Xuxian Jiang , Dongyan Xu
Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06 17 -24
Ziqing Mao , Ninghui Li , Hong Chen , Xuxian Jiang
Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09 237 -246
Wu Zhou , Yajin Zhou , Michael Grace , Xuxian Jiang
Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13 185 -196
Jinku Li , Zhi Wang , Xuxian Jiang , Michael Grace
european conference on computer systems 195 -208
Ning Zhang , Wenjing Lou , Xuxian Jiang , Y. Thomas Hou
communications and networking symposium 355 -363
Xuxian Jiang , Xinyuan Wang , Dongyan Xu
ACM Transactions on Information and System Security 13 ( 2) 12
Ryan Riley , Xuxian Jiang , Dongyan Xu
recent advances in intrusion detection 1 -20
Zhi Wang , Xuxian Jiang , Weidong Cui , Xinyuan Wang
recent advances in intrusion detection 21 -38
Daniel Ramsbrock , Xinyuan Wang , Xuxian Jiang
recent advances in intrusion detection 59 -77
Wu Zhou , Yajin Zhou , Xuxian Jiang , Peng Ning
Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12 317 -326
Min Xu , Xuxian Jiang , Ravi Sandhu , Xinwen Zhang
symposium on access control models and technologies 71 -80
Zhi Wang , Xuxian Jiang , Weidong Cui , Xinyuan Wang
european symposium on research in computer security 200 -215
Zhi Wang , Xuxian Jiang , Weidong Cui , Peng Ning
computer and communications security 545 -554
Martim Carbone , Weidong Cui , Long Lu , Wenke Lee
computer and communications security 555 -565
Yajin Zhou , Lei Wu , Zhi Wang , Xuxian Jiang
wireless network security 23
Ahmed M. Azab , Peng Ning , Zhi Wang , Xuxian Jiang
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10 38 -49
Mingshen Sun , Min Zheng , John C. S. Lui , Xuxian Jiang
annual computer security applications conference 226 -235
William Enck , Xuxian Jiang
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12 1062 -1063
Zhi Wang , Xuxian Jiang
ieee symposium on security and privacy 380 -395
Yajin Zhou , Xuxian Jiang
ieee symposium on security and privacy 95 -109