Xiaokui Shu
Orcid: 0000-0002-7381-7041
  According to our database1,
  Xiaokui Shu
  authored at least 26 papers
  between 2012 and 2024.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.
    
  
    Proceedings of the IEEE Symposium on Security and Privacy, 2024
    
  
  2023
    Proceedings of the 26th International Symposium on Research in Attacks, 2023
    
  
    Proceedings of the IEEE International Conference on Data Mining, 2023
    
  
  2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
    
  
    Proceedings of the Annual Computer Security Applications Conference, 2022
    
  
  2021
  2020
    Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
    
  
    Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
    
  
  2018
    Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
    
  
  2017
    Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02354-5, 2017
    
  
    ACM Trans. Priv. Secur., 2017
    
  
    CoRR, 2017
    
  
  2016
    PhD thesis, 2016
    
  
    Proceedings of the 19th International Conference on Extending Database Technology, 2016
    
  
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
    
  
DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution.
    
  
    Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
    
  
  2015
    IEEE Trans. Inf. Forensics Secur., 2015
    
  
    Comput. Secur., 2015
    
  
    Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
    
  
    Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
    
  
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing.
    
  
    Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
    
  
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce.
    
  
    Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
    
  
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
    
  
  2013
    Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
    
  
  2012
    Comput. Secur., 2012
    
  
    Proceedings of the Security and Privacy in Communication Networks, 2012