Xiang Cui

Orcid: 0000-0001-6611-2409

According to our database1, Xiang Cui authored at least 103 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel learning framework for vocal music education: an exploration of convolutional neural networks and pluralistic learning approaches.
Soft Comput., February, 2024

2023
Detecting compromised email accounts via login behavior characterization.
Cybersecur., December, 2023

IMeP: Impedance Matching Enhanced Power-Delivered-to-Load Optimization for Magnetic MIMO Wireless Power Transfer System.
ACM Trans. Sens. Networks, November, 2023

Framework for understanding intention-unbreakable malware.
Sci. China Inf. Sci., April, 2023

PROCS: Power Routing and Current Scheduling in Multi-Relay Magnetic MIMO WPT System.
IEEE Trans. Mob. Comput., March, 2023

In Situ Diagnosis of Multichip IGBT Module Wire Bonding Faults Based on Collector Voltage Undershoot.
IEEE Trans. Ind. Electron., 2023

A Novel Energy Harvesting Method for Online Monitoring Sensors in HVdc Overhead Line.
IEEE Trans. Ind. Electron., 2023

DPDA: Distributed Probability-adaptive Direction Adjustment for Magnetic Wireless Power Transfer.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Roland: Robust In-band Parallel Communication for Magnetic MIMO Wireless Power Transfer System.
Proceedings of the IEEE INFOCOM 2023, 2023

2022
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks.
Comput. Secur., 2022

CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph.
Proceedings of the IEEE International Conference on Trust, 2022

DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM.
Proceedings of the IEEE International Conference on Trust, 2022

From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism.
Proceedings of the IEEE International Conference on Trust, 2022

Mag-E4E: Trade Efficiency for Energy in Magnetic MIMO Wireless Power Transfer System.
Proceedings of the IEEE INFOCOM 2022, 2022

DeepC2: AI-Powered Covert Command and Control on OSNs.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Method of Segmented Turns Arrangement of PCB Rogowski Coil With Anti-Interference Ability.
IEEE Trans. Instrum. Meas., 2021

Method of Turns Arrangement of Noncircular Rogowski Coil With Rectangular Section.
IEEE Trans. Instrum. Meas., 2021

EvilModel 2.0: Hiding Malware Inside of Neural Network Models.
CoRR, 2021

Crafting Adversarial Example to Bypass Flow-&ML- based Botnet Detector via RL.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Data Veracity of Patients and Health Consumers Reported Adverse Drug Reactions on Twitter: Key Linguistic Features, Twitter Variables, and Association Rules.
Proceedings of the MEDINFO 2021: One World, One Health - Global Partnership for Digital Innovation, 2021

IMP: Impedance Matching Enhanced Power-Delivered-to-Load Optimization for Magnetic MIMO Wireless Power Transfer System.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

EvilModel: Hiding Malware Inside of Neural Network Models.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Onion: Dependency-Aware Reliable Communication Protocol for Magnetic MIMO WPT System.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Prediction and Analysis of Saturated Electricity Consumption Based on Logistic - BP Neural Network.
Proceedings of the 2021 International Conference on Applications and Techniques in Cyber Intelligence, 2021

2020
Coupled Inductance Model of Full-Bridge Modules in Hybrid High Voltage Direct Current Circuit Breakers.
IEEE Trans. Ind. Electron., 2020

The transplantation technology of communication intensive applications on heterogeneous clusters.
Trans. Emerg. Telecommun. Technol., 2020

AI-powered Covert Botnet Command and Control on OSNs.
CoRR, 2020

First Step Towards Modeling Unbreakable Malware.
CoRR, 2020

A new secondary decomposition-ensemble approach with cuckoo search optimization for air cargo forecasting.
Appl. Soft Comput., 2020

Heterogeneous Distance Learning Based on Kernel Analysis-Synthesis Dictionary for Semi-Supervised Image to Video Person Re-Identification.
IEEE Access, 2020

Joint Power Routing and Current Scheduling in Multi-Relay Magnetic MIMO WPT System.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

CoinBot: A Covert Botnet in the Cryptocurrency Network.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Systematic Study of AI Applications in Cybersecurity Competitions.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

ACE: Accurate and Automatic CSI Error Calibration for Wireless Localization System.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

PowerPool: Multi-source Ambient Energy harvesting.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

Exploratory Analysis of Data Veracity Problem for Consumer Reported Adverse Drug Reaction Events on Social Media.
Proceedings of the AMIA 2020, 2020

2019
Mechanical Design and Kinematic Modeling of a Cable-Driven Arm Exoskeleton Incorporating Inaccurate Human Limb Anthropomorphic Parameters.
Sensors, 2019

Distance learning by mining hard and easy negative samples for person re-identification.
Pattern Recognit., 2019

Trust architecture and reputation evaluation for internet of things.
J. Ambient Intell. Humaniz. Comput., 2019

A Highly Efficient Remote Access Trojan Detection Method.
Int. J. Digit. Crime Forensics, 2019

Parallel Feedback Communications for Magnetic MIMO Wireless Power Transfer System.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Research on SQL Injection and Defense Technology.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Automatically Traceback RDP-Based Targeted Ransomware Attacks.
Wirel. Commun. Mob. Comput., 2018

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018

A Systematic Method on PDF Privacy Leakage Issues.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Practical Metrics for Evaluating Anonymous Networks.
Proceedings of the Science of Cyber Security - First International Conference, 2018

Study on Advanced Botnet Based on Publicly Available Resources.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Trusted Computing Base for Information System Classified Protection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

The Research on Security Audit for Information System Classified Protection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Encryption Traffic Analysis Countermeasure Model Based on Game Theory.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

SLBot: A Serverless Botnet Based on Service Flux.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

A Novel Approach for Detecting Browser-Based Silent Miner.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

MaliceScript: A Novel Browser-Based Intranet Threat.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Constructing Browser Fingerprint Tracking Chain Based on LSTM Model.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Micro-Honeypot: Using Browser Fingerprinting to Track Attackers.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Transient Electromagnetic Disturbance Induced on the Ports of Intelligent Component of Electronic Instrument Transformer Due to Switching Operations in 500 kV GIS Substations.
IEEE Access, 2017

A Reputation-Based Resilient and Recoverable P2P Botnet.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Samsara parallel: a non-BSP parallel-in-time model.
Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2016

Measurement of ground-level charge density under a HVDC conductor with presence of fine particles.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2016

2015
Botnet spoofing: fighting botnet with itself.
Secur. Commun. Networks, 2015

Tiles: a new language mechanism for heterogeneous parallelism.
Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2015

Design of a cable-driven active leg exoskeleton (C-ALEX) and gait training experiments with human subjects.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

Quasi-peak response of EMI receiver to corona pulses.
Proceedings of the 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2015

A platform for multiple DC corona effects measurements and analysis.
Proceedings of the 2015 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2015

Programming Heterogeneous Systems with Array Types.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

2014
Cross-Platform Parallel Programming in Parray: A Case Study.
Proceedings of the Network and Parallel Computing, 2014

Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

A novel customized Cable-driven robot for 3-DOF wrist and forearm motion training.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

Monetary-and-QoS Aware Replica Placements in Cloud-Based Storage Systems.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

POSTER: Study of Software Plugin-based Malware.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Method of Collaborative Filtering Based on Uncertain User Interests Cluster.
J. Comput., 2013

Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.
Proceedings of the Security and Privacy in Communication Networks, 2013

Sniffing and propagating malwares through WPAD deception in LANs.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Closed-loop control for a cable-driven parallel manipulator with joint angle feedback.
Proceedings of the 2013 IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2013

2012
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks.
Proceedings of the Information Security and Privacy Research, 2012

Automatic Covert Channel Detection in Asbestos System (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

PARRAY: a unifying array representation for heterogeneous parallelism.
Proceedings of the 17th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2012

Network Security Situation Prediction Based on BP and RBF Neural Network.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

S-URL Flux: A Novel C&C Protocol for Mobile Botnets.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Power-aware Programming with GPU Accelerators.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Advanced triple-channel botnets: model and implementation.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Research on Real-time Publish/Subscribe System supported by Data-Integration.
J. Softw., 2011

A Propagation Model for Social Engineering Botnets in Social Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

A recoverable hybrid C&C botnet.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Andbot: Towards Advanced Mobile Botnets.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Programming-Level Power Measurement for GPU Clusters.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

Poster: recoverable botnets: a hybrid C&C approach.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Large-scale FFT on GPU clusters.
Proceedings of the 24th International Conference on Supercomputing, 2010

Auto-tuning Dense Matrix Multiplication for GPGPU with Cache.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2009
A review of classification methods for network vulnerability.
Proceedings of the IEEE International Conference on Systems, 2009

Improving Performance of Matrix Multiplication and FFT on GPU.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
RMobiGen: a trace generation, visualization, and performance analysis tool for random mobility models.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

2007
Study on Worm Poisoning Technology.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2005
Optical voltage sensor using a pulse-controlled electrooptic quarter waveplate.
IEEE Trans. Instrum. Meas., 2005

Techniques for Determining the Geographic Location of IP Addresses in ISP Topology Measurement.
J. Comput. Sci. Technol., 2005

Simple and efficient protocols for guaranteed message delivery in wireless ad-hoc networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

2004
Simple and Efficient Connectionless Semi-Compulsory Routing Protocols for Mobile Ad-Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004

2001
Measurement of AC electric power based on dual transverse Pockels effect.
IEEE Trans. Instrum. Meas., 2001


  Loading...