Följ
Xiaokui Shu
Xiaokui Shu
IBM Research
Verifierad e-postadress på ibm.com - Startsida
Titel
Citeras av
Citeras av
År
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security 49, 255-273, 2015
1572015
Privacy-Preserving Detection of Sensitive Data Exposure
X Shu, D Yao, E Bertino
IEEE Transactions on Information Forensics and Security (TIFS) 10 (5), 1092-1103, 2015
1482015
Unearthing stealthy program attacks buried in extremely long execution paths
X Shu, D Yao, N Ramakrishnan
Proceedings of the 2015 ACM Conference on Computer and Communications …, 2015
1032015
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
922017
Fast Detection of Transformed Data Leaks
X Shu, J Zhang, D Yao, W Feng
IEEE Transactions on Information Forensics and Security (TIFS) 11 (3), 528-542, 2016
882016
Data leak detection as a service
X Shu, DD Yao
Proceedings of the 8th International Conference on Security and Privacy in …, 2012
852012
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
D Stefan, X Shu, DD Yao
Computers & Security 31 (1), 109-121, 2012
762012
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
682018
Privacy-preserving scanning of big content for sensitive data exposure with MapReduce
F Liu, X Shu, D Yao, AR Butt
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
652015
Anomaly detection as a service: challenges, advances, and opportunities
D Yao, X Shu, L Cheng, SJ Stolfo, E Bertino, R Sandhu
Morgan & Claypool, 2018
572018
Massive distributed and parallel log analysis for organizational security
X Shu, J Smiy, D Yao, H Lin
Proceedings of the First International Workshop on Security and Privacy in …, 2013
392013
Fuzzy cyber detection pattern matching
X Shu, Z Gu, MP Stoecklin, HT Jamjoom
US Patent 11,544,527, 2023
372023
Long-span program behavior modeling and attack detection
X Shu, D Yao, N Ramakrishnan, T Jaeger
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-28, 2017
362017
A Formal Framework for Program Anomaly Detection
X Shu, DD Yao, BG Ryder
Proceedings of the 18th International Symposium on Research in Attacks …, 2015
352015
Multi-point causality tracking in cyber incident reasoning
X Shu, DL Schales, MP Stoecklin
US Patent 10,956,566, 2021
342021
Rapid and Parallel Content Screening for Detecting Transformed Data Exposure
X Shu, J Zhang, DD Yao, WC Feng
Proceedings of the Third International Workshop on Security and Privacy in …, 2015
222015
Automated semantic modeling of system events
Z Zhu, X Shu, DH Kirat, J Jang, MP Stoecklin
US Patent App. 16/711,688, 2021
182021
Scarecrow: Deactivating evasive malware via its own evasive logic
J Zhang, Z Gu, J Jang, D Kirat, M Stoecklin, X Shu, H Huang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
152020
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
X Shu, J Zhang, D Yao, WC Feng
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
142015
Endpoint inter-process activity extraction and pattern matching
X Shu, Z Gu, H Huang, MP Stoecklin, J Zhang
US Patent 11,184,374, 2021
102021
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20