Name
Affiliation
Papers
SHOUHUAI XU
Department of Computer Science, University of Texas at San Antonio, USA
163
Collaborators
Citations 
PageRank 
229
1717
115.84
Referers 
Referees 
References 
3432
3224
2460
Search Limit
1001000
Title
Citations
PageRank
Year
Blockchain-based automated and robust cyber security management00.342022
Auditing a Software-Defined Cross Domain Solution Architecture00.342022
A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics.00.342021
ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks00.342021
Computational complexity characterization of protecting elections from bribery00.342021
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching00.342021
Hardness and Algorithms for Electoral Manipulation Under Media Influence00.342021
Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub00.342020
APIN: Automatic Attack Path Identification in Computer Networks00.342020
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites00.342020
Metrics Towards Measuring Cyber Agility50.452019
A Case Study on using Deep Learning for Network Intrusion Detection00.342019
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study00.342019
A deep learning framework for predicting cyber attacks rates.20.412019
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent10.352019
iDev - Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow.30.372019
Election with Bribe-Effect Uncertainty - A Dichotomy Result.00.342019
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment.00.342018
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.541.562018
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge.00.342018
Node Diversification in Complex Networks by Decentralized Coloring.00.342018
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples.10.352018
Quantifying the security effectiveness of firewalls and DMZs.00.342018
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities50.422018
Efficient Public Blockchain Client for Lightweight Users.00.342018
DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks.00.342018
Preventive and Reactive Cyber Defense Dynamics Is Globally Stable.80.472018
Multi-context features for detecting malicious programs.30.402018
A safety and security architecture for reducing accidents in intelligent transportation systems00.342018
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth.70.442018
Measuring Relative Accuracy Of Malware Detectors In The Absence Of Ground Truth00.342018
Characterizing The Effectiveness Of Network-Based Intrusion Detection Systems00.342018
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm00.342018
RollSec: Automatically Secure Software States Against General Rollback.10.352018
Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization.50.432017
A control flow graph-based signature for packer identification.00.342017
EPBC: Efficient Public Blockchain Client for lightweight users.00.342017
A Survey on Security Metrics.00.342016
Extracting attack narratives from traffic datasets00.342016
VulPecker: an automated vulnerability detection system based on code similarity analysis.240.782016
Spatiotemporal Patterns And Predictability Of Cyberattacks60.462016
Active cyber defense dynamics exhibiting rich phenomena90.572015
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.120.522015
A Characterization of Cybersecurity Posture from Network Telescope Data.110.472014
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy10.352014
Characterizing the power of moving target defense via cyber epidemic dynamics70.512014
A new approach to modeling and analyzing security of networked systems60.442014
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study250.912013
Cross-layer detection of malicious websites340.952013
Real-time detection and prevention of android SMS permission abuses50.422013
  • 1
  • 2