Follow
Xin Hu
Xin Hu
OpenAI
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Large-scale malware indexing using function-call graphs
X Hu, T Chiueh, KG Shin
Proceedings of the 16th ACM conference on Computer and communications …, 2009
4532009
Behavioral detection of malware on mobile handsets
A Bose, X Hu, KG Shin, T Park
Proceedings of the 6th international conference on Mobile systems …, 2008
4462008
{CoVisor}: a compositional hypervisor for {software-defined} networks
X Jin, J Gossels, J Rexford, D Walker
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015
352*2015
Automatic generation of string signatures for malware detection
K Griffin, S Schneider, X Hu, T Chiueh
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
3452009
Privacy protection for users of location-based services
KG Shin, X Ju, Z Chen, X Hu
IEEE Wireless Communications 19 (1), 30-39, 2012
2812012
Accurate real-time identification of IP prefix hijacking
X Hu, ZM Mao
2007 IEEE Symposium on Security and Privacy (SP'07), 3-17, 2007
2772007
{MutantX-S}: Scalable malware clustering based on static features
X Hu, KG Shin, S Bhatkar, K Griffin
2013 USENIX Annual Technical Conference (USENIX ATC 13), 187-198, 2013
1892013
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ...
US Patent 9,832,217, 2017
1492017
Detection of botnets using combined host-and network-level information
Y Zeng, X Hu, KG Shin
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
1232010
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
Y Zeng, KG Shin, X Hu
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
1222012
Android malware clustering through malicious payload mining
Y Li, J Jang, X Hu, X Ou
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
1142017
Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation
AW Min, KG Shin, X Hu
IEEE transactions on Mobile Computing 10 (10), 1434-1447, 2010
1112010
Experimental study of fuzzy hashing in malware clustering analysis
Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang
8th workshop on cyber security experimentation and test (cset 15), 2015
1032015
Attack-tolerant distributed sensing for dynamic spectrum access networks
AW Min, KG Shin, X Hu
2009 17th IEEE International Conference on Network Protocols, 294-303, 2009
972009
RB-Seeker: Auto-detection of Redirection Botnets.
X Hu, M Knysz, KG Shin
NDSS, 2009
752009
Zero-sum password cracking game: A large-scale empirical study on the crackability, correlation, and security of passwords
S Ji, S Yang, X Hu, W Han, Z Li, R Beyah
IEEE transactions on dependable and secure computing 14 (5), 550-564, 2015
662015
Apparatus and method for detection of malicious program using program behavior
T Park, KG Shin, X Hu, A Bose
US Patent 8,245,295, 2012
662012
Detecting web exploit kits by tree-based structural similarity search
X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang
US Patent 9,723,016, 2017
572017
Attack-tolerant time-synchronization in wireless sensor networks
X Hu, T Park, KG Shin
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 41-45, 2008
552008
Encoding machine code instructions for static feature based malware clustering
X Hu, KE Griffin, SB Bhatkar
US Patent 8,826,439, 2014
532014
The system can't perform the operation now. Try again later.
Articles 1–20