Works (16)
2016 article
AppShell: Making data protection practical for lost or stolen Android devices
Jiang, X., Singh, K., & Zhou, Y. (2016, April 1).
2014 article
Data-Centric OS Kernel Malware Characterization
Rhee, J., Riley, R., Lin, Z., Jiang, X., & Xu, D. (2014, January 1). IEEE Transactions on Information Forensics and Security.
2014 article
Profiling user-trigger dependence for Android malware detection
Elish, K. O., Shu, X., Yao, D., Ryder, B. G., & Jiang, X. (2014, November 16). Computers & Security.
2014 journal article
Protecting communications infrastructure against cyber attacks
China Communications, 11(8), I-.
2013 article
Android Malware
Jiang, X., & Zhou, Y. (2013, January 1). SpringerBriefs in Computer Science.
2013 article
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
Rastogi, V., Chen, Y., & Jiang, X. (2013, November 19). IEEE Transactions on Information Forensics and Security.
2013 article
Fast, scalable detection of "Piggybacked" mobile applications
Zhou, W., Zhou, Y., Grace, M., Jiang, X., & Zou, S. (2013, February 18).
2012 article
Dissecting Android Malware: Characterization and Evolution
Zhou, Y., & Jiang, X. (2012, May 1).
2012 article
IntroLib: Efficient and transparent library call introspection for malware forensics
Deng, Z., Xu, D., Zhang, X., & Jiang, X. (2012, August 1). Digital Investigation.
2012 article
Intrusion Detection Models Based on Data Mining
Mao, G., Wu, X., & Jiang, X. (2012, January 1). International Journal of Computational Intelligence Systems.
2010 article
An Architectural Approach to Preventing Code Injection Attacks
Riley, R., Jiang, N. X., & Xu, N. D. (2010, January 20). IEEE Transactions on Dependable and Secure Computing.
2010 conference paper
DKSM: Subverting virtual machine introspection for fun and profit
2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.
2010 article
On the billing vulnerabilities of SIP-based VoIP systems
Zhang, R., Wang, X., Yang, X., & Jiang, X. (2010, February 15). Computer Networks.
2010 article
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
Jiang, X., Wang, X., & Xu, D. (2010, February 1). ACM Transactions on Information and System Security.
2010 conference paper
hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
2010 IEEE symposium on security and privacy, 380–395.
2009 conference paper
ReFormat: Automatic reverse engineering of encrypted messages
Computer security - esorics 2009, proceedings, 5789, 200–215.