On a New Class of Pulsing Denial-of-Service Attacks and the Defense.

Xiapu Luo , Rocky K. C. Chang
network and distributed system security symposium

140
2005
Recursive DNS Architectures and Vulnerability Implications.

David Dagon , Manos Antonakakis , Kevin Day , Xiapu Luo
network and distributed system security symposium

27
2009
Towards detecting target link flooding attack

Edmond W. W. Chan , Xiapu Luo , Xian Zhan , Lei Xue
usenix large installation systems administration conference 81 -96

54
2014
MonoScope: Automating network faults diagnosis based on active measurements

Waiting W. T. Fok , Ricky Mok , Weichao Li , Xiapu Luo
integrated network management 210 -217

11
2013
Novel approaches to end-to-end packet reordering measurement

Xiapu Luo , Rocky K. C. Chang
internet measurement conference 20 -20

19
2005
An efficient approach to multi-level route analytics

Waiting W. T. Fok , Ang Chen , Xiapu Luo , Rocky K. C. Chang
integrated network management 101 -108

1
2013
Performance analysis of TCP/AQM under denial-of-service attacks

Xiapu Luo , R.K.C. Chang , E.W.W. Chan
modeling, analysis, and simulation on computer and telecommunication systems 97 -104

22
2005
Method for non-cooperative measurement of network data-path quality

Xiapu Luo , Edmond Wun-Wah Chan , Rocky Kow-Chuen Chang

41
2010
Design and implementation of TCP data probes for reliable and metric-rich network path monitoring

Edmond W. W. Chan , Xiapu Luo , Rocky K. C. Chang
usenix annual technical conference 4 -4

45
2009
Two classes of novel tcp exploits and the countermeasures

Xiapu Luo , Kow-Chuen Rocky Chang
The Hong Kong Polytechnic University

2007
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.

Roberto Perdisci , Edmond W. W. Chan , Xiapu Luo , Wenke Lee
network and distributed system security symposium

104
2011
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets

Weiqiang Kong , Liming Nie , Xiapu Luo , He Jiang
IEEE Transactions on Services Computing 12 ( 1) 34 -46

62
2019
A Survey on the Security of Blockchain Systems

Ting Chen , Xiapu Luo , Peng Jiang , Qiaoyan Wen
arXiv: Cryptography and Security

1,444
2018
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART.

Ting Chen , Ting Chen , Yajin Zhou , Xiapu Luo
usenix security symposium 289 -306

31
2017
Enforcing Context-Aware BYOD Policies with In-Network Security.

Ang Chen , Xiapu Luo , Lei Xue , Adam Morrison
usenix conference on hot topics in cloud ccomputing

5
2018
Model-Reuse Attacks on Deep Learning Systems

Xiapu Luo , Ting Wang , Shouling Ji , Yujie Ji
arXiv: Cryptography and Security

135
2018
Security Analysis of EOSIO Smart Contracts.

Xuxian Jiang , Xiapu Luo , Haoyu Wang , Yao Guo
arXiv: Cryptography and Security

23
2020
Interpretable Deep Learning under Fire

Xiapu Luo , Ting Wang , Shouling Ji , Ningfei Wang
usenix security symposium 1659 -1676

123
2020
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.

Yajin Zhou , Kui Ren , Xiapu Luo , Zhi Wang
arXiv: Cryptography and Security

12
2020
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.

Joseph K Liu , Man Ho Au , Tsz Hon Yuen , Cong Zuo
IACR Cryptology ePrint Archive 2020 528

59
2020