Xiaobo Ma

According to our database1, Xiaobo Ma authored at least 25 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Quantitative and Comparative Study of Network-Level Efficiency for Cloud Storage Services.
TOMPECS, 2019

Protecting internet infrastructure against link flooding attacks: A techno-economic perspective.
Inf. Sci., 2019

A Commit Messages-Based Bug Localization for Android Applications.
International Journal of Software Engineering and Knowledge Engineering, 2019

2018
LinkScope: Toward Detecting Target Link Flooding Attacks.
IEEE Trans. Information Forensics and Security, 2018

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing.
Security and Communication Networks, 2018

Camera Placement Based on Vehicle Traffic for Better City Security Surveillance.
IEEE Intelligent Systems, 2018

Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.
Proceedings of the Network and System Security - 12th International Conference, 2018

Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks.
Proceedings of the Network and System Security - 12th International Conference, 2018

Can We Learn what People are Doing from Raw DNS Queries?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Mining repeating pattern in packet arrivals: Metrics, models, and applications.
Inf. Sci., 2017

Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance.
CoRR, 2017

AutoFlowLeaker: Circumventing Web Censorship through Automation Services.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Satellite Remote Sensing-Based In-Season Diagnosis of Rice Nitrogen Status in Northeast China.
Remote Sensing, 2015

Accurate DNS query characteristics estimation via active probing.
J. Network and Computer Applications, 2015

Modeling repeating behaviors in packet arrivals: Detection and measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Information Forensics and Security, 2014

MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

2013
A Peep on the Interplays between Online Video Websites and Online Social Networks
CoRR, 2013

Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting.
Proceedings of IEEE International Conference on Communications, 2013

2012
Towards active measurement for DNS query behavior of botnets.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
A Novel IRC Botnet Detection Method Based on Packet Size Sequence.
Proceedings of IEEE International Conference on Communications, 2010


  Loading...