Cross-layer detection of malicious websites L Xu, Z Zhan, S Xu, K Ye Proceedings of the third ACM conference on Data and application security and …, 2013 | 123 | 2013 |
Adaptive epidemic dynamics in networks: Thresholds and control S Xu, W Lu, L Xu, Z Zhan ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8 (4), 1-19, 2014 | 111 | 2014 |
Push-and pull-based epidemic spreading in networks: Thresholds and deeper insights S Xu, W Lu, L Xu ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (3), 1-26, 2012 | 103 | 2012 |
An evasion and counter-evasion study in malicious websites detection L Xu, Z Zhan, S Xu, K Ye 2014 IEEE Conference on Communications and Network Security, 265-273, 2014 | 61 | 2014 |
Method and system for resilient and adaptive detection of malicious websites S Xu, L Xu, Z Zhan, K Ye, K Han, F Born US Patent App. 14/405,553, 2015 | 39 | 2015 |
Federated cloud security architecture for secure and agile clouds W Luo, L Xu, Z Zhan, Q Zheng, S Xu High performance cloud auditing and applications, 169-188, 2014 | 17 | 2014 |
Detecting and characterizing malicious websites L Xu The University of Texas at San Antonio, 2014 | 1 | 2014 |
Push-and Pull-based Epidemic Spreading in Networks: Thresholds and Deeper Insights S Xu, W Lu, L Xu arXiv preprint arXiv:1603.07425, 2016 | | 2016 |
Method and system for resilient and adaptive detection of malicious websites FB Shouhuai XU, Li Xu, Zhenxin ZHAN, Keying YE, Keesook HAN US Patent WO2013184653 A1, 2014 | | 2014 |
Adaptive Epidemic Dynamics in Networks: Thresholds and Control S Xu, W Lu, L Xu, Z Zhan arXiv preprint arXiv:1311.2180, 2013 | | 2013 |