Xiaojing Liao
Xiaojing Liao
Email verificata su indiana.edu
Titolo
Citata da
Citata da
Anno
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
992016
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
372017
Staying secure and unprepared: Understanding and mitigating the security risks of apple zeroconf
X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu
2016 IEEE Symposium on Security and Privacy (SP), 655-674, 2016
342016
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~ X and iOS
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
342015
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~ X and iOS
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
342015
Privacy-preserving and secure top-k query in two-tier wireless sensor network
X Liao, J Li
2012 IEEE Global Communications Conference (GLOBECOM), 335-341, 2012
342012
Under the shadow of sunshine: Understanding and detecting bulletproof hosting on legitimate service provider networks
S Alrwais, X Liao, X Mi, P Wang, XF Wang, F Qian, R Beyah, D McCoy
2017 IEEE Symposium on Security and Privacy (SP), 805-823, 2017
282017
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
222016
Resident Evil: Understanding residential ip proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE Symposium on Security and Privacy (SP), 1185-1201, 2019
192019
Characterizing long-tail SEO spam on cloud web hosting services
X Liao, C Liu, D McCoy, E Shi, S Hao, R Beyah
Proceedings of the 25th International Conference on World Wide Web, 321-332, 2016
162016
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
142019
Unauthorized cross-app resource access on mac os x and ios
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
arXiv preprint arXiv:1505.06836, 2015
142015
Cracking Wall of Confinement: Understanding and Analyzing Malicious Domain Takedowns
E Alowaisheq
The Network and Distributed System Security Symposium (NDSS), 2019
102019
Di-PriDA: Differentially private distributed load balancing control for the smart grid
X Liao, P Srinivasan, D Formby, AR Beyah
IEEE Transactions on Dependable and Secure Computing, 2017
102017
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applicationsá…, 2016
102016
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
92016
S-match: Verifiable privacy-preserving profile matching for mobile social services
X Liao, S Uluagac, RA Beyah
2014 44th Annual IEEE/IFIP International Conference on Dependable Systemsá…, 2014
82014
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, RA Beyah
NDSS, 2018
72018
Towards secure metering data analysis via distributed differential privacy
X Liao, D Formby, C Day, RA Beyah
2014 44th Annual IEEE/IFIP International Conference on Dependable Systemsá…, 2014
72014
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
28th {USENIX} Security Symposium ({USENIX} Security 19), 747-764, 2019
62019
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20