default search action
BibTeX records: Xiao-chun Yun
@article{DBLP:journals/tse/CuiYCJLHY24, author = {Lei Cui and Junnan Yin and Jiancong Cui and Yuede Ji and Peng Liu and Zhiyu Hao and Xiaochun Yun}, title = {API2Vec++: Boosting {API} Sequence Representation for Malware Detection and Classification}, journal = {{IEEE} Trans. Software Eng.}, volume = {50}, number = {8}, pages = {2142--2162}, year = {2024}, url = {https://doi.org/10.1109/TSE.2024.3422990}, doi = {10.1109/TSE.2024.3422990}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/CuiYCJLHY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-06576, author = {Wei Peng and Junmei Ding and Wei Wang and Lei Cui and Wei Cai and Zhiyu Hao and Xiaochun Yun}, title = {CTISum: {A} New Benchmark Dataset For Cyber Threat Intelligence Summarization}, journal = {CoRR}, volume = {abs/2408.06576}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.06576}, doi = {10.48550/ARXIV.2408.06576}, eprinttype = {arXiv}, eprint = {2408.06576}, timestamp = {Mon, 23 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-06576.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/YunWZZZ23, author = {Xiaochun Yun and Yipeng Wang and Yongzheng Zhang and Chen Zhao and Zijian Zhao}, title = {Encrypted {TLS} Traffic Classification on Cloud Platforms}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {31}, number = {1}, pages = {164--177}, year = {2023}, url = {https://doi.org/10.1109/TNET.2022.3191312}, doi = {10.1109/TNET.2022.3191312}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/YunWZZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-01174, author = {Jiang Xie and Shuhao Li and Yongzheng Zhang and Xiaochun Yun and Jia Li}, title = {A method based on hierarchical spatiotemporal features for trojan traffic detection}, journal = {CoRR}, volume = {abs/2309.01174}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.01174}, doi = {10.48550/ARXIV.2309.01174}, eprinttype = {arXiv}, eprint = {2309.01174}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-01174.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-03724, author = {Jiang Xie and Shuhao Li and Xiaochun Yun and Yongzheng Zhang and Peng Chang}, title = {HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics}, journal = {CoRR}, volume = {abs/2309.03724}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.03724}, doi = {10.48550/ARXIV.2309.03724}, eprinttype = {arXiv}, eprint = {2309.03724}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-03724.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-03739, author = {Xiaochun Yun and Jiang Xie and Shuhao Li and Yongzheng Zhang and Peishuai Sun}, title = {Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features}, journal = {CoRR}, volume = {abs/2309.03739}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.03739}, doi = {10.48550/ARXIV.2309.03739}, eprinttype = {arXiv}, eprint = {2309.03739}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-03739.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YunXLZS22, author = {Xiaochun Yun and Jiang Xie and Shuhao Li and Yongzheng Zhang and Peishuai Sun}, title = {Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features}, journal = {Comput. Secur.}, volume = {121}, pages = {102834}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102834}, doi = {10.1016/J.COSE.2022.102834}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YunXLZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/WuYWWLL22, author = {Guangjun Wu and Xiaochun Yun and Yong Wang and Shupeng Wang and Binbin Li and Yong Liu}, title = {A Sketching Approach for Obtaining Real-Time Statistics Over Data Streams in Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {2}, pages = {1462--1475}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.2987023}, doi = {10.1109/TCC.2020.2987023}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/WuYWWLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/WangYZZL22, author = {Yipeng Wang and Xiaochun Yun and Yongzheng Zhang and Chen Zhao and Xin Liu}, title = {A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {2}, pages = {875--889}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3149933}, doi = {10.1109/TNSM.2022.3149933}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/WangYZZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/HaoWCYD22, author = {Zhiyu Hao and Wei Wang and Lei Cui and Xiaochun Yun and Zhenquan Ding}, title = {iConSnap: An Incremental Continuous Snapshots System for Virtual Machines}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {1}, pages = {539--550}, year = {2022}, url = {https://doi.org/10.1109/TSC.2019.2955700}, doi = {10.1109/TSC.2019.2955700}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/HaoWCYD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/ChengYLGQF22, author = {Zhenyu Cheng and Xiaochun Yun and Shuhao Li and Jinbu Geng and Rui Qin and Li Fan}, editor = {Derek Groen and Cl{\'{e}}lia de Mulatier and Maciej Paszynski and Valeria V. Krzhizhanovskaya and Jack J. Dongarra and Peter M. A. Sloot}, title = {{DITA-NCG:} Detecting Information Theft Attack Based on Node Communication Graph}, booktitle = {Computational Science - {ICCS} 2022 - 22nd International Conference, London, UK, June 21-23, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13350}, pages = {345--359}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-08751-6\_25}, doi = {10.1007/978-3-031-08751-6\_25}, timestamp = {Mon, 27 Jun 2022 17:21:53 +0200}, biburl = {https://dblp.org/rec/conf/iccS/ChengYLGQF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZengYCLTWZZ21, author = {Yuwei Zeng and Xiaochun Yun and Xunxun Chen and Boquan Li and Haiwei Tsang and Yipeng Wang and Tianning Zang and Yongzheng Zhang}, title = {Finding disposable domain names: {A} linguistics-based stacking approach}, journal = {Comput. Networks}, volume = {184}, pages = {107642}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2020.107642}, doi = {10.1016/J.COMNET.2020.107642}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZengYCLTWZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CuiHJFY21, author = {Lei Cui and Zhiyu Hao and Yang Jiao and Haiqiang Fei and Xiaochun Yun}, title = {VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {2004--2017}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3047756}, doi = {10.1109/TIFS.2020.3047756}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CuiHJFY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XieLYZC20, author = {Jiang Xie and Shuhao Li and Xiaochun Yun and Yongzheng Zhang and Peng Chang}, title = {HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics}, journal = {Comput. Secur.}, volume = {96}, pages = {101923}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101923}, doi = {10.1016/J.COSE.2020.101923}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XieLYZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YunHWZZZ20, author = {Xiaochun Yun and Ji Huang and Yipeng Wang and Tianning Zang and Yuan Zhou and Yongzheng Zhang}, title = {Khaos: An Adversarial Neural Network {DGA} With High Anti-Detection Ability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2225--2240}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2960647}, doi = {10.1109/TIFS.2019.2960647}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YunHWZZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/PengHY20, author = {Yaqiong Peng and Zhiyu Hao and Xiaochun Yun}, title = {Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {31}, number = {9}, pages = {2220--2231}, year = {2020}, url = {https://doi.org/10.1109/TPDS.2020.2987867}, doi = {10.1109/TPDS.2020.2987867}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/PengHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/LiuL0YL20, author = {Xiaolin Liu and Shuhao Li and Yongzheng Zhang and Xiaochun Yun and Jia Li}, editor = {Valeria V. Krzhizhanovskaya and G{\'{a}}bor Z{\'{a}}vodszky and Michael Harold Lees and Jack J. Dongarra and Peter M. A. Sloot and S{\'{e}}rgio Brissos and Jo{\~{a}}o Teixeira}, title = {Challenge Collapsar {(CC)} Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network}, booktitle = {Computational Science - {ICCS} 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3-5, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12139}, pages = {282--296}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-50420-5\_21}, doi = {10.1007/978-3-030-50420-5\_21}, timestamp = {Mon, 22 Jun 2020 14:20:44 +0200}, biburl = {https://dblp.org/rec/conf/iccS/LiuL0YL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/LiuL0YP20, author = {Zhicheng Liu and Shuhao Li and Yongzheng Zhang and Xiaochun Yun and Chengwei Peng}, editor = {Valeria V. Krzhizhanovskaya and G{\'{a}}bor Z{\'{a}}vodszky and Michael Harold Lees and Jack J. Dongarra and Peter M. A. Sloot and S{\'{e}}rgio Brissos and Jo{\~{a}}o Teixeira}, title = {Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network}, booktitle = {Computational Science - {ICCS} 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3-5, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12139}, pages = {379--398}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-50420-5\_28}, doi = {10.1007/978-3-030-50420-5\_28}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/LiuL0YP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/LiuL0Y020, author = {Zhicheng Liu and Shuhao Li and Yongzheng Zhang and Xiaochun Yun and Zhenyu Cheng}, title = {Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes, France, July 7-10, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISCC50000.2020.9219561}, doi = {10.1109/ISCC50000.2020.9219561}, timestamp = {Mon, 19 Oct 2020 11:52:22 +0200}, biburl = {https://dblp.org/rec/conf/iscc/LiuL0Y020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/XiYH19, author = {Rongrong Xi and Xiaochun Yun and Zhiyu Hao}, title = {Framework for risk assessment in cyber situational awareness}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {2}, pages = {149--156}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5189}, doi = {10.1049/IET-IFS.2018.5189}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/XiYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WangYLCYYJH19, author = {Chonghua Wang and Libo Yin and Jun Li and Xuehong Chen and Rongchao Yin and Xiaochun Yun and Yang Jiao and Zhiyu Hao}, title = {HProve: {A} Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e5}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157417}, doi = {10.4108/EAI.8-4-2019.157417}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/WangYLCYYJH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/PengYH19, author = {Yaqiong Peng and Xiaochun Yun and Zhiyu Hao}, title = {Fast Wait-Free Construction for Pool-Like Objects with Weakened Internal Order: Stacks as an Example}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {30}, number = {7}, pages = {1596--1612}, year = {2019}, url = {https://doi.org/10.1109/TPDS.2018.2889048}, doi = {10.1109/TPDS.2018.2889048}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/PengYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/WuYWFLLLWZ19, author = {Guangjun Wu and Xiaochun Yun and Shupeng Wang and Ge Fu and Chao Li and Yong Liu and Binbin Li and Yong Wang and Zhihui Zhao}, editor = {Guoliang Li and Jun Yang and Jo{\~{a}}o Gama and Juggapong Natwichai and Yongxin Tong}, title = {Accelerating Real-Time Tracking Applications over Big Data Stream with Constrained Space}, booktitle = {Database Systems for Advanced Applications - 24th International Conference, {DASFAA} 2019, Chiang Mai, Thailand, April 22-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11446}, pages = {3--18}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-18576-3\_1}, doi = {10.1007/978-3-030-18576-3\_1}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasfaa/WuYWFLLLWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/XieL0YL19, author = {Jiang Xie and Shuhao Li and Yongzheng Zhang and Xiaochun Yun and Jia Li}, title = {A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection}, booktitle = {38th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2019, London, United Kingdom, October 29-31, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IPCCC47392.2019.8958768}, doi = {10.1109/IPCCC47392.2019.8958768}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipccc/XieL0YL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuYZW19, author = {Zhicheng Liu and Xiaochun Yun and Yongzheng Zhang and Yipeng Wang}, title = {{CCGA:} Clustering and Capturing Group Activities for DGA-Based Botnets Detection}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {136--143}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00027}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00027}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LiYTXLZZ19, author = {Jia Li and Xiaochun Yun and Mao Tian and Jiang Xie and Shuhao Li and Yongzheng Zhang and Yu Zhou}, title = {A Method of {HTTP} Malicious Traffic Detection on Mobile Networks}, booktitle = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2019, Marrakesh, Morocco, April 15-18, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WCNC.2019.8885817}, doi = {10.1109/WCNC.2019.8885817}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/LiYTXLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cncert/2018, editor = {Xiaochun Yun and Weiping Wen and Bo Lang and Hanbing Yan and Li Ding and Jia Li and Yu Zhou}, title = {Cyber Security - 15th International Annual Conference, {CNCERT} 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {970}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-6621-5}, doi = {10.1007/978-981-13-6621-5}, isbn = {978-981-13-6620-8}, timestamp = {Fri, 16 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cncert/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/CuiHLY18, author = {Lei Cui and Zhiyu Hao and Lun Li and Xiaochun Yun}, title = {SnapFiner: {A} Page-Aware Snapshot System for Virtual Machines}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {29}, number = {11}, pages = {2613--2626}, year = {2018}, url = {https://doi.org/10.1109/TPDS.2018.2831202}, doi = {10.1109/TPDS.2018.2831202}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/CuiHLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/0010Y0C18, author = {Jian Xu and Xiaochun Yun and Yongzheng Zhang and Zhenyu Cheng}, editor = {Honghao Gao and Xinheng Wang and Yuyu Yin and Muddesar Iqbal}, title = {Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper)}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 14th {EAI} International Conference, CollaborateCom 2018, Shanghai, China, December 1-3, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {268}, pages = {222--232}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12981-1\_16}, doi = {10.1007/978-3-030-12981-1\_16}, timestamp = {Fri, 19 Jun 2020 11:35:42 +0200}, biburl = {https://dblp.org/rec/conf/colcom/0010Y0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/PengY0L18, author = {Chengwei Peng and Xiaochun Yun and Yongzheng Zhang and Shuhao Li}, editor = {Honghao Gao and Xinheng Wang and Yuyu Yin and Muddesar Iqbal}, title = {MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive {DNS} Data}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 14th {EAI} International Conference, CollaborateCom 2018, Shanghai, China, December 1-3, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {268}, pages = {488--503}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12981-1\_34}, doi = {10.1007/978-3-030-12981-1\_34}, timestamp = {Fri, 08 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/PengY0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XuY0C18, author = {Jian Xu and Xiaochun Yun and Yongzheng Zhang and Zhenyu Cheng}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Community Discovery of Attribution Trace Based on Deep Learning Approach}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {342--357}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_20}, doi = {10.1007/978-3-030-01950-1\_20}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/XuY0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PengY0L18, author = {Chengwei Peng and Xiaochun Yun and Yongzheng Zhang and Shuhao Li}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {MalHunter: Performing a Timely Detection on Malicious Domains via a Single {DNS} Query}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {685--695}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_40}, doi = {10.1007/978-3-030-01950-1\_40}, timestamp = {Fri, 26 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/PengY0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangYZCZ17, author = {Yipeng Wang and Xiaochun Yun and Yongzheng Zhang and Liwei Chen and Tianning Zang}, title = {Rethinking robust and accurate application protocol identification}, journal = {Comput. Networks}, volume = {129}, pages = {64--78}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2017.09.006}, doi = {10.1016/J.COMNET.2017.09.006}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/WangYZCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/WangHCZY17, author = {Chonghua Wang and Zhiyu Hao and Lei Cui and Xiangyu Zhang and Xiaochun Yun}, title = {Introspection-Based Memory Pruning for Live {VM} Migration}, journal = {Int. J. Parallel Program.}, volume = {45}, number = {6}, pages = {1298--1309}, year = {2017}, url = {https://doi.org/10.1007/s10766-016-0471-0}, doi = {10.1007/S10766-016-0471-0}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijpp/WangHCZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangYZCW17, author = {Yipeng Wang and Xiaochun Yun and Yongzheng Zhang and Liwei Chen and Guangjun Wu}, title = {A nonparametric approach to the automated protocol fingerprint inference}, journal = {J. Netw. Comput. Appl.}, volume = {99}, pages = {1--9}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2017.10.009}, doi = {10.1016/J.JNCA.2017.10.009}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WangYZCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/CuiHPY17, author = {Lei Cui and Zhiyu Hao and Yaqiong Peng and Xiaochun Yun}, title = {Piccolo: {A} Fast and Efficient Rollback System for Virtual Machine Clusters}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {28}, number = {8}, pages = {2328--2341}, year = {2017}, url = {https://doi.org/10.1109/TPDS.2017.2668403}, doi = {10.1109/TPDS.2017.2668403}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/CuiHPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangHY17, author = {Chonghua Wang and Zhiyu Hao and Xiaochun Yun}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {{NOR:} Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {500--517}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_29}, doi = {10.1007/978-3-319-75160-3\_29}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/WuYLWWZJZ17, author = {Guangjun Wu and Xiao{-}chun Yun and Chao Li and Shupeng Wang and Yipeng Wang and Xiaoyu Zhang and Siyu Jia and Guangyan Zhang}, editor = {K. Sel{\c{c}}uk Candan and Lei Chen and Torben Bach Pedersen and Lijun Chang and Wen Hua}, title = {Supporting Real-Time Analytic Queries in Big and Fast Data Environments}, booktitle = {Database Systems for Advanced Applications - 22nd International Conference, {DASFAA} 2017, Suzhou, China, March 27-30, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10178}, pages = {477--493}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-55699-4\_29}, doi = {10.1007/978-3-319-55699-4\_29}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasfaa/WuYLWWZJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/TuoY017, author = {Yupeng Tuo and Xiaochun Yun and Yongzheng Zhang}, title = {Mining Users' Important Locations and Semantics on Cellular Network Data}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {283--291}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.81}, doi = {10.1109/DSC.2017.81}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/TuoY017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/WangYWWW17, author = {Yong Wang and Xiaochun Yun and Xi Wang and Shupeng Wang and Yongshang Wu}, title = {Efficient Data Blocking and Skipping Framework Applying Heuristic Rules}, booktitle = {23rd {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2017, Shenzhen, China, December 15-17, 2017}, pages = {206--214}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICPADS.2017.00037}, doi = {10.1109/ICPADS.2017.00037}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/WangYWWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/WangYWWW17, author = {Yong Wang and Xiaochun Yun and Xi Wang and Shupeng Wang and Yongshang Wu}, title = {{LBFM:} Multi-Dimensional Membership Index for Block-Level Data Skipping}, booktitle = {2017 {IEEE} International Symposium on Parallel and Distributed Processing with Applications and 2017 {IEEE} International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, December 12-15, 2017}, pages = {343--351}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISPA/IUCC.2017.00056}, doi = {10.1109/ISPA/IUCC.2017.00056}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/WangYWWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nas/TuoY017, author = {Yupeng Tuo and Xiaochun Yun and Yongzheng Zhang}, title = {Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches}, booktitle = {2017 International Conference on Networking, Architecture, and Storage, {NAS} 2017, Shenzhen, China, August 7-9, 2017}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/NAS.2017.8026879}, doi = {10.1109/NAS.2017.8026879}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nas/TuoY017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/TuoY017, author = {Yupeng Tuo and Xiaochun Yun and Yongzheng Zhang}, title = {{NSIM:} {A} robust method to discover similar trajectories on cellular network location data}, booktitle = {28th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October 8-13, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PIMRC.2017.8292237}, doi = {10.1109/PIMRC.2017.8292237}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/TuoY017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/TuoY017a, author = {Yupeng Tuo and Xiaochun Yun and Yongzheng Zhang}, title = {{MSTM:} {A} novel map matching approach for low-sampling-rate trajectories}, booktitle = {28th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October 8-13, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PIMRC.2017.8292591}, doi = {10.1109/PIMRC.2017.8292591}, timestamp = {Tue, 20 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/TuoY017a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangMZRYH17, author = {Chonghua Wang and Shiqing Ma and Xiangyu Zhang and Junghwan Rhee and Xiaochun Yun and Zhiyu Hao}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware}, booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, pages = {778--792}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78813-5\_42}, doi = {10.1007/978-3-319-78813-5\_42}, timestamp = {Wed, 22 Dec 2021 13:40:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/WangMZRYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengY0LX17, author = {Chengwei Peng and Xiaochun Yun and Yongzheng Zhang and Shuhao Li and Jun Xiao}, title = {Discovering Malicious Domains through Alias-Canonical Graph}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {225--232}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.241}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.241}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PengY0LX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuY0SC17, author = {Jian Xu and Xiaochun Yun and Yongzheng Zhang and Yafei Sang and Zhenyu Cheng}, title = {NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {691--698}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.301}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.301}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuY0SC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhangYZZLW16, author = {Kai Zhang and Xiao{-}chun Yun and Xiaoyu Zhang and Xiaobin Zhu and Chao Li and Shupeng Wang}, title = {Weighted hierarchical geographic information description model for social relation estimation}, journal = {Neurocomputing}, volume = {216}, pages = {554--560}, year = {2016}, url = {https://doi.org/10.1016/j.neucom.2016.08.030}, doi = {10.1016/J.NEUCOM.2016.08.030}, timestamp = {Wed, 06 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ZhangYZZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XiYHZ16, author = {Rongrong Xi and Xiao{-}chun Yun and Zhiyu Hao and Yongzheng Zhang}, title = {Quantitative threat situation assessment based on alert verification}, journal = {Secur. Commun. Networks}, volume = {9}, number = {13}, pages = {2135--2142}, year = {2016}, url = {https://doi.org/10.1002/sec.1473}, doi = {10.1002/SEC.1473}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XiYHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/YunW0Z16, author = {Xiao{-}chun Yun and Yipeng Wang and Yongzheng Zhang and Yu Zhou}, title = {A Semantics-Aware Approach to the Automated Network Protocol Identification}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {1}, pages = {583--595}, year = {2016}, url = {https://doi.org/10.1109/TNET.2014.2381230}, doi = {10.1109/TNET.2014.2381230}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/YunW0Z16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcom/WangYWW16, author = {Yong Wang and Xiao{-}chun Yun and Shupeng Wang and Xi Wang}, editor = {Yu Wang and Ge Yu and Yanyong Zhang and Zhu Han and Guoren Wang}, title = {A Compact In-memory Index for Managing Set Membership Queries on Streaming Data}, booktitle = {Big Data Computing and Communications - Second International Conference, BigCom 2016, Shenyang, China, July 29-31, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9784}, pages = {88--98}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42553-5\_8}, doi = {10.1007/978-3-319-42553-5\_8}, timestamp = {Wed, 05 Jan 2022 14:30:58 +0100}, biburl = {https://dblp.org/rec/conf/bigcom/WangYWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/XiYH16, author = {Rongrong Xi and Xiaochun Yun and Zhiyu Hao}, editor = {Jinjun Chen and Laurence T. Yang}, title = {Study on Address Blocks with Inaccurate Geolocations of China's Internet}, booktitle = {18th {IEEE} International Conference on High Performance Computing and Communications; 14th {IEEE} International Conference on Smart City; 2nd {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016}, pages = {438--442}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0069}, doi = {10.1109/HPCC-SMARTCITY-DSS.2016.0069}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/XiYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangZYWBY16, author = {Xiaoyu Zhang and Kai Zhang and Xiao{-}chun Yun and Shupeng Wang and Xiuguo Bao and Qingsheng Yuan}, title = {Location-based correlation estimation in social network via Collaborative Learning}, booktitle = {{IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1073--1074}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFCOMW.2016.7562259}, doi = {10.1109/INFCOMW.2016.7562259}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangZYWBY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ZhangYLZLT16, author = {Kai Zhang and Xiao{-}chun Yun and Jiguang Liang and Xiaoyu Zhang and Chao Li and Bin Tian}, title = {Retweeting behavior prediction using probabilistic matrix factorization}, booktitle = {{IEEE} Symposium on Computers and Communication, {ISCC} 2016, Messina, Italy, June 27-30, 2016}, pages = {1185--1192}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ISCC.2016.7543897}, doi = {10.1109/ISCC.2016.7543897}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/ZhangYLZLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoY016, author = {Yanchen Qiao and Xiaochun Yun and Yongzheng Zhang}, title = {How to Automatically Identify the Homology of Different Malware}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {929--936}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0158}, doi = {10.1109/TRUSTCOM.2016.0158}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoY016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoY016a, author = {Yanchen Qiao and Xiaochun Yun and Yongzheng Zhang}, title = {Fast Reused Function Retrieval Method Based on Simhash and Inverted Index}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {937--944}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0159}, doi = {10.1109/TRUSTCOM.2016.0159}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoY016a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhangWZYWW15, author = {Xiaoyu Zhang and Shupeng Wang and Xiaobin Zhu and Xiao{-}chun Yun and Guangjun Wu and Yipeng Wang}, title = {Update vs. upgrade: Modeling with indeterminate multi-class active learning}, journal = {Neurocomputing}, volume = {162}, pages = {163--170}, year = {2015}, url = {https://doi.org/10.1016/j.neucom.2015.03.056}, doi = {10.1016/J.NEUCOM.2015.03.056}, timestamp = {Wed, 06 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ZhangWZYWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/YunWZLW15, author = {Xiao{-}chun Yun and Guangjun Wu and Guangyan Zhang and Keqin Li and Shupeng Wang}, title = {FastRAQ: {A} Fast Approach to Range-Aggregate Queries in Big Data Environments}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {3}, number = {2}, pages = {206--218}, year = {2015}, url = {https://doi.org/10.1109/TCC.2014.2338325}, doi = {10.1109/TCC.2014.2338325}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/YunWZLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YunL015, author = {Xiao{-}chun Yun and Shuhao Li and Yongzheng Zhang}, title = {{SMS} Worm Propagation Over Contact Social Networks: Modeling and Validation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {11}, pages = {2365--2380}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2455413}, doi = {10.1109/TIFS.2015.2455413}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YunL015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ZhangWY15, author = {Xiaoyu Zhang and Shupeng Wang and Xiao{-}chun Yun}, title = {Bidirectional Active Learning: {A} Two-Way Exploration Into Unlabeled and Labeled Data Set}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {26}, number = {12}, pages = {3034--3044}, year = {2015}, url = {https://doi.org/10.1109/TNNLS.2015.2401595}, doi = {10.1109/TNNLS.2015.2401595}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ZhangWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangYHCHZ15, author = {Chonghua Wang and Xiao{-}chun Yun and Zhiyu Hao and Lei Cui and Yandong Han and Qingxin Zou}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {Exploring Efficient and Robust Virtual Machine Introspection Techniques}, booktitle = {Algorithms and Architectures for Parallel Processing - 15th International Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9530}, pages = {429--448}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27137-8\_32}, doi = {10.1007/978-3-319-27137-8\_32}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangYHCHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/WangZYW15, author = {Shupeng Wang and Xiaoyu Zhang and Xiao{-}chun Yun and Guangjun Wu}, title = {Joint Recovery and Representation Learning for Robust Correlation Estimation Based on Partially Observed Data}, booktitle = {{IEEE} International Conference on Data Mining Workshop, {ICDMW} 2015, Atlantic City, NJ, USA, November 14-17, 2015}, pages = {925--931}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDMW.2015.36}, doi = {10.1109/ICDMW.2015.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/WangZYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/WangY015, author = {Yipeng Wang and Xiao{-}chun Yun and Yongzheng Zhang}, title = {Rethinking Robust and Accurate Application Protocol Identification: {A} Nonparametric Approach}, booktitle = {23rd {IEEE} International Conference on Network Protocols, {ICNP} 2015, San Francisco, CA, USA, November 10-13, 2015}, pages = {134--144}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICNP.2015.43}, doi = {10.1109/ICNP.2015.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/WangY015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nas/LiWXZW14, author = {Chao Li and Shupeng Wang and Xiao{-}chun Yun and Xiaoyang Zhou and Guangjun Wu}, title = {{MMD:} An Approach to Improve Reading Performance in Deduplication Systems}, booktitle = {9th {IEEE} International Conference on Networking, Architecture, and Storage, {NAS} 2014, Tianjin, China, August 6-8, 2014}, pages = {93--97}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/NAS.2014.21}, doi = {10.1109/NAS.2014.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nas/LiWXZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YanYLWZ13, author = {Jinghua Yan and Xiao{-}chun Yun and Hao Luo and Zhi{-}Gang Wu and Shuzhuang Zhang}, title = {Out-of-Sequence Traffic Classification Based on Improved Dynamic Time Warping}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {96-D}, number = {11}, pages = {2354--2364}, year = {2013}, url = {https://doi.org/10.1587/transinf.E96.D.2354}, doi = {10.1587/TRANSINF.E96.D.2354}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YanYLWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cluster/ZouHCYZ13, author = {Qingxin Zou and Zhiyu Hao and Xu Cui and Xiao{-}chun Yun and Yongzheng Zhang}, title = {Counting sort for the live migration of virtual machines}, booktitle = {2013 {IEEE} International Conference on Cluster Computing, {CLUSTER} 2013, Indianapolis, IN, USA, September 23-27, 2013}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CLUSTER.2013.6702664}, doi = {10.1109/CLUSTER.2013.6702664}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cluster/ZouHCYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/WangY0JQ12, author = {Yong Wang and Xiao{-}chun Yun and Yongzheng Zhang and Shuyuan Jin and Yanchen Qiao}, title = {Research of Network Vulnerability Analysis Based on Attack Capability Transfer}, booktitle = {12th {IEEE} International Conference on Computer and Information Technology, {CIT} 2012, Chengdu, Sichuan, China, October 27-29, 2012}, pages = {38--44}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CIT.2012.32}, doi = {10.1109/CIT.2012.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/WangY0JQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/WangYYXL12, author = {Yong Wang and Xiao{-}chun Yun and Yao Yao and Gang Xiong and Zhen Li}, title = {Traffic Measurement Based {DNSSEC} Analysis}, booktitle = {12th {IEEE} International Conference on Computer and Information Technology, {CIT} 2012, Chengdu, Sichuan, China, October 27-29, 2012}, pages = {62--69}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CIT.2012.37}, doi = {10.1109/CIT.2012.37}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcit/WangYYXL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/YanYWLZ12, author = {Jinghua Yan and Xiao{-}chun Yun and Zhi{-}Gang Wu and Hao Luo and Shuzhuang Zhang}, title = {A novel weighted combination technique for traffic classification}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {757--761}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664277}, doi = {10.1109/CCIS.2012.6664277}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccis/YanYWLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinacom/WangYXLY12, author = {Yong Wang and Xiaochun Yun and Gang Xiong and Zhen Li and Yao Yao}, title = {Availability analysis of {DNSSEC} resolution and validation service}, booktitle = {7th International Conference on Communications and Networking in China, Kunming, Yunnan Province, China, August 8-10, 2012}, pages = {35--42}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ChinaCom.2012.6417444}, doi = {10.1109/CHINACOM.2012.6417444}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chinacom/WangYXLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/WangYSWLZY0G12, author = {Yipeng Wang and Xiao{-}chun Yun and Muhammad Zubair Shafiq and Liyan Wang and Alex X. Liu and Zhibin Zhang and Danfeng Yao and Yongzheng Zhang and Li Guo}, title = {A semantics aware approach to automated reverse engineering unknown protocols}, booktitle = {20th {IEEE} International Conference on Network Protocols, {ICNP} 2012, Austin, TX, USA, October 30 - Nov. 2, 2012}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICNP.2012.6459963}, doi = {10.1109/ICNP.2012.6459963}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/WangYSWLZY0G12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/ZhangY12, author = {Yongzheng Zhang and Xiaochun Yun}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {Modeling of Hierarchical Index System for Network Operation Security}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {580--590}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_73}, doi = {10.1007/978-3-642-35795-4\_73}, timestamp = {Fri, 06 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/ZhangY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nas/LiY0XW12, author = {Shicong Li and Xiao{-}chun Yun and Yongzheng Zhang and Jun Xiao and Yipeng Wang}, title = {A General Framework of Trojan Communication Detection Based on Network Traces}, booktitle = {Seventh {IEEE} International Conference on Networking, Architecture, and Storage, {NAS} 2012, Xiamen, China, June 28-30, 2012}, pages = {49--58}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/NAS.2012.10}, doi = {10.1109/NAS.2012.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nas/LiY0XW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/YanYWLZJZ12, author = {Jinghua Yan and Xiao{-}chun Yun and Zhi{-}Gang Wu and Hao Luo and Shuzhuang Zhang and Shuyuan Jin and Zhibin Zhang}, editor = {Hong Shen and Yingpeng Sang and Yidong Li and Depei Qian and Albert Y. Zomaya}, title = {Online Traffic Classification Based on Co-training Method}, booktitle = {13th International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2012, Beijing, China, December 14-16, 2012}, pages = {391--397}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/PDCAT.2012.105}, doi = {10.1109/PDCAT.2012.105}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/YanYWLZJZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiYHZCW12, author = {Shuhao Li and Xiao{-}chun Yun and Zhiyu Hao and Yongzheng Zhang and Xiang Cui and Yipeng Wang}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Modeling Social Engineering Botnet Dynamics across Multiple Social Networks}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {261--272}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_22}, doi = {10.1007/978-3-642-30436-1\_22}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiYHZCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vc/FengCBBZLY11, author = {Bailan Feng and Juan Cao and Xiuguo Bao and Lei Bao and Yongdong Zhang and Shouxun Lin and Xiao{-}chun Yun}, title = {Graph-based multi-space semantic correlation propagation for video retrieval}, journal = {Vis. Comput.}, volume = {27}, number = {1}, pages = {21--34}, year = {2011}, url = {https://doi.org/10.1007/s00371-010-0510-6}, doi = {10.1007/S00371-010-0510-6}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vc/FengCBBZLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/XiYJZ11, author = {Rongrong Xi and Xiao{-}chun Yun and Shuyuan Jin and Yongzheng Zhang}, editor = {Sang{-}Soo Yeo and Binod Vaidya and George A. Papadopoulos}, title = {Network Threat Assessment Based on Alert Verification}, booktitle = {12th International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2011, Gwangju, Korea, October 20-22, 2011}, pages = {30--34}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PDCAT.2011.57}, doi = {10.1109/PDCAT.2011.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/XiYJZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/LiYHCW11, author = {Shuhao Li and Xiao{-}chun Yun and Zhiyu Hao and Xiang Cui and Yipeng Wang}, editor = {Sang{-}Soo Yeo and Binod Vaidya and George A. Papadopoulos}, title = {A Propagation Model for Social Engineering Botnets in Social Networks}, booktitle = {12th International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2011, Gwangju, Korea, October 20-22, 2011}, pages = {423--426}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PDCAT.2011.8}, doi = {10.1109/PDCAT.2011.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/LiYHCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiJY011, author = {Rongrong Xi and Shuyuan Jin and Xiao{-}chun Yun and Yongzheng Zhang}, title = {{CNSSA:} {A} Comprehensive Network Security Situation Awareness System}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {482--487}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.62}, doi = {10.1109/TRUSTCOM.2011.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiJY011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/ChangFYWY10, author = {Wei{-}ling Chang and Binxing Fang and Xiao{-}chun Yun and Shupeng Wang and Xiang{-}Zhan Yu}, editor = {James A. Storer and Michael W. Marcellin}, title = {A Pseudo-Random Number Generator Based on {LZSS}}, booktitle = {2010 Data Compression Conference {(DCC} 2010), 24-26 March 2010, Snowbird, UT, {USA}}, pages = {524}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DCC.2010.77}, doi = {10.1109/DCC.2010.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dcc/ChangFYWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/YanYZTG10, author = {Jinghua Yan and Xiao{-}chun Yun and Peng Zhang and Jianlong Tan and Li Guo}, title = {A New Weighted Ensemble Model for Detecting DoS Attack Streams}, booktitle = {Proceedings of the 2010 {IEEE/WIC/ACM} International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31 - September 3, 2010}, pages = {227--230}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WI-IAT.2010.264}, doi = {10.1109/WI-IAT.2010.264}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/YanYZTG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/ZangYZZM10, author = {Tianning Zang and Xiao{-}chun Yun and Tianyi Zang and Yongzheng Zhang and Chaoguang Men}, title = {Cooperative Work Systems for the Security of Digital Computing Infrastructure}, booktitle = {16th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2010, Shanghai, China, December 8-10, 2010}, pages = {676--681}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPADS.2010.88}, doi = {10.1109/ICPADS.2010.88}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/ZangYZZM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsdm/DuTCY10, author = {Weifu Du and Songbo Tan and Xueqi Cheng and Xiao{-}chun Yun}, editor = {Brian D. Davison and Torsten Suel and Nick Craswell and Bing Liu}, title = {Adapting information bottleneck method for automatic construction of domain-oriented sentiment lexicon}, booktitle = {Proceedings of the Third International Conference on Web Search and Web Data Mining, {WSDM} 2010, New York, NY, USA, February 4-6, 2010}, pages = {111--120}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1718487.1718502}, doi = {10.1145/1718487.1718502}, timestamp = {Tue, 21 May 2019 11:38:33 +0200}, biburl = {https://dblp.org/rec/conf/wsdm/DuTCY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-3485, author = {Wei{-}ling Chang and Binxing Fang and Xiao{-}chun Yun and Shupeng Wang and Xiang{-}Zhan Yu}, title = {Randomness Testing of Compressed Data}, journal = {CoRR}, volume = {abs/1001.3485}, year = {2010}, url = {http://arxiv.org/abs/1001.3485}, eprinttype = {arXiv}, eprint = {1001.3485}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-3485.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangLFY09, author = {Shuzhuang Zhang and Hao Luo and Binxing Fang and Xiao{-}chun Yun}, title = {Fast and Memory-Efficient Regular Expression Matching Using Transition Sharing}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {92-D}, number = {10}, pages = {1953--1960}, year = {2009}, url = {https://doi.org/10.1587/transinf.E92.D.1953}, doi = {10.1587/TRANSINF.E92.D.1953}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangLFY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/ChangYFW09, author = {Wei{-}ling Chang and Xiao{-}chun Yun and Binxing Fang and Shupeng Wang}, editor = {James A. Storer and Michael W. Marcellin}, title = {The Block {LZSS} Compression Algorithm}, booktitle = {2009 Data Compression Conference {(DCC} 2009), 16-18 March 2009, Snowbird, UT, {USA}}, pages = {439}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DCC.2009.9}, doi = {10.1109/DCC.2009.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dcc/ChangYFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/JinWGY09, author = {Shuyuan Jin and Yong Wang and Xiang Cui and Xiao{-}chun Yun}, title = {A review of classification methods for network vulnerability}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11-14 October 2009}, pages = {1171--1175}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICSMC.2009.5345951}, doi = {10.1109/ICSMC.2009.5345951}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/JinWGY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LuoFYW08, author = {Hao Luo and Binxing Fang and Xiao{-}chun Yun and Zhi{-}Gang Wu}, title = {An Effective Anomaly Detection Method in {SMTP} Traffic}, journal = {Int. J. Netw. Secur.}, volume = {6}, number = {3}, pages = {321--330}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n3/ijns-2008-v6-n3-p321-330.pdf}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/LuoFYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simulation/HaoYZ08, author = {Zhiyu Hao and Xiao{-}chun Yun and Hongli Zhang}, title = {An Efficient Routing Mechanism in Network Simulation}, journal = {Simul.}, volume = {84}, number = {10-11}, pages = {511--520}, year = {2008}, url = {https://doi.org/10.1177/0037549708095861}, doi = {10.1177/0037549708095861}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simulation/HaoYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/JiaoYJYY08, author = {Yaoting Jiao and Mei Yang and Yingtao Jiang and Yulu Yang and Xiao{-}chun Yun}, editor = {Shahram Latifi}, title = {Deadlock-Free Multi-Path Routing for Torus-Based NoCs}, booktitle = {Fifth International Conference on Information Technology: New Generations {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}}, pages = {253--258}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ITNG.2008.171}, doi = {10.1109/ITNG.2008.171}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/JiaoYJYY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/NeelkrishnanYJZYLY08, author = {Shankar Neelkrishnan and Mei Yang and Yingtao Jiang and Lei Zhang and Yulu Yang and Enyue Lu and Xiao{-}chun Yun}, editor = {Shahram Latifi}, title = {Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs}, booktitle = {Fifth International Conference on Information Technology: New Generations {(ITNG} 2008), 7-8 April 2008, Las Vegas, Nevada, {USA}}, pages = {259--264}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ITNG.2008.172}, doi = {10.1109/ITNG.2008.172}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/NeelkrishnanYJZYLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/ZangYZ08, author = {Tianning Zang and Xiao{-}chun Yun and Yongzheng Zhang}, title = {A Survey of Alert Fusion Techniques for Security Incident}, booktitle = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, pages = {475--481}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAIM.2008.104}, doi = {10.1109/WAIM.2008.104}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/ZangYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/LeiXJ08, author = {Dai Lei and Xiaochun Yun and Xiao Jun}, title = {Optimizing Traffic Classification Using Hybrid Feature Selection}, booktitle = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, pages = {520--525}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAIM.2008.30}, doi = {10.1109/WAIM.2008.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/LeiXJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/WuYW08, author = {Guangjun Wu and Xiao{-}chun Yun and Shupeng Wang}, title = {Design and Implementation of Multi-Version Disk Backup Data Merging Algorithm}, booktitle = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, pages = {526--531}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAIM.2008.51}, doi = {10.1109/WAIM.2008.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/WuYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/ChangYFWL08, author = {Wei{-}ling Chang and Xiao{-}chun Yun and Binxing Fang and Shupeng Wang and Shuhao Li}, title = {A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme}, booktitle = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, pages = {558--563}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAIM.2008.89}, doi = {10.1109/WAIM.2008.89}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/ChangYFWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangFYZ07, author = {Ping Wang and Binxing Fang and Xiao{-}chun Yun and Jun Zheng}, title = {A User-Habit Property: Haunting of Users in {IP} Networks}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {90-D}, number = {1}, pages = {371--373}, year = {2007}, url = {https://doi.org/10.1093/ietisy/e90-1.1.371}, doi = {10.1093/IETISY/E90-1.1.371}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangFYZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhouFCYC07, author = {Yuan Zhou and Binxing Fang and Zhenfu Cao and Xiao{-}chun Yun and Xiaoming Cheng}, title = {How to construct secure proxy cryptosystem}, journal = {Inf. Sci.}, volume = {177}, number = {19}, pages = {4095--4108}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2007.01.024}, doi = {10.1016/J.INS.2007.01.024}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhouFCYC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WangYY07, author = {Shupeng Wang and Xiao{-}chun Yun and Xiang{-}Zhan Yu}, title = {Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow Applications}, journal = {J. Inf. Sci. Eng.}, volume = {23}, number = {4}, pages = {1299--1313}, year = {2007}, url = {http://www.iis.sinica.edu.tw/page/jise/2007/200707\_21.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WangYY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/WuYC07, author = {Bing Wu and Xiao{-}chun Yun and Xiang Cui}, editor = {Shahram Latifi}, title = {Study on Worm Poisoning Technology}, booktitle = {Fourth International Conference on Information Technology: New Generations {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}}, pages = {65--70}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ITNG.2007.187}, doi = {10.1109/ITNG.2007.187}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/WuYC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/WangYL07, author = {Yong Wang and Xiao{-}chun Yun and Yifei Li}, editor = {Shahram Latifi}, title = {Analyzing the Characteristics of Gnutella Overlays}, booktitle = {Fourth International Conference on Information Technology: New Generations {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}}, pages = {1095--1100}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ITNG.2007.39}, doi = {10.1109/ITNG.2007.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/WangYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/LeiYX07, author = {Dai Lei and Chen You and Xiaochun Yun}, editor = {David S. Munro and Hong Shen and Quan Z. Sheng and Henry Detmold and Katrina Falkner and Cruz Izu and Paul D. Coddington and Bradley Alexander and Si{-}Qing Zheng}, title = {Optimizing {IP} Flow Classification Using Feature Selection}, booktitle = {Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies {(PDCAT} 2007), 3-6 December 2007, Adelaide, Australia}, pages = {39--45}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PDCAT.2007.11}, doi = {10.1109/PDCAT.2007.11}, timestamp = {Mon, 17 Jul 2023 13:04:30 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/LeiYX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/WangWYYJ07, author = {Shupeng Wang and Jianping Wang and Mei Yang and Xiao{-}chun Yun and Yingtao Jiang}, editor = {Jadwiga Indulska and Jianhua Ma and Laurence Tianruo Yang and Theo Ungerer and Jiannong Cao}, title = {Handover Cost Optimization in Traffic Management for Multi-homed Mobile Networks}, booktitle = {Ubiquitous Intelligence and Computing, 4th International Conference, {UIC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4611}, pages = {295--308}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73549-6\_30}, doi = {10.1007/978-3-540-73549-6\_30}, timestamp = {Wed, 31 Jan 2024 08:24:33 +0100}, biburl = {https://dblp.org/rec/conf/uic/WangWYYJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/YangYL06, author = {Wu Yang and Xiao{-}chun Yun and Jianhua Li}, editor = {Heng Tao Shen and Jinbao Li and Minglu Li and Jun Ni and Wei Wang}, title = {An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers}, booktitle = {Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3842}, pages = {835--841}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11610496\_114}, doi = {10.1007/11610496\_114}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apweb/YangYL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangFY06, author = {Ping Wang and Binxing Fang and Xiao{-}chun Yun}, title = {A User Habit Based Approach to Detect and Quarantine Worms}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2148--2152}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255088}, doi = {10.1109/ICC.2006.255088}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangFY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BoFY06, author = {Chen Bo and Binxing Fang and Xiao{-}chun Yun}, editor = {Sharad Mehrotra and Daniel Dajun Zeng and Hsinchun Chen and Bhavani Thuraisingham and Fei{-}Yue Wang}, title = {Adaptive Method for Monitoring Network and Early Detection of Internet Worms}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3975}, pages = {178--189}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760146\_16}, doi = {10.1007/11760146\_16}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/isi/BoFY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LuoFY06, author = {Hao Luo and Binxing Fang and Xiao{-}chun Yun}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {A Counting-Based Method for Massive Spam Mail Classification}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {45--56}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_5}, doi = {10.1007/11689522\_5}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LuoFY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangFY06, author = {Ping Wang and Binxing Fang and Xiao{-}chun Yun}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Model and Estimation of Worm Propagation Under Network Partition}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {57--66}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_6}, doi = {10.1007/11689522\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WangFY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/LuoFY06, author = {Hao Luo and Binxing Fang and Xiao{-}chun Yun}, title = {Anomaly Detection in {SMTP} Traffic}, booktitle = {Third International Conference on Information Technology: New Generations {(ITNG} 2006), 10-12 April 2006, Las Vegas, Nevada, {USA}}, pages = {408--413}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ITNG.2006.34}, doi = {10.1109/ITNG.2006.34}, timestamp = {Sun, 21 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itng/LuoFY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pads/HaoYZ06, author = {Zhiyu Hao and Xiao{-}chun Yun and Hongli Zhang}, title = {An Efficient Routing Mechanism in Network Simulation}, booktitle = {20th {IEEE/ACM/SCS} Workshop on Principles of Advanced and Distributed Simulation, {PADS} 2006, Singapore, May 23-26, 2006}, pages = {150--157}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/PADS.2006.9}, doi = {10.1109/PADS.2006.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pads/HaoYZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/YangYY05, author = {Wu Yang and Xiao{-}chun Yun and Yongtian Yang}, editor = {Xue Li and Shuliang Wang and Zhao Yang Dong}, title = {Using Boosting Learning Method for Intrusion Detection}, booktitle = {Advanced Data Mining and Applications, First International Conference, {ADMA} 2005, Wuhan, China, July 22-24, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3584}, pages = {634--641}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11527503\_75}, doi = {10.1007/11527503\_75}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/adma/YangYY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangFY05, author = {Ping Wang and Binxing Fang and Xiao{-}chun Yun}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A New User-Habit Based Approach for Early Warning of Worms}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {212--219}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_32}, doi = {10.1007/11596981\_32}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangFY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangFCY05, author = {Yongzheng Zhang and Binxing Fang and Yue Chi and Xiao{-}chun Yun}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Assessment of Windows System Security Using Vulnerability Relationship Graph}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {415--420}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_60}, doi = {10.1007/11596981\_60}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangFCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/WangFY05, author = {Bailing Wang and Binxing Fang and Xiao{-}chun Yun}, editor = {Hai Zhuge and Geoffrey C. Fox}, title = {A Worm Behavioral Approach to Susceptible Host Detection}, booktitle = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3795}, pages = {77--83}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11590354\_9}, doi = {10.1007/11590354\_9}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gcc/WangFY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/LiuYWS05, author = {Yi{-}xuan Liu and Xiao{-}chun Yun and Bailing Wang and Hai{-}bin Sun}, editor = {Daniel S. Yeung and Zhi{-}Qiang Liu and Xizhao Wang and Hong Yan}, title = {An Anti-worm with Balanced Tree Based Spreading Strategy}, booktitle = {Advances in Machine Learning and Cybernetics, 4th International Conference, {ICMLC} 2005, Guangzhou, China, August 18-21, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3930}, pages = {652--661}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11739685\_68}, doi = {10.1007/11739685\_68}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmlc/LiuYWS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/WuY05, author = {Yang Wu and Xiao{-}chun Yun}, editor = {Cheeha Kim}, title = {A High-Performance Network Monitoring Platform for Intrusion Detection}, booktitle = {Information Networking, Convergence in Broadband and Mobile Networking, International Conference, {ICOIN} 2005, Jeju Island, Korea, January 31- February 2, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3391}, pages = {52--61}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30582-8\_6}, doi = {10.1007/978-3-540-30582-8\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/icoin/WuY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangHXY05, author = {Tao Zhang and Mingzeng Hu and Xiao{-}chun Yun and Yongzheng Zhang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Computer Vulnerability Evaluation Using Fault Tree Analysis}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {302--313}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_26}, doi = {10.1007/978-3-540-31979-5\_26}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangHXY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/PingBX05, author = {Ping Wang and Binxing Fang and Xiao{-}chun Yun}, title = {A New Approach to Automatically Detect Worms}, booktitle = {Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies {(PDCAT} 2005), 5-8 December 2005, Dalian, China}, pages = {259--263}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PDCAT.2005.25}, doi = {10.1109/PDCAT.2005.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/PingBX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/XinFYC05, author = {Yi Xin and Binxing Fang and Xiao{-}chun Yun and Hai{-}Yong Chen}, title = {Worm Detection in Large Scale Network by Traffic}, booktitle = {Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies {(PDCAT} 2005), 5-8 December 2005, Dalian, China}, pages = {270--273}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PDCAT.2005.255}, doi = {10.1109/PDCAT.2005.255}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/XinFYC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcs/YangYL05, author = {Wu Yang and Xiao{-}chun Yun and Jian{-}Hua Li}, editor = {S. Q. Zheng}, title = {An Improved Network Intrusion Detection Method based on {VQ-SVM}}, booktitle = {International Conference on Parallel and Distributed Computing Systems, {PDCS} 2005, November 14-16, 2005, Phoenix, AZ, {USA}}, pages = {583--587}, publisher = {{IASTED/ACTA} Press}, year = {2005}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdcs/YangYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/XiangzhanXW05, author = {Xiang{-}Zhan Yu and Xiao{-}chun Yun and Shupeng Wang}, editor = {Hamid R. Arabnia}, title = {Implementation of a Dynamic Failover Technology}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 2005, Las Vegas, Nevada, USA, June 27-30, 2005, Volume 1}, pages = {339--345}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Mon, 01 Feb 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/XiangzhanXW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciit/WangY04, author = {Shupeng Wang and Xiao{-}chun Yun}, editor = {M. H. Hamza}, title = {An improved failure detector based on pull and push approach}, booktitle = {{IASTED} International Conference on Communications, Internet, and Information Technology, November 22 - 24, 2004, St. Thomas, {US} Virgin Islands, {USA}}, pages = {161--167}, publisher = {{IASTED/ACTA} Press}, year = {2004}, timestamp = {Thu, 05 Jul 2018 07:27:58 +0200}, biburl = {https://dblp.org/rec/conf/ciit/WangY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/YongzhengX04, author = {Yongzheng Zhang and Xiao{-}chun Yun}, title = {A New Vulnerability Taxonomy Based on Privilege Escalation}, booktitle = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004}, pages = {596--600}, year = {2004}, timestamp = {Thu, 02 Feb 2017 12:56:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/YongzhengX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/TianFX04, author = {Zhihong Tian and Binxing Fang and Xiao{-}chun Yun}, title = {Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method}, booktitle = {2004 {IEEE/WIC/ACM} International Conference on Web Intelligence {(WI} 2004), 20-24 September 2004, Beijing, China}, pages = {24--28}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/WI.2004.10152}, doi = {10.1109/WI.2004.10152}, timestamp = {Thu, 23 Mar 2023 14:30:18 +0100}, biburl = {https://dblp.org/rec/conf/webi/TianFX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iadis/BaoHYD03, author = {Xiuguo Bao and Ming{-}Zheng Hu and Xiao{-}chun Yun and Ri Ding}, title = {Anti-Sniffing in Unbounded Networks}, booktitle = {Proceedings of the {IADIS} International Conference WWW/Internet 2003, {ICWI} 2003, Algarve, Portugal, November 5-8, 2003}, pages = {580--586}, publisher = {{IADIS}}, year = {2003}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iadis/BaoHYD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.