² Xiaobo Ma, Bo An, Mengchen Zhao, Xiapu Luo, Lei Xue, Zhenhua Li, Tony Miu, Xiaohong Guan.Randomized Security Patrolling for Link Flooding Attack Detection. IEEE Transactions on Dependable and Secure Computing, 2018。(SCI, IF: 4.41)
² Ma, Xiaobo,He, Yihui,Luo, Xiapu,Li, Jianfeng,Zhao, Mengchen,An, Bo,Guan, Xiaohong,Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance,IEEE Intelligent Systems,2018。(SCI, IF: 2.374)
² Ma, Xiaobo,Li, Jianfeng, Tang, Yajuan, An, Bo, Guan, Xiaohong. Protecting Internet Infrastructure against Link Flooding Attacks: A Techno-Economic Perspective. Information Sciences, 2018。(SCI, IF: 4.832)
² Li, Jianfeng,Ma, Xiaobo,Li, Guodong,Luo, Xiapu,Zhang, Junjie,Li, Wei,Guan, Xiaohong,Can We Learn What People Are Doing from Raw DNS Queries? Computer Communications (INFOCOM), 2018 IEEE Conference on,Honolulu,USA。(CCF A, acceptance ratio 19%)
² Xue, Lei,Ma, Xiaobo,Luo, Xiapu,Chan, Edmond W.W.,Miu, TungNgai,Gu, Guofei,LinkScope: Towards Detecting Target Link Flooding Attacks,IEEE Transactions on Information Forensics and Security (TIFS),2018。(SCI, IF: 4.332)
² Xue, Lei,Ma, Xiaobo,Luo, Xiapu,Yu, Le,Wang, Shuai,Chen, Ting,Is What You Measure What You Expect? Factors Affecting Smartphone-Based Mobile Network Measurement,Computer Communications (INFOCOM), 2017 IEEE Conference on,2017.5.12017.5.4,Atlanta,USA。(CCF A, acceptance rate 20.93%)
² Li, Jianfeng,Ma, Xiaobo,Zhang, Junjie,Tao, Jing, Wang, Pinghui,Guan, Xiaohong,Mining repeating pattern in packet arrivals: Metrics, models, and applications,Information Sciences,2017,408:1-22。(SCI, IF: 4.832)
² Ma, Xiaobo,Zhang, Junjie,Li, Zhenhua,Li, Jianfeng,Tao, Jing,Guan, Xiaohong,Lui, John C.S.,Towsley, Don,Accurate DNS query characteristics estimation via active probing,Journal of Network and Computer Applications,2015,47:72-84。(SCI, IF: 3.5)
² Li, Jianfeng,Tao, Jing,Ma, Xiaobo,Zhang, Junjie,Guan, Xiaohong,Modeling repeating behaviors in packet arrivals: Detection and measurement,Computer Communications (INFOCOM), 2015 IEEE Conference on,2461-2469,2015.4.26-2015.5.1,Hong Kong, China。(CCF A, acceptance rate 19%)
² Ma, Xiaobo,Zhang, Junjie,Tao, Jing,Li, Jianfeng,Tian, Jue,Guan, Xiaohong,DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache Footprints,IEEE Transaction on Information Forensics and Security,2014,9(11):1906-1921。(SCI, IF: 4.332)
² Zhao, Shuang,Lee, Patrick P.C.,Lui, John C.S.,Guan, Xiaohong,Ma, Xiaobo,Tao, Jing, Cloud-based push-styled mobile botnets: A case study of exploiting the Cloud to Device Messaging service,28th Annual Computer Security Applications Conference, ACSAC 2012,119-128,2012.12.3-2012.12.7,Orlando, Florida, USA。(CCF B, acceptance rate 19%)
² 【Book chapter】Hu, Wenjun, Ma, Xiaobo,Luo, Xiapu, Protecting Android Apps against Reverse Engineering. Protecting Mobile Networks and Devices: Challenges and Solutions, CRC Press, 2016。