cyber Agility.
IEEE Trans. Information Forensics and Security, 2019

A deep learning framework for predicting cyber attacks rates.
EURASIP J. Information Security, 2019

Node diversification in complex networks by decentralized colouring.
J. Complex Networks, 2019

iDev: Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Election with Bribe-Effect Uncertainty: A Dichotomy Result.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Multi-context features for detecting malicious programs.
J. Computer Virology and Hacking Techniques, 2018

Preventive and Reactive Cyber Defense Dynamics Is Globally Stable.
IEEE Trans. Network Science and Engineering, 2018

Modeling and Predicting Cyber Hacking Breaches.
IEEE Trans. Information Forensics and Security, 2018

Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth.
IEEE Trans. Information Forensics and Security, 2018

Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment.
IEEE Trans. Cloud Computing, 2018

Efficient Public Blockchain Client for Lightweight Users.
ICST Trans. Security Safety, 2018

TNGuard: Securing IoT Oriented Tenant Networks Based on SDN.
IEEE Internet of Things Journal, 2018

RollSec: Automatically Secure Software States Against General Rollback.
International Journal of Parallel Programming, 2018

Special issue on social network security and privacy.
Concurrency and Computation: Practice and Experience, 2018

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Characterizing the Effectiveness of Network-Based Intrusion Detection Systems.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A safety and security architecture for reducing accidents in intelligent transportation systems.
Proceedings of the International Conference on Computer-Aided Design, 2018

Quantifying the security effectiveness of network diversity: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Quantifying the security effectiveness of firewalls and DMZs.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Protecting Election from Bribery: New Approach and Computational Complexity Characterization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning.
Technometrics, 2017

Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization.
Rel. Eng. & Sys. Safety, 2017

A Survey on Systems Security Metrics.
ACM Comput. Surv., 2017

A control flow graph-based signature for packer identification.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

A dataset generator for next generation system call host intrusion detection systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

EPBC: Efficient Public Blockchain Client for lightweight users.
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2017

2016
Metrics and measurement of trustworthy systems.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Extracting attack narratives from traffic datasets.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

VulPecker: an automated vulnerability detection system based on code similarity analysis.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Predicting Cyber Attack Rates With Extreme Values.
IEEE Trans. Information Forensics and Security, 2015

A Stochastic Model of Active Cyber Defense Dynamics.
Internet Mathematics, 2015

Cyber Epidemic Models with Dependences.
Internet Mathematics, 2015

TEE: A virtual DRTM based execution environment for secure cloud-end computing.
Future Generation Comp. Syst., 2015

Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Active cyber defense dynamics exhibiting rich phenomena.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
Adaptive Epidemic Dynamics in Networks: Thresholds and Control.
TAAS, 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

A Characterization of Cybersecurity Posture from Network Telescope Data.
Proceedings of the Trusted Systems - 6th International Conference, 2014

VABKS: Verifiable attribute-based keyword search over outsourced encrypted data.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Cybersecurity dynamics.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Emergent behavior in cybersecurity.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Characterizing the power of moving target defense via cyber epidemic dynamics.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

A new approach to modeling and analyzing security of networked systems.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

An evasion and counter-evasion study in malicious websites detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study.
IEEE Trans. Information Forensics and Security, 2013

Optimizing Active Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Cross-layer detection of malicious websites.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment.
Proceedings of the Computing Frontiers Conference, 2013

Real-time detection and prevention of android SMS permission abuses.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
A Stochastic Model of Multivirus Dynamics.
IEEE Trans. Dependable Sec. Comput., 2012

Enhancing Data Trustworthiness via Assured Digital Signing.
IEEE Trans. Dependable Sec. Comput., 2012

A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining.
Trans. Data Privacy, 2012

Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights.
TAAS, 2012

An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems.
Internet Mathematics, 2012

Secure and efficient proof of storage with deduplication.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Efficient query integrity for outsourced dynamic databases.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data.
IEEE Trans. Information Forensics and Security, 2011

A Stochastic Model for Quantitative Security Analyses of Networked Systems.
IEEE Trans. Dependable Sec. Comput., 2011

Building malware infection trees.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Fair and dynamic proofs of retrievability.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Non-interactive editable signatures for assured data provenance.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Non-interactive multisignatures in the plain public-key model with efficient verification.
Inf. Process. Lett., 2010

Trustworthy Information: Concepts and Mechanisms.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Assigning applications to servers: a simulation study.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Analyzing and Exploiting Network Behaviors of Malware.
Proceedings of the Security and Privacy in Communication Networks, 2010

Symptoms-Based Detection of Bot Processes.
Proceedings of the Computer Network Security, 2010

Evaluating detection and treatment effectiveness of commercial anti-malware programs.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
A probabilistic characterization of a fault-tolerant gossiping algorithm.
J. Systems Science & Complexity, 2009

Leak-free mediated group signatures.
Journal of Computer Security, 2009

An Access Control Language for a General Provenance Model.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Analyzing DNS activities of bot processes.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

A Characterization of the problem of secure provenance management.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009


SocialClouds: Concept, Security Architecture and Some Mechanisms.
Proceedings of the Trusted Systems, First International Conference, 2009

A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks.
Proceedings of the Trusted Systems, First International Conference, 2009

TIUPAM: A Framework for Trustworthiness-Centric Information Sharing.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Expecting the Unexpected: Towards Robust Credential Infrastructure.
Proceedings of the Financial Cryptography and Data Security, 2009

A Framework for Understanding Botnets.
Proceedings of the The Forth International Conference on Availability, 2009

A First Step towards Characterizing Stealthy Botnets.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions.
ACM Trans. Inf. Syst. Secur., 2008

Privacy Preserving Data Mining within Anonymous Credential Systems.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Privacy-Preserving Accountable Accuracy Management Systems (PAAMS).
Proceedings of the Protecting Persons While Protecting the People, 2008

Empirical Analysis of Certificate Revocation Lists.
Proceedings of the Data and Applications Security XXII, 2008

Collaborative Attack vs. Collaborative Defense.
Proceedings of the Collaborative Computing: Networking, 2008

Exploiting social networks for threshold signing: attack-resilience vs. availability.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
On the security of group communication schemes.
Journal of Computer Security, 2007

Towards an analytic model of epidemic spreading in heterogeneous systems.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Privacy-Preserving Data Mining through Knowledge Model Sharing.
Proceedings of the Privacy, 2007

A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

K-Anonymous Multi-party Secret Handshakes.
Proceedings of the Financial Cryptography and Data Security, 2007

Protecting Cryptographic Keys from Memory Disclosure Attacks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

A Scalable and Secure Cryptographic Service.
Proceedings of the Data and Applications Security XXI, 2007

How to Secure Your Email Address Book and Beyond.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Towards Quantifying the (In)Security of Networked Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
LHAP: A lightweight network access control protocol for ad hoc networks.
Ad Hoc Networks, 2006

Towards Blocking Outgoing Malicious Impostor Emails.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

A Flexible Framework for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Privacy-Preserving Decision Tree Mining Based on Random Substitutions.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication).
IACR Cryptology ePrint Archive, 2005

On the security of group communication schemes based on symmetric key cryptosystems.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Brief announcement: a flexible framework for secret handshakes.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

On Automatically Detecting Malicious Impostor Emails.
Proceedings of the Applied Public Key Infrastructure, 2005

Knowledge as a Service and Knowledge Breaching.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

Enhancing Anonymity via Market Competition.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Leak-Free Group Signatures with Immediate Revocation.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

k-anonymous secret handshakes with reusable credentials.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Accountable Ring Signatures: A Smart Card Approach.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
Constructing Disjoint Paths for Secure Communication.
Proceedings of the Distributed Computing, 17th International Conference, 2003

Strong Key-Insulated Signature Schemes.
Proceedings of the Public Key Cryptography, 2003

Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Retrofitting Fairness on the Original RSA-Based E-cash.
Proceedings of the Financial Cryptography, 2003

Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures.
Proceedings of the Topics in Cryptology, 2003

Accumulating Composites and Improved Group Signing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Authenticated multicast immune to denial-of-service attack.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

The Dark Side of Threshold Cryptography.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Key-Insulated Public Key Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2000
Friendly Observers Ease Off-Line E-Cash.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Money Conservation via Atomicity in Fair Off-Line E-Cash.
Proceedings of the Information Security, Second International Workshop, 1999

1998
On the Security of Three-Party Cryptographic Protocols.
Operating Systems Review, 1998

1997
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.
Operating Systems Review, 1997


  Loading...