Xiapu Luo
TitoloCitata daAnno
QDASH: a QoE-aware DASH system
RKP Mok, X Luo, EWW Chan, RKC Chang
Proceedings of the 3rd Multimedia Systems Conference, 11-22, 2012
3692012
A Survey on the security of blockchain systems
X Li, P Jiang, T Chen, X Luo, Q Wen
Future Generation Computer Systems, 2017
2332017
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
X Luo, RKC Chang
NDSS, 2005
1932005
Detecting stealthy P2P botnets using statistical traffic fingerprints
J Zhang, R Perdisci, W Lee, U Sarfraz, X Luo
2011 IEEE/IFIP 41st International Conference on Dependable Systemsá…, 2011
1342011
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
NDSS 11, 2011
1262011
Inferring the QoE of HTTP video streaming from user-viewing activities
RKP Mok, EWW Chan, X Luo, RKC Chang
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stacká…, 2011
1232011
Flow level detection and filtering of low-rate DDoS
C Zhang, Z Cai, W Chen, X Luo, J Yin
Computer Networks 56 (15), 3417-3431, 2012
922012
Building a scalable system for stealthy p2p-botnet detection
J Zhang, R Perdisci, W Lee, X Luo, U Sarfraz
IEEE transactions on information forensics and security 9 (1), 27-38, 2013
822013
Towards a scalable resource-driven approach for detecting repackaged Android applications
Y Shao, X Luo, C Qian, P Zhu, L Zhang
Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014
812014
Under-optimized smart contracts devour your money
T Chen, X Li, X Luo, X Zhang
2017 IEEE 24th International Conference on Software Analysis, Evolution andá…, 2017
742017
DexHunter: Toward Extracting Hidden Code from Packed Android Applications
Y Zhang, X Luo, H Yin
Proceedings of the 20th European Symposium on Research in Computer Securityá…, 0
69*
On tracking information flows through jni in android applications
C Qian, X Luo, Y Shao, ATS Chan
2014 44th Annual IEEE/IFIP International Conference on Dependable Systemsá…, 2014
642014
TCP covert timing channels: Design and detection
X Luo, EWW Chan, RKC Chang
2008 IEEE International Conference on Dependable Systems and Networks Withá…, 2008
632008
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks
R Perdisci, M Antonakakis, X Luo, W Lee
Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP Internationalá…, 2009
532009
Boosting the scalability of botnet detection using adaptive traffic sampling
J Zhang, X Luo, R Perdisci, G Gu, W Lee, N Feamster
Proceedings of the 6th ACM Symposium on Information, Computer andá…, 2011
482011
METHOD FOR NON-COOPERATIVE MEASUREMENT OF NETWORK DATA-PATH QUALITY
X LUO, EWW CHAN, RKC CHANG
WO Patent 2,010,142,250, 2010
47*2010
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
X Luo, EWW Chan, RKC Chang
USENIX Annual Technical Conference, 2009
462009
A centralized monitoring infrastructure for improving dns security
M Antonakakis, D Dagon, X Luo, R Perdisci, W Lee, J Bellmor
International Workshop on Recent Advances in Intrusion Detection, 18-37, 2010
442010
Towards more accurate severity prediction and fixer recommendation of software bugs
T Zhang, J Chen, G Yang, B Lee, X Luo
Journal of Systems and Software 117, 166-184, 2016
432016
RootGuard: Protecting Rooted Android Phones
Y Shao, X Luo, C Qian
Computer 47 (6), 32-40, 2014
432014
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20