Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction X Jiang, X Wang, D Xu ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010 | 965 | 2010 |
PROMISE: peer-to-peer media streaming using CollectCast M Hefeeda, A Habib, B Botev, D Xu, B Bhargava Proceedings of the eleventh ACM international conference on Multimedia, 45-54, 2003 | 644 | 2003 |
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing R Riley, X Jiang, D Xu Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 485 | 2008 |
On peer-to-peer media streaming D Xu, M Hefeeda, S Hambrusch, B Bhargava Proceedings 22nd International Conference on Distributed Computing Systems …, 2002 | 462 | 2002 |
Automatic protocol format reverse engineering through context-aware monitored execution. Z Lin, X Jiang, D Xu, X Zhang NDSS 8, 1-15, 2008 | 358 | 2008 |
Analysis of a CDN–P2P hybrid architecture for cost-effective streaming media distribution D Xu, SS Kulkarni, C Rosenberg, HK Chai Multimedia Systems 11, 383-399, 2006 | 344 | 2006 |
Automatic reverse engineering of data structures from binary execution Z Lin, X Zhang, D Xu Proceedings of the 11th Annual Information Security Symposium, 1-1, 2010 | 310 | 2010 |
Violin: Virtual internetworking on overlay infrastructure X Jiang, D Xu International Symposium on Parallel and Distributed Processing and …, 2004 | 267 | 2004 |
Autonomic live adaptation of virtual computational environments in a multi-domain infrastructure P Ruth, J Rhee, D Xu, R Kennell, S Goasguen 2006 IEEE International Conference on Autonomic Computing, 5-14, 2006 | 261 | 2006 |
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis JY Chen, G Pandurangan, D Xu IEEE Transactions on Parallel and Distributed Systems 17 (9), 987-1000, 2006 | 249 | 2006 |
GnuStream: a P2P media streaming system prototype X Jiang, Y Dong, D Xu, B Bhargava 2003 International Conference on Multimedia and Expo. ICME'03. Proceedings …, 2003 | 243 | 2003 |
High Accuracy Attack Provenance via Binary-based Execution Partition. KH Lee, X Zhang, D Xu NDSS 16, 2013 | 242 | 2013 |
QoS-aware middleware for ubiquitous and heterogeneous environments K Nahrstedt, D Xu, D Wichadakul, B Li IEEE Communications magazine 39 (11), 140-148, 2001 | 242 | 2001 |
Protracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. S Ma, X Zhang, D Xu NDSS 2, 4, 2016 | 241 | 2016 |
Dksm: Subverting virtual machine introspection for fun and profit S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu 2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010 | 235 | 2010 |
Collapsar: A VM-Based Architecture for Network Attack Detention Center. X Jiang, D Xu USENIX Security Symposium, 15-28, 2004 | 222 | 2004 |
Detecting attacks against robotic vehicles: A control invariant approach H Choi, WC Lee, Y Aafer, F Fei, Z Tu, X Zhang, D Xu, X Deng Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 205 | 2018 |
Hercule: Attack story reconstruction via community discovery on correlated log graph K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ... Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016 | 188 | 2016 |
Loggc: garbage collecting audit log KH Lee, X Zhang, D Xu Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 181 | 2013 |
Virtual distributed environments in a shared infrastructure P Ruth, X Jiang, D Xu, S Goasguen Computer 38 (5), 63-69, 2005 | 178 | 2005 |