Dongyan Xu
Dongyan Xu
Samuel D. Conte Professor of Computer Science, Purdue University
Verified email at cs.purdue.edu - Homepage
Title
Cited by
Cited by
Year
Stealthy malware detection through vmm-based" out-of-the-box" semantic view reconstruction
X Jiang, X Wang, D Xu
Proceedings of the 14th ACM conference on Computer and communications …, 2007
6862007
PROMISE: peer-to-peer media streaming using CollectCast
M Hefeeda, A Habib, B Botev, D Xu, B Bhargava
Proceedings of the eleventh ACM international conference on Multimedia, 45-54, 2003
6102003
On peer-to-peer media streaming
D Xu, M Hefeeda, S Hambrusch, B Bhargava
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
4252002
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
R Riley, X Jiang, D Xu
International Workshop on Recent Advances in Intrusion Detection, 1-20, 2008
4242008
Analysis of a CDN–P2P hybrid architecture for cost-effective streaming media distribution
D Xu, SS Kulkarni, C Rosenberg, HK Chai
Multimedia Systems 11 (4), 383-399, 2006
3052006
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Z Lin, X Jiang, D Xu, X Zhang
NDSS 8, 1-15, 2008
2552008
Violin: Virtual internetworking on overlay infrastructure
X Jiang, D Xu
International Symposium on Parallel and Distributed Processing and …, 2004
2512004
GnuStream: a P2P media streaming system prototype
X Jiang, Y Dong, D Xu, B Bhargava
2003 International Conference on Multimedia and Expo. ICME'03. Proceedings …, 2003
2352003
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
JY Chen, G Pandurangan, D Xu
IEEE Transactions on Parallel and Distributed Systems 17 (9), 987-1000, 2006
2292006
QoS-aware middleware for ubiquitous and heterogeneous environments
K Nahrstedt, D Xu, D Wichadakul, B Li
IEEE Communications magazine 39 (11), 140-148, 2001
2272001
Automatic reverse engineering of data structures from binary execution
Z Lin, X Zhang, D Xu
Proceedings of the 11th Annual Information Security Symposium, 1-1, 2010
2252010
Autonomic live adaptation of virtual computational environments in a multi-domain infrastructure
P Ruth, J Rhee, D Xu, R Kennell, S Goasguen
2006 IEEE International Conference on Autonomic Computing, 5-14, 2006
2222006
Dksm: Subverting virtual machine introspection for fun and profit
S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu
2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010
1932010
Collapsar: A VM-Based Architecture for Network Attack Detention Center.
X Jiang, D Xu
USENIX Security Symposium, 15-28, 2004
1892004
Viocluster: Virtualization for dynamic computational domains
P Ruth, P McGachey, D Xu
2005 IEEE International Conference on Cluster Computing, 1-10, 2005
1652005
Virtual distributed environments in a shared infrastructure
P Ruth, X Jiang, D Xu, S Goasguen
Computer 38 (5), 63-69, 2005
1652005
Soda: A service-on-demand architecture for application service hosting utility platforms
X Jiang, D Xu
High Performance Distributed Computing, 2003. Proceedings. 12th IEEE …, 2003
1312003
Multi-aspect profiling of kernel rootkit behavior
R Riley, X Jiang, D Xu
Proceedings of the 4th ACM European conference on Computer systems, 47-60, 2009
1272009
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
X Jiang, X Wang, D Xu
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
1242010
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Z Lin, J Rhee, X Zhang, D Xu, X Jiang
Ndss, 2011
1202011
The system can't perform the operation now. Try again later.
Articles 1–20