近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
● Xuanyu Liu, Ang Li, Xiao Fu*, Bin Luo, Xiaojiang Du and Mohsen Guizani, Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems, IEEE GLOBECOM 2021, Madrid, Spain, December 2021.
● Shiwen Song, Xuanyu Liu, Xiao Fu*, Bin Luo, Xiaojiang Du and Mohsen Guizani, Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction, IEEE GLOBECOM 2021, Madrid, Spain, December 2021.
● Xuanyu Liu, Qiang Zeng, Xiaojiang Du, Siva Likitha Valluru , Chenglong Fu, Xiao Fu* and Bin Luo, SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes, RAID 2021, Donostia/San Sebastian, Spain, October 2021.
● Li Lin, Xuanyu Liu, Xiao Fu*, Bin Luo, Xiaojiang Du and Mohsen Guizani, A Non-Intrusive Method for Smart Speaker Forensics, IEEE ICC 2021, Montreal, Canada, June 2021.
● Yuzhe Chen, Xiao Fu*, Bin Luo, Xiaojiang Du and Mohsen Guizani, Cloud Storage Forensics BaiduNetDisk WeiYun and 115yun on a Wireless Network, in Proc. of GLOBECOM 2020, Taiwan, China, December 2020.
● Yun Luo, Xiao Fu*, Bin Luo, Xiaojiang Du and Mohsen Guizani, Forensic Model for DDoS Attack, in Proc. of IEEE GLOBECOM 2020,Taiwan,China, December 2020.
● Fei Ye, Yunzhi Zheng, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizan, TamForen: A Tamper-Proof Cloud Forensic Framework, accepted by Transactions on Emerging Telecommunications Technologies.
● Meng Chen, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani, Cloud Database Encryption Technology Based on Combinatorial Encryption. Globecom 2019.
● Xiaoyu Ma, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani, A Design of Firewall Based on Feedback of Intrusion Detection System in Cloud Environmen. Globecom 2019.
● Sixian Sun, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani, Detecting and Preventing ARP Attack in SDN-Based Cloud Environment. Infocom 2020 workshop.
● Xuanyu Liu, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani, Monitoring User-Intent of Cloud-based Networked Applications in Cognitive Networks. Globecom 2018.
● Xiao Fu*, Rui Yang, Xiaojiang Du, Bin Luo, Mohsen Guizan,.Timing Channel in IaaS:How to Identify and Investigate. IEEE Access, 7:1-11, 2018.
● Sixian Sun, Xiao Fu*, Hao Ruan, Xiaojiang Du, Bin Luo, Mohsen Guizan, Real-time Behavior Analysis and Identification for Android Applications. IEEE Access, 6: 38041 – 38051, 2018.
● Xuanyu Liu, Xiao Fu*, Bin Luo, Xiaojiang Du. Distributed Cloud Forensic System with Decentralization and Multi-participation. Eai International Wireless Internet Conference. 2017
● Jiayun Xie, Xiao Fu*, Xiaojiang Du, Bin Luo.AutoPatchDroid: a framework for patching inter-app vulnerablities in android application. ICC 2017.
● Xie Jiayun, Fu Xiao*, Luo Bin.Survey on android protection mechanism(in Chinese) [J].Computer Engineering, 2018, 44 (2): 163-170,176.
● Hao Ruan, Xiao Fu*, Xiaojiang Du, Bin Luo. Analyzing Android Application in Real-Time at Kernel Level. ICCCN 2017.
● Rui Yang, Xiao Fu*, Xiaojiang Du, Bin Luo. Investigating Timing-based Side Channel Attacks in IaaS. Mobimedia 2016.
● Yingxin Cheng, Xiao Fu*, Xiaojiang Du, Bin Luo, Mohsen Guizani. A Lightweight Live Memory Forensic Approach Based on Hardware Virtualization. Information Sciences, 2017, 379(2): 23-41.
● Ziqi Wang, Rui Yang, Xiao Fu*, Xiaojiang Du, Bin Luo. A Shared Memory based Cross-VM Side Channel Attacks in IaaS Cloud. InfoCom 2016 workshop.
● Xiao Fu*, Yun Gao, Bin Luo, Xiaojiang Du, Mohsen Guizani. Security Threats to Hadoop: Data Leakage Attacks and How to Investigate Them. IEEE Network, 2017, 31(2): 67-71.
● Xiao Fu, Xiaojiang Du*, Bin Luo*. Data correlation-based analysis methods for automatic memory forensic. Security and Communication Networks. Volume 8, Issue 18, 4213-4226, December 2015.
● Yun Gao, Xiao Fu*, Bin Luo, Xiaojiang Du, Mohsen Guizani. Haddle: a framework for investigating data leakage attacks in Hadoop. Globalcom 2015.
● Gao Yun, Fu Xiao*, Luo Bin, A Survey of Cloud Forensics (in Chinese) [J]. Application Research of Computers. Volume 33, Issue1,1-6, January 2016.
● Xiao Fu, Xiaojiang Du, Bin Luo, Jin Shi, Yuhua Wang and Zhitao Guan. Correlating Processes for Automatic Memory Evidences Analysis. InfoCom 2015 workshop.
● Yiheng Duan, Xiao Fu*, Bin Luo, Ziqi Wang, Jin Shi, Xiaojiang Du. Detective: Automatically Identify and Analyze Malware Processes in Forensic Scenarios via Dynamic-Link Libraries. ICC 2015, London, UK, June 8-12, 2015.
● Li Junxiao, Fu Xiao*, Luo Bin, Xie Jiayun. A Survey on Android Malware and Detection Techniques (in Chinese) [J], Accepted, will be published in Application Research of Computers, 2015.
● Yingxin Cheng, Xiao Fu*, Bin Luo, Rui Yang, and Hao Ruan. Investigating the Hooking Behavior: A page-level Memory Monitoring Method for Live Forensics. ISC 2014, Hongkong, China, Oct 12-14, 2014.
● Qian Qin,Zhang Jian, Zhang Kun, Fu Xiao*,Mao Bing. Technical Study of Reducing Redundant Data for Intrusion Detection and Intrusion Forensics (in Chinese)[J], Computer Science, 2014,41(11A):252-258.
● Qian Qin, Dong Buyun, Tangzhe, Fu Xiao*, Mao Bing. Study on the Situation and Development of Memory Forensics (in Chinese) [J], Computer Engineering, 2014,40(8):95-102.
● Ji Yuchen, Fu Xiao*, Shi Jin, Zhao Zhihong, Luo Bin. Study on Event Reconstruction of Computer Intrusion Forensic (in Chinese) [J], Computer Engineering, 2014,40(1):315-321.
● Jian Zhang, Fu Xiao *, Bin Luo, Zhi-Hong Zhao and Xiaojiang Du. A Method to Automatically Filter Log Evidences for Intrusion Forensics, ICDCS 2013 workshop, Philadelphia, USA, July 8-11, 2013.
● Dong Buyun, Fang Pei, Fu Xiao*, Luo Bin, Zhao Zhihong. Design and Implementation of HDFS over Infiniband with RDMA, 11th International Conference on Wired/Wireless Internet Communications, St.Petersburg,Russia, June 5-7, 2013.
● Fu Xiao, Shi Jin, Xie Li. Layered Intrusion Scenario Reconstruction Method for Automated Evidence Analysis (in Chinese)[J], Journal of Software, 2011, 22(5): 996-1008.
● Fu Xiao, Xie Li. Filtering Intrusion Forensic Data Based on Attack Signatures, Journal of Computer Research and Development (in Chinese)[J], 2011,48(6): 964-973.
● Fu Xiao, Shi Jin, Xie Li. A Novel Data Mining-Based Method for Alert Reduction and Analysis, Journal of Network, 2010, 5(1):88-97.
● Fu Xiao, Xie Li. Security Alert Correlation: A Survey, Computer Science (in Chinese)[J], 2010,37(5):9-14.
● Fu Xiao, Cai Shengwen, Xie Li. Survey of Network Security Management (in Chinese)[J], Computer Science, 2009,36(2):15-19.
● Fu Xiao, Xie Li. ODARM: A Outlier Detection-based Alert Reduction Model. In: ABM Shawkat Ali and Yang Xiang. Dynamic and Advanced Data Mining for Progressing Technological Development: Innovations and Systemic Approaches, USA: IGI Global, November 2009.
● Fu Xiao, Xie Li. Using Outlier Detection to Reduce False Positives in Intrusion Detection, IEEE International Conference on Network and System Security, Shanghai, China, Oct. 18-20, 2008.