Xiaokui Shu
Xiaokui Shu
IBM T. J. Watson Research Center
Email confirmado em ibm.com - Página inicial
Título
Citado por
Citado por
Ano
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security 49, 255-273, 2015
1282015
Privacy-Preserving Detection of Sensitive Data Exposure
X Shu, D Yao, E Bertino
IEEE Transactions on Information Forensics and Security (TIFS) 10 (5), 1092-1103, 2015
1112015
Unearthing stealthy program attacks buried in extremely long execution paths
X Shu, D Yao, N Ramakrishnan
Proceedings of the 2015 ACM Conference on Computer and Communications …, 2015
742015
Data leak detection as a service
X Shu, DD Yao
Proceedings of the 8th International Conference on Security and Privacy in …, 2012
732012
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
D Stefan, X Shu, DD Yao
Computers & Security 31 (1), 109-121, 2012
632012
Fast Detection of Transformed Data Leaks
X Shu, J Zhang, D Yao, W Feng
IEEE Transactions on Information Forensics and Security (TIFS) 11 (3), 528-542, 2016
552016
Privacy-preserving scanning of big content for sensitive data exposure with MapReduce
F Liu, X Shu, D Yao, AR Butt
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
532015
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
502017
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
282018
Massive distributed and parallel log analysis for organizational security
X Shu, J Smiy, D Yao, H Lin
Proceedings of the First International Workshop on Security and Privacy in …, 2013
282013
A Formal Framework for Program Anomaly Detection
X Shu, DD Yao, BG Ryder
Proceedings of the 18th International Symposium on Research in Attacks …, 2015
252015
Anomaly detection as a service: challenges, advances, and opportunities
D Yao, X Shu, L Cheng, SJ Stolfo
Synthesis Lectures on Information Security, Privacy, and Trust 9 (3), 1-173, 2017
242017
Long-span program behavior modeling and attack detection
X Shu, D Yao, N Ramakrishnan, T Jaeger
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-28, 2017
192017
Rapid and Parallel Content Screening for Detecting Transformed Data Exposure
X Shu, J Zhang, DD Yao, WC Feng
Proceedings of the Third International Workshop on Security and Privacy in …, 2015
172015
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
X Shu, J Zhang, D Yao, WC Feng
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
102015
Data leak detection as a service: challenges and solutions
X Shu, DD Yao
52012
Rapid screening of big data against inadvertent leaks
X Shu, F Liu, DD Yao
Big Data Concepts, Theories, and Applications, 193-235, 2016
42016
Program anomaly detection: Methodology and practices
X Shu, D Yao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
32016
User action prediction
NP Laptev, X Shu
US Patent 10,643,141, 2020
22020
Towards an Open Format for Scalable System Telemetry
T Taylor, F Araujo, X Shu
2020 IEEE International Conference on Big Data (Big Data), 1031-1040, 2020
12020
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20