Shouhuai Xu
University of Colorado Colorado Springs
H-index: 53
North America-United States
Top articles of Shouhuai Xu
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Cross-domain solution architecture | 2024/3/14 | ||
Towards Principled Risk Scores for Space Cyber Risk Management | arXiv preprint arXiv:2402.02635 | Ekzhin Ear Brandon Bailey Shouhuai Xu | 2024/2/4 |
SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges | arXiv preprint arXiv:2401.13815 | Brandon Collins Shouhuai Xu Philip N Brown | 2024/1/24 |
Repeated data breaches and executive compensation | Applied Economics Letters | Haofei Zhang Jin Peng Juan Mao Shouhuai Xu | 2024/1/12 |
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities | Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang | 2024/4/12 | |
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey | Proceedings of the IEEE | Theodore Tangie Longtchi Rosana Montañez Rodriguez Laith Al-Shawaf Adham Atyabi Shouhuai Xu | 2024/4/5 |
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study | Tsinghua Science and Technology | Yan Xu Deqiang Li Qianmu Li Shouhuai Xu | 2023/8/21 |
Characterizing Privacy Risks in Healthcare IoT Systems | Shuai Li Alessio Baiocco Shouhuai Xu | 2023/11/30 | |
{Near-Ultrasound} Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone | Qi Xia Qian Chen Shouhuai Xu | 2023 | |
Electoral manipulation via influence: probabilistic model | Autonomous Agents and Multi-Agent Systems | Liangde Tao Lin Chen Lei Xu Shouhuai Xu Zhimin Gao | 2023/6 |
Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies | Ekzhin Ear Jose LC Remy Shouhuai Xu | 2023/7/31 | |
Check for updates | Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries: 8th International Workshop, BrainLes 2022, Held in Conjunction with MICCAI 2022, Singapore, September 18, 2022, Revised Selected Papers | Segmentation Framework via Optimal Mass Transportation Pre-processing Jia-Wei Liao¹ Tsung-Ming Huang Tiexiang Li | 2023/7/17 |
CVMan: A Framework for Clone-Incurred Vulnerability Management | Applied Sciences | Jian Shi Deqing Zou Shouhuai Xu Hai Jin | 2023/4/14 |
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms | Md Mahabub Uz Zaman Liangde Tao Mark Maldonado Chang Liu Ahmed Sunny | 2023/7/11 | |
Characterizing cyber attacks against space systems with missing data: Framework and case study | Ekzhin Ear Jose LC Remy Antonia Feffer Shouhuai Xu | 2023/10/2 | |
Pad: Towards principled adversarial malware detection against evasion attacks | IEEE Transactions on Dependable and Secure Computing | Deqiang Li Shicheng Cui Yun Li Jia Xu Fu Xiao | 2023/4/7 |
Quantifying psychological sophistication of malicious emails | Rosana Montañez Rodriguez Theodore Longtchi Kora Gwartney Ekzhin Ear David P Azari | 2023/7/11 | |
How do repeated data breaches affect firm policies? | Applied Economics Letters | Jin Peng Haofei Zhang Juan Mao Shouhuai Xu | 2023/9/14 |
Repeated data breaches and firm value | Economics Letters | Jin Peng Haofei Zhang Juan Mao Shouhuai Xu | 2023/3/1 |
Cyber attacks against enterprise networks: characterization, modeling and forecasting | Zheyuan Sun Maochao Xu Kristin M Schweitzer Raymond M Bateman Alexander Kott | 2023/7/11 |