Value-based program characterization and its application to software plagiarism detection YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu Proceedings of the 33rd international conference on software engineering …, 2011 | 124 | 2011 |
Program characterization using runtime values and its application to software plagiarism detection YC Jhi, X Jia, X Wang, S Zhu, P Liu, D Wu IEEE Transactions on Software Engineering 41 (9), 925-943, 2015 | 53 | 2015 |
Machine learning based cross-site scripting detection in online social network R Wang, X Jia, Q Li, S Zhang 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014 | 48 | 2014 |
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning D Tian, Q Ying, X Jia, R Ma, C Hu, W Liu Computer Networks 198, 108394, 2021 | 38 | 2021 |
Shelf: Preserving business continuity and availability in an intrusion recovery system X Xiong, X Jia, P Liu 2009 Annual Computer Security Applications Conference, 484-493, 2009 | 33 | 2009 |
A kernel rootkit detection approach based on virtualization and machine learning D Tian, R Ma, X Jia, C Hu IEEE Access 7, 91657-91666, 2019 | 31 | 2019 |
BinDeep: A deep learning approach to binary code similarity detection D Tian, X Jia, R Ma, S Liu, W Liu, C Hu Expert Systems with Applications 168, 114348, 2021 | 30 | 2021 |
Efficient ideal threshold secret sharing schemes based on exclusive-or operations C Lv, X Jia, L Tian, J Jing, M Sun 2010 Fourth International Conference on Network and System Security, 136-143, 2010 | 30 | 2010 |
CCA-secure type-based proxy re-encryption with invisible proxy X Jia, J Shao, J Jing, P Liu 2010 10th IEEE International Conference on Computer and Information …, 2010 | 24 | 2010 |
A comprehensive study of co-residence threat in multi-tenant public paas clouds W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu Information and Communications Security: 18th International Conference …, 2016 | 23 | 2016 |
Improved N-gram approach for cross-site scripting detection in Online Social Network R Wang, X Jia, Q Li, D Zhang 2015 Science and Information Conference (SAI), 1206-1212, 2015 | 22 | 2015 |
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing D Meng, R Hou, G Shi, B Tu, A Yu, Z Zhu, X Jia, P Liu Cybersecurity 1, 1-11, 2018 | 21 | 2018 |
Cross-layer damage assessment for cyber situational awareness P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li Cyber Situational Awareness: Issues and Research, 155-176, 2010 | 21 | 2010 |
Efficient secret sharing schemes C Lv, X Jia, J Lin, J Jing, L Tian, M Sun Secure and Trust Computing, Data Management and Applications: 8th FIRA …, 2011 | 19 | 2011 |
HyperCrop: a hypervisor-based countermeasure for return oriented programming J Jiang, X Jia, D Feng, S Zhang, P Liu International Conference on Information and Communications Security, 360-373, 2011 | 16 | 2011 |
An efficient group-based secret sharing scheme C Lv, X Jia, J Lin, J Jing, L Tian Information Security Practice and Experience: 7th International Conference …, 2011 | 15 | 2011 |
MDCD: A malware detection approach in cloud using deep learning D Tian, R Zhao, R Ma, X Jia, Q Shen, C Hu, W Liu Transactions on Emerging Telecommunications Technologies 33 (11), e4584, 2022 | 14 | 2022 |
MSYM: A multichannel communication system for android devices W Wang, D Tian, W Meng, X Jia, R Zhao, R Ma Computer Networks 168, 107024, 2020 | 13 | 2020 |
Cross-layer comprehensive intrusion harm analysis for production workload server systems S Zhang, X Jia, P Liu, J Jing Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 13 | 2010 |
A longitudinal and comprehensive measurement of dns strict privacy R Li, X Jia, Z Zhang, J Shao, R Lu, J Lin, X Jia, G Wei IEEE/ACM Transactions on Networking 31 (6), 2793-2808, 2023 | 12 | 2023 |