Vuldeepecker: A deep learning-based system for vulnerability detection Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong arXiv preprint arXiv:1801.01681, 2018 | 1100 | 2018 |
Sysevr: A framework for using deep learning to detect software vulnerabilities Z Li, D Zou, S Xu, H Jin, Y Zhu, Z Chen IEEE Transactions on Dependable and Secure Computing 19 (4), 2244-2258, 2021 | 666 | 2021 |
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data Q Zheng, S Xu, G Ateniese IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014 | 579 | 2014 |
A survey on ethereum systems security: Vulnerabilities, attacks, and defenses H Chen, M Pendleton, L Njilla, S Xu ACM Computing Surveys (CSUR) 53 (3), 1-43, 2020 | 565 | 2020 |
Key-insulated public key cryptosystems Y Dodis, J Katz, S Xu, M Yung Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 562 | 2002 |
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach S Zhu, S Xu, S Setia, S Jajodia 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 480 | 2003 |
Strong key-insulated signature schemes Y Dodis, J Katz, S Xu, M Yung Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002 | 340 | 2002 |
A survey on systems security metrics M Pendleton, R Garcia-Lebron, JH Cho, S Xu ACM Computing Surveys (CSUR) 49 (4), 1-35, 2016 | 326 | 2016 |
VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection D Zou, S Wang, S Xu, Z Li, H Jin IEEE Transactions on Dependable and Secure Computing 18 (5), 2224-2236, 2019 | 325 | 2019 |
Analyzing and exploiting network behaviors of malware JA Morales, A Al-Bataineh, S Xu, R Sandhu Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010 | 300 | 2010 |
Vulpecker: an automated vulnerability detection system based on code similarity analysis Z Li, D Zou, S Xu, H Jin, H Qi, J Hu Proceedings of the 32nd annual conference on computer security applications …, 2016 | 287 | 2016 |
Fair and dynamic proofs of retrievability Q Zheng, S Xu Proceedings of the first ACM conference on Data and application security and …, 2011 | 221 | 2011 |
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks S Zhu, S Xu, S Setia, S Jajodia 23rd International Conference on Distributed Computing Systems Workshops …, 2003 | 219 | 2003 |
Vuldeelocator: a deep learning-based fine-grained vulnerability detector Z Li, D Zou, S Xu, Z Chen, Y Zhu, H Jin IEEE Transactions on Dependable and Secure Computing 19 (4), 2821-2837, 2021 | 217 | 2021 |
Secure and efficient proof of storage with deduplication Q Zheng, S Xu Proceedings of the second ACM conference on Data and Application Security …, 2012 | 196 | 2012 |
Characterizing honeypot-captured cyber attacks: Statistical framework and case study Z Zhan, M Xu, S Xu IEEE Transactions on Information Forensics and Security 8 (11), 1775-1789, 2013 | 165 | 2013 |
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks S Zhu, S Setia, S Xu, S Jajodia Journal of Computer Security 14 (4), 301-325, 2006 | 158 | 2006 |
Modeling and predicting cyber hacking breaches M Xu, KM Schweitzer, RM Bateman, S Xu IEEE Transactions on Information Forensics and Security 13 (11), 2856-2871, 2018 | 143 | 2018 |
Predicting cyber attack rates with extreme values Z Zhan, M Xu, S Xu IEEE Transactions on Information Forensics and Security 10 (8), 1666-1677, 2015 | 136 | 2015 |
Cross-layer detection of malicious websites L Xu, Z Zhan, S Xu, K Ye Proceedings of the third ACM conference on Data and application security and …, 2013 | 131 | 2013 |