A survey on the security of blockchain systems X Li, P Jiang, T Chen, X Luo, Q Wen Future Generation Computer Systems 107, 841-853, 2020 | 1478 | 2020 |
QDASH: a QoE-aware DASH system RKP Mok, X Luo, EWW Chan, RKC Chang Proceedings of the 3rd Multimedia Systems Conference, 11-22, 2012 | 470 | 2012 |
Under-optimized smart contracts devour your money T Chen, X Li, X Luo, X Zhang 2017 IEEE 24th International Conference on Software Analysis, Evolution and …, 2017 | 360 | 2017 |
Understanding Ethereum via Graph Analysis T Chen, Y Zhu, Z Li, J Chen, X Li, X Luo, X Lin, X Zhange IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1484-1492, 2018 | 257 | 2018 |
On a New Class of Pulsing Denial-of-Service Attacks and the Defense. X Luo, RKC Chang NDSS, 2005 | 251 | 2005 |
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci NDSS 11, 2011 | 203 | 2011 |
Android malware familial classification and representative sample selection via frequent subgraph analysis M Fan, J Liu, X Luo, K Chen, Z Tian, Q Zheng, T Liu IEEE Transactions on Information Forensics and Security 13 (8), 1890-1905, 2018 | 192 | 2018 |
Inferring the QoE of HTTP video streaming from user-viewing activities RKP Mok, EWW Chan, X Luo, RKC Chang Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack …, 2011 | 181 | 2011 |
Detecting stealthy P2P botnets using statistical traffic fingerprints J Zhang, R Perdisci, W Lee, U Sarfraz, X Luo 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 170 | 2011 |
DexHunter: Toward Extracting Hidden Code from Packed Android Applications Y Zhang, X Luo, H Yin Proceedings of the 20th European Symposium on Research in Computer Security …, 0 | 151* | |
Flow level detection and filtering of low-rate DDoS C Zhang, Z Cai, W Chen, X Luo, J Yin Computer Networks 56 (15), 3417-3431, 2012 | 146 | 2012 |
Towards a scalable resource-driven approach for detecting repackaged Android applications Y Shao, X Luo, C Qian, P Zhu, L Zhang Proceedings of the 30th Annual Computer Security Applications Conference, 56-65, 2014 | 138 | 2014 |
Model-Reuse Attacks on Deep Learning Systems Y Ji, X Zhang, S Ji, X Luo, T Wang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 136 | 2018 |
A detailed and real-time performance monitoring framework for blockchain systems P Zheng, Z Zheng, X Luo, X Chen, X Liu 2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018 | 135 | 2018 |
Towards more accurate severity prediction and fixer recommendation of software bugs T Zhang, J Chen, G Yang, B Lee, X Luo Journal of Systems and Software 117, 166-184, 2016 | 135 | 2016 |
Interpretable deep learning under fire X Zhang, N Wang, H Shen, S Ji, X Luo, T Wang 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 124 | 2020 |
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks C Wang, TTN Miu, X Luo, J Wang IEEE Transactions on Information Forensics and Security 13 (3), 559-573, 2018 | 124 | 2018 |
Building a scalable system for stealthy p2p-botnet detection J Zhang, R Perdisci, W Lee, X Luo, U Sarfraz IEEE transactions on information forensics and security 9 (1), 27-38, 2013 | 119 | 2013 |
Software defect prediction based on kernel PCA and weighted extreme learning machine Z Xu, J Liu, X Luo, Z Yang, Y Zhang, P Yuan, Y Tang, T Zhang Information and Software Technology 106, 182-200, 2019 | 115 | 2019 |
A Survey on Access Control in Fog Computing P Zhang, JK Liu, FR Yu, M Sookhak, MH Au, X Luo IEEE Communications Magazine 56 (2), 144-149, 2018 | 113 | 2018 |