Selected publications

²     Xiaobo Ma, Bo An, Mengchen Zhao, Xiapu Luo, Lei Xue, Zhenhua Li, Tony Miu, Xiaohong Guan.Randomized Security Patrolling for Link Flooding Attack Detection. IEEE Transactions on Dependable and Secure Computing, 2018。(SCI, IF: 4.41)

²      Ma, XiaoboHe, YihuiLuo, XiapuLi, JianfengZhao, MengchenAn, BoGuan, XiaohongVehicle Traffic Driven Camera Placement for Better Metropolis Security SurveillanceIEEE Intelligent Systems2018(SCI, IF: 2.374)

²     Ma, XiaoboLi, Jianfeng, Tang, Yajuan,  An, Bo, Guan, Xiaohong.  Protecting Internet Infrastructure against Link Flooding Attacks: A Techno-Economic Perspective. Information Sciences, 2018(SCI, IF: 4.832)

 

²     Li, JianfengMa, XiaoboLi, GuodongLuo, XiapuZhang, JunjieLi, WeiGuan, XiaohongCan We Learn What People Are Doing from Raw DNS Queries? Computer Communications (INFOCOM), 2018 IEEE Conference onHonoluluUSA(CCF A, acceptance ratio 19%)

 

²     Xue, LeiMa, XiaoboLuo, XiapuChan, Edmond W.W.Miu, TungNgaiGu, GuofeiLinkScope: Towards Detecting Target Link Flooding AttacksIEEE Transactions on Information Forensics and Security (TIFS)2018。(SCI, IF: 4.332)

 

²     Xue, LeiMa, XiaoboLuo, XiapuYu, LeWang, ShuaiChen, TingIs What You Measure What You Expect? Factors Affecting Smartphone-Based Mobile Network MeasurementComputer Communications (INFOCOM), 2017 IEEE Conference on2017.5.12017.5.4AtlantaUSA(CCF A, acceptance rate 20.93%) 

 

²     Li, JianfengMa, XiaoboZhang, JunjieTao, Jing Wang, PinghuiGuan, XiaohongMining repeating pattern in packet arrivals: Metrics, models, and applicationsInformation Sciences20174081-22(SCI, IF: 4.832)

 

²     Ma, XiaoboZhang, JunjieLi, ZhenhuaLi, JianfengTao, JingGuan, XiaohongLui, John C.S.Towsley, DonAccurate DNS query characteristics estimation via active probingJournal of Network and Computer Applications20154772-84(SCI, IF: 3.5) 

 

²     Li, JianfengTao, JingMa, XiaoboZhang, JunjieGuan, XiaohongModeling repeating behaviors in packet arrivals: Detection and measurementComputer Communications (INFOCOM), 2015 IEEE Conference on2461-24692015.4.26-2015.5.1Hong Kong China(CCF A, acceptance rate 19%)  

 

²     Ma, XiaoboZhang, JunjieTao, JingLi, JianfengTian, JueGuan, XiaohongDNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache FootprintsIEEE Transaction on Information Forensics and Security2014911):1906-1921(SCI, IF: 4.332)

 

²    Zhao, ShuangLee, Patrick P.C.Lui, John C.S.Guan, XiaohongMa, XiaoboTao, Jing Cloud-based push-styled mobile botnets: A case study of exploiting the Cloud to Device Messaging service28th Annual Computer Security Applications Conference, ACSAC 2012119-1282012.12.3-2012.12.7Orlando, Florida, USA(CCF B, acceptance rate 19%) 

 

²   Book chapterHu, Wenjun, Ma, XiaoboLuo, Xiapu Protecting Android Apps against Reverse Engineering. Protecting Mobile Networks and Devices: Challenges and Solutions, CRC Press, 2016

 

版权所有:西安交通大学 站点设计:网络信息中心 陕ICP备05001571号 IPhone版本下载 IPhone版本下载    Android版本下载 Android版本下载
欢迎您访问我们的网站,您是第 位访客
推荐分辨率1024*768以上 推荐浏览器IE7 Fifefox 以上