What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiaohong Guan
Google Scholar
25
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Detection of False Data Injection Attacks in Smart Grids: An Optimal Transport-Based Reliable Self-Training Approach.
Kaiyao Miao
Meng Zhang
Fanghong Guo
Rongxing Lu
Xiaohong Guan
2023
conf/uss
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting.
Jian Qu
Xiaobo Ma
Jianfeng Li
Xiapu Luo
Lei Xue
Junjie Zhang
Zhenhua Li
Li Feng
Xiaohong Guan
2022
journals/tifs
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids.
Meng Zhang
Zhuorui Wu
Jun Yan
Rongxing Lu
Xiaohong Guan
2021
journals/tifs
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
Ming Fan
Wenying Wei
Xiaofei Xie
Yang Liu
Xiaohong Guan
Ting Liu
2020
journals/tifs
Symmetry Degree Measurement and its Applications to Anomaly Detection.
Tao Qin
Zhaoli Liu
Pinghui Wang
Shancang Li
Xiaohong Guan
Lixin Gao
2018
journals/compsec
From big data to knowledge: A spatio-temporal approach to malware detection.
Weixuan Mao
Zhongmin Cai
Yuan Yang
Xiaohong Shi
Xiaohong Guan
2018
journals/tifs
Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
Chao Shen
Yuanxun Li
Yufei Chen
Xiaohong Guan
Roy A. Maxion
2017
journals/compsec
Security importance assessment for system objects and malware detection.
Weixuan Mao
Zhongmin Cai
Don Towsley
Qian Feng
Xiaohong Guan
2016
journals/compsec
User practice in password security: An empirical study of real-life passwords in the wild.
Chao Shen
Tianwen Yu
Haodi Xu
Gengshan Yang
Xiaohong Guan
2016
journals/tifs
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
Chao Shen
Yong Zhang
Xiaohong Guan
Roy A. Maxion
2015
journals/compsec
Input extraction via motion-sensor behavior analysis on smartphones.
Chao Shen
Shichao Pei
Zhenyu Yang
Xiaohong Guan
2014
journals/compsec
Performance evaluation of anomaly-detection algorithms for mouse dynamics.
Chao Shen
Zhongmin Cai
Xiaohong Guan
Roy A. Maxion
2014
journals/tifs
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
Xiaobo Ma
Junjie Zhang
Jing Tao
Jianfeng Li
Jue Tian
Xiaohong Guan
2014
journals/tifs
A New Sketch Method for Measuring Host Connection Degree Distribution.
Pinghui Wang
Xiaohong Guan
Junzhou Zhao
Jing Tao
Tao Qin
2014
conf/acsac
Centrality metrics of importance in access behaviors and malware detections.
Weixuan Mao
Zhongmin Cai
Xiaohong Guan
Don Towsley
2013
journals/tifs
User Authentication Through Mouse Dynamics.
Chao Shen
Zhongmin Cai
Xiaohong Guan
Youtian Du
Roy A. Maxion
2012
conf/dsn
Continuous authentication for mouse dynamics: A pattern-growth approach.
Chao Shen
Zhongmin Cai
Xiaohong Guan
2012
conf/acsac
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Shuang Zhao
Patrick P. C. Lee
John C. S. Lui
Xiaohong Guan
Xiaobo Ma
Jing Tao
2011
journals/tifs
A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links.
Pinghui Wang
Xiaohong Guan
Tao Qin
Qiuzhen Huang
2011
conf/ccs
Poster: can it be more practical?: improving mouse dynamics biometric performance.
Chao Shen
Zhongmin Cai
Xiaohong Guan
2010
journals/tifs
Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring.
Xiaohong Guan
Tao Qin
Wei Li
Pinghui Wang
2006
journals/compsec
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Wei Wang
Xiaohong Guan
Xiangliang Zhang
Liwei Yang
2006
journals/compsec
A virtual disk environment for providing file system recovery.
Jinqian Liang
Xiaohong Guan
2005
journals/compsec
Multiple behavior information fusion based quantitative threat evaluation.
Xiu-Zhen Chen
Qing-Hua Zheng
Xiaohong Guan
Chen-Guang Lin
Jie Sun
2004
journals/compsec
Predicting the intrusion intentions by observing system call sequences.
Li Feng
Xiaohong Guan
Sangang Guo
Yan Gao
Peini Liu
Coauthors
Chao Shen
(8)
Chen-Guang Lin
(1)
Don Towsley
(2)
Fanghong Guo
(1)
Gengshan Yang
(1)
Haodi Xu
(1)
Jian Qu
(1)
Jianfeng Li
(2)
Jie Sun
(1)
Jing Tao
(3)
Jinqian Liang
(1)
John C. S. Lui
(1)
Jue Tian
(1)
Jun Yan
(1)
Junjie Zhang
(2)
Junzhou Zhao
(1)
Kaiyao Miao
(1)
Lei Xue
(1)
Li Feng
(2)
Liwei Yang
(1)
Lixin Gao
(1)
Meng Zhang
(2)
Ming Fan
(1)
Patrick P. C. Lee
(1)
Peini Liu
(1)
Pinghui Wang
(4)
Qian Feng
(1)
Qing-Hua Zheng
(1)
Qiuzhen Huang
(1)
Rongxing Lu
(2)
Roy A. Maxion
(4)
Sangang Guo
(1)
Shancang Li
(1)
Shichao Pei
(1)
Shuang Zhao
(1)
Tao Qin
(4)
Tianwen Yu
(1)
Ting Liu
(1)
Wei Li
(1)
Wei Wang
(1)
Weixuan Mao
(3)
Wenying Wei
(1)
Xiangliang Zhang
(1)
Xiaobo Ma
(3)
Xiaofei Xie
(1)
Xiaohong Guan
(25)
Xiaohong Shi
(1)
Xiapu Luo
(1)
Xiu-Zhen Chen
(1)
Yan Gao
(1)
Yang Liu
(1)
Yong Zhang
(1)
Youtian Du
(1)
Yuan Yang
(1)
Yuanxun Li
(1)
Yufei Chen
(1)
Zhaoli Liu
(1)
Zhenhua Li
(1)
Zhenyu Yang
(1)
Zhongmin Cai
(7)
Zhuorui Wu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to