CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs X Yu, P Joshi, J Xu, G Jin, H Zhang, G Jiang Proceedings of the Twenty-First International Conference on Architectural …, 2016 | 195 | 2016 |
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ... NDSS, 2020 | 176 | 2020 |
Heterogeneous Graph Matching Networks for Unknown Malware Detection S Wang, Z Chen, X Yu, D Li, J Ni, LA Tang, J Gui, Z Li, H Chen, PS Yu Proceedings of the Twenty-Eighth International Joint Conference on …, 2019 | 83* | 2019 |
Comprehending performance from real-world execution traces: A device-driver case X Yu, S Han, D Zhang, T Xie Proceedings of the 19th international conference on architectural support …, 2014 | 58 | 2014 |
{SIGL}: Securing software installations through deep graph learning X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen 30th USENIX Security Symposium (USENIX Security 21), 2345-2362, 2021 | 40 | 2021 |
{SEAL}: Storage-efficient causality analysis on enterprise logs with query-friendly compression P Fei, Z Li, Z Wang, X Yu, D Li, K Jee 30th USENIX Security Symposium (USENIX Security 21), 2987-3004, 2021 | 32 | 2021 |
Adversarial defense framework for graph neural network S Wang, Z Chen, J Ni, X Yu, Z Li, H Chen, PS Yu arXiv preprint arXiv:1905.03679, 2019 | 30 | 2019 |
Test data generation for derived types in C program Z Wang, X Yu, T Sun, G Pu, Z Ding, JL Hu 2009 Third IEEE International Symposium on Theoretical Aspects of Software …, 2009 | 29 | 2009 |
Vessels: Efficient and scalable deep learning prediction on trusted processors K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020 | 23 | 2020 |
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ... Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 20 | 2020 |
Database-access performance antipatterns in database-backed web applications S Shao, Z Qiu, X Yu, W Yang, G Jin, T Xie, X Wu 2020 IEEE International Conference on Software Maintenance and Evolution …, 2020 | 18 | 2020 |
CloudSeer: using logs to detect errors in the cloud infrastructure P Joshi, H Zhang, XU Jianwu, X Yu, G Jiang US Patent 9,720,753, 2017 | 15 | 2017 |
The verification of rCOS using Spin X Yu, Z Wang, G Pu, D Mao, J Liu Electronic Notes in Theoretical Computer Science 207, 49-67, 2008 | 10 | 2008 |
Towards scalable compositional test generation T Sun, Z Wang, G Pu, X Yu, Z Qiu, B Gu 2009 Ninth International Conference on Quality Software, 353-358, 2009 | 8 | 2009 |
A parallel approach to concolic testing with low-cost synchronization X Yu, S Sun, G Pu, S Jiang, Z Wang Electronic Notes in Theoretical Computer Science 274, 83-96, 2011 | 6 | 2011 |
Uncertainty-aware bootstrap learning for joint extraction on distantly-supervised data Y Li, X Yu, Y Liu, H Chen, C Liu arXiv preprint arXiv:2305.03827, 2023 | 5 | 2023 |
Securing software installation through deep graph learning X Yu, X Han, D Li, J Rhee, H Chen US Patent 11,321,066, 2022 | 3 | 2022 |
Dataflow Tunneling: Mining Inter-request Data Dependencies for Request-based Applications X Yu, G Jin Proceedings of the 40th International Conference on Software Engineering …, 2018 | 3 | 2018 |
Run-time discovery of Java design patterns K Miao, S Jiang, X Yu, J Zhao 2011 2nd International Conference on Artificial Intelligence, Management …, 2011 | 3 | 2011 |
Execution semantics for rCOS Z Wang, X Yu, G Pu, L Feng, H Zhu, J He 2008 15th Asia-Pacific Software Engineering Conference, 119-126, 2008 | 3 | 2008 |