Xiaoqi Jia
Xiaoqi Jia
Verifierad e-postadress på iie.ac.cn
Citeras av
Citeras av
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd International Conference on Software Engineering …, 2011
Program characterization using runtime values and its application to software plagiarism detection
YC Jhi, X Jia, X Wang, S Zhu, P Liu, D Wu
IEEE Transactions on Software Engineering 41 (9), 925-943, 2015
Shelf: Preserving business continuity and availability in an intrusion recovery system
X Xiong, X Jia, P Liu
2009 Annual Computer Security Applications Conference, 484-493, 2009
Efficient ideal threshold secret sharing schemes based on exclusive-or operations
C Lv, X Jia, L Tian, J Jing, M Sun
2010 Fourth International Conference on Network and System Security, 136-143, 2010
CCA-secure type-based proxy re-encryption with invisible proxy
X Jia, J Shao, J Jing, P Liu
2010 10th IEEE International Conference on Computer and Information …, 2010
Orthogonal deep neural networks
K Jia, S Li, Y Wen, T Liu, D Tao
IEEE transactions on pattern analysis and machine intelligence, 2019
Machine learning based cross-site scripting detection in online social network
R Wang, X Jia, Q Li, S Zhang
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
Efficient secret sharing schemes
C Lv, X Jia, J Lin, J Jing, L Tian, M Sun
FTRA International Conference on Secure and Trust Computing, Data Management …, 2011
HyperCrop: a hypervisor-based countermeasure for return oriented programming
J Jiang, X Jia, D Feng, S Zhang, P Liu
International Conference on Information and Communications Security, 360-373, 2011
An efficient group-based secret sharing scheme
C Lv, X Jia, J Lin, J Jing, L Tian
International conference on information security practice and experience …, 2011
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness, 155-176, 2010
Cross-layer comprehensive intrusion harm analysis for production workload server systems
S Zhang, X Jia, P Liu, J Jing
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Improved N-gram approach for cross-site scripting detection in Online Social Network
R Wang, X Jia, Q Li, D Zhang
2015 Science and Information Conference (SAI), 1206-1212, 2015
A comprehensive study of co-residence threat in multi-tenant public paas clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
International Conference on Information and Communications Security, 361-375, 2016
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing
D Meng, R Hou, G Shi, B Tu, A Yu, Z Zhu, X Jia, P Liu
Cybersecurity 1 (1), 1-11, 2018
Using virtual machines to do cross-layer damage assessment
X Jia, S Zhang, J Jing, P Liu
Proceedings of the 1st ACM workshop on Virtual machine security, 29-38, 2008
Defending return‐oriented programming based on virtualization techniques
X Jia, R Wang, J Jiang, S Zhang, P Liu
Security and Communication Networks 6 (10), 1236-1249, 2013
A behavior feature generation method for obfuscated malware detection
R Wang, X Jia, C Nie
2012 International Conference on Computer Science and Service System, 470-474, 2012
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems
S Zhang, X Jia, P Liu, J Jing
Information Forensics and Security, IEEE Transactions on 6 (4), 1323 - 1334, 2011
An Online Approach for Kernel-level Keylogger Detection and Defense.
D Tian, X Jia, J Chen, C Hu
J. Inf. Sci. Eng. 33 (2), 445-461, 2017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20