Follow
Xiaoqi Jia
Xiaoqi Jia
Verified email at iie.ac.cn
Title
Cited by
Cited by
Year
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd international conference on software engineering …, 2011
1242011
Program characterization using runtime values and its application to software plagiarism detection
YC Jhi, X Jia, X Wang, S Zhu, P Liu, D Wu
IEEE Transactions on Software Engineering 41 (9), 925-943, 2015
532015
Machine learning based cross-site scripting detection in online social network
R Wang, X Jia, Q Li, S Zhang
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
482014
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning
D Tian, Q Ying, X Jia, R Ma, C Hu, W Liu
Computer Networks 198, 108394, 2021
382021
Shelf: Preserving business continuity and availability in an intrusion recovery system
X Xiong, X Jia, P Liu
2009 Annual Computer Security Applications Conference, 484-493, 2009
332009
A kernel rootkit detection approach based on virtualization and machine learning
D Tian, R Ma, X Jia, C Hu
IEEE Access 7, 91657-91666, 2019
312019
BinDeep: A deep learning approach to binary code similarity detection
D Tian, X Jia, R Ma, S Liu, W Liu, C Hu
Expert Systems with Applications 168, 114348, 2021
302021
Efficient ideal threshold secret sharing schemes based on exclusive-or operations
C Lv, X Jia, L Tian, J Jing, M Sun
2010 Fourth International Conference on Network and System Security, 136-143, 2010
302010
CCA-secure type-based proxy re-encryption with invisible proxy
X Jia, J Shao, J Jing, P Liu
2010 10th IEEE International Conference on Computer and Information …, 2010
242010
A comprehensive study of co-residence threat in multi-tenant public paas clouds
W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu
Information and Communications Security: 18th International Conference …, 2016
232016
Improved N-gram approach for cross-site scripting detection in Online Social Network
R Wang, X Jia, Q Li, D Zhang
2015 Science and Information Conference (SAI), 1206-1212, 2015
222015
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing
D Meng, R Hou, G Shi, B Tu, A Yu, Z Zhu, X Jia, P Liu
Cybersecurity 1, 1-11, 2018
212018
Cross-layer damage assessment for cyber situational awareness
P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li
Cyber Situational Awareness: Issues and Research, 155-176, 2010
212010
Efficient secret sharing schemes
C Lv, X Jia, J Lin, J Jing, L Tian, M Sun
Secure and Trust Computing, Data Management and Applications: 8th FIRA …, 2011
192011
HyperCrop: a hypervisor-based countermeasure for return oriented programming
J Jiang, X Jia, D Feng, S Zhang, P Liu
International Conference on Information and Communications Security, 360-373, 2011
162011
An efficient group-based secret sharing scheme
C Lv, X Jia, J Lin, J Jing, L Tian
Information Security Practice and Experience: 7th International Conference …, 2011
152011
MDCD: A malware detection approach in cloud using deep learning
D Tian, R Zhao, R Ma, X Jia, Q Shen, C Hu, W Liu
Transactions on Emerging Telecommunications Technologies 33 (11), e4584, 2022
142022
MSYM: A multichannel communication system for android devices
W Wang, D Tian, W Meng, X Jia, R Zhao, R Ma
Computer Networks 168, 107024, 2020
132020
Cross-layer comprehensive intrusion harm analysis for production workload server systems
S Zhang, X Jia, P Liu, J Jing
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
132010
A longitudinal and comprehensive measurement of dns strict privacy
R Li, X Jia, Z Zhang, J Shao, R Lu, J Lin, X Jia, G Wei
IEEE/ACM Transactions on Networking 31 (6), 2793-2808, 2023
122023
The system can't perform the operation now. Try again later.
Articles 1–20