Xuxian Jiang Zhou, Y. J., Singh, K., & Jiang, X. X. (2016). AppShell: Making data protection practical for lost or stolen Android devices. Noms 2016 - 2016 ieee/ifip network operations and management symposium, 502–508. https://doi.org/10.1109/noms.2016.7502850 Elish, K. O., Shu, X., Yao, D., Ryder, B. G., & Jiang, X. (2015). Profiling user-trigger dependence for Android malware detection. COMPUTERS & SECURITY, 49, 255–273. https://doi.org/10.1016/j.cose.2014.11.001 Rastogi, V., Chen, Y., & Jiang, X. (2014). Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 99–108. https://doi.org/10.1109/tifs.2013.2290431 Rhee, J., Riley, R., Lin, Z., Jiang, X., & Xu, D. (2014). Data-Centric OS Kernel Malware Characterization. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 72–87. https://doi.org/10.1109/tifs.2013.2291964 Gu, D. W., Jiang, X. X., Xue, Y. B., Zou, W., & Guo, L. (2014). Protecting communications infrastructure against cyber attacks. China Communications, 11(8), I-. Jiang, X., & Zhou, Y. (2013). Android malware. https://doi.org/10.1007/978-1-4614-7394-7 Zhou, W., Zhou, Y., Grace, M., Jiang, X., & Zou, S. (2013). Fast, scalable detection of "piggybacked" mobile applications. ACM Conference on Data and Application Security and Privacy, 185–195. https://doi.org/10.1145/2435349.2435377 Zhou, Y., & Jiang, X. (2012). Dissecting Android Malware: Characterization and Evolution. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 95–109. https://doi.org/10.1109/sp.2012.16 Deng, Z., Xu, D., Zhang, X., & Jiang, X. (2012). IntroLib: Efficient and transparent library call introspection for malware forensics. DIGITAL INVESTIGATION, 9, S13–S23. https://doi.org/10.1016/j.diin.2012.05.013 Mao, G., Wu, X., & Jiang, X. (2012). Intrusion Detection Models Based on Data Mining. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 5(1), 30–38. https://doi.org/10.1080/18756891.2012.670519 Riley, R., Jiang, X., & Xu, D. (2010). An Architectural Approach to Preventing Code Injection Attacks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 7(4), 351–365. https://doi.org/10.1109/tdsc.2010.1 Bahram, S., Jiang, X. X., Wang, Z., Grace, M., Li, J. K., Srinivasan, D., … Xu, D. Y. (2010). DKSM: Subverting virtual machine introspection for fun and profit. 2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91. Zhang, R., Wang, X., Yang, X., & Jiang, X. (2010). On the billing vulnerabilities of SIP-based VoIP systems. COMPUTER NETWORKS, 54(11), 1837–1847. https://doi.org/10.1016/j.comnet.2010.02.007 Jiang, X., Wang, X., & Xu, D. (2010). Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 13(2). https://doi.org/10.1145/1698750.1698752 Wang, Z., & Jiang, X. X. (2010). hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. 2010 IEEE symposium on security and privacy, 380–395. Wang, Z., Jiang, X. X., Cui, W. D., Wang, X. Y., & Grace, M. (2009). ReFormat: Automatic reverse engineering of encrypted messages. Computer security - esorics 2009, proceedings, 5789, 200–215.