Xiaoqi Jia

Orcid: 0000-0002-8376-3235

According to our database1, Xiaoqi Jia authored at least 62 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services.
IEEE Trans. Dependable Secur. Comput., 2024

2023
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy.
IEEE/ACM Trans. Netw., December, 2023

ELAMD: An ensemble learning framework for adversarial malware defense.
J. Inf. Secur. Appl., June, 2023

Non-transferable blockchain-based identity authentication.
Peer Peer Netw. Appl., May, 2023

Container Privilege Escalation and Escape Detection Method Based on Security-First Architecture.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Protecting Encrypted Virtual Machines from Nested Page Fault Controlled Channel.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Refining Use-After-Free Defense: Eliminating Dangling Pointers in Registers and Memory.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Towards time evolved malware identification using two-head neural network.
J. Inf. Secur. Appl., 2022

CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning.
J. Grid Comput., 2022

MDCD: A malware detection approach in cloud using deep learning.
Trans. Emerg. Telecommun. Technol., 2022

EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave.
Proceedings of the IEEE International Conference on Trust, 2022

An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Practical Backdoor Attack Against Speaker Recognition System.
Proceedings of the Information Security Practice and Experience, 2022

SecFortress: Securing Hypervisor using Cross-layer Isolation.
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022

Protecting Virtual Machines against Untrusted Hypervisor on ARM64 Cloud Platform.
Proceedings of the IEEE International Conference on Communications, 2022

2021
BinDeep: A deep learning approach to binary code similarity detection.
Expert Syst. Appl., 2021

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021

2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

MSYM: A multichannel communication system for android devices.
Comput. Networks, 2020

EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

PiDicators: An Efficient Artifact to Detect Various VMs.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

ET-GAN: Cross-Language Emotion Transfer Based on Cycle-Consistent Generative Adversarial Networks.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
KEcruiser: A novel control flow protection for kernel extensions.
Future Gener. Comput. Syst., 2019

Powerful Speaker Embedding Training Framework by Adversarially Disentangled Identity Representation.
CoRR, 2019

EG-GAN: Cross-Language Emotion Gain Synthesis based on Cycle-Consistent Adversarial Networks.
CoRR, 2019

An online approach to defeating ROP attacks∗.
Concurr. Comput. Pract. Exp., 2019

A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning.
IEEE Access, 2019

2018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018

Binary Obfuscation Based Reassemble.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
An Online Approach for Kernel-level Keylogger Detection and Defense.
J. Inf. Sci. Eng., 2017

CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

An Online Approach to Defeating Return-Oriented-Programming Attacks.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Towards comprehensive protection for OpenFlow controllers.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Towards service continuity for transactional applications via diverse device drivers.
Int. J. Inf. Comput. Secur., 2016

Classifying Android Malware with Dynamic Behavior Dependency Graphs.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors.
Proceedings of the Advances in Information and Computer Security, 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Face Feature Points Detection Based on Adaboost and AAM.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015

An Effective Method for Gender Classification with Convolutional Neural Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Machine Learning Based Cross-Site Scripting Detection in Online Social Network.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Defending return-oriented programming based on virtualization techniques.
Secur. Commun. Networks, 2013

2011
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems.
IEEE Trans. Inf. Forensics Secur., 2011

Efficient Secret Sharing Schemes.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

An Efficient Group-Based Secret Sharing Scheme.
Proceedings of the Information Security Practice and Experience, 2011

Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011

HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.
Proceedings of the Information Security, 2010

Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control.
Proceedings of the Computational Science and Its Applications, 2010

Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Availability-sensitive intrusion recovery.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2009

SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Using virtual machines to do cross-layer damage assessment.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008


  Loading...