Follow
Xiaokui Shu
Title
Cited by
Cited by
Year
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security 49, 255-273, 2015
1572015
Privacy-Preserving Detection of Sensitive Data Exposure
X Shu, D Yao, E Bertino
IEEE Transactions on Information Forensics and Security (TIFS) 10 (5), 1092-1103, 2015
1502015
Unearthing stealthy program attacks buried in extremely long execution paths
X Shu, D Yao, N Ramakrishnan
Proceedings of the 2015 ACM Conference on Computer and Communications …, 2015
1032015
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
952017
Fast Detection of Transformed Data Leaks
X Shu, J Zhang, D Yao, W Feng
IEEE Transactions on Information Forensics and Security (TIFS) 11 (3), 528-542, 2016
912016
Data leak detection as a service
X Shu, DD Yao
Proceedings of the 8th International Conference on Security and Privacy in …, 2012
862012
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
D Stefan, X Shu, DD Yao
Computers & Security 31 (1), 109-121, 2012
772012
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
702018
Privacy-preserving scanning of big content for sensitive data exposure with MapReduce
F Liu, X Shu, D Yao, AR Butt
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
652015
Anomaly detection as a service: challenges, advances, and opportunities
D Yao, X Shu, L Cheng, SJ Stolfo, E Bertino, R Sandhu
Morgan & Claypool, 2018
582018
Fuzzy cyber detection pattern matching
X Shu, Z Gu, MP Stoecklin, HT Jamjoom
US Patent 11,544,527, 2023
402023
Massive distributed and parallel log analysis for organizational security
X Shu, J Smiy, D Yao, H Lin
Proceedings of the First International Workshop on Security and Privacy in …, 2013
392013
A Formal Framework for Program Anomaly Detection
X Shu, DD Yao, BG Ryder
Proceedings of the 18th International Symposium on Research in Attacks …, 2015
372015
Long-span program behavior modeling and attack detection
X Shu, D Yao, N Ramakrishnan, T Jaeger
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-28, 2017
362017
Multi-point causality tracking in cyber incident reasoning
X Shu, DL Schales, MP Stoecklin
US Patent 10,956,566, 2021
352021
Rapid and Parallel Content Screening for Detecting Transformed Data Exposure
X Shu, J Zhang, DD Yao, WC Feng
Proceedings of the Third International Workshop on Security and Privacy in …, 2015
222015
Automated semantic modeling of system events
Z Zhu, X Shu, DH Kirat, J Jang, MP Stoecklin
US Patent App. 16/711,688, 2021
202021
Scarecrow: Deactivating evasive malware via its own evasive logic
J Zhang, Z Gu, J Jang, D Kirat, M Stoecklin, X Shu, H Huang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
152020
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
X Shu, J Zhang, D Yao, WC Feng
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
142015
Iterative constraint solving in abstract graph matching for cyber incident reasoning
X Shu, DL Schales, MP Stoecklin, F Araujo
US Patent 11,941,054, 2024
112024
The system can't perform the operation now. Try again later.
Articles 1–20