2021 article

Mining Anomalies in Subspaces of High-Dimensional Time Series for Financial Transactional Data

He, J., Yeh, C.-C. M., Wu, Y., Wang, L., & Zhang, W. (2021, January 1). Lecture Notes in Computer Science.

author keywords: Unsupervised anomaly retrieval; High-dimensional time series; Subspace searching; Data mining
topics (OpenAlex): Time Series Analysis and Forecasting; Anomaly Detection Techniques and Applications; Complex Systems and Time Series Analysis
TL;DR: A novel and practical unsupervised anomaly retrieval system to retrieve anomalies from a large volume of high dimensional transactional time series and can localize high quality anomaly candidates in seconds, making it practical to use in a production environment. (via Semantic Scholar)
Source: Web Of Science
Added: November 15, 2021

2020 article

Self-Patch: Beyond Patch Tuesday for Containerized Applications

Tunde-Onadele, O., Lin, Y., He, J., & Gu, X. (2020, August 1).

By: O. Tunde-Onadele n, Y. Lin n, J. He n & X. Gu n

author keywords: Container Security; Anomaly Detection; Security Patching
topics (OpenAlex): Software System Performance and Reliability; Network Security and Intrusion Detection; Security and Verification in Computing
TL;DR: Self-Patch is presented, a new self-triggering patching framework for applications running inside containers that combines light-weight runtime attack detection and dynamic targeted patching to achieve more efficient and effective security protection for containerized applications. (via Semantic Scholar)
Source: Web Of Science
Added: November 29, 2021

2019 article

A Study on Container Vulnerability Exploit Detection

Tunde-Onadele, O., He, J., Dai, T., & Gu, X. (2019, June 1).

By: O. Tunde-Onadele n, J. He n, T. Dai n & X. Gu n

author keywords: Container Security; Anomaly Detection; Machine Learning
topics (OpenAlex): Network Security and Intrusion Detection; Software System Performance and Reliability; Advanced Malware Detection Techniques
TL;DR: This paper implements and evaluates a set of static and dynamic vulnerability attack detection schemes using 28 real world vulnerability exploits that widely exist in docker images and shows that the static vulnerability scanning scheme only detects 3 out of 28 tested vulnerabilities and dynamic anomaly detection schemes detect 22 vulnerability exploits. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: January 6, 2020

2019 article

TFix: Automatic Timeout Bug Fixing in Production Server Systems

He, J., Dai, T., & Gu, X. (2019, July 1).

By: J. He n, T. Dai n & X. Gu n

topics (OpenAlex): Software System Performance and Reliability; Software Testing and Debugging Techniques; Network Security and Intrusion Detection
TL;DR: TFix is presented, an automatic timeout bug fixing system for correcting misused timeout bugs in production systems that adopts a drill-down bug analysis protocol that can narrow down the root cause of a misusedtimeout bug and producing recommendations for correcting theRoot cause. (via Semantic Scholar)
Source: Web Of Science
Added: September 21, 2020

2018 article

DScope

Dai, T., He, J., Gu, X., Lu, S., & Wang, P. (2018, September 28).

By: T. Dai n, J. He n, X. Gu n, S. Lu* & P. Wang n

author keywords: static analysis; data corruption; performance bug detection
topics (OpenAlex): Software System Performance and Reliability; Cloud Computing and Resource Management; Distributed systems and fault tolerance
TL;DR: DScope, a tool that statically detects data-corruption related software hang bugs in cloud server systems, and identifies loops whose exit conditions can be affected by I/O operations through returned data, returned error code, orI/O exception handling. (via Semantic Scholar)
UN Sustainable Development Goals Color Wheel
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: March 4, 2019

2018 article

TScope: Automatic Timeout Bug Identification for Server Systems

He, J., Dai, T., & Gu, X. (2018, September 1).

By: J. He*, T. Dai* & X. Gu*

topics (OpenAlex): Software System Performance and Reliability; Network Security and Intrusion Detection; Cloud Computing and Resource Management
TL;DR: TScope leverages kernel-level system call tracing and machine learning based anomaly detection and feature extraction schemes to achieve timeout bug identification and introduces a unique system call selection scheme to achieve higher accuracy than existing generic performance bug detection tools. (via Semantic Scholar)
Source: Web Of Science
Added: December 3, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2026) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.