Xin Hu
Xin Hu
IBM T.J. Watson Research Center at Yorktown Heights, NY
Verifierad e-postadress på us.ibm.com - Startsida
TitelCiteras avÅr
Behavioral detection of malware on mobile handsets
A Bose, X Hu, KG Shin, T Park
Proceedings of the 6th international conference on Mobile systems …, 2008
3762008
Large-scale malware indexing using function-call graphs
X Hu, T Chiueh, KG Shin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3142009
Accurate real-time identification of IP prefix hijacking
X Hu, ZM Mao
2007 IEEE Symposium on Security and Privacy (SP'07), 3-17, 2007
2202007
Automatic generation of string signatures for malware detection
K Griffin, S Schneider, X Hu, TC Chiueh
International workshop on recent advances in intrusion detection, 101-120, 2009
2082009
Privacy protection for users of location-based services
KG Shin, X Ju, Z Chen, X Hu
IEEE Wireless Communications 19 (1), 30-39, 2012
1982012
Previewing file or document content
A Martinez, M Rahn
US Patent App. 10/044,737, 2004
1392004
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
Y Zeng, KG Shin, X Hu
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
1042012
Detection of botnets using combined host-and network-level information
Y Zeng, X Hu, KG Shin
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
962010
Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation
AW Min, KG Shin, X Hu
IEEE transactions on Mobile Computing 10 (10), 1434-1447, 2010
902010
Attack-tolerant distributed sensing for dynamic spectrum access networks
AW Min, KG Shin, X Hu
2009 17th IEEE International Conference on Network Protocols, 294-303, 2009
882009
Mutantx-s: Scalable malware clustering based on static features
X Hu, KG Shin, S Bhatkar, K Griffin
Presented as part of the 2013 {USENIX} Annual Technical Conference ({USENIX …, 2013
802013
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015
772015
RB-Seeker: Auto-detection of Redirection Botnets.
X Hu, M Knysz, KG Shin
NDSS, 2009
652009
Experimental study of fuzzy hashing in malware clustering analysis
Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang
8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015
532015
Apparatus and method for detection of malicious program using program behavior
T Park, KG Shin, X Hu, A Bose
US Patent 8,245,295, 2012
532012
Attack-tolerant time-synchronization in wireless sensor networks
X Hu, T Park, KG Shin
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 41-45, 2008
402008
Method and apparatus for modeling computer program behaviour for behavioural detection of malicious program
T Park, KG Shin, X Hu, A Bose
US Patent 8,713,680, 2014
392014
Measurement and analysis of global IP-usage patterns of fast-flux botnets
X Hu, M Knysz, KG Shin
2011 Proceedings IEEE INFOCOM, 2633-2641, 2011
382011
DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles
X Hu, KG Shin
Proceedings of the 29th annual computer security applications conference, 79-88, 2013
292013
Wide-area IP network mobility
X Hu, L Li, ZM Mao, YR Yang
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 951-959, 2008
282008
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20