Segueix
Yibo Xue
Yibo Xue
Correu electrònic verificat a tsinghua.edu.cn
Títol
Citada per
Citada per
Any
Droid-sec: deep learning in android malware detection
Z Yuan, Y Lu, Z Wang, Y Xue
Proceedings of the 2014 ACM conference on SIGCOMM, 371-372, 2014
5972014
Droiddetector: android malware characterization and detection using deep learning
Z Yuan, Y Lu, Y Xue
Tsinghua Science and Technology 21 (1), 114-123, 2016
5112016
Packet classification algorithms: From theory to practice
Y Qi, L Xu, B Yang, Y Xue, J Li
IEEE INFOCOM 2009, 648-656, 2009
2662009
A memory efficient multiple pattern matching architecture for network security
T Song, W Zhang, D Wang, Y Xue
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 166-170, 2008
1122008
An novel hybrid method for effectively classifying encrypted traffic
GL Sun, Y Xue, Y Dong, D Wang, C Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
1012010
Fine-grained android malware detection based on deep learning
D Li, Z Wang, Y Xue
2018 IEEE Conference on Communications and Network Security (CNS), 1-2, 2018
692018
Traffic classification: Issues and challenges
Y Xue, D Wang, L Zhang
2013 International Conference on Computing, Networking and Communications …, 2013
542013
Feacan: Front-end acceleration for content-aware network processing
Y Qi, K Wang, J Fong, Y Xue, J Li, W Jiang, V Prasanna
2011 Proceedings IEEE INFOCOM, 2114-2122, 2011
532011
LiveSec: Towards effective security management in large-scale production networks
K Wang, Y Qi, B Yang, Y Xue, J Li
2012 32nd International Conference on Distributed Computing Systems …, 2012
482012
Hierarchical cache directory for CMP
SL Guo, HX Wang, YB Xue, CM Li, DS Wang
Journal of Computer Science and Technology 25 (2), 246-256, 2010
452010
A new rumor propagation model and control strategy on social networks
Y Bao, C Yi, Y Xue, Y Dong
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
432013
Practical multituple packet classification using dynamic discrete bit selection
B Yang, J Fong, W Jiang, Y Xue, J Li
IEEE Transactions on Computers 63 (2), 424-434, 2012
402012
A3: automatic analysis of android malware
Z Luoshi, N Yan, W Xiao, W Zhaoguo, X Yibo
1st International Workshop on Cloud Computing and Information Security, 89-93, 2013
362013
DroidChain: A novel Android malware detection method based on behavior chains
Z Wang, C Li, Z Yuan, Y Guan, Y Xue
Pervasive and Mobile Computing 32, 3-14, 2016
342016
Characterizing application behaviors for classifying p2p traffic
D Wang, L Zhang, Z Yuan, Y Xue, Y Dong
2014 International Conference on Computing, Networking and Communications …, 2014
332014
Memory efficient string matching algorithm for network intrusion management system
J Yu, Y Xue, J Li
Tsinghua Science and Technology 12 (5), 585-593, 2007
322007
UTM-CM: A practical control mechanism solution for UTM system
Y Zhang, F Deng, Z Chen, Y Xue, C Lin
2010 International Conference on Communications and Mobile Computing 1, 86-90, 2010
262010
Para-snort: A multi-thread snort on multi-core ia platform
X Chen, Y Wu, L Xu, Y Xue, J Li
Proceedings of Parallel and Distributed Computing and Systems (PDCS), 2009
252009
MDH: A high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set
Z Zhou, Y Xue, J Liu, W Zhang, J Li
Information and Communications Security: 9th International Conference, ICICS …, 2007
252007
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
D Wang, L He, Y Xue, Y Dong
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
242012
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20