Follow
Xiaokui Shu
Title
Cited by
Cited by
Year
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security 49, 255-273, 2015
1422015
Privacy-Preserving Detection of Sensitive Data Exposure
X Shu, D Yao, E Bertino
IEEE Transactions on Information Forensics and Security (TIFS) 10 (5), 1092-1103, 2015
1332015
Unearthing stealthy program attacks buried in extremely long execution paths
X Shu, D Yao, N Ramakrishnan
Proceedings of the 2015 ACM Conference on Computer and Communications …, 2015
902015
Data leak detection as a service
X Shu, DD Yao
Proceedings of the 8th International Conference on Security and Privacy in …, 2012
812012
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
732017
Fast Detection of Transformed Data Leaks
X Shu, J Zhang, D Yao, W Feng
IEEE Transactions on Information Forensics and Security (TIFS) 11 (3), 528-542, 2016
692016
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
D Stefan, X Shu, DD Yao
Computers & Security 31 (1), 109-121, 2012
692012
Privacy-preserving scanning of big content for sensitive data exposure with MapReduce
F Liu, X Shu, D Yao, AR Butt
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
622015
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
452018
Anomaly detection as a service: challenges, advances, and opportunities
D Yao, X Shu, L Cheng, SJ Stolfo
Synthesis Lectures on Information Security, Privacy, and Trust 9 (3), 1-173, 2017
452017
Massive distributed and parallel log analysis for organizational security
X Shu, J Smiy, D Yao, H Lin
Proceedings of the First International Workshop on Security and Privacy in …, 2013
392013
A Formal Framework for Program Anomaly Detection
X Shu, DD Yao, BG Ryder
Proceedings of the 18th International Symposium on Research in Attacks …, 2015
292015
Long-span program behavior modeling and attack detection
X Shu, D Yao, N Ramakrishnan, T Jaeger
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-28, 2017
252017
Rapid and Parallel Content Screening for Detecting Transformed Data Exposure
X Shu, J Zhang, DD Yao, WC Feng
Proceedings of the Third International Workshop on Security and Privacy in …, 2015
192015
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
X Shu, J Zhang, D Yao, WC Feng
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
142015
Fuzzy Cyber Detection Pattern Matching
X Shu, Z Gu, MP Stoecklin, HT Jamjoom
US Patent App. 16/783,274, 2021
102021
Multi-point causality tracking in cyber incident reasoning
X Shu, DL Schales, MP Stoecklin
US Patent 10,956,566, 2021
102021
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic
J Zhang, Z Gu, J Jang, D Kirat, M Stoecklin, X Shu, H Huang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
82020
Data leak detection as a service: challenges and solutions
X Shu, DD Yao
52012
Towards an open format for scalable system telemetry
T Taylor, F Araujo, X Shu
2020 IEEE International Conference on Big Data (Big Data), 1031-1040, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20