What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shouhuai Xu
Google Scholar
ORCID:
0000-0001-8034-0942
41
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
MalPacDetector: An LLM-Based Malicious NPM Package Detector.
Jian Wang
Zhen Li
Jixiang Qu
Deqing Zou
Shouhuai Xu
Ziteng Xu
Zhenwei Wang
Hai Jin
2025
conf/sp
SoK: Space Infrastructures Vulnerabilities, Attacks and Defenses.
Jose Luis Castanon Remy
Ekzhin Ear
Caleb Chang
Antonia Feffer
Shouhuai Xu
2025
conf/csr2
The Notional Risk Scores Approach to Space Cyber Risk Management.
Ekzhin Ear
Brandon Bailey
Shouhuai Xu
2025
conf/csr2
Space Cyber Risk Management: Desired Properties.
Ekzhin Ear
Brandon Bailey
Shouhuai Xu
2025
conf/uss
SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments.
Yiwei Hu
Zhen Li
Kedie Shu
Shenghua Guan
Deqing Zou
Shouhuai Xu
Bin Yuan
Hai Jin
2023
conf/uss
Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone.
Qi Xia
Qian Chen
Shouhuai Xu
2023
conf/csr2
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies.
Ekzhin Ear
Jose L. C. Remy
Shouhuai Xu
2023
conf/cns
Characterizing Cyber Attacks against Space Systems with Missing Data: Framework and Case Study.
Ekzhin Ear
Jose L. C. Remy
Antonia Feffer
Shouhuai Xu
2022
conf/csr2
Auditing a Software-Defined Cross Domain Solution Architecture.
Nathan Daughety
Marcus Pendleton
Rebeca Perez
Shouhuai Xu
John V. Franco
2022
conf/cns
Supporting Law-Enforcement to Cope with Blacklisted Websites: Framework and Case Study.
Mir Mehedi Ahsan Pritom
Shouhuai Xu
2021
journals/tifs
A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity.
Zijian Fang
Maochao Xu
Shouhuai Xu
Taizhong Hu
2021
conf/cns
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking.
Wenjun Fan
Sang-Yoon Chang
Xiaobo Zhou
Shouhuai Xu
2021
conf/acsac
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Deqiang Li
Tian Qiu
Shuo Chen
Qianmu Li
Shouhuai Xu
2020
conf/ccs
The Cybersecurity Dynamics Way of Thinking and Landscape.
Shouhuai Xu
2019
journals/tifs
Metrics Towards Measuring Cyber Agility.
Jose David Mireles
Eric Ficke
Jin-Hee Cho
Patrick M. Hurley
Shouhuai Xu
2018
journals/tifs
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth.
Pang Du
Zheyuan Sun
Huashan Chen
Jin-Hee Cho
Shouhuai Xu
2018
journals/tifs
Modeling and Predicting Cyber Hacking Breaches.
Maochao Xu
Kristin M. Schweitzer
Raymond M. Bateman
Shouhuai Xu
2018
conf/ndss
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
Zhen Li
Deqing Zou
Shouhuai Xu
Xinyu Ou
Hai Jin
Sujuan Wang
Zhijun Deng
Yuyi Zhong
2018
conf/acsac
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network.
Yanfang Ye
Shifu Hou
Lingwei Chen
Xin Li
Liang Zhao
Shouhuai Xu
Jiabin Wang
Qi Xiong
2016
conf/acsac
VulPecker: an automated vulnerability detection system based on code similarity analysis.
Zhen Li
Deqing Zou
Shouhuai Xu
Hai Jin
Hanchao Qi
Jie Hu
2015
journals/tifs
Predicting Cyber Attack Rates With Extreme Values.
Zhenxin Zhan
Maochao Xu
Shouhuai Xu
2014
conf/cns
An evasion and counter-evasion study in malicious websites detection.
Li Xu
Zhenxin Zhan
Shouhuai Xu
Keying Ye
2013
journals/tifs
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study.
Zhenxin Zhan
Maochao Xu
Shouhuai Xu
2013
conf/ccs
Real-time detection and prevention of android SMS permission abuses.
Weiliang Luo
Shouhuai Xu
Xuxian Jiang
2012
conf/ccs
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Yevgeniy Dodis
Weiliang Luo
Shouhuai Xu
Moti Yung
2012
conf/ccs
Efficient query integrity for outsourced dynamic databases.
Qingji Zheng
Shouhuai Xu
Giuseppe Ateniese
2011
journals/tifs
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data.
Shouhuai Xu
Xiaohu Li
Timothy Paul Parker
Xueping Wang
2010
conf/ccs
TEE: a virtual DRTM based execution environment for secure cloud-end computing.
Weiqi Dai
Hai Jin
Deqing Zou
Shouhuai Xu
Weide Zheng
Lei Shi
2010
conf/acns
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Erhan J. Kartaltepe
Jose Andre Morales
Shouhuai Xu
Ravi S. Sandhu
2009
conf/fc
Expecting the Unexpected: Towards Robust Credential Infrastructure.
Shouhuai Xu
Moti Yung
2008
conf/ccs
Exploiting social networks for threshold signing: attack-resilience vs. availability.
Shouhuai Xu
Xiaohu Li
T. Paul Parker
2007
conf/fc
-Anonymous Multi-party Secret Handshakes.
Shouhuai Xu
Moti Yung
2007
conf/dsn
Protecting Cryptographic Keys from Memory Disclosure Attacks.
Keith Harrison
Shouhuai Xu
2007
conf/cans
How to Secure Your Email Address Book and Beyond.
Erhan J. Kartaltepe
T. Paul Parker
Shouhuai Xu
2004
conf/ccs
k-anonymous secret handshakes with reusable credentials.
Shouhuai Xu
Moti Yung
2003
conf/fc
Retrofitting Fairness on the Original RSA-Based E-cash.
Shouhuai Xu
Moti Yung
2003
conf/pkc
Strong Key-Insulated Signature Schemes.
Yevgeniy Dodis
Jonathan Katz
Shouhuai Xu
Moti Yung
2003
conf/ctrsa
Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures.
Shouhuai Xu
Ravi S. Sandhu
2003
conf/asiacrypt
Accumulating Composites and Improved Group Signing.
Gene Tsudik
Shouhuai Xu
2002
conf/fc
The Dark Side of Threshold Cryptography.
Shouhuai Xu
Moti Yung
2002
conf/eurocrypt
Key-Insulated Public Key Cryptosystems.
Yevgeniy Dodis
Jonathan Katz
Shouhuai Xu
Moti Yung
Coauthors
Antonia Feffer
(2)
Bin Yuan
(1)
Brandon Bailey
(2)
Caleb Chang
(1)
Deqiang Li
(1)
Deqing Zou
(5)
Ekzhin Ear
(5)
Erhan J. Kartaltepe
(2)
Eric Ficke
(1)
Gene Tsudik
(1)
Giuseppe Ateniese
(1)
Hai Jin
(5)
Hanchao Qi
(1)
Huashan Chen
(1)
Jiabin Wang
(1)
Jian Wang
(1)
Jie Hu
(1)
Jin-Hee Cho
(2)
Jixiang Qu
(1)
John V. Franco
(1)
Jonathan Katz
(2)
Jose Andre Morales
(1)
Jose David Mireles
(1)
Jose L. C. Remy
(2)
Jose Luis Castanon Remy
(1)
Kedie Shu
(1)
Keith Harrison
(1)
Keying Ye
(1)
Kristin M. Schweitzer
(1)
Lei Shi
(1)
Li Xu
(1)
Liang Zhao
(1)
Lingwei Chen
(1)
Maochao Xu
(4)
Marcus Pendleton
(1)
Mir Mehedi Ahsan Pritom
(1)
Moti Yung
(8)
Nathan Daughety
(1)
Pang Du
(1)
Patrick M. Hurley
(1)
Qi Xia
(1)
Qi Xiong
(1)
Qian Chen
(1)
Qianmu Li
(1)
Qingji Zheng
(1)
Ravi S. Sandhu
(2)
Raymond M. Bateman
(1)
Rebeca Perez
(1)
Sang-Yoon Chang
(1)
Shenghua Guan
(1)
Shifu Hou
(1)
Shouhuai Xu
(41)
Shuo Chen
(1)
Sujuan Wang
(1)
T. Paul Parker
(2)
Taizhong Hu
(1)
Tian Qiu
(1)
Timothy Paul Parker
(1)
Weide Zheng
(1)
Weiliang Luo
(2)
Weiqi Dai
(1)
Wenjun Fan
(1)
Xiaobo Zhou
(1)
Xiaohu Li
(2)
Xin Li
(1)
Xinyu Ou
(1)
Xueping Wang
(1)
Xuxian Jiang
(1)
Yanfang Ye
(1)
Yevgeniy Dodis
(3)
Yiwei Hu
(1)
Yuyi Zhong
(1)
Zhen Li
(4)
Zhenwei Wang
(1)
Zhenxin Zhan
(3)
Zheyuan Sun
(1)
Zhijun Deng
(1)
Zijian Fang
(1)
Ziteng Xu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to