Search For:

Displaying 1-23 out of 23 total
Trust Propagation Policy for Secure Interoperability in Multi-domain Environments
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Luo Xin, Yang Yi-Xian, Niu Xin-Xin, Hu Zheng-Ming
Issue Date:December 2008
pp. 181-184
Access control is one of the most important issues of secure interoperability between domains. Role-based access control (RBAC) is a technology that has been proposed as an alternative approach to traditional access control mechanisms both to simplify the ...
 
Predicting Object-Oriented Software Maintainability Using Projection Pursuit Regression
Found in: Information Science and Engineering, International Conference on
By Li-jin Wang, Xin-xin Hu, Zheng-yuan Ning, Wen-hua Ke
Issue Date:December 2009
pp. 3827-3830
This paper presents ongoing work on using projection pursuit regression model to predict object-oriented software maintainability. The maintainability is measured as the number of changes made to code during a maintenance period by means of object-oriented...
 
A diode-based predistortion linearizer for traveling wave tube amplifiers
Found in: IEEE International Vacuum Electronics Conference
By Xin Hu, Gang Wang, Zi-Cheng Wang, Ji-Run Luo
Issue Date:February 2011
pp. 239-240
The simulation and design of a predistortion linearizer based on schottky and varactor diodes are presented. The linearizer is capable of providing different combinations of the amplitude and phase characteristics for the use of the different traveling wav...
 
Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation
Found in: IEEE Transactions on Mobile Computing
By Alexander W. Min, Kang G. Shin, Xin Hu
Issue Date:October 2011
pp. 1434-1447
Cooperative (or distributed) sensing has been recognized as a viable means to enhance the incumbent signal detection by exploiting the diversity of sensors. However, it is challenging to secure such distributed sensing due mainly to the unique features of ...
 
A Study on Latent Vulnerabilities
Found in: Reliable Distributed Systems, IEEE Symposium on
By Beng Heng Ng, Xin Hu, Atul Prakash
Issue Date:November 2010
pp. 333-337
Software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptible to latent vulnerabilities. Source code which is re-used without being patched for v...
 
A Study on the Hybrid Encryption Technology in the Security Transmission of Electronic Documents
Found in: Information Science and Management Engineering, International Conference of
By Xinli Hu, Lianjie Ma
Issue Date:August 2010
pp. 60-63
Although electronic documents have been greatly improved in the transferring speed and processing speed, it would also result that electronic documents information is disclosed, counterfeited, tampered, repudiated and so on. In order to solve the above pro...
 
Detection of botnets using combined host- and network-level information
Found in: 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)
By Yuanyuan Zeng, Xin Hu,K G Shin
Issue Date:June 2010
pp. 291-300
Bots are coordinated by a command and control (C&C) infrastructure to launch attacks that seriously threaten the Internet services and users. Most botnet-detection approaches function at the network level and require the analysis of packets' payloads, ...
 
An Integrated Docking Pipeline for the Prediction of Large-Scale Protein-Protein Interactions
Found in: HPCMP Users Group Conference
By Xin Hu,Michael Lee,Kamal Kumar,Anders Wallqvist
Issue Date:June 2010
pp. 228-232
Knowledge of the three-dimensional (3D) structures of protein complexes provides a fundamental understanding of biological systems, as well as novel insights for antimicrobial drug and vaccine design. Protein-protein docking is used to predict the 3D struc...
 
A Study on Inter-governmental Documents Security Transfer under E-government Environment
Found in: International Conference on E-Business and E-Government
By Xinli Hu,Lianjie Ma
Issue Date:May 2010
pp. 663-666
The electronic of government documents transmission and processing has greatly improved working efficiency. However, because the network has openness, connectivity and other features, resulting the network vulnerable to be attacked by hacker and viruses, a...
 
Accelerating Biomedical Research in Designing Diagnostic Assays, Drugs, and Vaccines
Found in: Computing in Science and Engineering
By Anders Wallqvist, Nela Zavaljevski, Ravi Vijaya Satya, Rajkumar Bondugula, Valmik Desai, Xin Hu, Kamal Kumar, Michael Lee, In-Chul Yeh, Chenggang Yu
Issue Date:September 2010
pp. 46-55
The US Department of Defense Biotechnology High-Performance Computing Software Applications Institute for Force Health Protection develops state-of-the-art high-performance computing applications that accelerate biomedical research in the development of di...
 
Attack-tolerant distributed sensing for dynamic spectrum access networks
Found in: 2009 17th IEEE International Conference on Network Protocols. ICNP 2009
By A.W. Min,K.G. Shin, Xin Hu
Issue Date:October 2009
pp. 294-303
Accurate sensing of the spectrum condition is of crucial importance to the mitigation of the spectrum scarcity problem in dynamic spectrum access (DSA) networks. Specifically, distributed sensing has been recognized as a viable means to enhance the incumbe...
 
Accurate Real-time Identification of IP Prefix Hijacking
Found in: Security and Privacy, IEEE Symposium on
By Xin Hu, Z. Morley Mao
Issue Date:May 2007
pp. 3-17
We present novel and practical techniques to accurately detect IP prefix hijacking attacks in real time to facilitate mitigation. Attacks may hijack victim's address space to disrupt network services or perpetrate malicious activities such as spamming and ...
 
An Improved Parallel Interference Cancellation Algorithm in DS/CDMA Communication System
Found in: Computer and Information Technology, International Conference on
By Geng Xin, Hu Hanying, Liu Zhengjun
Issue Date:September 2005
pp. 464-468
<p>This paper introduces an improved parallel interference cancellation algorithm in a DS/CDMA communication system. Because of the lack of the energy information of interfering signal in the conventional parallel interference cancellation (PIC) algo...
 
Outsourcing multi-version key-value stores with verifiable data freshness
Found in: 2014 IEEE 30th International Conference on Data Engineering (ICDE)
By Yuzhe Tang,Ling Liu,Ting Wang,Xin Hu,Reiner Sailer,Peter Pietzuch
Issue Date:March 2014
pp. 1214-1217
In the age of big data, key-value data updated by intensive write streams is increasingly common, e.g., in social event streams. To serve such data in a cost-effective manner, a popular new paradigm is to outsource it to the cloud and store it in a scalabl...
   
Reconciling malware labeling discrepancy via consensus learning
Found in: 2014 IEEE 30th International Conference on Data Engineering Workshops (ICDEW)
By Ting Wang,Xin Hu,Shicong Meng,Reiner Sailer
Issue Date:March 2014
pp. 84-89
Anti-virus systems developed by different vendors often demonstrate strong discrepancy in the labels they assign to given malware, which significantly hinders threat intelligence sharing. The key challenge of addressing this discrepancy stems from the diff...
   
DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles
Found in: Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC '13)
By Kang G. Shin, Xin Hu
Issue Date:December 2013
pp. 79-88
Automatic malware clustering plays a vital role in combating the rapidly growing number of malware variants. Most existing malware clustering algorithms operate on either static instruction features or dynamic behavior features to partition malware into fa...
     
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
Found in: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12)
By Kang G. Shin, Xin Hu, Yuanyuan Zeng
Issue Date:April 2012
pp. 137-148
Botnets are one of the most serious security threats to the Internet and personal computer (PC) users. Although botnets have not yet caused major outbreaks in the mobile world, with the rapidly-growing popularity of smartphones such as Apple's iPhone and A...
     
Large-scale malware indexing using function-call graphs
Found in: Proceedings of the 16th ACM conference on Computer and communications security (CCS '09)
By Kang G. Shin, Tzi-cker Chiueh, Xin Hu
Issue Date:November 2009
pp. 611-620
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem is to quickly determine if a new malware sample is similar to any previously-se...
     
Behavioral detection of malware on mobile handsets
Found in: Proceeding of the 6th international conference on Mobile systems, applications, and services (MobiSys '08)
By Abhijit Bose, Kang G. Shin, Taejoon Park, Xin Hu
Issue Date:June 2008
pp. 1-1
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devices. First, we propose an efficient representation of malware behaviors based...
     
Optimization-based wideband basis functions for efficient interconnect extraction
Found in: Proceedings of the conference on Design, automation and test in Europe (DATE '07)
By Jacob White, Luca Daniel, Tarek Moselhy, Xin Hu
Issue Date:April 2007
pp. 1200-1205
This paper introduces a technique for the numerical generation of basis functions that are capable of parameterizing the frequency-variant nature of cross-sectional conductor current distributions. Hence skin and proximity effects can be captured utilizing...
     
pFFT in FastMaxwell: a fast impedance extraction solver for 3D conductor structures over substrate
Found in: Proceedings of the conference on Design, automation and test in Europe (DATE '07)
By Luca Daniel, Tarek Moselhy, Xin Hu
Issue Date:April 2007
pp. 1194-1199
In this paper we describe the acceleration algorithm implemented in FastMaxwell, a program for wideband electromagnetic extraction of complicated 3D conductor structures over substrate. FastMaxwell is based on the integral domain mixed potential integral e...
     
Analysis of full-wave conductor system impedance over substrate using novel integration techniques
Found in: Proceedings of the 42nd annual conference on Design automation (DAC '05)
By Jacob White, Jung Hoon Lee, Luca Daniel, Xin Hu
Issue Date:June 2005
pp. 147-152
An efficient approach to full-wave impedance extraction is developed that accounts for substrate effects through the use of two-layer media Green's functions in a mixed-potential-integral-equation (MPIE) solver. Particularly, the choice of implementation f...
     
Lithology Identification Methods Contrast Based on Support Vector Machines at Different Well Logging Parameters Set
Found in: Computational and Information Sciences, International Conference on
By Xin-hu Li, Jie Luo, Dong Liu
Issue Date:December 2010
pp. 495-498
Based on the coring well and well logging data, according to three methods, including M-N value, curve superposition and curve characteristic value, which are often be used on lithology identification, three different well logging curve parameters set was ...
 
 1