Blank

²     Xiaobo Ma, Bo An, Mengchen Zhao, Xiapu Luo, Lei Xue, Zhenhua Li, Tony Miu, Xiaohong Guan.Randomized Security Patrolling for Link Flooding Attack Detection. IEEE Transactions on Dependable and Secure Computing, 2018。(SCI, IF: 4.41)

²      Ma, XiaoboHe, YihuiLuo, XiapuLi, JianfengZhao, MengchenAn, BoGuan, XiaohongVehicle Traffic Driven Camera Placement for Better Metropolis Security SurveillanceIEEE Intelligent Systems2018(SCI, IF: 2.374)

²     Ma, XiaoboLi, Jianfeng, Tang, Yajuan,  An, Bo, Guan, Xiaohong.  Protecting Internet Infrastructure against Link Flooding Attacks: A Techno-Economic Perspective. Information Sciences, 2018(SCI, IF: 4.832)

 

²     Li, JianfengMa, XiaoboLi, GuodongLuo, XiapuZhang, JunjieLi, WeiGuan, XiaohongCan We Learn What People Are Doing from Raw DNS Queries? Computer Communications (INFOCOM), 2018 IEEE Conference onHonoluluUSA(CCF A, acceptance ratio 19%)

 

²     Xue, LeiMa, XiaoboLuo, XiapuChan, Edmond W.W.Miu, TungNgaiGu, GuofeiLinkScope: Towards Detecting Target Link Flooding AttacksIEEE Transactions on Information Forensics and Security (TIFS)2018。(SCI, IF: 4.332)

 

²     Xue, LeiMa, XiaoboLuo, XiapuYu, LeWang, ShuaiChen, TingIs What You Measure What You Expect? Factors Affecting Smartphone-Based Mobile Network MeasurementComputer Communications (INFOCOM), 2017 IEEE Conference on2017.5.12017.5.4AtlantaUSA(CCF A, acceptance rate 20.93%) 

 

²     Li, JianfengMa, XiaoboZhang, JunjieTao, Jing Wang, PinghuiGuan, XiaohongMining repeating pattern in packet arrivals: Metrics, models, and applicationsInformation Sciences20174081-22(SCI, IF: 4.832)

 

²     Ma, XiaoboZhang, JunjieLi, ZhenhuaLi, JianfengTao, JingGuan, XiaohongLui, John C.S.Towsley, DonAccurate DNS query characteristics estimation via active probingJournal of Network and Computer Applications20154772-84(SCI, IF: 3.5) 

 

²     Li, JianfengTao, JingMa, XiaoboZhang, JunjieGuan, XiaohongModeling repeating behaviors in packet arrivals: Detection and measurementComputer Communications (INFOCOM), 2015 IEEE Conference on2461-24692015.4.26-2015.5.1Hong Kong China(CCF A, acceptance rate 19%)  

 

²     Ma, XiaoboZhang, JunjieTao, JingLi, JianfengTian, JueGuan, XiaohongDNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache FootprintsIEEE Transaction on Information Forensics and Security2014911):1906-1921(SCI, IF: 4.332)

 

²    Zhao, ShuangLee, Patrick P.C.Lui, John C.S.Guan, XiaohongMa, XiaoboTao, Jing Cloud-based push-styled mobile botnets: A case study of exploiting the Cloud to Device Messaging service28th Annual Computer Security Applications Conference, ACSAC 2012119-1282012.12.3-2012.12.7Orlando, Florida, USA(CCF B, acceptance rate 19%) 

 

²   Book chapterHu, Wenjun, Ma, XiaoboLuo, Xiapu Protecting Android Apps against Reverse Engineering. Protecting Mobile Networks and Devices: Challenges and Solutions, CRC Press, 2016