RB-Seeker: Auto-detection of Redirection Botnets.

Matthew Knysz , Kang G. Shin , Xin Hu
network and distributed system security symposium

47
2009
MutantX-S: scalable malware clustering based on static features

Sandeep Bhatkar , Kang G. Shin , Kent Griffin , Xin Hu
usenix annual technical conference 187 -198

71
2013
Authentication of Freshness for OutsourcedMulti-Version Key-Value Stores

Peter Pietzuch , Ling Liu , Yuzhe Tang , Jiyong Jang
Georgia Institute of Technology

2
2014
Rateless and pollution-attack-resilient network coding

Wentao Huang , Ting Wang , Xin Hu , Jiyong Jang
2015 IEEE International Symposium on Information Theory (ISIT) 2623 -2627

6
2015
Stream computing for large-scale, multi-channel cyber threat analytics

Douglas L. Schales , Mihai Christodorescu , Xin Hu , Jiyong Jang
information reuse and integration 8 -15

5
2014
A Study on Latent Vulnerabilities

Beng Heng Ng , Xin Hu , Atul Prakash
symposium on reliable distributed systems 333 -337

6
2010
Android Malware Clustering through Malicious Payload Mining

Yuping Li , Jiyong Jang , Xin Hu , Xinming Ou
recent advances in intrusion detection 192 -214

84
2017
BotMeter: Charting DGA-Botnet Landscapes in Large Networks

Ting Wang , Xin Hu , Jiyong Jang , Shouling Ji
2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) 334 -343

11
2016
Reconciling malware labeling discrepancy via consensus learning

Ting Wang , Xin Hu , Shicong Meng , Reiner Sailer
international conference on data engineering 84 -89

1
2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation

Xin Hu , Ting Wang , Marc Ph Stoecklin , Douglas L Schales
EURASIP Journal on Information Security 2014 ( 1) 17

5
2014
Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing

Ting Wang , Shicong Meng , Wei Gao , Xin Hu
conference on information and knowledge management 1239 -1248

3
2014
Outsourcing multi-version key-value stores with verifiable data freshness

Yuzhe Tang , Ling Liu , Ting Wang , Xin Hu
international conference on data engineering 1214 -1217

19
2014
Behavioral detection of malware on mobile handsets

Abhijit Bose , Xin Hu , Kang G. Shin , Taejoon Park
Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08 225 -238

261
2008
Design of SMS commanded-and-controlled and P2P-structured mobile botnets

Yuanyuan Zeng , Kang G. Shin , Xin Hu
wireless network security 137 -148

64
2012
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks

Xin Hu , Jiyong Jang , Marc Ph. Stoecklin , Ting Wang
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 479 -490

29
2016
Containment of network worms via per-process rate-limiting

Yuanyuan Zeng , Xin Hu , Haixiong Wang , Kang G. Shin
Proceedings of the 4th international conference on Security and privacy in communication netowrks - SecureComm '08 14

6
2008
Detecting Malicious Exploit Kits using Tree-based Similarity Searches

Teryl Taylor , Xin Hu , Ting Wang , Jiyong Jang
conference on data and application security and privacy 255 -266

19
2016
Attack-tolerant distributed sensing for dynamic spectrum access networks

Alexander W. Min , Kang G. Shin , Xin Hu
international conference on network protocols 294 -303

75
2009
Large-scale malware indexing using function-call graphs

Xin Hu , Tzi-cker Chiueh , Kang G. Shin
computer and communications security 611 -620

422
2009
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis

Jialong Zhang , Xin Hu , Jiyong Jang , Ting Wang
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications 1 -9

5
2016