Shouhuai Xu - Publications

Affiliations: 
Computer Science The University of Texas at San Antonio, San Antonio, TX, United States 
Area:
Computer Science

34 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Chen H, Pendleton M, Njilla L, Xu S. A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses Acm Computing Surveys. 53: 1-43. DOI: 10.1145/3391195  0.324
2019 Mireles JD, Ficke E, Cho J, Hurley P, Xu S. Metrics Towards Measuring Cyber Agility Ieee Transactions On Information Forensics and Security. 14: 3217-3232. DOI: 10.1109/Tifs.2019.2912551  0.343
2018 Zheng R, Lu W, Xu S. Preventive and Reactive Cyber Defense Dynamics Is Globally Stable Ieee Transactions On Network Science and Engineering. 5: 156-170. DOI: 10.1109/Tnse.2017.2734904  0.333
2018 Xu M, Schweitzer KM, Bateman RM, Xu S. Modeling and Predicting Cyber Hacking Breaches Ieee Transactions On Information Forensics and Security. 13: 2856-2871. DOI: 10.1109/Tifs.2018.2834227  0.308
2018 Xu L, Lee J, Kim SH, Zheng Q, Xu S, Suh T, Ro WW, Shi W. Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment Ieee Transactions On Cloud Computing. 6: 478-491. DOI: 10.1109/Tcc.2015.2511728  0.54
2018 Dai W, Wan P, Qiang W, Yang LT, Zou D, Jin H, Xu S, Huang Z. TNGuard: Securing IoT Oriented Tenant Networks Based on SDN Ieee Internet of Things Journal. 5: 1411-1423. DOI: 10.1109/Jiot.2018.2801317  0.362
2018 Dai W, Du Y, Jin H, Qiang W, Zou D, Xu S, Liu Z. RollSec: Automatically Secure Software States Against General Rollback International Journal of Parallel Programming. 46: 788-805. DOI: 10.1007/S10766-017-0523-0  0.335
2017 Pendleton M, Garcia-Lebron R, Cho J, Xu S. A Survey on Systems Security Metrics Acm Computing Surveys. 49: 62. DOI: 10.1145/3005714  0.358
2017 Hu X, Xu M, Xu S, Zhao P. Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization Reliability Engineering & System Safety. 159: 119-133. DOI: 10.1016/J.Ress.2016.10.025  0.312
2017 Tyra A, Li J, Shang Y, Jiang S, Zhao Y, Xu S. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks Physica a-Statistical Mechanics and Its Applications. 482: 713-727. DOI: 10.1016/J.Physa.2017.04.078  0.341
2016 Huang F, Xu S, Ye Q, Zheng Q, Xu Y, Liu Q. [Construction of lentiviral vector of siRNA specific for γ-synuclein and its inhibition effect on colorectal carcinoma cell line SW1116]. Zhonghua Wei Chang Wai Ke Za Zhi = Chinese Journal of Gastrointestinal Surgery. 19: 446-52. PMID 27112482  0.403
2016 Peng C, Xu M, Xu S, Hu T. Modeling and predicting extreme cyber attack rates via marked point processes Journal of Applied Statistics. 44: 2534-2563. DOI: 10.1080/02664763.2016.1257590  0.355
2015 Zheng Q, Luo Q, Niu Z, Li H, Li B, Xu SS, Li Z. Variation in Chromosome Constitution of the Xiaoyan Series Partial Amphiploids and Its Relationship to Stripe Rust and Stem Rust Resistance. Journal of Genetics and Genomics = Yi Chuan Xue Bao. 42: 657-60. PMID 26674383 DOI: 10.1016/j.jgg.2015.08.004  0.414
2015 Chen YZ, Huang ZG, Xu S, Lai YC. Spatiotemporal patterns and predictability of cyberattacks. Plos One. 10: e0124472. PMID 25992837 DOI: 10.1371/Journal.Pone.0124472  0.321
2015 Li H, Fan R, Fu S, Wei B, Xu S, Feng J, Zheng Q, Wang X, Han F, Zhang X. Development of Triticum aestivum-Leymus mollis translocation lines and identification of resistance to stripe rust. Journal of Genetics and Genomics = Yi Chuan Xue Bao. 42: 129-32. PMID 25819090 DOI: 10.1016/j.jgg.2014.11.008  0.42
2015 Xu S, Zhao X, Zhao Q, Zheng Q, Fang Z, Yang X, Wang H, Liu P, Xu H. Wogonin prevents rat dorsal root ganglion neurons death via inhibiting tunicamycin-induced ER stress in vitro. Cellular and Molecular Neurobiology. 35: 389-98. PMID 25381475 DOI: 10.1007/s10571-014-0134-x  0.399
2015 Zhan Z, Xu M, Xu S. Predicting Cyber Attack Rates with Extreme Values Ieee Transactions On Information Forensics and Security. 10: 1666-1677. DOI: 10.1109/Tifs.2015.2422261  0.312
2015 Xu M, Da G, Xu S. Cyber epidemic models with dependences Internet Mathematics. 11: 62-92. DOI: 10.1080/15427951.2014.902407  0.355
2015 Dai W, Jin H, Zou D, Xu S, Zheng W, Shi L, Yang LT. TEE: A virtual DRTM based execution environment for secure cloud-end computing Future Generation Computer Systems. 49: 47-57. DOI: 10.1016/J.Future.2014.08.005  0.35
2014 Zheng Q, Lv Z, Niu Z, Li B, Li H, Xu SS, Han F, Li Z. Molecular cytogenetic characterization and stem rust resistance of five wheat-Thinopyrum ponticum partial amphiploids. Journal of Genetics and Genomics = Yi Chuan Xue Bao. 41: 591-9. PMID 25434682 DOI: 10.1016/j.jgg.2014.06.003  0.423
2013 Zhan Z, Xu M, Xu S. Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study Ieee Transactions On Information Forensics and Security. 8: 1775-1789. DOI: 10.1109/Tifs.2013.2279800  0.362
2012 Xu S, Lu W, Xu L. Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights Acm Transactions On Autonomous and Adaptive Systems. 7: 32. DOI: 10.1145/2348832.2348835  0.32
2012 Dai W, Parker TP, Jin H, Xu S. Enhancing Data Trustworthiness via Assured Digital Signing Ieee Transactions On Dependable and Secure Computing. 9: 838-851. DOI: 10.1109/Tdsc.2012.71  0.341
2012 Xu S, Lu W, Zhan Z. A Stochastic Model of Multivirus Dynamics Ieee Transactions On Dependable and Secure Computing. 9: 30-45. DOI: 10.1109/Tdsc.2011.33  0.341
2012 Xu M, Xu S. An Extended Stochastic Model for Quantitative Security Analysis of Networked Systems Internet Mathematics. 8: 288-320. DOI: 10.1080/15427951.2012.654480  0.352
2011 Xu S, Li X, Parker TP, Wang X. Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data Ieee Transactions On Information Forensics and Security. 6: 39-52. DOI: 10.1109/Tifs.2010.2093521  0.339
2011 Li X, Parker P, Xu S. A Stochastic Model for Quantitative Security Analyses of Networked Systems Ieee Transactions On Dependable and Secure Computing. 8: 28-43. DOI: 10.1109/Tdsc.2008.75  0.388
2010 Xu S. Toward a theoretical framework for trustworthy cyber sensing Proceedings of Spie. 7709: 770907. DOI: 10.1117/12.850156  0.305
2010 Qian H, Xu S. Non-interactive multisignatures in the plain public-key model with efficient verification Information Processing Letters. 111: 82-89. DOI: 10.1016/J.Ipl.2010.10.015  0.31
2009 Ding X, Tsudik G, Xu S. Leak-free mediated group signatures Journal of Computer Security. 17: 489-514. DOI: 10.3233/Jcs-2009-0342  0.323
2008 Xu S, Čapkun S. Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions Acm Transactions On Information and System Security. 12: 2. DOI: 10.1145/1410234.1410236  0.357
2006 Zhu S, Setia S, Xu S, Jajodia S. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks Journal of Computer Security. 14: 301-325. DOI: 10.3233/Jcs-2006-14401  0.336
1998 Xu S, Zhang G, Zhu H. On the security of three-party cryptographic protocols Operating Systems Review. 32: 7-20. DOI: 10.1145/281258.281261  0.351
1997 Xu S, Zhang G, Zhu H. On the properties of cryptographic protocols and the weaknesses of the BAN-like logics Operating Systems Review. 31: 12-23. DOI: 10.1145/271019.271023  0.342
Show low-probability matches.