Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhaoyan Xu
@inproceedings{DBLP:conf/dimva/ParkKYPXPS19, author = {Taejune Park and Yeonkeun Kim and Vinod Yegneswaran and Phillip A. Porras and Zhaoyan Xu and KyoungSoo Park and Seungwon Shin}, editor = {Roberto Perdisci and Cl{\'{e}}mentine Maurice and Giorgio Giacinto and Magnus Almgren}, title = {{DPX:} Data-Plane eXtensions for {SDN} Security Service Instantiation}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, {DIMVA} 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11543}, pages = {415--437}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22038-9\_20}, doi = {10.1007/978-3-030-22038-9\_20}, timestamp = {Tue, 29 Dec 2020 18:36:17 +0100}, biburl = {https://dblp.org/rec/conf/dimva/ParkKYPXPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ShinXKG18, author = {Seungwon Shin and Zhaoyan Xu and Yeonkeun Kim and Guofei Gu}, title = {CloudRand: Building Heterogeneous and Moving-Target Network Interfaces}, booktitle = {27th International Conference on Computer Communication and Networks, {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018}, pages = {1--11}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCN.2018.8487356}, doi = {10.1109/ICCCN.2018.8487356}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ShinXKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ParkXS18, author = {Taejune Park and Zhaoyan Xu and Seungwon Shin}, title = {{HEX} Switch: Hardware-assisted security extensions of OpenFlow}, booktitle = {Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, SecSoN@SIGCOMM 2018, Budapest, Hungary, August 24, 2018}, pages = {33--39}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3229616.3229622}, doi = {10.1145/3229616.3229622}, timestamp = {Wed, 21 Nov 2018 12:44:03 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/ParkXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HassanzadehXSGP16, author = {Amin Hassanzadeh and Zhaoyan Xu and Radu Stoleru and Guofei Gu and Michalis Polychronakis}, title = {{PRIDE:} {A} practical intrusion detection system for resource constrained wireless mesh networks}, journal = {Comput. Secur.}, volume = {62}, pages = {114--132}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.007}, doi = {10.1016/J.COSE.2016.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HassanzadehXSGP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuNBYCG14, author = {Zhaoyan Xu and Antonio Nappa and Robert Baykov and Guangliang Yang and Juan Caballero and Guofei Gu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{AUTOPROBE:} Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {179--190}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660352}, doi = {10.1145/2660267.2660352}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuNBYCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YangXGYP14, author = {Chao Yang and Zhaoyan Xu and Guofei Gu and Vinod Yegneswaran and Phillip A. Porras}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {163--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_10}, doi = {10.1007/978-3-319-11203-9\_10}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YangXGYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangXZXWG14, author = {Yong Wang and Zhaoyan Xu and Jialong Zhang and Lei Xu and Haopei Wang and Guofei Gu}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {{SRID:} State Relation Based Intrusion Detection for False Data Injection Attacks in {SCADA}}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {401--418}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_23}, doi = {10.1007/978-3-319-11212-1\_23}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangXZXWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NappaXRCG14, author = {Antonio Nappa and Zhaoyan Xu and M. Zubair Rafique and Juan Caballero and Guofei Gu}, title = {CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/cyberprobe-towards-internet-scale-active-detection-malicious-servers}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NappaXRCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuZGL14, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {22--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_2}, doi = {10.1007/978-3-319-11379-1\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/XuZGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ShinXG13, author = {Seungwon Shin and Zhaoyan Xu and Guofei Gu}, title = {{EFFORT:} {A} new host-network cooperated framework for efficient and effective bot malware detection}, journal = {Comput. Networks}, volume = {57}, number = {13}, pages = {2628--2642}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2013.05.010}, doi = {10.1016/J.COMNET.2013.05.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ShinXG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/XuZGL13, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, title = {{AUTOVAC:} Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization}, booktitle = {{IEEE} 33rd International Conference on Distributed Computing Systems, {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}}, pages = {112--123}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDCS.2013.69}, doi = {10.1109/ICDCS.2013.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/XuZGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HassanzadehXSGP13, author = {Amin Hassanzadeh and Zhaoyan Xu and Radu Stoleru and Guofei Gu and Michalis Polychronakis}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {{PRIDE:} Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {213--228}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_16}, doi = {10.1007/978-3-319-02726-5\_16}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/HassanzadehXSGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuCGK12, author = {Zhaoyan Xu and Lingfeng Chen and Guofei Gu and Christopher Kruegel}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {PeerPress: utilizing enemies' {P2P} strength against them}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {581--592}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382257}, doi = {10.1145/2382196.2382257}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XuCGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuZGL12, author = {Zhaoyan Xu and Jialong Zhang and Guofei Gu and Zhiqiang Lin}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Automatic generation of vaccines for malware immunization}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1037--1039}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382317}, doi = {10.1145/2382196.2382317}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuZGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShinXG12, author = {Seungwon Shin and Zhaoyan Xu and Guofei Gu}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {{EFFORT:} Efficient and effective bot malware detection}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2846--2850}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195713}, doi = {10.1109/INFCOM.2012.6195713}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShinXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangYXG12, author = {Jialong Zhang and Chao Yang and Zhaoyan Xu and Guofei Gu}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {230--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_12}, doi = {10.1007/978-3-642-33338-5\_12}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.