Theo dõi
Shouhuai Xu
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Vuldeepecker: A deep learning-based system for vulnerability detection
Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong
arXiv preprint arXiv:1801.01681, 2018
9382018
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
5622002
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Q Zheng, S Xu, G Ateniese
IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014
5602014
Sysevr: A framework for using deep learning to detect software vulnerabilities
Z Li, D Zou, S Xu, H Jin, Y Zhu, Z Chen
IEEE Transactions on Dependable and Secure Computing 19 (4), 2244-2258, 2021
5382021
A survey on ethereum systems security: Vulnerabilities, attacks, and defenses
H Chen, M Pendleton, L Njilla, S Xu
ACM Computing Surveys (CSUR) 53 (3), 1-43, 2020
4952020
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
S Zhu, S Xu, S Setia, S Jajodia
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
4812003
Strong key-insulated signature schemes
Y Dodis, J Katz, S Xu, M Yung
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
3362002
A survey on systems security metrics
M Pendleton, R Garcia-Lebron, JH Cho, S Xu
ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016
3112016
Analyzing and exploiting network behaviors of malware
JA Morales, A Al-Bataineh, S Xu, R Sandhu
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
2862010
VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
D Zou, S Wang, S Xu, Z Li, H Jin
IEEE Transactions on Dependable and Secure Computing 18 (5), 2224-2236, 2019
2662019
Vulpecker: an automated vulnerability detection system based on code similarity analysis
Z Li, D Zou, S Xu, H Jin, H Qi, J Hu
Proceedings of the 32nd annual conference on computer security applications …, 2016
2632016
Fair and dynamic proofs of retrievability
Q Zheng, S Xu
Proceedings of the first ACM conference on Data and application security and …, 2011
2172011
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
S Zhu, S Xu, S Setia, S Jajodia
23rd International Conference on Distributed Computing Systems Workshops …, 2003
2172003
Secure and efficient proof of storage with deduplication
Q Zheng, S Xu
Proceedings of the second ACM conference on Data and Application Security …, 2012
1922012
Vuldeelocator: a deep learning-based fine-grained vulnerability detector
Z Li, D Zou, S Xu, Z Chen, Y Zhu, H Jin
IEEE Transactions on Dependable and Secure Computing 19 (4), 2821-2837, 2021
1702021
Characterizing honeypot-captured cyber attacks: Statistical framework and case study
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security 8 (11), 1775-1789, 2013
1582013
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
S Zhu, S Setia, S Xu, S Jajodia
Journal of Computer Security 14 (4), 301-325, 2006
1572006
Modeling and predicting cyber hacking breaches
M Xu, KM Schweitzer, RM Bateman, S Xu
IEEE Transactions on Information Forensics and Security 13 (11), 2856-2871, 2018
1292018
Predicting cyber attack rates with extreme values
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security 10 (8), 1666-1677, 2015
1272015
Cross-layer detection of malicious websites
L Xu, Z Zhan, S Xu, K Ye
Proceedings of the third ACM conference on Data and application security and …, 2013
1232013
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20