Follow
Yibo Xue
Yibo Xue
Verified email at tsinghua.edu.cn
Title
Cited by
Cited by
Year
Droid-sec: deep learning in android malware detection
Z Yuan, Y Lu, Z Wang, Y Xue
Proceedings of the 2014 ACM conference on SIGCOMM, 371-372, 2014
6372014
Droiddetector: android malware characterization and detection using deep learning
Z Yuan, Y Lu, Y Xue
Tsinghua Science and Technology 21 (1), 114-123, 2016
5632016
Packet classification algorithms: From theory to practice
Y Qi, L Xu, B Yang, Y Xue, J Li
IEEE INFOCOM 2009, 648-656, 2009
2852009
A memory efficient multiple pattern matching architecture for network security
T Song, W Zhang, D Wang, Y Xue
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 166-170, 2008
1112008
An novel hybrid method for effectively classifying encrypted traffic
GL Sun, Y Xue, Y Dong, D Wang, C Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
1072010
Fine-grained android malware detection based on deep learning
D Li, Z Wang, Y Xue
2018 IEEE Conference on Communications and Network Security (CNS), 1-2, 2018
762018
Traffic classification: Issues and challenges
Y Xue, D Wang, L Zhang
2013 International Conference on Computing, Networking and Communications …, 2013
592013
Feacan: Front-end acceleration for content-aware network processing
Y Qi, K Wang, J Fong, Y Xue, J Li, W Jiang, V Prasanna
2011 Proceedings IEEE INFOCOM, 2114-2122, 2011
522011
LiveSec: Towards effective security management in large-scale production networks
K Wang, Y Qi, B Yang, Y Xue, J Li
2012 32nd International Conference on Distributed Computing Systems …, 2012
482012
A new rumor propagation model and control strategy on social networks
Y Bao, C Yi, Y Xue, Y Dong
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
472013
Hierarchical cache directory for CMP
SL Guo, HX Wang, YB Xue, CM Li, DS Wang
Journal of Computer Science and Technology 25 (2), 246-256, 2010
472010
Practical multituple packet classification using dynamic discrete bit selection
B Yang, J Fong, W Jiang, Y Xue, J Li
IEEE Transactions on Computers 63 (2), 424-434, 2012
422012
A3: automatic analysis of android malware
Z Luoshi, N Yan, W Xiao, W Zhaoguo, X Yibo
1st International Workshop on Cloud Computing and Information Security, 89-93, 2013
382013
DroidChain: A novel Android malware detection method based on behavior chains
Z Wang, C Li, Z Yuan, Y Guan, Y Xue
Pervasive and Mobile Computing 32, 3-14, 2016
352016
Characterizing application behaviors for classifying p2p traffic
D Wang, L Zhang, Z Yuan, Y Xue, Y Dong
2014 international conference on computing, networking and communications …, 2014
352014
Memory efficient string matching algorithm for network intrusion management system
J Yu, Y Xue, J Li
Tsinghua Science and Technology 12 (5), 585-593, 2007
322007
UTM-CM: A practical control mechanism solution for UTM system
Y Zhang, F Deng, Z Chen, Y Xue, C Lin
2010 International Conference on Communications and Mobile Computing 1, 86-90, 2010
272010
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
D Wang, L He, Y Xue, Y Dong
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
262012
A novel optimization method to improve de-duplication storage system performance
C Liu, Y Xue, D Ju, D Wang
2009 15th International Conference on Parallel and Distributed Systems, 228-235, 2009
252009
Para-snort: A multi-thread snort on multi-core ia platform
X Chen, Y Wu, L Xu, Y Xue, J Li
Proceedings of Parallel and Distributed Computing and Systems (PDCS), 2009
252009
The system can't perform the operation now. Try again later.
Articles 1–20