Xiaokui Shu
Xiaokui Shu
IBM T. J. Watson Research Center
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα ibm.com - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security 49, 255-273, 2015
1192015
Privacy-Preserving Detection of Sensitive Data Exposure
X Shu, D Yao, E Bertino
IEEE Transactions on Information Forensics and Security (TIFS) 10 (5), 1092-1103, 2015
1002015
Data leak detection as a service
X Shu, DD Yao
Proceedings of the 8th International Conference on Security and Privacy in …, 2012
722012
Unearthing stealthy program attacks buried in extremely long execution paths
X Shu, D Yao, N Ramakrishnan
Proceedings of the 2015 ACM Conference on Computer and Communications …, 2015
642015
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
D Stefan, X Shu, DD Yao
Computers & Security 31 (1), 109-121, 2012
622012
Fast Detection of Transformed Data Leaks
X Shu, J Zhang, D Yao, W Feng
IEEE Transactions on Information Forensics and Security (TIFS) 11 (3), 528-542, 2016
522016
Privacy-preserving scanning of big content for sensitive data exposure with MapReduce
F Liu, X Shu, D Yao, AR Butt
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
452015
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
392017
A Formal Framework for Program Anomaly Detection
X Shu, DD Yao, BG Ryder
Proceedings of the 18th International Symposium on Research in Attacks …, 2015
242015
Massive distributed and parallel log analysis for organizational security
X Shu, J Smiy, D Yao, H Lin
Proceedings of the First International Workshop on Security and Privacy in …, 2013
212013
Anomaly detection as a service: challenges, advances, and opportunities
D Yao, X Shu, L Cheng, SJ Stolfo
Synthesis Lectures on Information Security, Privacy, and Trust 9 (3), 1-173, 2017
202017
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
192018
Long-span program behavior modeling and attack detection
X Shu, D Yao, N Ramakrishnan, T Jaeger
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-28, 2017
182017
Rapid and Parallel Content Screening for Detecting Transformed Data Exposure
X Shu, J Zhang, DD Yao, WC Feng
Proceedings of the Third International Workshop on Security and Privacy in …, 2015
162015
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
X Shu, J Zhang, D Yao, WC Feng
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
112015
Data leak detection as a service: challenges and solutions
X Shu, DD Yao
Department of Computer Science, Virginia Polytechnic Institute & State …, 2012
52012
Rapid screening of big data against inadvertent leaks
X Shu, F Liu, DD Yao
Big Data Concepts, Theories, and Applications, 193-235, 2016
42016
Program anomaly detection: Methodology and practices
X Shu, D Yao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
32016
User action prediction
NP Laptev, X Shu
US Patent 10,643,141, 2020
22020
Threat Detection in Program Execution and Data Movement: Theory and Practice
X Shu
Virginia Tech, 2016
12016
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20