Biblio

Export 6 results:
Sort by:
Filters: Author is Xiaokui Shu  [Clear All Filters]
2015
Shu, X., D. D. Yao, and B. Ryder, "A Formal Framework for Program Anomaly Detection", 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, 11/2015.
Shu, X., D. D. Yao, and N. Ramakrishnan, "Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths", 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, Colorado, ACM, 10/2015.
Liu, F., X. Shu, D. D. Yao, and A. Butt, "Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce", ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, ACM, 03/2015.
Shu, X., J. Zhang, D. D. Yao, and W. - C. Feng, "Fast Detection of Transformed Data Leaks", IEEE Transactions on Information Forensics & Security (TIFS), 2015.
Liu, F., X. Shu, D. Yao, and A. R. Butt, "Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce", Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, USA, March 2-4, 2015, pp. 195–206, 2015.