Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. X Xiong, D Tian, P Liu NDSS 11, 2011 | 111 | 2011 |
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. D Tian, Q Zeng, D Wu, P Liu, C Hu NDSS, 2012 | 29 | 2012 |
Hierarchical distributed alert correlation model D Tian, H Changzhen, Y Qi, W Jianqiao 2009 Fifth International Conference on Information Assurance and Security 2 …, 2009 | 21 | 2009 |
A kernel rootkit detection approach based on virtualization and machine learning D Tian, R Ma, X Jia, C Hu IEEE Access 7, 91657-91666, 2019 | 18 | 2019 |
BinDeep: a deep learning approach to binary code similarity detection D Tian, X Jia, R Ma, S Liu, W Liu, C Hu Expert Systems with Applications 168, 114348, 2021 | 15 | 2021 |
E-WBM: An effort-based vulnerability discovery model X Wang, R Ma, B Li, D Tian, X Wang IEEE Access 7, 44276-44292, 2019 | 14 | 2019 |
Defeating buffer overflow attacks via virtualization D Tian, X Xiong, C Hu, P Liu Computers & Electrical Engineering 40 (6), 1940-1950, 2014 | 12 | 2014 |
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning D Tian, Q Ying, X Jia, R Ma, C Hu, W Liu Computer Networks 198, 108394, 2021 | 11 | 2021 |
MSYM: A multichannel communication system for android devices W Wang, D Tian, W Meng, X Jia, R Zhao, R Ma Computer Networks 168, 107024, 2020 | 11 | 2020 |
Semantic aware attribution analysis of remote exploits D Kong, D Tian, Q Pan, P Liu, D Wu Security and Communication Networks, 2012 | 10 | 2012 |
An Online Approach for Kernel-level Keylogger Detection and Defense. D Tian, X Jia, J Chen, C Hu J. Inf. Sci. Eng. 33 (2), 445-461, 2017 | 8 | 2017 |
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits D Kong, D Tian, P Liu, D Wu Security and Privacy in Communication Networks: 7th International ICST …, 2012 | 8 | 2012 |
Findevasion: an effective environment-sensitive malware detection system for the cloud X Jia, G Zhou, Q Huang, W Zhang, D Tian Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017 …, 2018 | 7 | 2018 |
A policy‐centric approach to protecting OS kernel from vulnerable LKMs D Tian, X Xiong, C Hu, P Liu Software: Practice and Experience 48 (6), 1269-1284, 2018 | 6 | 2018 |
Policy-centric protection of OS kernel from vulnerable loadable kernel modules D Tian, X Xiong, C Hu, P Liu Information Security Practice and Experience: 7th International Conference …, 2011 | 5 | 2011 |
CMFuzz: context-aware adaptive mutation for fuzzers X Wang, C Hu, R Ma, D Tian, J He Empirical Software Engineering 26, 1-34, 2021 | 4 | 2021 |
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning Q Ying, Y Yu, D Tian, X Jia, R Ma, C Hu Journal of Grid Computing 20 (3), 31, 2022 | 3 | 2022 |
Towards time evolved malware identification using two-head neural network C Yuan, J Cai, D Tian, R Ma, X Jia, W Liu Journal of Information Security and Applications 65, 103098, 2022 | 3 | 2022 |
KEcruiser: A novel control flow protection for kernel extensions D Tian, R Ma, X Jia, C Hu Future Generation Computer Systems 100, 1-9, 2019 | 3 | 2019 |
Software cruising: A new technology for building concurrent software monitor D Wu, P Liu, Q Zeng, D Tian Secure Cloud Computing, 303-324, 2014 | 3 | 2014 |