Xiao Yu
Xiao Yu
Research Manager, Machine Learning & Security, Stellar Cyber
Verified email at - Homepage
Cited by
Cited by
CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs
X Yu, P Joshi, J Xu, G Jin, H Zhang, G Jiang
Proceedings of the Twenty-First International Conference on Architectural …, 2016
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
Heterogeneous Graph Matching Networks for Unknown Malware Detection
S Wang, Z Chen, X Yu, D Li, J Ni, LA Tang, J Gui, Z Li, H Chen, PS Yu
Proceedings of the Twenty-Eighth International Joint Conference on …, 2019
Comprehending performance from real-world execution traces: A device-driver case
X Yu, S Han, D Zhang, T Xie
Proceedings of the 19th international conference on architectural support …, 2014
Test data generation for derived types in C program
Z Wang, X Yu, T Sun, G Pu, Z Ding, JL Hu
2009 Third IEEE International Symposium on Theoretical Aspects of Software …, 2009
Adversarial defense framework for graph neural network
S Wang, Z Chen, J Ni, X Yu, Z Li, H Chen, PS Yu
arXiv preprint arXiv:1905.03679, 2019
SIGL: Securing Software Installations Through Deep Graph Learning.
X Han, X Yu, TFJM Pasquier, D Li, J Rhee, JW Mickens, MI Seltzer, ...
USENIX Security Symposium, 2345-2362, 2021
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
USENIX Security Symposium, 2987-3004, 2021
Vessels: Efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020
Database-access performance antipatterns in database-backed web applications
S Shao, Z Qiu, X Yu, W Yang, G Jin, T Xie, X Wu
2020 IEEE International Conference on Software Maintenance and Evolution …, 2020
CloudSeer: using logs to detect errors in the cloud infrastructure
P Joshi, H Zhang, XU Jianwu, X Yu, G Jiang
US Patent 9,720,753, 2017
The verification of rCOS using Spin
X Yu, Z Wang, G Pu, D Mao, J Liu
Electronic Notes in Theoretical Computer Science 207, 49-67, 2008
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage
WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ...
Annual Computer Security Applications Conference, 165-178, 2020
Towards scalable compositional test generation
T Sun, Z Wang, G Pu, X Yu, Z Qiu, B Gu
2009 Ninth International Conference on Quality Software, 353-358, 2009
A parallel approach to concolic testing with low-cost synchronization
X Yu, S Sun, G Pu, S Jiang, Z Wang
Electronic Notes in Theoretical Computer Science 274, 83-96, 2011
Dataflow Tunneling: Mining Inter-request Data Dependencies for Request-based Applications
X Yu, G Jin
Proceedings of the 40th International Conference on Software Engineering …, 2018
Execution semantics for rCOS
Z Wang, X Yu, G Pu, L Feng, H Zhu, J He
2008 15th Asia-Pacific Software Engineering Conference, 119-126, 2008
Run-time discovery of Java design patterns
K Miao, S Jiang, X Yu, J Zhao
2011 2nd International Conference on Artificial Intelligence, Management …, 2011
Anomaly Detection on Web-User Behaviors Through Deep Learning
J Gui, Z Chen, X Yu, C Lumezanu, H Chen
Security and Privacy in Communication Networks: 16th EAI International …, 2020
Understanding and Debugging Complex Software Systems: A Data-Driven Perspective
X Yu
North Carolina State University, 2018
The system can't perform the operation now. Try again later.
Articles 1–20