default search action
Xiao Fu 0005
Person information
- affiliation: Nanjing University, State Key Laboratory for Novel Software Technology, China
Other persons with the same name
- Fu Xiao (aka: Xiao Fu) — disambiguation page
- Xiao Fu 0001 — Oregon State University, School of Electrical Engineering and Computer Science, Corvallis, OR, USA (and 2 more)
- Xiao Fu 0002 — Beijing University of Posts and Telecommunications, School of Electronic Engineering, China
- Xiao Fu 0003 — University of Manchester, UK
- Xiao Fu 0004 (aka: Fu Xiao 0004) — Tianjin University, State Key Lab of Precision Measuring Technology and Instruments, China
- Xiao Fu 0006 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 1 more)
- Xiao Fu 0007 — University College London, London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Zhiqiang Hao, Chuanyi Li, Xiao Fu, Bin Luo, Xiaojiang Du:
Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques. ESORICS (4) 2024: 65-85 - [c24]Yaqing Zhang, Xiao Fu, Bin Luo, Xiaojiang Du:
A Crowdsourcing Digital Forensics Platform for IoT Environments Powered by Blockchain. ICC 2024: 2016-2021 - 2023
- [j7]Xuanyu Liu, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
Machine Learning-Based Non-Intrusive Digital Forensic Service for Smart Homes. IEEE Trans. Netw. Serv. Manag. 20(2): 945-960 (2023) - [c23]Ruiqing Chu, Xuanyu Liu, Xiao Fu, Bin Luo, Mohsen Guizani:
Credibility Management of Cloud-based Digital Forensic Data: A Decentralized Verification Mechanism. CloudNet 2023: 45-52 - [c22]Yihao Jin, Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Convolutional Neural Network Based Classification of WeChat Mini-Apps. ICC 2023: 747-752 - 2022
- [j6]Fei Ye, Yunzhi Zheng, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
TamForen: A tamper-proof cloud forensic framework. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [c21]Yuzhu Sun, Xuanyu Liu, Tianchi Wu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Using Cloud Computing Based Crowdsourcing for Security and Privacy Settings of Android Users. GLOBECOM 2022: 522-527 - 2021
- [c20]Xuanyu Liu, Ang Li, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems. GLOBECOM 2021: 1-6 - [c19]Shiwen Song, Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction. GLOBECOM 2021: 1-6 - [c18]Li Lin, Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
A Non-Intrusive Method for Smart Speaker Forensics. ICC 2021: 1-6 - [c17]Xuanyu Liu, Qiang Zeng, Xiaojiang Du, Siva Likitha Valluru, Chenglong Fu, Xiao Fu, Bin Luo:
SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes. RAID 2021: 33-47 - 2020
- [c16]Yuzhe Chen, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network. GLOBECOM 2020: 1-6 - [c15]Yun Luo, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Forensic Model for DDoS Attack. GLOBECOM 2020: 1-6 - [c14]Sixian Sun, Xiao Fu, Bin Luo, Xiaojiang Du:
Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment. INFOCOM Workshops 2020: 659-664
2010 – 2019
- 2019
- [j5]Xiao Fu, Rui Yang, Xiaojiang Du, Bin Luo, Mohsen Guizani:
Timing Channel in IaaS: How to Identify and Investigate. IEEE Access 7: 1-11 (2019) - [c13]Meng Chen, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Cloud Database Encryption Technology Based on Combinatorial Encryption. GLOBECOM 2019: 1-5 - [c12]Xiaoyu Ma, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environment. GLOBECOM 2019: 1-6 - 2018
- [j4]Sixian Sun, Xiao Fu, Hao Ruan, Xiaojiang Du, Bin Luo, Mohsen Guizani:
Real-Time Behavior Analysis and Identification for Android Application. IEEE Access 6: 38041-38051 (2018) - [c11]Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks. GLOBECOM 2018: 1-7 - [i1]Xiao Fu, Rui Yang, Xiaojiang Du, Bin Luo:
Timing Channel in IaaS: How to Identify and Investigate. CoRR abs/1804.01634 (2018) - 2017
- [j3]Yingxin Cheng, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
A lightweight live memory forensic approach based on hardware virtualization. Inf. Sci. 379: 23-41 (2017) - [j2]Xiao Fu, Yun Gao, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Security Threats to Hadoop: Data Leakage Attacks and Investigation. IEEE Netw. 31(2): 67-71 (2017) - [c10]Jiayun Xie, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application. ICC 2017: 1-6 - [c9]Hao Ruan, Xiao Fu, Xuanyu Liu, Xiaojiang Du, Bin Luo:
Analyzing Android Application in Real-Time at Kernel Level. ICCCN 2017: 1-9 - [c8]Xuanyu Liu, Xiao Fu, Bin Luo, Xiaojiang Du:
Distributed Cloud Forensic System with Decentralization and Multi-participation. WICON 2017: 181-196 - 2016
- [c7]Ziqi Wang, Rui Yang, Xiao Fu, Xiaojiang Du, Bin Luo:
A shared memory based cross-VM side channel attacks in IaaS cloud. INFOCOM Workshops 2016: 181-186 - [c6]Rui Yang, Xiao Fu, Xiaojiang Du, Bin Luo:
Investigating Timing Channel in IaaS. MobiMedia 2016: 84-89 - 2015
- [j1]Xiao Fu, Xiaojiang Du, Bin Luo:
Data correlation-based analysis methods for automatic memory forensic. Secur. Commun. Networks 8(18): 4213-4226 (2015) - [c5]Yun Gao, Xiao Fu, Bin Luo, Xiaojiang Du, Mohsen Guizani:
Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop. GLOBECOM 2015: 1-6 - [c4]Yiheng Duan, Xiao Fu, Bin Luo, Ziqi Wang, Jin Shi, Xiaojiang Du:
Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs. ICC 2015: 5691-5696 - [c3]Xiao Fu, Xiaojiang Du, Bin Luo, Jin Shi, Zhitao Guan, Yuhua Wang:
Correlating processes for automatic memory evidence analysis. INFOCOM Workshops 2015: 115-120 - 2014
- [c2]Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan:
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics. ISC 2014: 255-272 - 2013
- [c1]Jian Zhang, Xiao Fu, Xiaojiang Du, Bin Luo, Zhihong Zhao:
A Method to Automatically Filter Log Evidences for Intrusion Forensics. ICDCS Workshops 2013: 39-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint