What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xusheng Xiao
Google Scholar
ORCID:
0000-0003-4797-4294
17
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph.
Shang Ma
Chaoran Chen
Shao Yang
Shifu Hou
Toby Jia-Jun Li
Xusheng Xiao
Tao Xie
Yanfang Ye
2024
conf/ndss
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
Shaofei Li
Feng Dong
Xusheng Xiao
Haoyu Wang
Fei Shao
Jiedong Chen
Yao Guo
Xiangqun Chen
Ding Li
2023
conf/ccs
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Feng Dong
Shaofei Li
Peng Jiang
Ding Li
Haoyu Wang
Liangyi Huang
Xusheng Xiao
Jiedong Chen
Xiapu Luo
Yao Guo
Xiangqun Chen
2023
conf/uss
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System.
Feng Dong
Liu Wang
Xu Nie
Fei Shao
Haoyu Wang
Ding Li
Xiapu Luo
Xusheng Xiao
2023
conf/uss
On the Security Risks of Knowledge Graph Reasoning.
Zhaohan Xi
Tianyu Du
Changjiang Li
Ren Pang
Shouling Ji
Xiapu Luo
Xusheng Xiao
Fenglong Ma
Ting Wang
2022
conf/uss
Back-Propagating System Dependency Impact for Attack Investigation.
Pengcheng Fang
Peng Gao
Changlin Liu
Erman Ayday
Kangkook Jee
Ting Wang
Yanfang (Fanny) Ye
Zhuotao Liu
Xusheng Xiao
2022
conf/sp
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
Zhiqiang Xu
Pengcheng Fang
Changlin Liu
Xusheng Xiao
Yu Wen
Dan Meng
2019
conf/ccs
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
Zhuotao Liu
Yangxi Xiang
Jian Shi
Peng Gao
Haoyu Wang
Xusheng Xiao
Bihan Wen
Yih-Chun Hu
2019
conf/ccs
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Shengqu Xi
Shao Yang
Xusheng Xiao
Yuan Yao
Yayuan Xiong
Fengyuan Xu
Haoyu Wang
Peng Gao
Zhuotao Liu
Feng Xu
Jian Lu
2019
conf/acsac
Progressive processing of system-behavioral query.
Jiaping Gui
Xusheng Xiao
Ding Li
Chung Hwan Kim
Haifeng Chen
2018
conf/ccs
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Yutao Tang
Ding Li
Zhichun Li
Mu Zhang
Kangkook Jee
Xusheng Xiao
Zhenyu Wu
Junghwan Rhee
Fengyuan Xu
Qun Li
2018
conf/uss
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Peng Gao
Xusheng Xiao
Ding Li
Zhichun Li
Kangkook Jee
Zhenyu Wu
Chung Hwan Kim
Sanjeev R. Kulkarni
Prateek Mittal
2018
conf/dsn
PreInfer: Automatic Inference of Preconditions via Symbolic Analysis.
Angello Astorga
Siwakorn Srisakaokul
Xusheng Xiao
Tao Xie
2016
conf/ccs
High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Zhang Xu
Zhenyu Wu
Zhichun Li
Kangkook Jee
Junghwan Rhee
Xusheng Xiao
Fengyuan Xu
Haining Wang
Guofei Jiang
2015
conf/uss
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
Jianjun Huang
Zhichun Li
Xusheng Xiao
Zhenyu Wu
Kangjie Lu
Xiangyu Zhang
Guofei Jiang
2014
conf/acsac
Relation extraction for inferring access control rules from natural language artifacts.
John Slankas
Xusheng Xiao
Laurie A. Williams
Tao Xie
2013
conf/uss
WHYPER: Towards Automating Risk Assessment of Mobile Applications.
Rahul Pandita
Xusheng Xiao
Wei Yang
William Enck
Tao Xie
Coauthors
Angello Astorga
(1)
Bihan Wen
(1)
Changjiang Li
(1)
Changlin Liu
(2)
Chaoran Chen
(1)
Chung Hwan Kim
(2)
Dan Meng
(1)
Ding Li
(6)
Erman Ayday
(1)
Fei Shao
(2)
Feng Dong
(3)
Feng Xu
(1)
Fenglong Ma
(1)
Fengyuan Xu
(3)
Guofei Jiang
(2)
Haifeng Chen
(1)
Haining Wang
(1)
Haoyu Wang
(5)
Jian Lu
(1)
Jian Shi
(1)
Jianjun Huang
(1)
Jiaping Gui
(1)
Jiedong Chen
(2)
John Slankas
(1)
Junghwan Rhee
(2)
Kangjie Lu
(1)
Kangkook Jee
(4)
Laurie A. Williams
(1)
Liangyi Huang
(1)
Liu Wang
(1)
Mu Zhang
(1)
Peng Gao
(4)
Peng Jiang
(1)
Pengcheng Fang
(2)
Prateek Mittal
(1)
Qun Li
(1)
Rahul Pandita
(1)
Ren Pang
(1)
Sanjeev R. Kulkarni
(1)
Shang Ma
(1)
Shao Yang
(2)
Shaofei Li
(2)
Shengqu Xi
(1)
Shifu Hou
(1)
Shouling Ji
(1)
Siwakorn Srisakaokul
(1)
Tao Xie
(4)
Tianyu Du
(1)
Ting Wang
(2)
Toby Jia-Jun Li
(1)
Wei Yang
(1)
William Enck
(1)
Xiangqun Chen
(2)
Xiangyu Zhang
(1)
Xiapu Luo
(3)
Xu Nie
(1)
Xusheng Xiao
(17)
Yanfang (Fanny) Ye
(1)
Yanfang Ye
(1)
Yangxi Xiang
(1)
Yao Guo
(2)
Yayuan Xiong
(1)
Yih-Chun Hu
(1)
Yu Wen
(1)
Yuan Yao
(1)
Yutao Tang
(1)
Zhang Xu
(1)
Zhaohan Xi
(1)
Zhenyu Wu
(4)
Zhichun Li
(4)
Zhiqiang Xu
(1)
Zhuotao Liu
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to