BibTeX records: Xiao-chun Yun

download as .bib file

@article{DBLP:journals/tse/CuiYCJLHY24,
  author       = {Lei Cui and
                  Junnan Yin and
                  Jiancong Cui and
                  Yuede Ji and
                  Peng Liu and
                  Zhiyu Hao and
                  Xiaochun Yun},
  title        = {API2Vec++: Boosting {API} Sequence Representation for Malware Detection
                  and Classification},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {50},
  number       = {8},
  pages        = {2142--2162},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSE.2024.3422990},
  doi          = {10.1109/TSE.2024.3422990},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/CuiYCJLHY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2408-06576,
  author       = {Wei Peng and
                  Junmei Ding and
                  Wei Wang and
                  Lei Cui and
                  Wei Cai and
                  Zhiyu Hao and
                  Xiaochun Yun},
  title        = {CTISum: {A} New Benchmark Dataset For Cyber Threat Intelligence Summarization},
  journal      = {CoRR},
  volume       = {abs/2408.06576},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2408.06576},
  doi          = {10.48550/ARXIV.2408.06576},
  eprinttype    = {arXiv},
  eprint       = {2408.06576},
  timestamp    = {Mon, 23 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2408-06576.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YunWZZZ23,
  author       = {Xiaochun Yun and
                  Yipeng Wang and
                  Yongzheng Zhang and
                  Chen Zhao and
                  Zijian Zhao},
  title        = {Encrypted {TLS} Traffic Classification on Cloud Platforms},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {31},
  number       = {1},
  pages        = {164--177},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNET.2022.3191312},
  doi          = {10.1109/TNET.2022.3191312},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YunWZZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-01174,
  author       = {Jiang Xie and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Xiaochun Yun and
                  Jia Li},
  title        = {A method based on hierarchical spatiotemporal features for trojan
                  traffic detection},
  journal      = {CoRR},
  volume       = {abs/2309.01174},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.01174},
  doi          = {10.48550/ARXIV.2309.01174},
  eprinttype    = {arXiv},
  eprint       = {2309.01174},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-01174.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-03724,
  author       = {Jiang Xie and
                  Shuhao Li and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Peng Chang},
  title        = {HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical
                  Spatio-Temporal Features of Traffics},
  journal      = {CoRR},
  volume       = {abs/2309.03724},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.03724},
  doi          = {10.48550/ARXIV.2309.03724},
  eprinttype    = {arXiv},
  eprint       = {2309.03724},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-03724.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-03739,
  author       = {Xiaochun Yun and
                  Jiang Xie and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Peishuai Sun},
  title        = {Detecting unknown HTTP-based malicious communication behavior via
                  generated adversarial flows and hierarchical traffic features},
  journal      = {CoRR},
  volume       = {abs/2309.03739},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.03739},
  doi          = {10.48550/ARXIV.2309.03739},
  eprinttype    = {arXiv},
  eprint       = {2309.03739},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-03739.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YunXLZS22,
  author       = {Xiaochun Yun and
                  Jiang Xie and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Peishuai Sun},
  title        = {Detecting unknown HTTP-based malicious communication behavior via
                  generated adversarial flows and hierarchical traffic features},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102834},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102834},
  doi          = {10.1016/J.COSE.2022.102834},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YunXLZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/WuYWWLL22,
  author       = {Guangjun Wu and
                  Xiaochun Yun and
                  Yong Wang and
                  Shupeng Wang and
                  Binbin Li and
                  Yong Liu},
  title        = {A Sketching Approach for Obtaining Real-Time Statistics Over Data
                  Streams in Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {2},
  pages        = {1462--1475},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.2987023},
  doi          = {10.1109/TCC.2020.2987023},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/WuYWWLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/WangYZZL22,
  author       = {Yipeng Wang and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Chen Zhao and
                  Xin Liu},
  title        = {A Multi-Scale Feature Attention Approach to Network Traffic Classification
                  and Its Model Explanation},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {2},
  pages        = {875--889},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3149933},
  doi          = {10.1109/TNSM.2022.3149933},
  timestamp    = {Thu, 07 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/WangYZZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/HaoWCYD22,
  author       = {Zhiyu Hao and
                  Wei Wang and
                  Lei Cui and
                  Xiaochun Yun and
                  Zhenquan Ding},
  title        = {iConSnap: An Incremental Continuous Snapshots System for Virtual Machines},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {539--550},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2019.2955700},
  doi          = {10.1109/TSC.2019.2955700},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/HaoWCYD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/ChengYLGQF22,
  author       = {Zhenyu Cheng and
                  Xiaochun Yun and
                  Shuhao Li and
                  Jinbu Geng and
                  Rui Qin and
                  Li Fan},
  editor       = {Derek Groen and
                  Cl{\'{e}}lia de Mulatier and
                  Maciej Paszynski and
                  Valeria V. Krzhizhanovskaya and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {{DITA-NCG:} Detecting Information Theft Attack Based on Node Communication
                  Graph},
  booktitle    = {Computational Science - {ICCS} 2022 - 22nd International Conference,
                  London, UK, June 21-23, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13350},
  pages        = {345--359},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-08751-6\_25},
  doi          = {10.1007/978-3-031-08751-6\_25},
  timestamp    = {Mon, 27 Jun 2022 17:21:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/ChengYLGQF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZengYCLTWZZ21,
  author       = {Yuwei Zeng and
                  Xiaochun Yun and
                  Xunxun Chen and
                  Boquan Li and
                  Haiwei Tsang and
                  Yipeng Wang and
                  Tianning Zang and
                  Yongzheng Zhang},
  title        = {Finding disposable domain names: {A} linguistics-based stacking approach},
  journal      = {Comput. Networks},
  volume       = {184},
  pages        = {107642},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2020.107642},
  doi          = {10.1016/J.COMNET.2020.107642},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZengYCLTWZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CuiHJFY21,
  author       = {Lei Cui and
                  Zhiyu Hao and
                  Yang Jiao and
                  Haiqiang Fei and
                  Xiaochun Yun},
  title        = {VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph
                  Comparison},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {2004--2017},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3047756},
  doi          = {10.1109/TIFS.2020.3047756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CuiHJFY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XieLYZC20,
  author       = {Jiang Xie and
                  Shuhao Li and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Peng Chang},
  title        = {HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical
                  Spatio-temporal Features of Traffics},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101923},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101923},
  doi          = {10.1016/J.COSE.2020.101923},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XieLYZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YunHWZZZ20,
  author       = {Xiaochun Yun and
                  Ji Huang and
                  Yipeng Wang and
                  Tianning Zang and
                  Yuan Zhou and
                  Yongzheng Zhang},
  title        = {Khaos: An Adversarial Neural Network {DGA} With High Anti-Detection
                  Ability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2225--2240},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2960647},
  doi          = {10.1109/TIFS.2019.2960647},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YunHWZZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/PengHY20,
  author       = {Yaqiong Peng and
                  Zhiyu Hao and
                  Xiaochun Yun},
  title        = {Lock-Free Parallelization for Variance-Reduced Stochastic Gradient
                  Descent on Streaming Data},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {31},
  number       = {9},
  pages        = {2220--2231},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPDS.2020.2987867},
  doi          = {10.1109/TPDS.2020.2987867},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/PengHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/LiuL0YL20,
  author       = {Xiaolin Liu and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Xiaochun Yun and
                  Jia Li},
  editor       = {Valeria V. Krzhizhanovskaya and
                  G{\'{a}}bor Z{\'{a}}vodszky and
                  Michael Harold Lees and
                  Jack J. Dongarra and
                  Peter M. A. Sloot and
                  S{\'{e}}rgio Brissos and
                  Jo{\~{a}}o Teixeira},
  title        = {Challenge Collapsar {(CC)} Attack Traffic Detection Based on Packet
                  Field Differentiated Preprocessing and Deep Neural Network},
  booktitle    = {Computational Science - {ICCS} 2020 - 20th International Conference,
                  Amsterdam, The Netherlands, June 3-5, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12139},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-50420-5\_21},
  doi          = {10.1007/978-3-030-50420-5\_21},
  timestamp    = {Mon, 22 Jun 2020 14:20:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/LiuL0YL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/LiuL0YP20,
  author       = {Zhicheng Liu and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Xiaochun Yun and
                  Chengwei Peng},
  editor       = {Valeria V. Krzhizhanovskaya and
                  G{\'{a}}bor Z{\'{a}}vodszky and
                  Michael Harold Lees and
                  Jack J. Dongarra and
                  Peter M. A. Sloot and
                  S{\'{e}}rgio Brissos and
                  Jo{\~{a}}o Teixeira},
  title        = {Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional
                  Network},
  booktitle    = {Computational Science - {ICCS} 2020 - 20th International Conference,
                  Amsterdam, The Netherlands, June 3-5, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12139},
  pages        = {379--398},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-50420-5\_28},
  doi          = {10.1007/978-3-030-50420-5\_28},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/LiuL0YP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LiuL0Y020,
  author       = {Zhicheng Liu and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Xiaochun Yun and
                  Zhenyu Cheng},
  title        = {Efficient Malware Originated Traffic Classification by Using Generative
                  Adversarial Networks},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes,
                  France, July 7-10, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISCC50000.2020.9219561},
  doi          = {10.1109/ISCC50000.2020.9219561},
  timestamp    = {Mon, 19 Oct 2020 11:52:22 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/LiuL0Y020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/XiYH19,
  author       = {Rongrong Xi and
                  Xiaochun Yun and
                  Zhiyu Hao},
  title        = {Framework for risk assessment in cyber situational awareness},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {149--156},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5189},
  doi          = {10.1049/IET-IFS.2018.5189},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/XiYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WangYLCYYJH19,
  author       = {Chonghua Wang and
                  Libo Yin and
                  Jun Li and
                  Xuehong Chen and
                  Rongchao Yin and
                  Xiaochun Yun and
                  Yang Jiao and
                  Zhiyu Hao},
  title        = {HProve: {A} Hypervisor Level Provenance System to Reconstruct Attack
                  Story Caused by Kernel Malware},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e5},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157417},
  doi          = {10.4108/EAI.8-4-2019.157417},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/WangYLCYYJH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/PengYH19,
  author       = {Yaqiong Peng and
                  Xiaochun Yun and
                  Zhiyu Hao},
  title        = {Fast Wait-Free Construction for Pool-Like Objects with Weakened Internal
                  Order: Stacks as an Example},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {30},
  number       = {7},
  pages        = {1596--1612},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPDS.2018.2889048},
  doi          = {10.1109/TPDS.2018.2889048},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/PengYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/WuYWFLLLWZ19,
  author       = {Guangjun Wu and
                  Xiaochun Yun and
                  Shupeng Wang and
                  Ge Fu and
                  Chao Li and
                  Yong Liu and
                  Binbin Li and
                  Yong Wang and
                  Zhihui Zhao},
  editor       = {Guoliang Li and
                  Jun Yang and
                  Jo{\~{a}}o Gama and
                  Juggapong Natwichai and
                  Yongxin Tong},
  title        = {Accelerating Real-Time Tracking Applications over Big Data Stream
                  with Constrained Space},
  booktitle    = {Database Systems for Advanced Applications - 24th International Conference,
                  {DASFAA} 2019, Chiang Mai, Thailand, April 22-25, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11446},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-18576-3\_1},
  doi          = {10.1007/978-3-030-18576-3\_1},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasfaa/WuYWFLLLWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/XieL0YL19,
  author       = {Jiang Xie and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Xiaochun Yun and
                  Jia Li},
  title        = {A Method Based on Hierarchical Spatiotemporal Features for Trojan
                  Traffic Detection},
  booktitle    = {38th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2019, London, United Kingdom, October 29-31, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IPCCC47392.2019.8958768},
  doi          = {10.1109/IPCCC47392.2019.8958768},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipccc/XieL0YL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuYZW19,
  author       = {Zhicheng Liu and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Yipeng Wang},
  title        = {{CCGA:} Clustering and Capturing Group Activities for DGA-Based Botnets
                  Detection},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {136--143},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00027},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00027},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuYZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LiYTXLZZ19,
  author       = {Jia Li and
                  Xiaochun Yun and
                  Mao Tian and
                  Jiang Xie and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Yu Zhou},
  title        = {A Method of {HTTP} Malicious Traffic Detection on Mobile Networks},
  booktitle    = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2019, Marrakesh, Morocco, April 15-18, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WCNC.2019.8885817},
  doi          = {10.1109/WCNC.2019.8885817},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/LiYTXLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cncert/2018,
  editor       = {Xiaochun Yun and
                  Weiping Wen and
                  Bo Lang and
                  Hanbing Yan and
                  Li Ding and
                  Jia Li and
                  Yu Zhou},
  title        = {Cyber Security - 15th International Annual Conference, {CNCERT} 2018,
                  Beijing, China, August 14-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {970},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-6621-5},
  doi          = {10.1007/978-981-13-6621-5},
  isbn         = {978-981-13-6620-8},
  timestamp    = {Fri, 16 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/CuiHLY18,
  author       = {Lei Cui and
                  Zhiyu Hao and
                  Lun Li and
                  Xiaochun Yun},
  title        = {SnapFiner: {A} Page-Aware Snapshot System for Virtual Machines},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {29},
  number       = {11},
  pages        = {2613--2626},
  year         = {2018},
  url          = {https://doi.org/10.1109/TPDS.2018.2831202},
  doi          = {10.1109/TPDS.2018.2831202},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/CuiHLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/0010Y0C18,
  author       = {Jian Xu and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Zhenyu Cheng},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Yuyu Yin and
                  Muddesar Iqbal},
  title        = {Important Member Discovery of Attribution Trace Based on Relevant
                  Circle (Short Paper)},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 14th {EAI} International Conference, CollaborateCom 2018, Shanghai,
                  China, December 1-3, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {268},
  pages        = {222--232},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12981-1\_16},
  doi          = {10.1007/978-3-030-12981-1\_16},
  timestamp    = {Fri, 19 Jun 2020 11:35:42 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/0010Y0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/PengY0L18,
  author       = {Chengwei Peng and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Shuhao Li},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Yuyu Yin and
                  Muddesar Iqbal},
  title        = {MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive
                  {DNS} Data},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 14th {EAI} International Conference, CollaborateCom 2018, Shanghai,
                  China, December 1-3, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {268},
  pages        = {488--503},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12981-1\_34},
  doi          = {10.1007/978-3-030-12981-1\_34},
  timestamp    = {Fri, 08 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/PengY0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XuY0C18,
  author       = {Jian Xu and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Zhenyu Cheng},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Community Discovery of Attribution Trace Based on Deep Learning Approach},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {342--357},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_20},
  doi          = {10.1007/978-3-030-01950-1\_20},
  timestamp    = {Sat, 05 Sep 2020 18:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/XuY0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PengY0L18,
  author       = {Chengwei Peng and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Shuhao Li},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {MalHunter: Performing a Timely Detection on Malicious Domains via
                  a Single {DNS} Query},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {685--695},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_40},
  doi          = {10.1007/978-3-030-01950-1\_40},
  timestamp    = {Fri, 26 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PengY0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangYZCZ17,
  author       = {Yipeng Wang and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Liwei Chen and
                  Tianning Zang},
  title        = {Rethinking robust and accurate application protocol identification},
  journal      = {Comput. Networks},
  volume       = {129},
  pages        = {64--78},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2017.09.006},
  doi          = {10.1016/J.COMNET.2017.09.006},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/WangYZCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/WangHCZY17,
  author       = {Chonghua Wang and
                  Zhiyu Hao and
                  Lei Cui and
                  Xiangyu Zhang and
                  Xiaochun Yun},
  title        = {Introspection-Based Memory Pruning for Live {VM} Migration},
  journal      = {Int. J. Parallel Program.},
  volume       = {45},
  number       = {6},
  pages        = {1298--1309},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10766-016-0471-0},
  doi          = {10.1007/S10766-016-0471-0},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijpp/WangHCZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangYZCW17,
  author       = {Yipeng Wang and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Liwei Chen and
                  Guangjun Wu},
  title        = {A nonparametric approach to the automated protocol fingerprint inference},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {99},
  pages        = {1--9},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2017.10.009},
  doi          = {10.1016/J.JNCA.2017.10.009},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WangYZCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/CuiHPY17,
  author       = {Lei Cui and
                  Zhiyu Hao and
                  Yaqiong Peng and
                  Xiaochun Yun},
  title        = {Piccolo: {A} Fast and Efficient Rollback System for Virtual Machine
                  Clusters},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {28},
  number       = {8},
  pages        = {2328--2341},
  year         = {2017},
  url          = {https://doi.org/10.1109/TPDS.2017.2668403},
  doi          = {10.1109/TPDS.2017.2668403},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/CuiHPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangHY17,
  author       = {Chonghua Wang and
                  Zhiyu Hao and
                  Xiaochun Yun},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {{NOR:} Towards Non-intrusive, Real-Time and OS-agnostic Introspection
                  for Virtual Machines in Cloud Environment},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {500--517},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_29},
  doi          = {10.1007/978-3-319-75160-3\_29},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/WuYLWWZJZ17,
  author       = {Guangjun Wu and
                  Xiao{-}chun Yun and
                  Chao Li and
                  Shupeng Wang and
                  Yipeng Wang and
                  Xiaoyu Zhang and
                  Siyu Jia and
                  Guangyan Zhang},
  editor       = {K. Sel{\c{c}}uk Candan and
                  Lei Chen and
                  Torben Bach Pedersen and
                  Lijun Chang and
                  Wen Hua},
  title        = {Supporting Real-Time Analytic Queries in Big and Fast Data Environments},
  booktitle    = {Database Systems for Advanced Applications - 22nd International Conference,
                  {DASFAA} 2017, Suzhou, China, March 27-30, 2017, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10178},
  pages        = {477--493},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-55699-4\_29},
  doi          = {10.1007/978-3-319-55699-4\_29},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasfaa/WuYLWWZJZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/TuoY017,
  author       = {Yupeng Tuo and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {Mining Users' Important Locations and Semantics on Cellular Network
                  Data},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {283--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.81},
  doi          = {10.1109/DSC.2017.81},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/TuoY017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/WangYWWW17,
  author       = {Yong Wang and
                  Xiaochun Yun and
                  Xi Wang and
                  Shupeng Wang and
                  Yongshang Wu},
  title        = {Efficient Data Blocking and Skipping Framework Applying Heuristic
                  Rules},
  booktitle    = {23rd {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2017, Shenzhen, China, December 15-17, 2017},
  pages        = {206--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICPADS.2017.00037},
  doi          = {10.1109/ICPADS.2017.00037},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/WangYWWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/WangYWWW17,
  author       = {Yong Wang and
                  Xiaochun Yun and
                  Xi Wang and
                  Shupeng Wang and
                  Yongshang Wu},
  title        = {{LBFM:} Multi-Dimensional Membership Index for Block-Level Data Skipping},
  booktitle    = {2017 {IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications and 2017 {IEEE} International Conference on Ubiquitous
                  Computing and Communications (ISPA/IUCC), Guangzhou, China, December
                  12-15, 2017},
  pages        = {343--351},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISPA/IUCC.2017.00056},
  doi          = {10.1109/ISPA/IUCC.2017.00056},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/WangYWWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nas/TuoY017,
  author       = {Yupeng Tuo and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric
                  Approaches},
  booktitle    = {2017 International Conference on Networking, Architecture, and Storage,
                  {NAS} 2017, Shenzhen, China, August 7-9, 2017},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/NAS.2017.8026879},
  doi          = {10.1109/NAS.2017.8026879},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nas/TuoY017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/TuoY017,
  author       = {Yupeng Tuo and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {{NSIM:} {A} robust method to discover similar trajectories on cellular
                  network location data},
  booktitle    = {28th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October
                  8-13, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PIMRC.2017.8292237},
  doi          = {10.1109/PIMRC.2017.8292237},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/TuoY017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/TuoY017a,
  author       = {Yupeng Tuo and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {{MSTM:} {A} novel map matching approach for low-sampling-rate trajectories},
  booktitle    = {28th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October
                  8-13, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PIMRC.2017.8292591},
  doi          = {10.1109/PIMRC.2017.8292591},
  timestamp    = {Tue, 20 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/TuoY017a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangMZRYH17,
  author       = {Chonghua Wang and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Junghwan Rhee and
                  Xiaochun Yun and
                  Zhiyu Hao},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {A Hypervisor Level Provenance System to Reconstruct Attack Story Caused
                  by Kernel Malware},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {778--792},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_42},
  doi          = {10.1007/978-3-319-78813-5\_42},
  timestamp    = {Wed, 22 Dec 2021 13:40:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangMZRYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengY0LX17,
  author       = {Chengwei Peng and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Jun Xiao},
  title        = {Discovering Malicious Domains through Alias-Canonical Graph},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {225--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.241},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.241},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengY0LX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuY0SC17,
  author       = {Jian Xu and
                  Xiaochun Yun and
                  Yongzheng Zhang and
                  Yafei Sang and
                  Zhenyu Cheng},
  title        = {NetworkTrace: Probabilistic Relevant Pattern Recognition Approach
                  to Attribution Trace Analysis},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {691--698},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.301},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.301},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuY0SC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhangYZZLW16,
  author       = {Kai Zhang and
                  Xiao{-}chun Yun and
                  Xiaoyu Zhang and
                  Xiaobin Zhu and
                  Chao Li and
                  Shupeng Wang},
  title        = {Weighted hierarchical geographic information description model for
                  social relation estimation},
  journal      = {Neurocomputing},
  volume       = {216},
  pages        = {554--560},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.neucom.2016.08.030},
  doi          = {10.1016/J.NEUCOM.2016.08.030},
  timestamp    = {Wed, 06 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhangYZZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiYHZ16,
  author       = {Rongrong Xi and
                  Xiao{-}chun Yun and
                  Zhiyu Hao and
                  Yongzheng Zhang},
  title        = {Quantitative threat situation assessment based on alert verification},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {13},
  pages        = {2135--2142},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1473},
  doi          = {10.1002/SEC.1473},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiYHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YunW0Z16,
  author       = {Xiao{-}chun Yun and
                  Yipeng Wang and
                  Yongzheng Zhang and
                  Yu Zhou},
  title        = {A Semantics-Aware Approach to the Automated Network Protocol Identification},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {1},
  pages        = {583--595},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2014.2381230},
  doi          = {10.1109/TNET.2014.2381230},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YunW0Z16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcom/WangYWW16,
  author       = {Yong Wang and
                  Xiao{-}chun Yun and
                  Shupeng Wang and
                  Xi Wang},
  editor       = {Yu Wang and
                  Ge Yu and
                  Yanyong Zhang and
                  Zhu Han and
                  Guoren Wang},
  title        = {A Compact In-memory Index for Managing Set Membership Queries on Streaming
                  Data},
  booktitle    = {Big Data Computing and Communications - Second International Conference,
                  BigCom 2016, Shenyang, China, July 29-31, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9784},
  pages        = {88--98},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42553-5\_8},
  doi          = {10.1007/978-3-319-42553-5\_8},
  timestamp    = {Wed, 05 Jan 2022 14:30:58 +0100},
  biburl       = {https://dblp.org/rec/conf/bigcom/WangYWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/XiYH16,
  author       = {Rongrong Xi and
                  Xiaochun Yun and
                  Zhiyu Hao},
  editor       = {Jinjun Chen and
                  Laurence T. Yang},
  title        = {Study on Address Blocks with Inaccurate Geolocations of China's Internet},
  booktitle    = {18th {IEEE} International Conference on High Performance Computing
                  and Communications; 14th {IEEE} International Conference on Smart
                  City; 2nd {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  pages        = {438--442},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0069},
  doi          = {10.1109/HPCC-SMARTCITY-DSS.2016.0069},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/XiYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangZYWBY16,
  author       = {Xiaoyu Zhang and
                  Kai Zhang and
                  Xiao{-}chun Yun and
                  Shupeng Wang and
                  Xiuguo Bao and
                  Qingsheng Yuan},
  title        = {Location-based correlation estimation in social network via Collaborative
                  Learning},
  booktitle    = {{IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1073--1074},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFCOMW.2016.7562259},
  doi          = {10.1109/INFCOMW.2016.7562259},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangZYWBY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ZhangYLZLT16,
  author       = {Kai Zhang and
                  Xiao{-}chun Yun and
                  Jiguang Liang and
                  Xiaoyu Zhang and
                  Chao Li and
                  Bin Tian},
  title        = {Retweeting behavior prediction using probabilistic matrix factorization},
  booktitle    = {{IEEE} Symposium on Computers and Communication, {ISCC} 2016, Messina,
                  Italy, June 27-30, 2016},
  pages        = {1185--1192},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISCC.2016.7543897},
  doi          = {10.1109/ISCC.2016.7543897},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/ZhangYLZLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoY016,
  author       = {Yanchen Qiao and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {How to Automatically Identify the Homology of Different Malware},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {929--936},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0158},
  doi          = {10.1109/TRUSTCOM.2016.0158},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoY016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoY016a,
  author       = {Yanchen Qiao and
                  Xiaochun Yun and
                  Yongzheng Zhang},
  title        = {Fast Reused Function Retrieval Method Based on Simhash and Inverted
                  Index},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {937--944},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0159},
  doi          = {10.1109/TRUSTCOM.2016.0159},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoY016a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhangWZYWW15,
  author       = {Xiaoyu Zhang and
                  Shupeng Wang and
                  Xiaobin Zhu and
                  Xiao{-}chun Yun and
                  Guangjun Wu and
                  Yipeng Wang},
  title        = {Update vs. upgrade: Modeling with indeterminate multi-class active
                  learning},
  journal      = {Neurocomputing},
  volume       = {162},
  pages        = {163--170},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.neucom.2015.03.056},
  doi          = {10.1016/J.NEUCOM.2015.03.056},
  timestamp    = {Wed, 06 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhangWZYWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/YunWZLW15,
  author       = {Xiao{-}chun Yun and
                  Guangjun Wu and
                  Guangyan Zhang and
                  Keqin Li and
                  Shupeng Wang},
  title        = {FastRAQ: {A} Fast Approach to Range-Aggregate Queries in Big Data
                  Environments},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {3},
  number       = {2},
  pages        = {206--218},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCC.2014.2338325},
  doi          = {10.1109/TCC.2014.2338325},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/YunWZLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YunL015,
  author       = {Xiao{-}chun Yun and
                  Shuhao Li and
                  Yongzheng Zhang},
  title        = {{SMS} Worm Propagation Over Contact Social Networks: Modeling and
                  Validation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {11},
  pages        = {2365--2380},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2455413},
  doi          = {10.1109/TIFS.2015.2455413},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YunL015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhangWY15,
  author       = {Xiaoyu Zhang and
                  Shupeng Wang and
                  Xiao{-}chun Yun},
  title        = {Bidirectional Active Learning: {A} Two-Way Exploration Into Unlabeled
                  and Labeled Data Set},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {26},
  number       = {12},
  pages        = {3034--3044},
  year         = {2015},
  url          = {https://doi.org/10.1109/TNNLS.2015.2401595},
  doi          = {10.1109/TNNLS.2015.2401595},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhangWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WangYHCHZ15,
  author       = {Chonghua Wang and
                  Xiao{-}chun Yun and
                  Zhiyu Hao and
                  Lei Cui and
                  Yandong Han and
                  Qingxin Zou},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {Exploring Efficient and Robust Virtual Machine Introspection Techniques},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 15th International
                  Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015.
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9530},
  pages        = {429--448},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27137-8\_32},
  doi          = {10.1007/978-3-319-27137-8\_32},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WangYHCHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/WangZYW15,
  author       = {Shupeng Wang and
                  Xiaoyu Zhang and
                  Xiao{-}chun Yun and
                  Guangjun Wu},
  title        = {Joint Recovery and Representation Learning for Robust Correlation
                  Estimation Based on Partially Observed Data},
  booktitle    = {{IEEE} International Conference on Data Mining Workshop, {ICDMW} 2015,
                  Atlantic City, NJ, USA, November 14-17, 2015},
  pages        = {925--931},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICDMW.2015.36},
  doi          = {10.1109/ICDMW.2015.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/WangZYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/WangY015,
  author       = {Yipeng Wang and
                  Xiao{-}chun Yun and
                  Yongzheng Zhang},
  title        = {Rethinking Robust and Accurate Application Protocol Identification:
                  {A} Nonparametric Approach},
  booktitle    = {23rd {IEEE} International Conference on Network Protocols, {ICNP}
                  2015, San Francisco, CA, USA, November 10-13, 2015},
  pages        = {134--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICNP.2015.43},
  doi          = {10.1109/ICNP.2015.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/WangY015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nas/LiWXZW14,
  author       = {Chao Li and
                  Shupeng Wang and
                  Xiao{-}chun Yun and
                  Xiaoyang Zhou and
                  Guangjun Wu},
  title        = {{MMD:} An Approach to Improve Reading Performance in Deduplication
                  Systems},
  booktitle    = {9th {IEEE} International Conference on Networking, Architecture, and
                  Storage, {NAS} 2014, Tianjin, China, August 6-8, 2014},
  pages        = {93--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/NAS.2014.21},
  doi          = {10.1109/NAS.2014.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nas/LiWXZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YanYLWZ13,
  author       = {Jinghua Yan and
                  Xiao{-}chun Yun and
                  Hao Luo and
                  Zhi{-}Gang Wu and
                  Shuzhuang Zhang},
  title        = {Out-of-Sequence Traffic Classification Based on Improved Dynamic Time
                  Warping},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {96-D},
  number       = {11},
  pages        = {2354--2364},
  year         = {2013},
  url          = {https://doi.org/10.1587/transinf.E96.D.2354},
  doi          = {10.1587/TRANSINF.E96.D.2354},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YanYLWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cluster/ZouHCYZ13,
  author       = {Qingxin Zou and
                  Zhiyu Hao and
                  Xu Cui and
                  Xiao{-}chun Yun and
                  Yongzheng Zhang},
  title        = {Counting sort for the live migration of virtual machines},
  booktitle    = {2013 {IEEE} International Conference on Cluster Computing, {CLUSTER}
                  2013, Indianapolis, IN, USA, September 23-27, 2013},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CLUSTER.2013.6702664},
  doi          = {10.1109/CLUSTER.2013.6702664},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cluster/ZouHCYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/WangY0JQ12,
  author       = {Yong Wang and
                  Xiao{-}chun Yun and
                  Yongzheng Zhang and
                  Shuyuan Jin and
                  Yanchen Qiao},
  title        = {Research of Network Vulnerability Analysis Based on Attack Capability
                  Transfer},
  booktitle    = {12th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2012, Chengdu, Sichuan, China, October 27-29, 2012},
  pages        = {38--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CIT.2012.32},
  doi          = {10.1109/CIT.2012.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/WangY0JQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/WangYYXL12,
  author       = {Yong Wang and
                  Xiao{-}chun Yun and
                  Yao Yao and
                  Gang Xiong and
                  Zhen Li},
  title        = {Traffic Measurement Based {DNSSEC} Analysis},
  booktitle    = {12th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2012, Chengdu, Sichuan, China, October 27-29, 2012},
  pages        = {62--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CIT.2012.37},
  doi          = {10.1109/CIT.2012.37},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/WangYYXL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/YanYWLZ12,
  author       = {Jinghua Yan and
                  Xiao{-}chun Yun and
                  Zhi{-}Gang Wu and
                  Hao Luo and
                  Shuzhuang Zhang},
  title        = {A novel weighted combination technique for traffic classification},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {757--761},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664277},
  doi          = {10.1109/CCIS.2012.6664277},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/YanYWLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinacom/WangYXLY12,
  author       = {Yong Wang and
                  Xiaochun Yun and
                  Gang Xiong and
                  Zhen Li and
                  Yao Yao},
  title        = {Availability analysis of {DNSSEC} resolution and validation service},
  booktitle    = {7th International Conference on Communications and Networking in China,
                  Kunming, Yunnan Province, China, August 8-10, 2012},
  pages        = {35--42},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ChinaCom.2012.6417444},
  doi          = {10.1109/CHINACOM.2012.6417444},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chinacom/WangYXLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/WangYSWLZY0G12,
  author       = {Yipeng Wang and
                  Xiao{-}chun Yun and
                  Muhammad Zubair Shafiq and
                  Liyan Wang and
                  Alex X. Liu and
                  Zhibin Zhang and
                  Danfeng Yao and
                  Yongzheng Zhang and
                  Li Guo},
  title        = {A semantics aware approach to automated reverse engineering unknown
                  protocols},
  booktitle    = {20th {IEEE} International Conference on Network Protocols, {ICNP}
                  2012, Austin, TX, USA, October 30 - Nov. 2, 2012},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICNP.2012.6459963},
  doi          = {10.1109/ICNP.2012.6459963},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/WangYSWLZY0G12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/ZhangY12,
  author       = {Yongzheng Zhang and
                  Xiaochun Yun},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {Modeling of Hierarchical Index System for Network Operation Security},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {580--590},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_73},
  doi          = {10.1007/978-3-642-35795-4\_73},
  timestamp    = {Fri, 06 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/ZhangY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nas/LiY0XW12,
  author       = {Shicong Li and
                  Xiao{-}chun Yun and
                  Yongzheng Zhang and
                  Jun Xiao and
                  Yipeng Wang},
  title        = {A General Framework of Trojan Communication Detection Based on Network
                  Traces},
  booktitle    = {Seventh {IEEE} International Conference on Networking, Architecture,
                  and Storage, {NAS} 2012, Xiamen, China, June 28-30, 2012},
  pages        = {49--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/NAS.2012.10},
  doi          = {10.1109/NAS.2012.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nas/LiY0XW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/YanYWLZJZ12,
  author       = {Jinghua Yan and
                  Xiao{-}chun Yun and
                  Zhi{-}Gang Wu and
                  Hao Luo and
                  Shuzhuang Zhang and
                  Shuyuan Jin and
                  Zhibin Zhang},
  editor       = {Hong Shen and
                  Yingpeng Sang and
                  Yidong Li and
                  Depei Qian and
                  Albert Y. Zomaya},
  title        = {Online Traffic Classification Based on Co-training Method},
  booktitle    = {13th International Conference on Parallel and Distributed Computing,
                  Applications and Technologies, {PDCAT} 2012, Beijing, China, December
                  14-16, 2012},
  pages        = {391--397},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/PDCAT.2012.105},
  doi          = {10.1109/PDCAT.2012.105},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcat/YanYWLZJZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiYHZCW12,
  author       = {Shuhao Li and
                  Xiao{-}chun Yun and
                  Zhiyu Hao and
                  Yongzheng Zhang and
                  Xiang Cui and
                  Yipeng Wang},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Modeling Social Engineering Botnet Dynamics across Multiple Social
                  Networks},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {261--272},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_22},
  doi          = {10.1007/978-3-642-30436-1\_22},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiYHZCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vc/FengCBBZLY11,
  author       = {Bailan Feng and
                  Juan Cao and
                  Xiuguo Bao and
                  Lei Bao and
                  Yongdong Zhang and
                  Shouxun Lin and
                  Xiao{-}chun Yun},
  title        = {Graph-based multi-space semantic correlation propagation for video
                  retrieval},
  journal      = {Vis. Comput.},
  volume       = {27},
  number       = {1},
  pages        = {21--34},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00371-010-0510-6},
  doi          = {10.1007/S00371-010-0510-6},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vc/FengCBBZLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/XiYJZ11,
  author       = {Rongrong Xi and
                  Xiao{-}chun Yun and
                  Shuyuan Jin and
                  Yongzheng Zhang},
  editor       = {Sang{-}Soo Yeo and
                  Binod Vaidya and
                  George A. Papadopoulos},
  title        = {Network Threat Assessment Based on Alert Verification},
  booktitle    = {12th International Conference on Parallel and Distributed Computing,
                  Applications and Technologies, {PDCAT} 2011, Gwangju, Korea, October
                  20-22, 2011},
  pages        = {30--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PDCAT.2011.57},
  doi          = {10.1109/PDCAT.2011.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/XiYJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/LiYHCW11,
  author       = {Shuhao Li and
                  Xiao{-}chun Yun and
                  Zhiyu Hao and
                  Xiang Cui and
                  Yipeng Wang},
  editor       = {Sang{-}Soo Yeo and
                  Binod Vaidya and
                  George A. Papadopoulos},
  title        = {A Propagation Model for Social Engineering Botnets in Social Networks},
  booktitle    = {12th International Conference on Parallel and Distributed Computing,
                  Applications and Technologies, {PDCAT} 2011, Gwangju, Korea, October
                  20-22, 2011},
  pages        = {423--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PDCAT.2011.8},
  doi          = {10.1109/PDCAT.2011.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/LiYHCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiJY011,
  author       = {Rongrong Xi and
                  Shuyuan Jin and
                  Xiao{-}chun Yun and
                  Yongzheng Zhang},
  title        = {{CNSSA:} {A} Comprehensive Network Security Situation Awareness System},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {482--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.62},
  doi          = {10.1109/TRUSTCOM.2011.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiJY011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcc/ChangFYWY10,
  author       = {Wei{-}ling Chang and
                  Binxing Fang and
                  Xiao{-}chun Yun and
                  Shupeng Wang and
                  Xiang{-}Zhan Yu},
  editor       = {James A. Storer and
                  Michael W. Marcellin},
  title        = {A Pseudo-Random Number Generator Based on {LZSS}},
  booktitle    = {2010 Data Compression Conference {(DCC} 2010), 24-26 March 2010, Snowbird,
                  UT, {USA}},
  pages        = {524},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DCC.2010.77},
  doi          = {10.1109/DCC.2010.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dcc/ChangFYWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/YanYZTG10,
  author       = {Jinghua Yan and
                  Xiao{-}chun Yun and
                  Peng Zhang and
                  Jianlong Tan and
                  Li Guo},
  title        = {A New Weighted Ensemble Model for Detecting DoS Attack Streams},
  booktitle    = {Proceedings of the 2010 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, Toronto, Canada, August 31 - September 3,
                  2010},
  pages        = {227--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WI-IAT.2010.264},
  doi          = {10.1109/WI-IAT.2010.264},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/YanYZTG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ZangYZZM10,
  author       = {Tianning Zang and
                  Xiao{-}chun Yun and
                  Tianyi Zang and
                  Yongzheng Zhang and
                  Chaoguang Men},
  title        = {Cooperative Work Systems for the Security of Digital Computing Infrastructure},
  booktitle    = {16th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2010, Shanghai, China, December 8-10, 2010},
  pages        = {676--681},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICPADS.2010.88},
  doi          = {10.1109/ICPADS.2010.88},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/ZangYZZM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsdm/DuTCY10,
  author       = {Weifu Du and
                  Songbo Tan and
                  Xueqi Cheng and
                  Xiao{-}chun Yun},
  editor       = {Brian D. Davison and
                  Torsten Suel and
                  Nick Craswell and
                  Bing Liu},
  title        = {Adapting information bottleneck method for automatic construction
                  of domain-oriented sentiment lexicon},
  booktitle    = {Proceedings of the Third International Conference on Web Search and
                  Web Data Mining, {WSDM} 2010, New York, NY, USA, February 4-6, 2010},
  pages        = {111--120},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1718487.1718502},
  doi          = {10.1145/1718487.1718502},
  timestamp    = {Tue, 21 May 2019 11:38:33 +0200},
  biburl       = {https://dblp.org/rec/conf/wsdm/DuTCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-3485,
  author       = {Wei{-}ling Chang and
                  Binxing Fang and
                  Xiao{-}chun Yun and
                  Shupeng Wang and
                  Xiang{-}Zhan Yu},
  title        = {Randomness Testing of Compressed Data},
  journal      = {CoRR},
  volume       = {abs/1001.3485},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.3485},
  eprinttype    = {arXiv},
  eprint       = {1001.3485},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-3485.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangLFY09,
  author       = {Shuzhuang Zhang and
                  Hao Luo and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  title        = {Fast and Memory-Efficient Regular Expression Matching Using Transition
                  Sharing},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {10},
  pages        = {1953--1960},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.1953},
  doi          = {10.1587/TRANSINF.E92.D.1953},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangLFY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcc/ChangYFW09,
  author       = {Wei{-}ling Chang and
                  Xiao{-}chun Yun and
                  Binxing Fang and
                  Shupeng Wang},
  editor       = {James A. Storer and
                  Michael W. Marcellin},
  title        = {The Block {LZSS} Compression Algorithm},
  booktitle    = {2009 Data Compression Conference {(DCC} 2009), 16-18 March 2009, Snowbird,
                  UT, {USA}},
  pages        = {439},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DCC.2009.9},
  doi          = {10.1109/DCC.2009.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dcc/ChangYFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/JinWGY09,
  author       = {Shuyuan Jin and
                  Yong Wang and
                  Xiang Cui and
                  Xiao{-}chun Yun},
  title        = {A review of classification methods for network vulnerability},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, San Antonio, TX, USA, 11-14 October 2009},
  pages        = {1171--1175},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICSMC.2009.5345951},
  doi          = {10.1109/ICSMC.2009.5345951},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/JinWGY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LuoFYW08,
  author       = {Hao Luo and
                  Binxing Fang and
                  Xiao{-}chun Yun and
                  Zhi{-}Gang Wu},
  title        = {An Effective Anomaly Detection Method in {SMTP} Traffic},
  journal      = {Int. J. Netw. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {321--330},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n3/ijns-2008-v6-n3-p321-330.pdf},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuoFYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simulation/HaoYZ08,
  author       = {Zhiyu Hao and
                  Xiao{-}chun Yun and
                  Hongli Zhang},
  title        = {An Efficient Routing Mechanism in Network Simulation},
  journal      = {Simul.},
  volume       = {84},
  number       = {10-11},
  pages        = {511--520},
  year         = {2008},
  url          = {https://doi.org/10.1177/0037549708095861},
  doi          = {10.1177/0037549708095861},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simulation/HaoYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/JiaoYJYY08,
  author       = {Yaoting Jiao and
                  Mei Yang and
                  Yingtao Jiang and
                  Yulu Yang and
                  Xiao{-}chun Yun},
  editor       = {Shahram Latifi},
  title        = {Deadlock-Free Multi-Path Routing for Torus-Based NoCs},
  booktitle    = {Fifth International Conference on Information Technology: New Generations
                  {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}},
  pages        = {253--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ITNG.2008.171},
  doi          = {10.1109/ITNG.2008.171},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/JiaoYJYY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/NeelkrishnanYJZYLY08,
  author       = {Shankar Neelkrishnan and
                  Mei Yang and
                  Yingtao Jiang and
                  Lei Zhang and
                  Yulu Yang and
                  Enyue Lu and
                  Xiao{-}chun Yun},
  editor       = {Shahram Latifi},
  title        = {Design and Implementation of a Parameterized NoC Router and its Application
                  to Build PRDT-Based NoCs},
  booktitle    = {Fifth International Conference on Information Technology: New Generations
                  {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}},
  pages        = {259--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ITNG.2008.172},
  doi          = {10.1109/ITNG.2008.172},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/NeelkrishnanYJZYLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/ZangYZ08,
  author       = {Tianning Zang and
                  Xiao{-}chun Yun and
                  Yongzheng Zhang},
  title        = {A Survey of Alert Fusion Techniques for Security Incident},
  booktitle    = {The Ninth International Conference on Web-Age Information Management,
                  {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China},
  pages        = {475--481},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAIM.2008.104},
  doi          = {10.1109/WAIM.2008.104},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/ZangYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/LeiXJ08,
  author       = {Dai Lei and
                  Xiaochun Yun and
                  Xiao Jun},
  title        = {Optimizing Traffic Classification Using Hybrid Feature Selection},
  booktitle    = {The Ninth International Conference on Web-Age Information Management,
                  {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China},
  pages        = {520--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAIM.2008.30},
  doi          = {10.1109/WAIM.2008.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/LeiXJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/WuYW08,
  author       = {Guangjun Wu and
                  Xiao{-}chun Yun and
                  Shupeng Wang},
  title        = {Design and Implementation of Multi-Version Disk Backup Data Merging
                  Algorithm},
  booktitle    = {The Ninth International Conference on Web-Age Information Management,
                  {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China},
  pages        = {526--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAIM.2008.51},
  doi          = {10.1109/WAIM.2008.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/WuYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/ChangYFWL08,
  author       = {Wei{-}ling Chang and
                  Xiao{-}chun Yun and
                  Binxing Fang and
                  Shupeng Wang and
                  Shuhao Li},
  title        = {A Quasi Word-Based Compression Method of English Text Using Byte-Oriented
                  Coding Scheme},
  booktitle    = {The Ninth International Conference on Web-Age Information Management,
                  {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China},
  pages        = {558--563},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAIM.2008.89},
  doi          = {10.1109/WAIM.2008.89},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/ChangYFWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangFYZ07,
  author       = {Ping Wang and
                  Binxing Fang and
                  Xiao{-}chun Yun and
                  Jun Zheng},
  title        = {A User-Habit Property: Haunting of Users in {IP} Networks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {90-D},
  number       = {1},
  pages        = {371--373},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietisy/e90-1.1.371},
  doi          = {10.1093/IETISY/E90-1.1.371},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangFYZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhouFCYC07,
  author       = {Yuan Zhou and
                  Binxing Fang and
                  Zhenfu Cao and
                  Xiao{-}chun Yun and
                  Xiaoming Cheng},
  title        = {How to construct secure proxy cryptosystem},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {19},
  pages        = {4095--4108},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2007.01.024},
  doi          = {10.1016/J.INS.2007.01.024},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhouFCYC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WangYY07,
  author       = {Shupeng Wang and
                  Xiao{-}chun Yun and
                  Xiang{-}Zhan Yu},
  title        = {Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow
                  Applications},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {23},
  number       = {4},
  pages        = {1299--1313},
  year         = {2007},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2007/200707\_21.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WangYY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/WuYC07,
  author       = {Bing Wu and
                  Xiao{-}chun Yun and
                  Xiang Cui},
  editor       = {Shahram Latifi},
  title        = {Study on Worm Poisoning Technology},
  booktitle    = {Fourth International Conference on Information Technology: New Generations
                  {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}},
  pages        = {65--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ITNG.2007.187},
  doi          = {10.1109/ITNG.2007.187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/WuYC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/WangYL07,
  author       = {Yong Wang and
                  Xiao{-}chun Yun and
                  Yifei Li},
  editor       = {Shahram Latifi},
  title        = {Analyzing the Characteristics of Gnutella Overlays},
  booktitle    = {Fourth International Conference on Information Technology: New Generations
                  {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}},
  pages        = {1095--1100},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ITNG.2007.39},
  doi          = {10.1109/ITNG.2007.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/WangYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/LeiYX07,
  author       = {Dai Lei and
                  Chen You and
                  Xiaochun Yun},
  editor       = {David S. Munro and
                  Hong Shen and
                  Quan Z. Sheng and
                  Henry Detmold and
                  Katrina Falkner and
                  Cruz Izu and
                  Paul D. Coddington and
                  Bradley Alexander and
                  Si{-}Qing Zheng},
  title        = {Optimizing {IP} Flow Classification Using Feature Selection},
  booktitle    = {Eighth International Conference on Parallel and Distributed Computing,
                  Applications and Technologies {(PDCAT} 2007), 3-6 December 2007, Adelaide,
                  Australia},
  pages        = {39--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PDCAT.2007.11},
  doi          = {10.1109/PDCAT.2007.11},
  timestamp    = {Mon, 17 Jul 2023 13:04:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcat/LeiYX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/WangWYYJ07,
  author       = {Shupeng Wang and
                  Jianping Wang and
                  Mei Yang and
                  Xiao{-}chun Yun and
                  Yingtao Jiang},
  editor       = {Jadwiga Indulska and
                  Jianhua Ma and
                  Laurence Tianruo Yang and
                  Theo Ungerer and
                  Jiannong Cao},
  title        = {Handover Cost Optimization in Traffic Management for Multi-homed Mobile
                  Networks},
  booktitle    = {Ubiquitous Intelligence and Computing, 4th International Conference,
                  {UIC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4611},
  pages        = {295--308},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73549-6\_30},
  doi          = {10.1007/978-3-540-73549-6\_30},
  timestamp    = {Wed, 31 Jan 2024 08:24:33 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/WangWYYJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/YangYL06,
  author       = {Wu Yang and
                  Xiao{-}chun Yun and
                  Jianhua Li},
  editor       = {Heng Tao Shen and
                  Jinbao Li and
                  Minglu Li and
                  Jun Ni and
                  Wei Wang},
  title        = {An Efficient SVM-Based Method to Detect Malicious Attacks for Web
                  Servers},
  booktitle    = {Advanced Web and Network Technologies, and Applications, APWeb 2006
                  International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China,
                  January 16-18, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3842},
  pages        = {835--841},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11610496\_114},
  doi          = {10.1007/11610496\_114},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/YangYL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangFY06,
  author       = {Ping Wang and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  title        = {A User Habit Based Approach to Detect and Quarantine Worms},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2148--2152},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255088},
  doi          = {10.1109/ICC.2006.255088},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangFY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BoFY06,
  author       = {Chen Bo and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  editor       = {Sharad Mehrotra and
                  Daniel Dajun Zeng and
                  Hsinchun Chen and
                  Bhavani Thuraisingham and
                  Fei{-}Yue Wang},
  title        = {Adaptive Method for Monitoring Network and Early Detection of Internet
                  Worms},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA,
                  USA, May 23-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3975},
  pages        = {178--189},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760146\_16},
  doi          = {10.1007/11760146\_16},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BoFY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LuoFY06,
  author       = {Hao Luo and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {A Counting-Based Method for Massive Spam Mail Classification},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {45--56},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_5},
  doi          = {10.1007/11689522\_5},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LuoFY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WangFY06,
  author       = {Ping Wang and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Model and Estimation of Worm Propagation Under Network Partition},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {57--66},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_6},
  doi          = {10.1007/11689522\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WangFY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/LuoFY06,
  author       = {Hao Luo and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  title        = {Anomaly Detection in {SMTP} Traffic},
  booktitle    = {Third International Conference on Information Technology: New Generations
                  {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}},
  pages        = {408--413},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ITNG.2006.34},
  doi          = {10.1109/ITNG.2006.34},
  timestamp    = {Sun, 21 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itng/LuoFY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pads/HaoYZ06,
  author       = {Zhiyu Hao and
                  Xiao{-}chun Yun and
                  Hongli Zhang},
  title        = {An Efficient Routing Mechanism in Network Simulation},
  booktitle    = {20th {IEEE/ACM/SCS} Workshop on Principles of Advanced and Distributed
                  Simulation, {PADS} 2006, Singapore, May 23-26, 2006},
  pages        = {150--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/PADS.2006.9},
  doi          = {10.1109/PADS.2006.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pads/HaoYZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/YangYY05,
  author       = {Wu Yang and
                  Xiao{-}chun Yun and
                  Yongtian Yang},
  editor       = {Xue Li and
                  Shuliang Wang and
                  Zhao Yang Dong},
  title        = {Using Boosting Learning Method for Intrusion Detection},
  booktitle    = {Advanced Data Mining and Applications, First International Conference,
                  {ADMA} 2005, Wuhan, China, July 22-24, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3584},
  pages        = {634--641},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11527503\_75},
  doi          = {10.1007/11527503\_75},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/adma/YangYY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangFY05,
  author       = {Ping Wang and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {A New User-Habit Based Approach for Early Warning of Worms},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {212--219},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_32},
  doi          = {10.1007/11596981\_32},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangFY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangFCY05,
  author       = {Yongzheng Zhang and
                  Binxing Fang and
                  Yue Chi and
                  Xiao{-}chun Yun},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Assessment of Windows System Security Using Vulnerability Relationship
                  Graph},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {415--420},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_60},
  doi          = {10.1007/11596981\_60},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangFCY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/WangFY05,
  author       = {Bailing Wang and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  editor       = {Hai Zhuge and
                  Geoffrey C. Fox},
  title        = {A Worm Behavioral Approach to Susceptible Host Detection},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference,
                  Beijing, China, November 30 - December 3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3795},
  pages        = {77--83},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11590354\_9},
  doi          = {10.1007/11590354\_9},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/WangFY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/LiuYWS05,
  author       = {Yi{-}xuan Liu and
                  Xiao{-}chun Yun and
                  Bailing Wang and
                  Hai{-}bin Sun},
  editor       = {Daniel S. Yeung and
                  Zhi{-}Qiang Liu and
                  Xizhao Wang and
                  Hong Yan},
  title        = {An Anti-worm with Balanced Tree Based Spreading Strategy},
  booktitle    = {Advances in Machine Learning and Cybernetics, 4th International Conference,
                  {ICMLC} 2005, Guangzhou, China, August 18-21, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3930},
  pages        = {652--661},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11739685\_68},
  doi          = {10.1007/11739685\_68},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlc/LiuYWS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/WuY05,
  author       = {Yang Wu and
                  Xiao{-}chun Yun},
  editor       = {Cheeha Kim},
  title        = {A High-Performance Network Monitoring Platform for Intrusion Detection},
  booktitle    = {Information Networking, Convergence in Broadband and Mobile Networking,
                  International Conference, {ICOIN} 2005, Jeju Island, Korea, January
                  31- February 2, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3391},
  pages        = {52--61},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30582-8\_6},
  doi          = {10.1007/978-3-540-30582-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/WuY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangHXY05,
  author       = {Tao Zhang and
                  Mingzeng Hu and
                  Xiao{-}chun Yun and
                  Yongzheng Zhang},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {Computer Vulnerability Evaluation Using Fault Tree Analysis},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {302--313},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_26},
  doi          = {10.1007/978-3-540-31979-5\_26},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangHXY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/PingBX05,
  author       = {Ping Wang and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  title        = {A New Approach to Automatically Detect Worms},
  booktitle    = {Sixth International Conference on Parallel and Distributed Computing,
                  Applications and Technologies {(PDCAT} 2005), 5-8 December 2005, Dalian,
                  China},
  pages        = {259--263},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PDCAT.2005.25},
  doi          = {10.1109/PDCAT.2005.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/PingBX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/XinFYC05,
  author       = {Yi Xin and
                  Binxing Fang and
                  Xiao{-}chun Yun and
                  Hai{-}Yong Chen},
  title        = {Worm Detection in Large Scale Network by Traffic},
  booktitle    = {Sixth International Conference on Parallel and Distributed Computing,
                  Applications and Technologies {(PDCAT} 2005), 5-8 December 2005, Dalian,
                  China},
  pages        = {270--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PDCAT.2005.255},
  doi          = {10.1109/PDCAT.2005.255},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/XinFYC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcs/YangYL05,
  author       = {Wu Yang and
                  Xiao{-}chun Yun and
                  Jian{-}Hua Li},
  editor       = {S. Q. Zheng},
  title        = {An Improved Network Intrusion Detection Method based on {VQ-SVM}},
  booktitle    = {International Conference on Parallel and Distributed Computing Systems,
                  {PDCS} 2005, November 14-16, 2005, Phoenix, AZ, {USA}},
  pages        = {583--587},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2005},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcs/YangYL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/XiangzhanXW05,
  author       = {Xiang{-}Zhan Yu and
                  Xiao{-}chun Yun and
                  Shupeng Wang},
  editor       = {Hamid R. Arabnia},
  title        = {Implementation of a Dynamic Failover Technology},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 2005, Las Vegas, Nevada,
                  USA, June 27-30, 2005, Volume 1},
  pages        = {339--345},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Mon, 01 Feb 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/XiangzhanXW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciit/WangY04,
  author       = {Shupeng Wang and
                  Xiao{-}chun Yun},
  editor       = {M. H. Hamza},
  title        = {An improved failure detector based on pull and push approach},
  booktitle    = {{IASTED} International Conference on Communications, Internet, and
                  Information Technology, November 22 - 24, 2004, St. Thomas, {US} Virgin
                  Islands, {USA}},
  pages        = {161--167},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2004},
  timestamp    = {Thu, 05 Jul 2018 07:27:58 +0200},
  biburl       = {https://dblp.org/rec/conf/ciit/WangY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/YongzhengX04,
  author       = {Yongzheng Zhang and
                  Xiao{-}chun Yun},
  title        = {A New Vulnerability Taxonomy Based on Privilege Escalation},
  booktitle    = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise
                  Information Systems, Porto, Portugal, April 14-17, 2004},
  pages        = {596--600},
  year         = {2004},
  timestamp    = {Thu, 02 Feb 2017 12:56:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/YongzhengX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/TianFX04,
  author       = {Zhihong Tian and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  title        = {Defending Against Flash Crowds and Malicious Traffic Attacks with
                  An Auction-Based Method},
  booktitle    = {2004 {IEEE/WIC/ACM} International Conference on Web Intelligence {(WI}
                  2004), 20-24 September 2004, Beijing, China},
  pages        = {24--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/WI.2004.10152},
  doi          = {10.1109/WI.2004.10152},
  timestamp    = {Thu, 23 Mar 2023 14:30:18 +0100},
  biburl       = {https://dblp.org/rec/conf/webi/TianFX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iadis/BaoHYD03,
  author       = {Xiuguo Bao and
                  Ming{-}Zheng Hu and
                  Xiao{-}chun Yun and
                  Ri Ding},
  title        = {Anti-Sniffing in Unbounded Networks},
  booktitle    = {Proceedings of the {IADIS} International Conference WWW/Internet 2003,
                  {ICWI} 2003, Algarve, Portugal, November 5-8, 2003},
  pages        = {580--586},
  publisher    = {{IADIS}},
  year         = {2003},
  timestamp    = {Tue, 16 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iadis/BaoHYD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}