Follow
Shouhuai Xu
Title
Cited by
Cited by
Year
Vuldeepecker: A deep learning-based system for vulnerability detection
Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong
arXiv preprint arXiv:1801.01681, 2018
5392018
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
5382002
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
S Zhu, S Xu, S Setia, S Jajodia
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
4802003
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Q Zheng, S Xu, G Ateniese
IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014
4782014
Strong key-insulated signature schemes
Y Dodis, J Katz, S Xu, M Yung
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
3272002
A survey on ethereum systems security: Vulnerabilities, attacks, and defenses
H Chen, M Pendleton, L Njilla, S Xu
ACM Computing Surveys (CSUR) 53 (3), 1-43, 2020
2822020
A survey on systems security metrics
M Pendleton, R Garcia-Lebron, JH Cho, S Xu
ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016
2592016
Analyzing and exploiting network behaviors of malware
JA Morales, A Al-Bataineh, S Xu, R Sandhu
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
2582010
Sysevr: A framework for using deep learning to detect software vulnerabilities
Z Li, D Zou, S Xu, H Jin, Y Zhu, Z Chen
IEEE Transactions on Dependable and Secure Computing 19 (4), 2244-2258, 2021
2432021
Fair and dynamic proofs of retrievability
Q Zheng, S Xu
Proceedings of the first ACM conference on Data and application security and …, 2011
2062011
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
S Zhu, S Xu, S Setia, S Jajodia
23rd International Conference on Distributed Computing Systems Workshops …, 2003
2052003
Vulpecker: an automated vulnerability detection system based on code similarity analysis
Z Li, D Zou, S Xu, H Jin, H Qi, J Hu
Proceedings of the 32nd annual conference on computer security applications …, 2016
1872016
Secure and efficient proof of storage with deduplication
Q Zheng, S Xu
Proceedings of the second ACM conference on Data and Application Security …, 2012
1762012
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
S Zhu, S Setia, S Xu, S Jajodia
Journal of Computer Security 14 (4), 301-325, 2006
1532006
Characterizing honeypot-captured cyber attacks: Statistical framework and case study
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security 8 (11), 1775-1789, 2013
1442013
Social network-based botnet command-and-control: emerging threats and countermeasures
EJ Kartaltepe, JA Morales, S Xu, R Sandhu
Applied Cryptography and Network Security: 8th International Conference …, 2010
1172010
Predicting cyber attack rates with extreme values
Z Zhan, M Xu, S Xu
IEEE Transactions on Information Forensics and Security 10 (8), 1666-1677, 2015
1132015
Cross-layer detection of malicious websites
L Xu, Z Zhan, S Xu, K Ye
Proceedings of the third ACM conference on Data and application security and …, 2013
1132013
VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
D Zou, S Wang, S Xu, Z Li, H Jin
IEEE Transactions on Dependable and Secure Computing 18 (5), 2224-2236, 2019
1122019
Accumulating composites and improved group signing
G Tsudik, S Xu
Asiacrypt 2894, 269-286, 2003
1112003
The system can't perform the operation now. Try again later.
Articles 1–20