Xiao Fu

Orcid: 0000-0002-2263-4309

Affiliations:
  • Nanjing University, State Key Laboratory for Novel Software Technology, China


According to our database1, Xiao Fu authored at least 30 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes.
IEEE Trans. Netw. Serv. Manag., June, 2023

Convolutional Neural Network Based Classification of WeChat Mini-Apps.
Proceedings of the IEEE International Conference on Communications, 2023

2022
TamForen: A tamper-proof cloud forensic framework.
Trans. Emerg. Telecommun. Technol., 2022

Using Cloud Computing Based Crowdsourcing for Security and Privacy Settings of Android Users.
Proceedings of the IEEE Global Communications Conference, 2022

2021
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

A Non-Intrusive Method for Smart Speaker Forensics.
Proceedings of the ICC 2021, 2021

Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction.
Proceedings of the IEEE Global Communications Conference, 2021

Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Forensic Model for DDoS Attack.
Proceedings of the IEEE Global Communications Conference, 2020

Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Timing Channel in IaaS: How to Identify and Investigate.
IEEE Access, 2019

A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Cloud Database Encryption Technology Based on Combinatorial Encryption.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Timing Channel in IaaS: How to Identify and Investigate.
CoRR, 2018

Real-Time Behavior Analysis and Identification for Android Application.
IEEE Access, 2018

Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Security Threats to Hadoop: Data Leakage Attacks and Investigation.
IEEE Netw., 2017

A lightweight live memory forensic approach based on hardware virtualization.
Inf. Sci., 2017

Distributed Cloud Forensic System with Decentralization and Multi-participation.
Proceedings of the Wireless Internet - 10th International Conference, 2017

Analyzing Android Application in Real-Time at Kernel Level.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Investigating Timing Channel in IaaS.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A shared memory based cross-VM side channel attacks in IaaS cloud.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Data correlation-based analysis methods for automatic memory forensic.
Secur. Commun. Networks, 2015

Correlating processes for automatic memory evidence analysis.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics.
Proceedings of the Information Security - 17th International Conference, 2014

2013
A Method to Automatically Filter Log Evidences for Intrusion Forensics.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013


  Loading...