Key-insulated public key cryptosystems Y Dodis, J Katz, S Xu, M Yung International Conference on the Theory and Applications of Cryptographic …, 2002 | 504 | 2002 |
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach S Zhu, S Xu, S Setia, S Jajodia 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 469 | 2003 |
VABKS: verifiable attribute-based keyword search over outsourced encrypted data Q Zheng, S Xu, G Ateniese IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014 | 361 | 2014 |
Strong key-insulated signature schemes Y Dodis, J Katz, S Xu, M Yung International Workshop on Public Key Cryptography, 130-144, 2003 | 305 | 2003 |
Vuldeepecker: A deep learning-based system for vulnerability detection Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong arXiv preprint arXiv:1801.01681, 2018 | 223 | 2018 |
Analyzing and exploiting network behaviors of malware JA Morales, A Al-Bataineh, S Xu, R Sandhu International conference on security and privacy in communication systems, 20-34, 2010 | 222 | 2010 |
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks S Zhu, S Xu, S Setia, S Jajodia 23rd International Conference on Distributed Computing Systems Workshops …, 2003 | 196 | 2003 |
Fair and dynamic proofs of retrievability Q Zheng, S Xu Proceedings of the first ACM conference on Data and application security and …, 2011 | 191 | 2011 |
Secure and efficient proof of storage with deduplication Q Zheng, S Xu Proceedings of the second ACM conference on Data and Application Security …, 2012 | 156 | 2012 |
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks S Zhu, S Setia, S Xu, S Jajodia Journal of Computer Security 14 (4), 301-325, 2006 | 149 | 2006 |
A survey on systems security metrics M Pendleton, R Garcia-Lebron, JH Cho, S Xu ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016 | 132 | 2016 |
Characterizing honeypot-captured cyber attacks: Statistical framework and case study Z Zhan, M Xu, S Xu IEEE Transactions on Information Forensics and Security 8 (11), 1775-1789, 2013 | 112 | 2013 |
Social network-based botnet command-and-control: emerging threats and countermeasures EJ Kartaltepe, JA Morales, S Xu, R Sandhu International conference on applied cryptography and network security, 511-528, 2010 | 112 | 2010 |
Accumulating composites and improved group signing G Tsudik, S Xu International Conference on the Theory and Application of Cryptology and …, 2003 | 104 | 2003 |
Statistical predictive modeling and compensation of geometric deviations of three-dimensional printed products Q Huang, H Nouri, K Xu, Y Chen, S Sosina, T Dasgupta Journal of Manufacturing Science and Engineering 136 (6), 2014 | 103 | 2014 |
A stochastic model of multivirus dynamics S Xu, W Lu, Z Zhan IEEE Transactions on Dependable and Secure Computing 9 (1), 30-45, 2011 | 91 | 2011 |
An access control language for a general provenance model Q Ni, S Xu, E Bertino, R Sandhu, W Han Workshop on Secure Data Management, 68-88, 2009 | 91 | 2009 |
Vulpecker: an automated vulnerability detection system based on code similarity analysis Z Li, D Zou, S Xu, H Jin, H Qi, J Hu Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 88 | 2016 |
Cross-layer detection of malicious websites L Xu, Z Zhan, S Xu, K Ye Proceedings of the third ACM conference on Data and application security and …, 2013 | 87 | 2013 |
Adaptive epidemic dynamics in networks: Thresholds and control S Xu, W Lu, L Xu, Z Zhan ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8 (4), 1-19, 2014 | 85 | 2014 |