Zheng Cong , Xu Zhi
Xu Zhi , Xiao Zihang
Xu Zhi , Xiao Zihang
Xu Zhi , Wexler Elad , Weiss Asaf
Sencun Zhu , Zhi Xu
WOOT'12 Proceedings of the 6th USENIX conference on Offensive Technologies 1 -1
Sencun Zhu , Zhi Xu
7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2010
Zhi Xu , Hungyuan Hsu , Xin Chen , Sencun Zhu
Research in Attacks, Intrusions, and Defenses 147 -168
Hasan Ural , Zhi Xu
Testing of Software and Communicating Systems 335 -350
Xiaowu Chen , Zhi Xu , Zhangsheng Pan , Xixi Luo
grid and cooperative computing 720 -728
Hasan Ural , Zhi Xu , Fan Zhang
automation of software test 6 -6
Zhi Xu , Kun Bai , Sencun Zhu
wireless network security 113 -124
Ashwin Chaugule , Zhi Xu , Sencun Zhu
applied cryptography and network security 19 -37
Zhi Xu , Sencun Zhu
conference on data and application security and privacy 61 -72
Xiao Zhang , Zhi Xu
Proceedings of the First Workshop on Radical and Experiential Security
Cong Zheng , Tongbo Luo , Zhi Xu , Wenjun Hu
Proceedings of the First Workshop on Radical and Experiential Security 61 -64
Zhi Xu , Kun Bai , Sencun Zhu , Leslie Liu
Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers 7 389 -408
Bo Zhao , Zhi Xu , Caixia Chi , Sencun Zhu
Najmeh Miramirkhani , Ari Azarafrooz , Yihua Liao , Zhi Xu
Yihua Liao , Ari Azarafrooz , Najmeh Miramirkhani , Zhi Xu
Ari Azarafrooz , Najmeh Miramirkhani , Zhi Xu , Yihua Liao