default search action
Xiao-chun Yun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j34]Lei Cui, Junnan Yin, Jiancong Cui, Yuede Ji, Peng Liu, Zhiyu Hao, Xiaochun Yun:
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification. IEEE Trans. Software Eng. 50(8): 2142-2162 (2024) - 2023
- [j33]Xiaochun Yun, Yipeng Wang, Yongzheng Zhang, Chen Zhao, Zijian Zhao:
Encrypted TLS Traffic Classification on Cloud Platforms. IEEE/ACM Trans. Netw. 31(1): 164-177 (2023) - 2022
- [j32]Xiaochun Yun, Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun:
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. Comput. Secur. 121: 102834 (2022) - [j31]Guangjun Wu, Xiaochun Yun, Yong Wang, Shupeng Wang, Binbin Li, Yong Liu:
A Sketching Approach for Obtaining Real-Time Statistics Over Data Streams in Cloud. IEEE Trans. Cloud Comput. 10(2): 1462-1475 (2022) - [j30]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Chen Zhao, Xin Liu:
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation. IEEE Trans. Netw. Serv. Manag. 19(2): 875-889 (2022) - [j29]Zhiyu Hao, Wei Wang, Lei Cui, Xiaochun Yun, Zhenquan Ding:
iConSnap: An Incremental Continuous Snapshots System for Virtual Machines. IEEE Trans. Serv. Comput. 15(1): 539-550 (2022) - 2021
- [j28]Yuwei Zeng, Xiaochun Yun, Xunxun Chen, Boquan Li, Haiwei Tsang, Yipeng Wang, Tianning Zang, Yongzheng Zhang:
Finding disposable domain names: A linguistics-based stacking approach. Comput. Networks 184: 107642 (2021) - [j27]Lei Cui, Zhiyu Hao, Yang Jiao, Haiqiang Fei, Xiaochun Yun:
VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison. IEEE Trans. Inf. Forensics Secur. 16: 2004-2017 (2021) - 2020
- [j26]Jiang Xie, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. Comput. Secur. 96: 101923 (2020) - [j25]Xiaochun Yun, Ji Huang, Yipeng Wang, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 15: 2225-2240 (2020) - [j24]Yaqiong Peng, Zhiyu Hao, Xiaochun Yun:
Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data. IEEE Trans. Parallel Distributed Syst. 31(9): 2220-2231 (2020) - 2019
- [j23]Rongrong Xi, Xiaochun Yun, Zhiyu Hao:
Framework for risk assessment in cyber situational awareness. IET Inf. Secur. 13(2): 149-156 (2019) - [j22]Chonghua Wang, Libo Yin, Jun Li, Xuehong Chen, Rongchao Yin, Xiaochun Yun, Yang Jiao, Zhiyu Hao:
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. EAI Endorsed Trans. Security Safety 5(18): e5 (2019) - [j21]Yaqiong Peng, Xiaochun Yun, Zhiyu Hao:
Fast Wait-Free Construction for Pool-Like Objects with Weakened Internal Order: Stacks as an Example. IEEE Trans. Parallel Distributed Syst. 30(7): 1596-1612 (2019) - 2018
- [j20]Lei Cui, Zhiyu Hao, Lun Li, Xiaochun Yun:
SnapFiner: A Page-Aware Snapshot System for Virtual Machines. IEEE Trans. Parallel Distributed Syst. 29(11): 2613-2626 (2018) - 2017
- [j19]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang:
Rethinking robust and accurate application protocol identification. Comput. Networks 129: 64-78 (2017) - [j18]Chonghua Wang, Zhiyu Hao, Lei Cui, Xiangyu Zhang, Xiaochun Yun:
Introspection-Based Memory Pruning for Live VM Migration. Int. J. Parallel Program. 45(6): 1298-1309 (2017) - [j17]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Guangjun Wu:
A nonparametric approach to the automated protocol fingerprint inference. J. Netw. Comput. Appl. 99: 1-9 (2017) - [j16]Lei Cui, Zhiyu Hao, Yaqiong Peng, Xiaochun Yun:
Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters. IEEE Trans. Parallel Distributed Syst. 28(8): 2328-2341 (2017) - 2016
- [j15]Kai Zhang, Xiao-chun Yun, Xiaoyu Zhang, Xiaobin Zhu, Chao Li, Shupeng Wang:
Weighted hierarchical geographic information description model for social relation estimation. Neurocomputing 216: 554-560 (2016) - [j14]Rongrong Xi, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang:
Quantitative threat situation assessment based on alert verification. Secur. Commun. Networks 9(13): 2135-2142 (2016) - [j13]Xiao-chun Yun, Yipeng Wang, Yongzheng Zhang, Yu Zhou:
A Semantics-Aware Approach to the Automated Network Protocol Identification. IEEE/ACM Trans. Netw. 24(1): 583-595 (2016) - 2015
- [j12]Xiaoyu Zhang, Shupeng Wang, Xiaobin Zhu, Xiao-chun Yun, Guangjun Wu, Yipeng Wang:
Update vs. upgrade: Modeling with indeterminate multi-class active learning. Neurocomputing 162: 163-170 (2015) - [j11]Xiao-chun Yun, Guangjun Wu, Guangyan Zhang, Keqin Li, Shupeng Wang:
FastRAQ: A Fast Approach to Range-Aggregate Queries in Big Data Environments. IEEE Trans. Cloud Comput. 3(2): 206-218 (2015) - [j10]Xiao-chun Yun, Shuhao Li, Yongzheng Zhang:
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation. IEEE Trans. Inf. Forensics Secur. 10(11): 2365-2380 (2015) - [j9]Xiaoyu Zhang, Shupeng Wang, Xiao-chun Yun:
Bidirectional Active Learning: A Two-Way Exploration Into Unlabeled and Labeled Data Set. IEEE Trans. Neural Networks Learn. Syst. 26(12): 3034-3044 (2015) - 2013
- [j8]Jinghua Yan, Xiao-chun Yun, Hao Luo, Zhi-Gang Wu, Shuzhuang Zhang:
Out-of-Sequence Traffic Classification Based on Improved Dynamic Time Warping. IEICE Trans. Inf. Syst. 96-D(11): 2354-2364 (2013) - 2011
- [j7]Bailan Feng, Juan Cao, Xiuguo Bao, Lei Bao, Yongdong Zhang, Shouxun Lin, Xiao-chun Yun:
Graph-based multi-space semantic correlation propagation for video retrieval. Vis. Comput. 27(1): 21-34 (2011) - 2009
- [j6]Shuzhuang Zhang, Hao Luo, Binxing Fang, Xiao-chun Yun:
Fast and Memory-Efficient Regular Expression Matching Using Transition Sharing. IEICE Trans. Inf. Syst. 92-D(10): 1953-1960 (2009) - 2008
- [j5]Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu:
An Effective Anomaly Detection Method in SMTP Traffic. Int. J. Netw. Secur. 6(3): 321-330 (2008) - [j4]Zhiyu Hao, Xiao-chun Yun, Hongli Zhang:
An Efficient Routing Mechanism in Network Simulation. Simul. 84(10-11): 511-520 (2008) - 2007
- [j3]Ping Wang, Binxing Fang, Xiao-chun Yun, Jun Zheng:
A User-Habit Property: Haunting of Users in IP Networks. IEICE Trans. Inf. Syst. 90-D(1): 371-373 (2007) - [j2]Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng:
How to construct secure proxy cryptosystem. Inf. Sci. 177(19): 4095-4108 (2007) - [j1]Shupeng Wang, Xiao-chun Yun, Xiang-Zhan Yu:
Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow Applications. J. Inf. Sci. Eng. 23(4): 1299-1313 (2007)
Conference and Workshop Papers
- 2022
- [c84]Zhenyu Cheng, Xiaochun Yun, Shuhao Li, Jinbu Geng, Rui Qin, Li Fan:
DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph. ICCS (1) 2022: 345-359 - 2020
- [c83]Xiaolin Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network. ICCS (3) 2020: 282-296 - [c82]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Chengwei Peng:
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. ICCS (3) 2020: 379-398 - [c81]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Zhenyu Cheng:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks. ISCC 2020: 1-7 - 2019
- [c80]Guangjun Wu, Xiaochun Yun, Shupeng Wang, Ge Fu, Chao Li, Yong Liu, Binbin Li, Yong Wang, Zhihui Zhao:
Accelerating Real-Time Tracking Applications over Big Data Stream with Constrained Space. DASFAA (1) 2019: 3-18 - [c79]Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection. IPCCC 2019: 1-8 - [c78]Zhicheng Liu, Xiaochun Yun, Yongzheng Zhang, Yipeng Wang:
CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection. TrustCom/BigDataSE 2019: 136-143 - [c77]Jia Li, Xiaochun Yun, Mao Tian, Jiang Xie, Shuhao Li, Yongzheng Zhang, Yu Zhou:
A Method of HTTP Malicious Traffic Detection on Mobile Networks. WCNC 2019: 1-8 - 2018
- [c76]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper). CollaborateCom 2018: 222-232 - [c75]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data. CollaborateCom 2018: 488-503 - [c74]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:
Community Discovery of Attribution Trace Based on Deep Learning Approach. ICICS 2018: 342-357 - [c73]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. ICICS 2018: 685-695 - 2017
- [c72]Chonghua Wang, Zhiyu Hao, Xiaochun Yun:
NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment. Inscrypt 2017: 500-517 - [c71]Guangjun Wu, Xiao-chun Yun, Chao Li, Shupeng Wang, Yipeng Wang, Xiaoyu Zhang, Siyu Jia, Guangyan Zhang:
Supporting Real-Time Analytic Queries in Big and Fast Data Environments. DASFAA (2) 2017: 477-493 - [c70]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
Mining Users' Important Locations and Semantics on Cellular Network Data. DSC 2017: 283-291 - [c69]Yong Wang, Xiaochun Yun, Xi Wang, Shupeng Wang, Yongshang Wu:
Efficient Data Blocking and Skipping Framework Applying Heuristic Rules. ICPADS 2017: 206-214 - [c68]Yong Wang, Xiaochun Yun, Xi Wang, Shupeng Wang, Yongshang Wu:
LBFM: Multi-Dimensional Membership Index for Block-Level Data Skipping. ISPA/IUCC 2017: 343-351 - [c67]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches. NAS 2017: 1-10 - [c66]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
NSIM: A robust method to discover similar trajectories on cellular network location data. PIMRC 2017: 1-7 - [c65]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
MSTM: A novel map matching approach for low-sampling-rate trajectories. PIMRC 2017: 1-7 - [c64]Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao:
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. SecureComm 2017: 778-792 - [c63]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao:
Discovering Malicious Domains through Alias-Canonical Graph. TrustCom/BigDataSE/ICESS 2017: 225-232 - [c62]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng:
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis. TrustCom/BigDataSE/ICESS 2017: 691-698 - 2016
- [c61]Yong Wang, Xiao-chun Yun, Shupeng Wang, Xi Wang:
A Compact In-memory Index for Managing Set Membership Queries on Streaming Data. BigCom 2016: 88-98 - [c60]Rongrong Xi, Xiaochun Yun, Zhiyu Hao:
Study on Address Blocks with Inaccurate Geolocations of China's Internet. HPCC/SmartCity/DSS 2016: 438-442 - [c59]Xiaoyu Zhang, Kai Zhang, Xiao-chun Yun, Shupeng Wang, Xiuguo Bao, Qingsheng Yuan:
Location-based correlation estimation in social network via Collaborative Learning. INFOCOM Workshops 2016: 1073-1074 - [c58]Kai Zhang, Xiao-chun Yun, Jiguang Liang, Xiaoyu Zhang, Chao Li, Bin Tian:
Retweeting behavior prediction using probabilistic matrix factorization. ISCC 2016: 1185-1192 - [c57]Yanchen Qiao, Xiaochun Yun, Yongzheng Zhang:
How to Automatically Identify the Homology of Different Malware. Trustcom/BigDataSE/ISPA 2016: 929-936 - [c56]Yanchen Qiao, Xiaochun Yun, Yongzheng Zhang:
Fast Reused Function Retrieval Method Based on Simhash and Inverted Index. Trustcom/BigDataSE/ISPA 2016: 937-944 - 2015
- [c55]Chonghua Wang, Xiao-chun Yun, Zhiyu Hao, Lei Cui, Yandong Han, Qingxin Zou:
Exploring Efficient and Robust Virtual Machine Introspection Techniques. ICA3PP (3) 2015: 429-448 - [c54]Shupeng Wang, Xiaoyu Zhang, Xiao-chun Yun, Guangjun Wu:
Joint Recovery and Representation Learning for Robust Correlation Estimation Based on Partially Observed Data. ICDM Workshops 2015: 925-931 - [c53]Yipeng Wang, Xiao-chun Yun, Yongzheng Zhang:
Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach. ICNP 2015: 134-144 - 2014
- [c52]Chao Li, Shupeng Wang, Xiao-chun Yun, Xiaoyang Zhou, Guangjun Wu:
MMD: An Approach to Improve Reading Performance in Deduplication Systems. NAS 2014: 93-97 - 2013
- [c51]Qingxin Zou, Zhiyu Hao, Xu Cui, Xiao-chun Yun, Yongzheng Zhang:
Counting sort for the live migration of virtual machines. CLUSTER 2013: 1-5 - 2012
- [c50]Yong Wang, Xiao-chun Yun, Yongzheng Zhang, Shuyuan Jin, Yanchen Qiao:
Research of Network Vulnerability Analysis Based on Attack Capability Transfer. CIT 2012: 38-44 - [c49]Yong Wang, Xiao-chun Yun, Yao Yao, Gang Xiong, Zhen Li:
Traffic Measurement Based DNSSEC Analysis. CIT 2012: 62-69 - [c48]Jinghua Yan, Xiao-chun Yun, Zhi-Gang Wu, Hao Luo, Shuzhuang Zhang:
A novel weighted combination technique for traffic classification. CCIS 2012: 757-761 - [c47]Yong Wang, Xiaochun Yun, Gang Xiong, Zhen Li, Yao Yao:
Availability analysis of DNSSEC resolution and validation service. CHINACOM 2012: 35-42 - [c46]Yipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao, Yongzheng Zhang, Li Guo:
A semantics aware approach to automated reverse engineering unknown protocols. ICNP 2012: 1-10 - [c45]Yongzheng Zhang, Xiaochun Yun:
Modeling of Hierarchical Index System for Network Operation Security. ISCTCS 2012: 580-590 - [c44]Shicong Li, Xiao-chun Yun, Yongzheng Zhang, Jun Xiao, Yipeng Wang:
A General Framework of Trojan Communication Detection Based on Network Traces. NAS 2012: 49-58 - [c43]Jinghua Yan, Xiao-chun Yun, Zhi-Gang Wu, Hao Luo, Shuzhuang Zhang, Shuyuan Jin, Zhibin Zhang:
Online Traffic Classification Based on Co-training Method. PDCAT 2012: 391-397 - [c42]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. SEC 2012: 261-272 - 2011
- [c41]Rongrong Xi, Xiao-chun Yun, Shuyuan Jin, Yongzheng Zhang:
Network Threat Assessment Based on Alert Verification. PDCAT 2011: 30-34 - [c40]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Xiang Cui, Yipeng Wang:
A Propagation Model for Social Engineering Botnets in Social Networks. PDCAT 2011: 423-426 - [c39]Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang:
CNSSA: A Comprehensive Network Security Situation Awareness System. TrustCom 2011: 482-487 - 2010
- [c38]Wei-ling Chang, Binxing Fang, Xiao-chun Yun, Shupeng Wang, Xiang-Zhan Yu:
A Pseudo-Random Number Generator Based on LZSS. DCC 2010: 524 - [c37]Jinghua Yan, Xiao-chun Yun, Peng Zhang, Jianlong Tan, Li Guo:
A New Weighted Ensemble Model for Detecting DoS Attack Streams. Web Intelligence/IAT Workshops 2010: 227-230 - [c36]Tianning Zang, Xiao-chun Yun, Tianyi Zang, Yongzheng Zhang, Chaoguang Men:
Cooperative Work Systems for the Security of Digital Computing Infrastructure. ICPADS 2010: 676-681 - [c35]Weifu Du, Songbo Tan, Xueqi Cheng, Xiao-chun Yun:
Adapting information bottleneck method for automatic construction of domain-oriented sentiment lexicon. WSDM 2010: 111-120 - 2009
- [c34]Wei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang:
The Block LZSS Compression Algorithm. DCC 2009: 439 - [c33]Shuyuan Jin, Yong Wang, Xiang Cui, Xiao-chun Yun:
A review of classification methods for network vulnerability. SMC 2009: 1171-1175 - 2008
- [c32]Yaoting Jiao, Mei Yang, Yingtao Jiang, Yulu Yang, Xiao-chun Yun:
Deadlock-Free Multi-Path Routing for Torus-Based NoCs. ITNG 2008: 253-258 - [c31]Shankar Neelkrishnan, Mei Yang, Yingtao Jiang, Lei Zhang, Yulu Yang, Enyue Lu, Xiao-chun Yun:
Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCs. ITNG 2008: 259-264 - [c30]Tianning Zang, Xiao-chun Yun, Yongzheng Zhang:
A Survey of Alert Fusion Techniques for Security Incident. WAIM 2008: 475-481 - [c29]Dai Lei, Xiaochun Yun, Xiao Jun:
Optimizing Traffic Classification Using Hybrid Feature Selection. WAIM 2008: 520-525 - [c28]Guangjun Wu, Xiao-chun Yun, Shupeng Wang:
Design and Implementation of Multi-Version Disk Backup Data Merging Algorithm. WAIM 2008: 526-531 - [c27]Wei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li:
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme. WAIM 2008: 558-563 - 2007
- [c26]Bing Wu, Xiao-chun Yun, Xiang Cui:
Study on Worm Poisoning Technology. ITNG 2007: 65-70 - [c25]Yong Wang, Xiao-chun Yun, Yifei Li:
Analyzing the Characteristics of Gnutella Overlays. ITNG 2007: 1095-1100 - [c24]Dai Lei, Chen You, Xiaochun Yun:
Optimizing IP Flow Classification Using Feature Selection. PDCAT 2007: 39-45 - [c23]Shupeng Wang, Jianping Wang, Mei Yang, Xiao-chun Yun, Yingtao Jiang:
Handover Cost Optimization in Traffic Management for Multi-homed Mobile Networks. UIC 2007: 295-308 - 2006
- [c22]Wu Yang, Xiao-chun Yun, Jianhua Li:
An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers. APWeb Workshops 2006: 835-841 - [c21]Ping Wang, Binxing Fang, Xiao-chun Yun:
A User Habit Based Approach to Detect and Quarantine Worms. ICC 2006: 2148-2152 - [c20]Chen Bo, Binxing Fang, Xiao-chun Yun:
Adaptive Method for Monitoring Network and Early Detection of Internet Worms. ISI 2006: 178-189 - [c19]Hao Luo, Binxing Fang, Xiao-chun Yun:
A Counting-Based Method for Massive Spam Mail Classification. ISPEC 2006: 45-56 - [c18]Ping Wang, Binxing Fang, Xiao-chun Yun:
Model and Estimation of Worm Propagation Under Network Partition. ISPEC 2006: 57-66 - [c17]Hao Luo, Binxing Fang, Xiao-chun Yun:
Anomaly Detection in SMTP Traffic. ITNG 2006: 408-413 - [c16]Zhiyu Hao, Xiao-chun Yun, Hongli Zhang:
An Efficient Routing Mechanism in Network Simulation. PADS 2006: 150-157 - 2005
- [c15]Wu Yang, Xiao-chun Yun, Yongtian Yang:
Using Boosting Learning Method for Intrusion Detection. ADMA 2005: 634-641 - [c14]Ping Wang, Binxing Fang, Xiao-chun Yun:
A New User-Habit Based Approach for Early Warning of Worms. CIS (2) 2005: 212-219 - [c13]Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun:
Assessment of Windows System Security Using Vulnerability Relationship Graph. CIS (2) 2005: 415-420 - [c12]Bailing Wang, Binxing Fang, Xiao-chun Yun:
A Worm Behavioral Approach to Susceptible Host Detection. GCC 2005: 77-83 - [c11]Yi-xuan Liu, Xiao-chun Yun, Bailing Wang, Hai-bin Sun:
An Anti-worm with Balanced Tree Based Spreading Strategy. ICMLC 2005: 652-661 - [c10]Yang Wu, Xiao-chun Yun:
A High-Performance Network Monitoring Platform for Intrusion Detection. ICOIN 2005: 52-61 - [c9]Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang:
Computer Vulnerability Evaluation Using Fault Tree Analysis. ISPEC 2005: 302-313 - [c8]Ping Wang, Binxing Fang, Xiao-chun Yun:
A New Approach to Automatically Detect Worms. PDCAT 2005: 259-263 - [c7]Yi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen:
Worm Detection in Large Scale Network by Traffic. PDCAT 2005: 270-273 - [c6]Wu Yang, Xiao-chun Yun, Jian-Hua Li:
An Improved Network Intrusion Detection Method based on VQ-SVM. IASTED PDCS 2005: 583-587 - [c5]Xiang-Zhan Yu, Xiao-chun Yun, Shupeng Wang:
Implementation of a Dynamic Failover Technology. PDPTA 2005: 339-345 - 2004
- [c4]Shupeng Wang, Xiao-chun Yun:
An improved failure detector based on pull and push approach. Communications, Internet, and Information Technology 2004: 161-167 - [c3]Yongzheng Zhang, Xiao-chun Yun:
A New Vulnerability Taxonomy Based on Privilege Escalation. ICEIS (3) 2004: 596-600 - [c2]Zhihong Tian, Binxing Fang, Xiao-chun Yun:
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method. Web Intelligence 2004: 24-28 - 2003
- [c1]Xiuguo Bao, Ming-Zheng Hu, Xiao-chun Yun, Ri Ding:
Anti-Sniffing in Unbounded Networks. ICWI 2003: 580-586
Editorship
- 2019
- [e1]Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou:
Cyber Security - 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers. Communications in Computer and Information Science 970, Springer 2019, ISBN 978-981-13-6620-8 [contents]
Informal and Other Publications
- 2024
- [i5]Wei Peng, Junmei Ding, Wei Wang, Lei Cui, Wei Cai, Zhiyu Hao, Xiaochun Yun:
CTISum: A New Benchmark Dataset For Cyber Threat Intelligence Summarization. CoRR abs/2408.06576 (2024) - 2023
- [i4]Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A method based on hierarchical spatiotemporal features for trojan traffic detection. CoRR abs/2309.01174 (2023) - [i3]Jiang Xie, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics. CoRR abs/2309.03724 (2023) - [i2]Xiaochun Yun, Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun:
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. CoRR abs/2309.03739 (2023) - 2010
- [i1]Wei-ling Chang, Binxing Fang, Xiao-chun Yun, Shupeng Wang, Xiang-Zhan Yu:
Randomness Testing of Compressed Data. CoRR abs/1001.3485 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint