Xiaokui Shu  Xiaokui Shu photo       

contact information

Research Staff Member
T. J. Watson Research Center, Yorktown Heights, NY USA

links



2017

Anomaly Detection as a Service: Challenges, Advances, and Opportunities
Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo
Synthesis Lectures on Information Security, Privacy, and Trust 9(3), 1--173, 2017

Long-Span Program Behavior Modeling and Attack Detection
Xiaokui Shu, Danfeng (Daphne) Yao, Naren Ramakrishnan, Trent Jaeger
ACM Transactions on Privacy and Security (TOPS) 20(4), 12:1--12:28, ACM, 2017


2016

Rapid Screening of Big Data Against Inadvertent Leaks
Xiaokui Shu, Fang Liu, Danfeng Yao
Big Data Concepts, Theories and Applications, pp. 193--235, Springer International Publishing, 2016

Fast Detection of Transformed Data Leaks
Xiaokui Shu, Jing Zhang, Danfeng Yao, Wu-chun Feng
IEEE Transactions on Information Forensics and Security (TIFS) 11(3), 528--542, 2016

DECT: Distributed Evolving Context Tree for Mining Web Behavior Evolution
Xiaokui Shu, Nikolay Laptev, Danfeng Yao
Proceedings of the 19th International Conference on Extending Database Technology (EDBT), pp. 573--579, 2016


2015

Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce
Fang Liu, Xiaokui Shu, Danfeng Yao, Ali Raza Butt
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 195--206, ACM, 2015

Profiling user-trigger dependence for Android malware detection
Karim O. Elish, Xiaokui Shu, Danfeng Yao, Barbara G. Ryder, Xuxian Jiang
Computers & Security49, 255--273, 2015

Rapid and Parallel Content Screening for Detecting Transformed Data Exposure
Xiaokui Shu, Jing Zhang, Danfeng Yao, Wu-chun Feng
Proceedings of the Third International Workshop on Security and Privacy in Big Data (BigSecurity), pp. 191--196, IEEE, 2015

Privacy-Preserving Detection of Sensitive Data Exposure
Xiaokui Shu, Danfeng Yao, Elisa Bertino
IEEE Transactions on Information Forensics and Security (TIFS) 10(5), 1092--1103, 2015

Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan
Proceedings of the 2015 ACM Conference on Computer and Communications Security (CCS), pp. 401--413, ACM

A Formal Framework for Program Anomaly Detection
Xiaokui Shu, Danfeng Yao, Barbara G. Ryder
Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pp. 270--292, Springer, 2015


2013

Massive Distributed and Parallel Log Analysis For Organizational Security
Xiaokui Shu, John Smiy, Danfeng Yao, Heshan Lin
Proceedings of the First International Workshop on Security and Privacy in Big Data (BigSecurity), pp. 194--199, IEEE, 2013


2012

Robustness of keystroke-dynamics based biometrics against synthetic forgeries
Deian Stefan, Xiaokui Shu, Danfeng Yao
Computers & Security 31(1), 109--121, 2012

Data Leak Detection as a Service
Xiaokui Shu, Danfeng Yao
Proceedings of the 8th International Conference on Security and Privacy in Communication Networks (SecureComm), pp. 222--240, Springer, 2012