ÆÈ·Î¿ì
Xiapu Luo
Á¦¸ñ
Àοë
Àοë
¿¬µµ
A survey on the security of blockchain systems
X Li, P Jiang, T Chen, X Luo, Q Wen
Future Generation Computer Systems 107, 841-853, 2020
17612020
QDASH: a QoE-aware DASH system
RKP Mok, X Luo, EWW Chan, RKC Chang
Proceedings of the 3rd Multimedia Systems Conference, 11-22, 2012
4772012
Under-optimized smart contracts devour your money
T Chen, X Li, X Luo, X Zhang
2017 IEEE 24th International Conference on Software Analysis, Evolution and ¡¦, 2017
4082017
Understanding Ethereum via Graph Analysis
T Chen, Y Zhu, Z Li, J Chen, X Li, X Luo, X Lin, X Zhange
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1484-1492, 2018
3312018
Android malware familial classification and representative sample selection via frequent subgraph analysis
M Fan, J Liu, X Luo, K Chen, Z Tian, Q Zheng, T Liu
IEEE Transactions on Information Forensics and Security 13 (8), 1890-1905, 2018
2232018
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
NDSS 11, 2011
2142011
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
X Luo, RKC Chang
NDSS, 2005
2002005
Inferring the QoE of HTTP video streaming from user-viewing activities
RKP Mok, EWW Chan, X Luo, RKC Chang
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack ¡¦, 2011
1932011
Detecting stealthy P2P botnets using statistical traffic fingerprints
J Zhang, R Perdisci, W Lee, U Sarfraz, X Luo
2011 IEEE/IFIP 41st International Conference on Dependable Systems ¡¦, 2011
1722011
Model-Reuse Attacks on Deep Learning Systems
Y Ji, X Zhang, S Ji, X Luo, T Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications ¡¦, 2018
1712018
A detailed and real-time performance monitoring framework for blockchain systems
P Zheng, Z Zheng, X Luo, X Chen, X Liu
2018 IEEE/ACM 40th International Conference on Software Engineering ¡¦, 2018
1642018
DexHunter: Toward Extracting Hidden Code from Packed Android Applications
Y Zhang, X Luo, H Yin
Proceedings of the 20th European Symposium on Research in Computer Security ¡¦, 0
159*
Towards more accurate severity prediction and fixer recommendation of software bugs
T Zhang, J Chen, G Yang, B Lee, X Luo
Journal of Systems and Software 117, 166-184, 2016
1572016
Flow level detection and filtering of low-rate DDoS
C Zhang, Z Cai, W Chen, X Luo, J Yin
Computer Networks 56 (15), 3417-3431, 2012
1532012
Interpretable deep learning under fire
X Zhang, N Wang, H Shen, S Ji, X Luo, T Wang
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
1522020
Software defect prediction based on kernel PCA and weighted extreme learning machine
Z Xu, J Liu, X Luo, Z Yang, Y Zhang, P Yuan, Y Tang, T Zhang
Information and Software Technology 106, 182-200, 2019
1512019
Towards a scalable resource-driven approach for detecting repackaged Android applications
Y Shao, X Luo, C Qian, P Zhu, L Zhang
Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014
1462014
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks
C Wang, TTN Miu, X Luo, J Wang
IEEE Transactions on Information Forensics and Security 13 (3), 559-573, 2018
1402018
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks
T Chen, X Li, Y Wang, J Chen, Z Li, X Luo, MH Au, X Zhang
Information Security Practice and Experience: 13th International Conference ¡¦, 2017
1342017
A Survey on Access Control in Fog Computing
P Zhang, JK Liu, FR Yu, M Sookhak, MH Au, X Luo
IEEE Communications Magazine 56 (2), 144-149, 2018
1322018
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20