BibTeX records: Zhaoyan Xu

download as .bib file

@inproceedings{DBLP:conf/dimva/ParkKYPXPS19,
  author       = {Taejune Park and
                  Yeonkeun Kim and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Zhaoyan Xu and
                  KyoungSoo Park and
                  Seungwon Shin},
  editor       = {Roberto Perdisci and
                  Cl{\'{e}}mentine Maurice and
                  Giorgio Giacinto and
                  Magnus Almgren},
  title        = {{DPX:} Data-Plane eXtensions for {SDN} Security Service Instantiation},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden,
                  June 19-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11543},
  pages        = {415--437},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22038-9\_20},
  doi          = {10.1007/978-3-030-22038-9\_20},
  timestamp    = {Tue, 29 Dec 2020 18:36:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/ParkKYPXPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ShinXKG18,
  author       = {Seungwon Shin and
                  Zhaoyan Xu and
                  Yeonkeun Kim and
                  Guofei Gu},
  title        = {CloudRand: Building Heterogeneous and Moving-Target Network Interfaces},
  booktitle    = {27th International Conference on Computer Communication and Networks,
                  {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCN.2018.8487356},
  doi          = {10.1109/ICCCN.2018.8487356},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ShinXKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/ParkXS18,
  author       = {Taejune Park and
                  Zhaoyan Xu and
                  Seungwon Shin},
  title        = {{HEX} Switch: Hardware-assisted security extensions of OpenFlow},
  booktitle    = {Proceedings of the 2018 Workshop on Security in Softwarized Networks:
                  Prospects and Challenges, SecSoN@SIGCOMM 2018, Budapest, Hungary,
                  August 24, 2018},
  pages        = {33--39},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3229616.3229622},
  doi          = {10.1145/3229616.3229622},
  timestamp    = {Wed, 21 Nov 2018 12:44:03 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/ParkXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HassanzadehXSGP16,
  author       = {Amin Hassanzadeh and
                  Zhaoyan Xu and
                  Radu Stoleru and
                  Guofei Gu and
                  Michalis Polychronakis},
  title        = {{PRIDE:} {A} practical intrusion detection system for resource constrained
                  wireless mesh networks},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {114--132},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.007},
  doi          = {10.1016/J.COSE.2016.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HassanzadehXSGP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuNBYCG14,
  author       = {Zhaoyan Xu and
                  Antonio Nappa and
                  Robert Baykov and
                  Guangliang Yang and
                  Juan Caballero and
                  Guofei Gu},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{AUTOPROBE:} Towards Automatic Active Malicious Server Probing Using
                  Dynamic Binary Analysis},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {179--190},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660352},
  doi          = {10.1145/2660267.2660352},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuNBYCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangXGYP14,
  author       = {Chao Yang and
                  Zhaoyan Xu and
                  Guofei Gu and
                  Vinod Yegneswaran and
                  Phillip A. Porras},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {DroidMiner: Automated Mining and Characterization of Fine-grained
                  Malicious Behaviors in Android Applications},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {163--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_10},
  doi          = {10.1007/978-3-319-11203-9\_10},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YangXGYP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangXZXWG14,
  author       = {Yong Wang and
                  Zhaoyan Xu and
                  Jialong Zhang and
                  Lei Xu and
                  Haopei Wang and
                  Guofei Gu},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {{SRID:} State Relation Based Intrusion Detection for False Data Injection
                  Attacks in {SCADA}},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {401--418},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_23},
  doi          = {10.1007/978-3-319-11212-1\_23},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangXZXWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NappaXRCG14,
  author       = {Antonio Nappa and
                  Zhaoyan Xu and
                  M. Zubair Rafique and
                  Juan Caballero and
                  Guofei Gu},
  title        = {CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/cyberprobe-towards-internet-scale-active-detection-malicious-servers},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NappaXRCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuZGL14,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted
                  Environment},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {22--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_2},
  doi          = {10.1007/978-3-319-11379-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuZGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ShinXG13,
  author       = {Seungwon Shin and
                  Zhaoyan Xu and
                  Guofei Gu},
  title        = {{EFFORT:} {A} new host-network cooperated framework for efficient
                  and effective bot malware detection},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {13},
  pages        = {2628--2642},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.05.010},
  doi          = {10.1016/J.COMNET.2013.05.010},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ShinXG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/XuZGL13,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  title        = {{AUTOVAC:} Automatically Extracting System Resource Constraints and
                  Generating Vaccines for Malware Immunization},
  booktitle    = {{IEEE} 33rd International Conference on Distributed Computing Systems,
                  {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}},
  pages        = {112--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDCS.2013.69},
  doi          = {10.1109/ICDCS.2013.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/XuZGL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HassanzadehXSGP13,
  author       = {Amin Hassanzadeh and
                  Zhaoyan Xu and
                  Radu Stoleru and
                  Guofei Gu and
                  Michalis Polychronakis},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {{PRIDE:} Practical Intrusion Detection in Resource Constrained Wireless
                  Mesh Networks},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_16},
  doi          = {10.1007/978-3-319-02726-5\_16},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/HassanzadehXSGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuCGK12,
  author       = {Zhaoyan Xu and
                  Lingfeng Chen and
                  Guofei Gu and
                  Christopher Kruegel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {PeerPress: utilizing enemies' {P2P} strength against them},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {581--592},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382257},
  doi          = {10.1145/2382196.2382257},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuCGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuZGL12,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Automatic generation of vaccines for malware immunization},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1037--1039},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382317},
  doi          = {10.1145/2382196.2382317},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuZGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShinXG12,
  author       = {Seungwon Shin and
                  Zhaoyan Xu and
                  Guofei Gu},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {{EFFORT:} Efficient and effective bot malware detection},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2846--2850},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195713},
  doi          = {10.1109/INFCOM.2012.6195713},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShinXG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangYXG12,
  author       = {Jialong Zhang and
                  Chao Yang and
                  Zhaoyan Xu and
                  Guofei Gu},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites
                  through Reversing Search Poisoning Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {230--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_12},
  doi          = {10.1007/978-3-642-33338-5\_12},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics