Xiaobo Ma

Orcid: 0000-0002-0934-5035

According to our database1, Xiaobo Ma authored at least 61 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024

ABC-Channel: An Advanced Blockchain-based Covert Channel.
CoRR, 2024

TrafficGPT: Breaking the Token Barrier for Efficient Long Traffic Analysis and Generation.
CoRR, 2024

2023
ParaDefender: A Scenario-Driven Parallel System for Defending Metaverses.
IEEE Trans. Syst. Man Cybern. Syst., April, 2023

Who is DNS serving for? A human-software perspective of modeling DNS services.
Knowl. Based Syst., March, 2023

A Transfer Learning Framework for Proactive Ramp Metering Performance Assessment.
CoRR, 2023

On-ramp and Off-ramp Traffic Flows Estimation Based on A Data-driven Transfer Learning Framework.
CoRR, 2023

HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection.
Comput. Secur., 2023

An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
PackerGrind: An Adaptive Unpacking System for Android Apps.
IEEE Trans. Software Eng., 2022

Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting.
IEEE/ACM Trans. Netw., 2022

Overlay-Based Android Malware Detection at Market Scales: Systematically Adapting to the New Technological Landscape.
IEEE Trans. Mob. Comput., 2022

Magnetic-Based Polydimethylsiloxane Microspheres for Magnetic Field Measurement.
IEEE Trans. Instrum. Meas., 2022

Integration of Sentinel-1A, ALOS-2 and GF-1 Datasets for Identifying Landslides in the Three Parallel Rivers Region, China.
Remote. Sens., 2022

Discussion on InSAR Identification Effectivity of Potential Landslides and Factors That Influence the Effectivity.
Remote. Sens., 2022

Capturing semantic features to improve Chinese event detection.
CAAI Trans. Intell. Technol., 2022

FOAP: Fine-Grained Open-World Android App Fingerprinting.
Proceedings of the 31st USENIX Security Symposium, 2022

Packet-Level Open-World App Fingerprinting on Wireless Traffic.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Landing Reinforcement Learning onto Smart Scanning of The Internet of Things.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Systematically Landing Machine Learning onto Market-Scale Mobile Malware Detection.
IEEE Trans. Parallel Distributed Syst., 2021

One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers.
IEEE Commun. Mag., 2021

On Modeling Link Flooding Attacks and Defenses.
IEEE Access, 2021

Inaccurate Prediction Is Not Always Bad: Open-World Driver Recognition via Error Analysis.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Context-aware Website Fingerprinting over Encrypted Proxies.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

A Link Flooding Attack Detection Method based on Non-Cooperative Active Measurement.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

Exploiting Bitcoin Mining Pool for Stealthy and Flexible Botnet Channels.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

Effectively and Efficiently Defending Shadowsocks against Website Fingerprinting Attacks.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

On the Performance Evaluation of Congestion Control Algorithms against DDoS Attacks.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

2020
Randomized Security Patrolling for Link Flooding Attack Detection.
IEEE Trans. Dependable Secur. Comput., 2020

Taming energy cost of disk encryption software on data-intensive mobile devices.
Future Gener. Comput. Syst., 2020

A Potential Game Approach to Multiple UAVs 3D Placement in Iot Communication Networks.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

RSS-Based Localization Using Bayesian Hierarchical Model with Spatially Correlated Shadow Fading.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

An Uncertainty-Based Traffic Training Approach to Efficiently Identifying Encrypted Proxies.
Proceedings of the 12th International Conference on Advanced Infocomm Technology, 2020

Hybrid Syntactic Graph Convolutional Networks for Chinese Event Detection.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020

2019
A Quantitative and Comparative Study of Network-Level Efficiency for Cloud Storage Services.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2019

Protecting internet infrastructure against link flooding attacks: A techno-economic perspective.
Inf. Sci., 2019

A Commit Messages-Based Bug Localization for Android Applications.
Int. J. Softw. Eng. Knowl. Eng., 2019

DeepCG: Classifying Metamorphic Malware Through Deep Learning of Call Graphs.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
LinkScope: Toward Detecting Target Link Flooding Attacks.
IEEE Trans. Inf. Forensics Secur., 2018

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing.
Secur. Commun. Networks, 2018

Camera Placement Based on Vehicle Traffic for Better City Security Surveillance.
IEEE Intell. Syst., 2018

Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.
Proceedings of the Network and System Security - 12th International Conference, 2018

Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks.
Proceedings of the Network and System Security - 12th International Conference, 2018

Can We Learn what People are Doing from Raw DNS Queries?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Mining repeating pattern in packet arrivals: Metrics, models, and applications.
Inf. Sci., 2017

Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance.
CoRR, 2017

AutoFlowLeaker: Circumventing Web Censorship through Automation Services.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Satellite Remote Sensing-Based In-Season Diagnosis of Rice Nitrogen Status in Northeast China.
Remote. Sens., 2015

Accurate DNS query characteristics estimation via active probing.
J. Netw. Comput. Appl., 2015

Modeling repeating behaviors in packet arrivals: Detection and measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Inf. Forensics Secur., 2014

MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
A Peep on the Interplays between Online Video Websites and Online Social Networks
CoRR, 2013

Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting.
Proceedings of IEEE International Conference on Communications, 2013

2012
Towards active measurement for DNS query behavior of botnets.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
A Novel IRC Botnet Detection Method Based on Packet Size Sequence.
Proceedings of IEEE International Conference on Communications, 2010


  Loading...