Anomaly Based Web Phishing Page Detection
Pan, Ying, Ding, Xuhua
Published in 2006 22nd Annual Computer Security Applications Conference (ACSAC'06) (01.12.2006)
Published in 2006 22nd Annual Computer Security Applications Conference (ACSAC'06) (01.12.2006)
Get full text
Conference Proceeding
A Hybrid Scheme for Authenticating Scalable Video Codestreams
Zhuo Wei, Yongdong Wu, Deng, Robert H., Xuhua Ding
Published in IEEE transactions on information forensics and security (01.04.2014)
Published in IEEE transactions on information forensics and security (01.04.2014)
Get full text
Journal Article
Efficient block-based transparent encryption for H.264/SVC bitstreams
Deng, Robert Huijie, Ding, Xuhua, Wu, Yongdong, Wei, Zhuo
Published in Multimedia systems (01.03.2014)
Published in Multimedia systems (01.03.2014)
Get full text
Journal Article
Database Access Pattern Protection Without Full-Shuffles
Xuhua Ding, Yanjiang Yang, Deng, Robert H
Published in IEEE transactions on information forensics and security (01.03.2011)
Published in IEEE transactions on information forensics and security (01.03.2011)
Get full text
Journal Article
Tuning On-Air Signatures for Balancing Performance and Confidentiality
Zheng, Baihua, Lee, Wang-Chien, Liu, Peng, Lee, Dik Lun, Ding, Xuhua
Published in IEEE transactions on knowledge and data engineering (01.12.2009)
Published in IEEE transactions on knowledge and data engineering (01.12.2009)
Get full text
Journal Article
On Trustworthiness of CPU Usage Metering and Accounting
Mei Liu, Xuhua Ding
Published in 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops (01.06.2010)
Published in 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops (01.06.2010)
Get full text
Conference Proceeding
Privacy-Preserving Querying in Sensor Networks
De Cristofaro, E., Xuhua Ding, Tsudik, G.
Published in 2009 Proceedings of 18th International Conference on Computer Communications and Networks (01.08.2009)
Published in 2009 Proceedings of 18th International Conference on Computer Communications and Networks (01.08.2009)
Get full text
Conference Proceeding
Concretely Mapped Symbolic Memory Locations for Memory Error Detection
Tu, Haoxin, Jiang, Lingxiao, Hong, Jiaqi, Ding, Xuhua, Jiang, He
Published in IEEE transactions on software engineering (01.07.2024)
Published in IEEE transactions on software engineering (01.07.2024)
Get full text
Journal Article
Smile: Secure Memory Introspection for Live Enclave
Zhou, Lei, Ding, Xuhua, Zhang, Fengwei
Published in 2022 IEEE Symposium on Security and Privacy (SP) (01.05.2022)
Published in 2022 IEEE Symposium on Security and Privacy (SP) (01.05.2022)
Get full text
Conference Proceeding
Hardware-Assisted Live Kernel Function Updating on Intel Platforms
Zhou, Lei, Zhang, Fengwei, Leach, Kevin, Ding, Xuhua, Ning, Zhenyu, Wang, Guojun, Xiao, Jidong
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Get full text
Journal Article
Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions
Su, Chao, Ding, Xuhua, Zeng, Qingkai
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01.06.2021)
Published in 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (01.06.2021)
Get full text
Conference Proceeding
A Coprocessor-Based Introspection Framework Via Intel Management Engine
Zhou, Lei, Zhang, Fengwei, Xiao, Jidong, Leach, Kevin, Weimer, Westley, Ding, Xuhua, Wang, Guojun
Published in IEEE transactions on dependable and secure computing (01.07.2021)
Published in IEEE transactions on dependable and secure computing (01.07.2021)
Get full text
Journal Article
Secure server-aided top-k monitoring
Wang, Yujue, Pang, HweeHwa, Yang, Yanjiang, Ding, Xuhua
Published in Information sciences (01.12.2017)
Published in Information sciences (01.12.2017)
Get full text
Journal Article