


Остановите войну!
for scientists:


default search action
Shouhuai Xu
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j60]Liangde Tao, Lin Chen
, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Electoral manipulation via influence: probabilistic model. Auton. Agents Multi Agent Syst. 37(1): 18 (2023) - [j59]Deqiang Li, Qianmu Li, Yanfang (Fanny) Ye, Shouhuai Xu:
Arms Race in Adversarial Malware Detection: A Survey. ACM Comput. Surv. 55(2): 15:1-15:35 (2023) - [i58]Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. CoRR abs/2302.11328 (2023) - 2022
- [j58]Haoyu Chen, Deqing Zou, Hai Jin, Shouhuai Xu, Bin Yuan:
SAND: semi-automated adaptive network defense via programmable rule generation and deployment. Sci. China Inf. Sci. 65(7): 1-18 (2022) - [j57]Muqing He, Deqing Zou, Weizhong Qiang
, Wenbo Wu, Shouhuai Xu, Xianjun Deng, Hai Jin:
Utility-Prioritized Differential Privacy for Quantitative Biomedical Data. J. Circuits Syst. Comput. 31(13): 2250236:1-2250236:23 (2022) - [j56]Songlin He
, Eric Ficke
, Mir Mehedi Ahsan Pritom
, Huashan Chen, Qiang Tang, Qian Chen
, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
Blockchain-based automated and robust cyber security management. J. Parallel Distributed Comput. 163: 62-82 (2022) - [j55]Zhen Li
, Deqing Zou
, Shouhuai Xu
, Hai Jin
, Yawei Zhu, Zhaoxuan Chen:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 19(4): 2244-2258 (2022) - [j54]Zhen Li, Deqing Zou
, Shouhuai Xu
, Zhaoxuan Chen, Yawei Zhu, Hai Jin
:
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector. IEEE Trans. Dependable Secur. Comput. 19(4): 2821-2837 (2022) - [j53]Huashan Chen, Hasan Cam, Shouhuai Xu
:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. IEEE Trans. Dependable Secur. Comput. 19(6): 3804-3821 (2022) - [c118]Mir Mehedi Ahsan Pritom, Shouhuai Xu:
Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study. CNS 2022: 181-189 - [c117]Nathan Daughety, Marcus Pendleton, Rebeca Perez, Shouhuai Xu, John V. Franco:
Auditing a Software-Defined Cross Domain Solution Architecture. CSR 2022: 96-103 - [c116]Zhen Li, Qian (Guenevere) Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. ICSE 2022: 1906-1918 - [c115]Eric Ficke
, Raymond M. Bateman
, Shouhuai Xu
:
Reducing Intrusion Alert Trees to Aid Visualization. NSS 2022: 140-154 - [c114]Joshua H. Seaton, Sena Hounsinou, Timothy Wood, Shouhuai Xu, Philip N. Brown, Gedare Bloom:
Poster: Toward Zero-Trust Path-Aware Access Control. SACMAT 2022: 267-269 - [c113]Rosana Montanez Rodriguez, Shouhuai Xu:
Cyber Social Engineering Kill Chain. SciSec 2022: 487-504 - [i57]Zhen Li, Guenevere Chen, Chen Chen, Yayi Zou, Shouhuai Xu:
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation. CoRR abs/2202.06043 (2022) - [i56]Rosana Montañez Rodriguez, Adham Atyabi, Shouhuai Xu:
Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study. CoRR abs/2203.04813 (2022) - [i55]Theodore Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu:
SoK: Why Have Defenses against Social Engineering Attacks Achieved Limited Success? CoRR abs/2203.08302 (2022) - [i54]Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
A Coupling Approach to Analyzing Games with Dynamic Environments. CoRR abs/2207.06504 (2022) - 2021
- [j52]Weizhi Meng
, Javier Lopez, Shouhuai Xu, Chunhua Su, Rongxing Lu:
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges. IEEE Access 9: 108846-108850 (2021) - [j51]Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu
:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses. ACM Comput. Surv. 53(3): 67:1-67:43 (2021) - [j50]Zhaofeng Liu, Ren Zheng, Wenlian Lu, Shouhuai Xu:
Using Event-Based Method to Estimate Cybersecurity Equilibrium. IEEE CAA J. Autom. Sinica 8(2): 455-467 (2021) - [j49]Qian Chen
, Paul Romanowich
, Jorge Castillo, Krishna Chandra Roy
, Gustavo Chavez, Shouhuai Xu:
ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks. IEEE Internet Things J. 8(18): 14355-14371 (2021) - [j48]Shouhuai Xu, Moti Yung, Jingguo Wang:
Seeking Foundations for the Science of Cyber Security. Inf. Syst. Frontiers 23(2): 263-267 (2021) - [j47]Lin Chen, Ahmed Imtiaz Sunny, Lei Xu
, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational complexity characterization of protecting elections from bribery. Theor. Comput. Sci. 891: 189-209 (2021) - [j46]Deqing Zou
, Sujuan Wang, Shouhuai Xu
, Zhen Li
, Hai Jin
:
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2224-2236 (2021) - [j45]Zijian Fang, Maochao Xu
, Shouhuai Xu
, Taizhong Hu:
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity. IEEE Trans. Inf. Forensics Secur. 16: 2186-2201 (2021) - [j44]Deqiang Li
, Qianmu Li
, Yanfang Ye
, Shouhuai Xu
:
A Framework for Enhancing Deep Neural Networks Against Adversarial Malware. IEEE Trans. Netw. Sci. Eng. 8(1): 736-750 (2021) - [j43]Yujuan Han
, Wenlian Lu
, Shouhuai Xu
:
Preventive and Reactive Cyber Defense Dynamics With Ergodic Time-Dependent Parameters is Globally Attractive. IEEE Trans. Netw. Sci. Eng. 8(3): 2517-2532 (2021) - [j42]Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, Hengkai Ye:
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching. ACM Trans. Softw. Eng. Methodol. 30(2): 23:1-23:31 (2021) - [c112]Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu:
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? ACSAC 2021: 596-608 - [c111]Wenjun Fan, Sang-Yoon Chang, Xiaobo Zhou, Shouhuai Xu:
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking. CNS 2021: 101-109 - [c110]Liangde Tao, Lin Chen
, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi, Dian Huang:
Hardness and Algorithms for Electoral Manipulation Under Media Influence. IJTCS-FAW 2021: 53-64 - [c109]Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
Paying Firms to Share Cyber Threat Intelligence. GameSec 2021: 365-377 - [c108]Nathan Daughety, Marcus Pendleton, Shouhuai Xu, Laurent Njilla, John V. Franco:
vCDS: A Virtualized Cross Domain Solution Architecture. MILCOM 2021: 61-68 - [c107]Shouhuai Xu:
SARR: A Cybersecurity Metrics and Quantification Framework (Keynote). SciSec 2021: 3-17 - [c106]John Charlton, Pang Du, Shouhuai Xu:
A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics. SciSec 2021: 77-92 - [i53]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. CoRR abs/2102.13223 (2021) - [i52]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. CoRR abs/2102.13226 (2021) - [i51]Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin:
Towards Making Deep Learning-based Vulnerability Detectors Robust. CoRR abs/2108.00669 (2021) - [i50]Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu:
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? CoRR abs/2109.09654 (2021) - [i49]Huashan Chen, Richard B. Garcia-Lebron, Zheyuan Sun, Jin-Hee Cho, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Software Diversity. CoRR abs/2111.10090 (2021) - [i48]Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. CoRR abs/2112.07826 (2021) - 2020
- [j41]Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, Yusheng Feng:
Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. EAI Endorsed Trans. Security Safety 7(25): e4 (2020) - [c105]Shouhuai Xu:
The Cybersecurity Dynamics Way of Thinking and Landscape. MTD@CCS 2020: 69-80 - [c104]Lin Chen
, Ahmed Sunny, Lei Xu
, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. COCOON 2020: 85-97 - [c103]Yiming Zhang, Yujie Fan, Shifu Hou, Yanfang Ye, Xusheng Xiao
, Pan Li
, Chuan Shi, Liang Zhao, Shouhuai Xu:
Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub. ICKG 2020: 458-465 - [c102]Eric Ficke, Shouhuai Xu:
APIN: Automatic Attack Path Identification in Computer Networks. ISI 2020: 1-6 - [c101]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu
, Shouhuai Xu:
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites. ISI 2020: 1-6 - [c100]Mir Mehedi Ahsan Pritom, Kristin M. Schweitzer, Raymond M. Bateman, Min Xu, Shouhuai Xu:
Characterizing the Landscape of COVID-19 Themed Cyberattacks and Defenses. ISI 2020: 1-6 - [i47]Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin:
μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. CoRR abs/2001.02334 (2020) - [i46]Zhen Li, Deqing Zou, Shouhuai Xu, Zhaoxuan Chen, Yawei Zhu, Hai Jin:
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector. CoRR abs/2001.02350 (2020) - [i45]Yujuan Han, Wenlian Lu, Shouhuai Xu:
Preventive and Reactive Cyber Defense Dynamics with Ergodic Time-dependent Parameters Is Globally Attractive. CoRR abs/2001.07958 (2020) - [i44]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
Enhancing Deep Neural Networks Against Adversarial Malware Examples. CoRR abs/2004.07919 (2020) - [i43]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
SoK: Arms Race in Adversarial Malware Detection. CoRR abs/2005.11671 (2020) - [i42]Lin Chen, Ahmed Sunny, Lei Xu, Shouhuai Xu, Zhimin Gao, Yang Lu, Weidong Shi, Nolan Shah:
Computational Complexity Characterization of Protecting Elections from Bribery. CoRR abs/2007.02533 (2020) - [i41]Rosana Montanez Rodriguez, Edward Golob, Shouhuai Xu:
Human Cognition through the Lens of Social Engineering Cyberattacks. CoRR abs/2007.04932 (2020) - [i40]Shouhuai Xu:
Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity. CoRR abs/2010.05683 (2020) - [i39]Shouhuai Xu:
On the Security of Group Communication Schemes. CoRR abs/2010.05692 (2020)
2010 – 2019
- 2019
- [j40]Richard Garcia-Lebron, David J. Myers, Shouhuai Xu, Jie Sun:
Node diversification in complex networks by decentralized colouring. J. Complex Networks 7(4): 554-563 (2019) - [j39]Jin-Hee Cho, Shouhuai Xu
, Patrick M. Hurley
, Matthew MacKay, Trevor Benjamin, Mark Beaumont:
STRAM: Measuring the Trustworthiness of Computer-Based Systems. ACM Comput. Surv. 51(6): 128:1-128:47 (2019) - [j38]Xing Fang
, Maochao Xu, Shouhuai Xu, Peng Zhao:
A deep learning framework for predicting cyber attacks rates. EURASIP J. Inf. Secur. 2019: 5 (2019) - [j37]Jose David Mireles
, Eric Ficke
, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu
:
Metrics Towards Measuring Cyber Agility. IEEE Trans. Inf. Forensics Secur. 14(12): 3217-3232 (2019) - [j36]Zongzong Lin
, Wenlian Lu, Shouhuai Xu
:
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent. IEEE/ACM Trans. Netw. 27(3): 1098-1111 (2019) - [c99]Lin Chen
, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. AAAI 2019: 2572-2579 - [c98]Lingwei Chen, Shifu Hou, Yanfang Ye, Thirimachos Bourlai
, Shouhuai Xu, Liang Zhao:
iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow. ASONAM 2019: 1097-1104 - [c97]Lei Xu
, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu, Weidong Shi:
KCRS: A Blockchain-Based Key Compromise Resilient Signature System. BlockSys 2019: 226-239 - [c96]Lin Chen
, Lei Xu
, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribe-Effect Uncertainty: A Dichotomy Result. IJCAI 2019: 158-164 - [c95]Yujie Fan, Yiming Zhang, Shifu Hou, Lingwei Chen, Yanfang Ye, Chuan Shi, Liang Zhao, Shouhuai Xu:
iDev: Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow. IJCAI 2019: 2272-2278 - [c94]Gabriel C. Fernandez, Shouhuai Xu:
A Case Study on using Deep Learning for Network Intrusion Detection. MILCOM 2019: 1-6 - [c93]Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. MILCOM 2019: 1-6 - [e12]Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11933, Springer 2019, ISBN 978-3-030-34636-2 [contents] - [i38]Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics Towards Measuring Cyber Agility. CoRR abs/1906.05395 (2019) - [i37]Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu:
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses. CoRR abs/1908.04507 (2019) - [i36]Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. CoRR abs/1909.08725 (2019) - [i35]Gabriel C. Fernandez, Shouhuai Xu:
A Case Study on Using Deep Learning for Network Intrusion Detection. CoRR abs/1910.02203 (2019) - 2018
- [j35]Miroslaw Kutylowski, Yu Wang
, Shouhuai Xu, Laurence T. Yang:
Special issue on social network security and privacy. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j34]Weiqi Dai, Yukun Du, Hai Jin, Weizhong Qiang, Deqing Zou, Shouhuai Xu, Zhongze Liu:
RollSec: Automatically Secure Software States Against General Rollback. Int. J. Parallel Program. 46(4): 788-805 (2018) - [j33]Weiqi Dai
, Pengfei Wan, Weizhong Qiang
, Laurence T. Yang
, Deqing Zou
, Hai Jin
, Shouhuai Xu, Zirong Huang:
TNGuard: Securing IoT Oriented Tenant Networks Based on SDN. IEEE Internet Things J. 5(3): 1411-1423 (2018) - [j32]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. EAI Endorsed Trans. Security Safety 4(13): e5 (2018) - [j31]Lei Xu
, Jong-Hyuk Lee, Seung Hun Kim, Qingji Zheng, Shouhuai Xu
, Taeweon Suh, Won Woo Ro, Weidong Shi:
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment. IEEE Trans. Cloud Comput. 6(2): 478-491 (2018) - [j30]Maochao Xu, Kristin M. Schweitzer
, Raymond M. Bateman
, Shouhuai Xu
:
Modeling and Predicting Cyber Hacking Breaches. IEEE Trans. Inf. Forensics Secur. 13(11): 2856-2871 (2018) - [j29]Pang Du
, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu
:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. IEEE Trans. Inf. Forensics Secur. 13(12): 2965-2980 (2018) - [j28]Ren Zheng, Wenlian Lu, Shouhuai Xu
:
Preventive and Reactive Cyber Defense Dynamics Is Globally Stable. IEEE Trans. Netw. Sci. Eng. 5(2): 156-170 (2018) - [j27]Moustafa Saleh
, Tao Li, Shouhuai Xu:
Multi-context features for detecting malicious programs. J. Comput. Virol. Hacking Tech. 14(2): 181-193 (2018) - [c92]Yanfang Ye, Shifu Hou, Lingwei Chen, Xin Li, Liang Zhao, Shouhuai Xu, Jiabin Wang, Qi Xiong:
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. ACSAC 2018: 542-552 - [c91]Lingwei Chen, Shifu Hou, Yanfang Ye, Shouhuai Xu:
DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks. ASONAM 2018: 782-789 - [c90]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Nolan Shah, Yang Lu, Weidong Shi:
Protecting Election from Bribery: New Approach and Computational Complexity Characterization. AAMAS 2018: 1894-1896 - [c89]Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of firewalls and DMZs. HotSoS 2018: 9:1-9:11 - [c88]Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of network diversity: poster. HotSoS 2018: 24:1 - [c87]Qian Chen
, Azizeh Khaled Sowan, Shouhuai Xu:
A safety and security architecture for reducing accidents in intelligent transportation systems. ICCAD 2018: 95 - [c86]Richard B. Garcia-Lebron, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation Graphs. MILCOM 2018: 70-75 - [c85]Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Characterizing the Effectiveness of Network-Based Intrusion Detection Systems. MILCOM 2018: 76-81 - [c84]John Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu:
Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth. MILCOM 2018: 450-455 - [c83]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. NDSS 2018 - [e11]David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang
, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5 [contents] - [e10]Feng Liu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11287, Springer 2018, ISBN 978-3-030-03025-4 [contents] - [d1]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. IEEE DataPort, 2018 - [i34]Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. CoRR abs/1801.01681 (2018) - [i33]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, Jialai Wang:
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities. CoRR abs/1807.06756 (2018) - [i32]Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu:
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples. CoRR abs/1809.06498 (2018) - [i31]Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. CoRR abs/1810.07260 (2018) - [i30]Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi:
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm. CoRR abs/1811.03158 (2018) - [i29]Lei Xu, Lin Chen, Zhimin Gao, Shouhuai Xu, Weidong Shi:
Efficient Public Blockchain Client for Lightweight Users. CoRR abs/1811.04900 (2018) - [i28]Richard Garcia-Lebron, David J. Myers, Shouhuai Xu, Jie Sun:
Node Diversification in Complex Networks by Decentralized Coloring. CoRR abs/1811.11197 (2018) - [i27]Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu:
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge. CoRR abs/1812.08108 (2018) - 2017
- [j26]Marcus Pendleton, Richard Garcia-Lebron, Jin-Hee Cho, Shouhuai Xu
:
A Survey on Systems Security Metrics. ACM Comput. Surv. 49(4): 62:1-62:35 (2017) - [j25]Xiaoxiao Hu, Maochao Xu, Shouhuai Xu, Peng Zhao:
Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization. Reliab. Eng. Syst. Saf. 159: 119-133 (2017) - [j24]Maochao Xu, Lei Hua
, Shouhuai Xu:
A Vine Copula Model for Predicting the Effectiveness of Cyber Defense Early-Warning. Technometrics 59(4): 508-520 (2017) - [c82]Lei Xu
, Lin Chen
, Zhimin Gao, Shouhuai Xu, Weidong Shi:
EPBC: Efficient Public Blockchain Client for lightweight users. SERIAL@Middleware 2017: 1:1-1:6 - [c81]Marcus Pendleton, Shouhuai Xu:
A dataset generator for next generation system call host intrusion detection systems. MILCOM 2017: 231-236 - [c80]Moustafa Saleh, E. Paul Ratazzi
, Shouhuai Xu:
A control flow graph-based signature for packer identification. MILCOM 2017: 683-688 - 2016
- [c79]Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu:
VulPecker: an automated vulnerability detection system based on code similarity analysis. ACSAC 2016: 201-213 - [c78]