フォロー
Xiao Yu
Xiao Yu
Research Manager, Machine Learning & Security, Stellar Cyber
確認したメール アドレス: stellarcyber.ai - ホームページ
タイトル
引用先
引用先
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
2122020
CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs
X Yu, P Joshi, J Xu, G Jin, H Zhang, G Jiang
Proceedings of the Twenty-First International Conference on Architectural …, 2016
2072016
Heterogeneous Graph Matching Networks for Unknown Malware Detection
S Wang, Z Chen, X Yu, D Li, J Ni, LA Tang, J Gui, Z Li, H Chen, PS Yu
Proceedings of the Twenty-Eighth International Joint Conference on …, 2019
88*2019
Comprehending performance from real-world execution traces: A device-driver case
X Yu, S Han, D Zhang, T Xie
Proceedings of the 19th international conference on architectural support …, 2014
592014
{SIGL}: Securing software installations through deep graph learning
X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen
30th USENIX Security Symposium (USENIX Security 21), 2345-2362, 2021
482021
{SEAL}: Storage-efficient causality analysis on enterprise logs with query-friendly compression
P Fei, Z Li, Z Wang, X Yu, D Li, K Jee
30th USENIX Security Symposium (USENIX Security 21), 2987-3004, 2021
432021
Vessels: Efficient and scalable deep learning prediction on trusted processors
K Kim, CH Kim, JJ Rhee, X Yu, H Chen, D Tian, B Lee
Proceedings of the 11th ACM Symposium on Cloud Computing, 462-476, 2020
342020
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage
WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ...
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
302020
Adversarial defense framework for graph neural network
S Wang, Z Chen, J Ni, X Yu, Z Li, H Chen, PS Yu
arXiv preprint arXiv:1905.03679, 2019
302019
Test data generation for derived types in C program
Z Wang, X Yu, T Sun, G Pu, Z Ding, JL Hu
2009 Third IEEE International Symposium on Theoretical Aspects of Software …, 2009
292009
Database-access performance antipatterns in database-backed web applications
S Shao, Z Qiu, X Yu, W Yang, G Jin, T Xie, X Wu
2020 IEEE International Conference on Software Maintenance and Evolution …, 2020
222020
CloudSeer: using logs to detect errors in the cloud infrastructure
P Joshi, H Zhang, XU Jianwu, X Yu, G Jiang
US Patent 9,720,753, 2017
152017
The verification of rCOS using Spin
X Yu, Z Wang, G Pu, D Mao, J Liu
Electronic Notes in Theoretical Computer Science 207, 49-67, 2008
102008
Towards scalable compositional test generation
T Sun, Z Wang, G Pu, X Yu, Z Qiu, B Gu
2009 Ninth International Conference on Quality Software, 353-358, 2009
82009
Uncertainty-aware bootstrap learning for joint extraction on distantly-supervised data
Y Li, X Yu, Y Liu, H Chen, C Liu
arXiv preprint arXiv:2305.03827, 2023
72023
A parallel approach to concolic testing with low-cost synchronization
X Yu, S Sun, G Pu, S Jiang, Z Wang
Electronic Notes in Theoretical Computer Science 274, 83-96, 2011
62011
Dataflow Tunneling: Mining Inter-request Data Dependencies for Request-based Applications
X Yu, G Jin
Proceedings of the 40th International Conference on Software Engineering …, 2018
52018
Execution semantics for rCOS
Z Wang, X Yu, G Pu, L Feng, H Zhu, J He
2008 15th Asia-Pacific Software Engineering Conference, 119-126, 2008
42008
Securing software installation through deep graph learning
X Yu, X Han, D Li, J Rhee, H Chen
US Patent 11,321,066, 2022
32022
Run-time discovery of Java design patterns
K Miao, S Jiang, X Yu, J Zhao
2011 2nd International Conference on Artificial Intelligence, Management …, 2011
32011
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20