Articles with public access mandates - Xiaokui ShuLearn more
Available somewhere: 5
Fast Detection of Transformed Data Leaks
X Shu, J Zhang, D Yao, W Feng
IEEE Transactions on Information Forensics and Security (TIFS) 11 (3), 528-542, 2016
Mandates: US National Science Foundation
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Mandates: US Department of Defense
Long-span program behavior modeling and attack detection
X Shu, D Yao, N Ramakrishnan, T Jaeger
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-28, 2017
Mandates: US Department of Defense
RAPID: real-time alert investigation with context-aware prioritization for efficient threat discovery
Y Liu, X Shu, Y Sun, J Jang, P Mittal
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
Mandates: US Department of Defense
Rapid screening of big data against inadvertent leaks
X Shu, F Liu, D Yao
Big Data Concepts, Theories, and Applications, 193-235, 2016
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program