Follow
Haitao Xu
Title
Cited by
Cited by
Year
E-commerce reputation manipulation: The emergence of reputation-escalation-as-a-service
H Xu, D Liu, H Wang, A Stavrou
International Conference on World Wide Web (WWW), 1296-1306, 2015
872015
RiskCog: Unobtrusive real-time user authentication on mobile devices in the wild
T Zhu, Z Qu, H Xu, J Zhang, Z Shao, Y Chen, S Prabhakar, J Yang
IEEE Transactions on Mobile Computing (TMC), 2019
642019
Click fraud detection on the advertiser side
H Xu, D Liu, A Koehl, H Wang, A Stavrou
European Symposium on Research in Computer Security (ESORICS), 419-438, 2014
512014
UISCOPE: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications
R Yang, S Ma, H Xu, X Zhang, Y Chen
In Proc. of the Symposium on Network and Distributed System Security (NDSS), 2020
372020
An Investigation into Android In-App Ad Practice: Implications for App Developers
B He, H Xu, L Jin, G Guo, Y Chen, G Weng
IEEE International Conference on Computer Communications (INFOCOM), 2018
242018
Internet Protocol Cameras with No Password Protection: An Empirical Investigation
H Xu, F Xu, B Chen
International Conference on Passive and Active Network Measurement (PAM), 47-59, 2018
212018
Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace
H Xu, Z Li, C Chu, Y Chen, Y Yang, H Lu, H Wang, A Stavrou
European Symposium on Research in Computer Security (ESORICS), 143-163, 2018
192018
SnWF: website fingerprinting attack by ensembling the snapshot of deep learning
Y Wang, H Xu, Z Guo, Z Qin, K Ren
IEEE Transactions on Information Forensics and Security 17, 1214-1226, 2022
182022
Privacy risk assessment on online photos
H Xu, H Wang, A Stavrou
International Symposium on Research in Attacks, Intrusions and Defenses …, 2015
162015
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows
R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ...
IEEE Transactions on Dependable and Secure Computing (TDSC), 2020
142020
MAdLens: Investigating into Android In-App Ad Practice at API Granularity
L Jin, B He, G Weng, H Xu, Y Chen, G Guo
IEEE Transactions on Mobile Computing (TMC), 2019
132019
An empirical investigation of ecommerce-reputation-escalation-as-a-service
H Xu, D Liu, H Wang, A Stavrou
ACM Transactions on the Web (TWEB) 11 (2), 1-35, 2017
112017
A large-scale pretrained deep model for phishing url detection
Y Wang, W Zhu, H Xu, Z Qin, K Ren, W Ma
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
92023
Privacy Risk Assessment on Email Tracking
H Xu, S Hao, A Sari, H Wang
IEEE International Conference on Computer Communications (INFOCOM), 2018
92018
A lightweight multi-view learning approach for phishing attack detection using transformer with mixture of experts
Y Wang, W Ma, H Xu, Y Liu, P Yin
Applied Sciences 13 (13), 7429, 2023
72023
CMD: Co-analyzed IoT Malware Detection and Forensics via Network and Hardware Domains
Z Zhao, Z Li, J Yu, F Zhang, X Xie, H Xu, B Chen
IEEE Transactions on Mobile Computing, 2023
32023
A study of the partnership between advertisers and publishers
W Ma, H Xu
Passive and Active Measurement: 22nd International Conference, PAM 2021 …, 2021
22021
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events
Z Li, Y Wei, X Shen, L Wang, Y Chen, H Xu, S Ji, F Zhang
arXiv preprint arXiv:2403.12541, 2024
2024
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining
X Ling, J Yu, Z Zhao, Z Zhou, H Xu, B Chen, F Zhang
International Conference on Applied Cryptography and Network Security, 283-309, 2024
2024
URLBERT: A Contrastive and Adversarial Pre-trained Model for URL Classification
Y Li, Y Wang, H Xu, Z Guo, Z Cao, L Zhang
arXiv preprint arXiv:2402.11495, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20