Xiao Yu
Xiao Yu
Research Manager, Machine Learning & Security, Stellar Cyber
Verified email at - Homepage
Cited by
Cited by
CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs
X Yu, P Joshi, J Xu, G Jin, H Zhang, G Jiang
Proceedings of the Twenty-First International Conference on Architectural …, 2016
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
Heterogeneous Graph Matching Networks for Unknown Malware Detection
S Wang, Z Chen, X Yu, D Li, J Ni, LA Tang, J Gui, Z Li, H Chen, PS Yu
Proceedings of the Twenty-Eighth International Joint Conference on …, 2019
Comprehending performance from real-world execution traces: A device-driver case
X Yu, S Han, D Zhang, T Xie
Proceedings of the 19th international conference on architectural support …, 2014
{SIGL}: Securing software installations through deep graph learning
X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen
30th USENIX Security Symposium (USENIX Security 21), 2345-2362, 2021
{SEAL}: Storage-efficient causality analysis on enterprise logs with query-friendly compression
P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
30th USENIX Security Symposium (USENIX Security 21), 2987-3004, 2021
Adversarial defense framework for graph neural network
S Wang, Z Chen, J Ni, X Yu, Z Li, H Chen, PS Yu
arXiv preprint arXiv:1905.03679, 2019
Test data generation for derived types in C program
Z Wang, X Yu, T Sun, G Pu, Z Ding, JL Hu
2009 Third IEEE International Symposium on Theoretical Aspects of Software …, 2009
Vessels: Efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020
Database-access performance antipatterns in database-backed web applications
S Shao, Z Qiu, X Yu, W Yang, G Jin, T Xie, X Wu
2020 IEEE International Conference on Software Maintenance and Evolution …, 2020
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage
WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ...
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
CloudSeer: using logs to detect errors in the cloud infrastructure
P Joshi, H Zhang, XU Jianwu, X Yu, G Jiang
US Patent 9,720,753, 2017
The verification of rCOS using Spin
X Yu, Z Wang, G Pu, D Mao, J Liu
Electronic Notes in Theoretical Computer Science 207, 49-67, 2008
Towards scalable compositional test generation
T Sun, Z Wang, G Pu, X Yu, Z Qiu, B Gu
2009 Ninth International Conference on Quality Software, 353-358, 2009
A parallel approach to concolic testing with low-cost synchronization
X Yu, S Sun, G Pu, S Jiang, Z Wang
Electronic Notes in Theoretical Computer Science 274, 83-96, 2011
Uncertainty-aware bootstrap learning for joint extraction on distantly-supervised data
Y Li, X Yu, Y Liu, H Chen, C Liu
arXiv preprint arXiv:2305.03827, 2023
Securing software installation through deep graph learning
X Yu, X Han, D Li, J Rhee, H Chen
US Patent 11,321,066, 2022
Dataflow Tunneling: Mining Inter-request Data Dependencies for Request-based Applications
X Yu, G Jin
Proceedings of the 40th International Conference on Software Engineering …, 2018
Run-time discovery of Java design patterns
K Miao, S Jiang, X Yu, J Zhao
2011 2nd International Conference on Artificial Intelligence, Management …, 2011
Execution semantics for rCOS
Z Wang, X Yu, G Pu, L Feng, H Zhu, J He
2008 15th Asia-Pacific Software Engineering Conference, 119-126, 2008
The system can't perform the operation now. Try again later.
Articles 1–20