​
Login / Signup
Xin Hu
Publication Activity (10 Years)
Years Active: 2008-2018
Publications (10 Years): 13
Top Topics
Privacy Protection
Data Anonymization
Detecting Malicious
Lightweight
Top Venues
IBM J. Res. Dev.
INFOCOM
RAID
ICDE
</>
Publications
</>
Jialong Zhang
,
Jiyong Jang
,
Guofei Gu
,
Marc Ph. Stoecklin
,
Xin Hu
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
RAID
(2018)
Yuping Li
,
Jiyong Jang
,
Xin Hu
,
Xinming Ou
Android Malware Clustering through Malicious Payload Mining.
CoRR
(2017)
Shouling Ji
,
Shukun Yang
,
Anupam Das
,
Xin Hu
,
Raheem A. Beyah
Password correlation: Quantification, evaluation and application.
INFOCOM
(2017)
Yuping Li
,
Jiyong Jang
,
Xin Hu
,
Xinming Ou
Android Malware Clustering Through Malicious Payload Mining.
RAID
(2017)
Shouling Ji
,
Shukun Yang
,
Xin Hu
,
Weili Han
,
Zhigong Li
,
Raheem A. Beyah
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput.
14 (5) (2017)
Ting Wang
,
Xin Hu
,
Jiyong Jang
,
Shouling Ji
,
Marc Ph. Stoecklin
,
Teryl Taylor
BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
ICDCS
(2016)
Douglas Lee Schales
,
Jiyong Jang
,
Ting Wang
,
Xin Hu
,
Dhilung Kirat
,
B. Wuest
,
Marc Ph. Stoecklin
Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev.
60 (4) (2016)
Xin Hu
,
Jiyong Jang
,
Ting Wang
,
Zubair Ashraf
,
Marc Ph. Stoecklin
,
Dhilung Kirat
Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev.
60 (4) (2016)
Xin Hu
,
Jiyong Jang
,
Marc Ph. Stoecklin
,
Ting Wang
,
Douglas Lee Schales
,
Dhilung Kirat
,
Josyula R. Rao
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
DSN
(2016)
Marc Ph. Stoecklin
,
Kapil Singh
,
Larry Koved
,
Xin Hu
,
Suresh N. Chari
,
Josyula R. Rao
,
P.-C. Cheng
,
Mihai Christodorescu
,
Reiner Sailer
,
Douglas Lee Schales
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev.
60 (4) (2016)
Jialong Zhang
,
Xin Hu
,
Jiyong Jang
,
Ting Wang
,
Guofei Gu
,
Marc Ph. Stoecklin
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
INFOCOM
(2016)
Stefan Berger
,
Yangyi Chen
,
Xin Hu
,
Dimitrios E. Pendarakis
,
Josyula R. Rao
,
Reiner Sailer
,
Douglas Lee Schales
,
Marc Ph. Stoecklin
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev.
60 (4) (2016)
Teryl Taylor
,
Xin Hu
,
Ting Wang
,
Jiyong Jang
,
Marc Ph. Stoecklin
,
Fabian Monrose
,
Reiner Sailer
Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
CODASPY
(2016)
Wentao Huang
,
Ting Wang
,
Xin Hu
,
Jiyong Jang
,
Theodoros Salonidis
Rateless and pollution-attack-resilient network coding.
ISIT
(2015)
Douglas Lee Schales
,
Xin Hu
,
Jiyong Jang
,
Reiner Sailer
,
Marc Ph. Stoecklin
,
Ting Wang
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
ICDE
(2015)
Shouling Ji
,
Weiqing Li
,
Prateek Mittal
,
Xin Hu
,
Raheem A. Beyah
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
USENIX Security Symposium
(2015)
Ting Wang
,
Xin Hu
,
Shicong Meng
,
Reiner Sailer
Reconciling malware labeling discrepancy via consensus learning.
ICDE Workshops
(2014)
Ting Wang
,
Shicong Meng
,
Wei Gao
,
Xin Hu
Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing.
CIKM
(2014)
Xin Hu
,
Ting Wang
,
Marc Ph. Stoecklin
,
Douglas Lee Schales
,
Jiyong Jang
,
Reiner Sailer
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur.
2014 (2014)
Xin Hu
,
Ting Wang
,
Marc Ph. Stoecklin
,
Douglas Lee Schales
,
Jiyong Jang
,
Reiner Sailer
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
IEEE Symposium on Security and Privacy Workshops
(2014)
Yuzhe Richard Tang
,
Ling Liu
,
Ting Wang
,
Xin Hu
,
Reiner Sailer
,
Peter R. Pietzuch
Outsourcing multi-version key-value stores with verifiable data freshness.
ICDE
(2014)
Douglas Lee Schales
,
Mihai Christodorescu
,
Xin Hu
,
Jiyong Jang
,
Josyula R. Rao
,
Reiner Sailer
,
Marc Ph. Stoecklin
,
Wietse Z. Venema
,
Ting Wang
Stream computing for large-scale, multi-channel cyber threat analytics.
IRI
(2014)
Yuzhe Richard Tang
,
Ting Wang
,
Ling Liu
,
Xin Hu
,
Jiyong Jang
Lightweight authentication of freshness in outsourced key-value stores.
ACSAC
(2014)
Xin Hu
,
Kang G. Shin
,
Sandeep Bhatkar
,
Kent Griffin
MutantX-S: Scalable Malware Clustering Based on Static Features.
USENIX Annual Technical Conference
(2013)
Zhigang Chen
,
Xin Hu
,
Xiaoen Ju
,
Kang G. Shin
LISA: Location information ScrAmbler for privacy protection on smartphones.
CNS
(2013)
Xin Hu
,
Kang G. Shin
DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles.
ACSAC
(2013)
Matthew Knysz
,
Xin Hu
,
Yuanyuan Zeng
,
Kang G. Shin
Open WiFi networks: Lethal weapons for botnets?
INFOCOM
(2012)
Yuanyuan Zeng
,
Kang G. Shin
,
Xin Hu
Design of SMS commanded-and-controlled and P2P-structured mobile botnets.
WISEC
(2012)
Kang G. Shin
,
Xiaoen Ju
,
Zhigang Chen
,
Xin Hu
Privacy protection for users of location-based services.
IEEE Wirel. Commun.
19 (1) (2012)
Alexander W. Min
,
Kang G. Shin
,
Xin Hu
Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation.
IEEE Trans. Mob. Comput.
10 (10) (2011)
Xin Hu
,
Matthew Knysz
,
Kang G. Shin
Measurement and analysis of global IP-usage patterns of fast-flux botnets.
INFOCOM
(2011)
Matthew Knysz
,
Xin Hu
,
Kang G. Shin
Good guys vs. Bot Guise: Mimicry attacks against fast-flux detection systems.
INFOCOM
(2011)
Yuanyuan Zeng
,
Xin Hu
,
Kang G. Shin
Detection of botnets using combined host- and network-level information.
DSN
(2010)
Xin Hu
,
Tzi-cker Chiueh
,
Kang G. Shin
Large-scale malware indexing using function-call graphs.
CCS
(2009)
Alexander W. Min
,
Kang G. Shin
,
Xin Hu
Attack-Tolerant Distributed Sensing for Dynamic Spectrum Access Networks.
ICNP
(2009)
Kent Griffin
,
Scott Schneider
,
Xin Hu
,
Tzi-cker Chiueh
Automatic Generation of String Signatures for Malware Detection.
RAID
(2009)
Xin Hu
,
Matthew Knysz
,
Kang G. Shin
RB-Seeker: Auto-detection of Redirection Botnets.
NDSS
(2009)
Abhijit Bose
,
Xin Hu
,
Kang G. Shin
,
Taejoon Park
Behavioral detection of malware on mobile handsets.
MobiSys
(2008)
Yuanyuan Zeng
,
Xin Hu
,
Haixiong Wang
,
Kang G. Shin
,
Abhijit Bose
Containment of network worms via per-process rate-limiting.
SecureComm
(2008)
Xin Hu
,
Taejoon Park
,
Kang G. Shin
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks.
INFOCOM
(2008)