Xuxian Jiang [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. FinancialCryptographyandDataSecurity-2020 - Sabah, Malaysia
Design and Implementation of an Android Host-based Intrusion Prevention System ACSAC-2014 - new orleans,usa
Enabling Trusted Data-Intensive Execution in Cloud Computing CNS-2014 - san francisco,usa
Owner-centric Protection of Unstructured Data on Smartphones Trust-2014 - Crete,Greece
DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform CODASPY-2014 - San Antonio, USA
AirBag: Boosting Smartphone Resistance to Malware Infection NDSS-2014 - San Diego,USA
Fast, Scalable Detection of "Piggybacked" Mobile Applications Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA
Process Out-Grafting: An Efficient Out-of-VM Approach for Fine-Grained Process Execution Monitoring Confrence-on-computer-communications-security-2011 - Chicago, USA
Billing Attacks On Sip-Based Voip Systems 1st USENIX Workshop on Offensive Technologies-2007 - Boston, USA Security
Collapsar: A Vm-Based Architecture For Network Attack Detention Center 13th USENIX Security Symposium-2004 - San Diego, USA Security