Behavioral detection of malware on mobile handsets A Bose, X Hu, KG Shin, T Park Proceedings of the 6th international conference on Mobile systems …, 2008 | 413 | 2008 |
Large-scale malware indexing using function-call graphs X Hu, T Chiueh, KG Shin Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 355 | 2009 |
Automatic generation of string signatures for malware detection K Griffin, S Schneider, X Hu, T Chiueh International workshop on recent advances in intrusion detection, 101-120, 2009 | 244 | 2009 |
Accurate real-time identification of IP prefix hijacking X Hu, ZM Mao 2007 IEEE Symposium on Security and Privacy (SP'07), 3-17, 2007 | 231 | 2007 |
Privacy protection for users of location-based services KG Shin, X Ju, Z Chen, X Hu IEEE Wireless Communications 19 (1), 30-39, 2012 | 227 | 2012 |
Previewing file or document content A Martinez, M Rahn US Patent App. 10/044,737, 2004 | 145 | 2004 |
Design of SMS commanded-and-controlled and P2P-structured mobile botnets Y Zeng, KG Shin, X Hu Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 114 | 2012 |
Mutantx-s: Scalable malware clustering based on static features X Hu, KG Shin, S Bhatkar, K Griffin 2013 {USENIX} Annual Technical Conference ({USENIX}{ATC} 13), 187-198, 2013 | 107 | 2013 |
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization S Ji, W Li, P Mittal, X Hu, R Beyah 24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015 | 105 | 2015 |
Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation AW Min, KG Shin, X Hu IEEE transactions on Mobile Computing 10 (10), 1434-1447, 2010 | 100 | 2010 |
Detection of botnets using combined host-and network-level information Y Zeng, X Hu, KG Shin 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 97 | 2010 |
Attack-tolerant distributed sensing for dynamic spectrum access networks AW Min, KG Shin, X Hu 2009 17th IEEE International Conference on Network Protocols, 294-303, 2009 | 94 | 2009 |
Experimental study of fuzzy hashing in malware clustering analysis Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang 8th Workshop on Cyber Security Experimentation and Test ({CSET} 15), 2015 | 70 | 2015 |
RB-Seeker: Auto-detection of Redirection Botnets. X Hu, M Knysz, KG Shin NDSS, 2009 | 67 | 2009 |
Apparatus and method for detection of malicious program using program behavior T Park, KG Shin, X Hu, A Bose US Patent 8,245,295, 2012 | 58 | 2012 |
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ... US Patent 9,832,217, 2017 | 56 | 2017 |
Attack-tolerant time-synchronization in wireless sensor networks X Hu, T Park, KG Shin IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 41-45, 2008 | 44 | 2008 |
Method and apparatus for modeling computer program behaviour for behavioural detection of malicious program T Park, KG Shin, X Hu, A Bose US Patent 8,713,680, 2014 | 41 | 2014 |
Measurement and analysis of global IP-usage patterns of fast-flux botnets X Hu, M Knysz, KG Shin 2011 Proceedings IEEE INFOCOM, 2633-2641, 2011 | 41 | 2011 |
Android malware clustering through malicious payload mining Y Li, J Jang, X Hu, X Ou International symposium on research in attacks, intrusions, and defenses …, 2017 | 39 | 2017 |