default search action
Xiaoqi Jia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Qihang Zhou, Wenzhuo Cao, Xiaoqi Jia, Shengzhi Zhang, Jiayun Chen, Nan Jiang, Weijuan Zhang, Haichao Du, Zhenyu Song, Qingjia Huang:
HClave: An isolated execution environment design for hypervisor runtime security. Comput. Secur. 144: 103923 (2024) - [j21]Qiyuan Li, Bo Zhang, Donghai Tian, Xiaoqi Jia, Changzhen Hu:
MDGraph: A novel malware detection method based on memory dump and graph neural network. Expert Syst. Appl. 255: 124776 (2024) - [j20]Ruixuan Li, Zhenyong Zhang, Jun Shao, Rongxing Lu, Xiaoqi Jia, Guiyi Wei:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. IEEE Trans. Dependable Secur. Comput. 21(1): 125-138 (2024) - [c44]Jiayun Chen, Qihang Zhou, Weijuan Zhang, Nan Jiang, Yamin Xie, Xiaoqi Jia:
vASP: Full VM Life-cycle Protection Based on Active Security Processor Architecture. CCGrid 2024: 168-177 - [c43]Shaowen Xu, Qihang Zhou, Zhicong Zhang, Xiaoqi Jia, Donglin Liu, Heqing Huang, Haichao Du, Zhenyu Song:
ConMonitor: Lightweight Container Protection with Virtualization and VM Functions. SoCC 2024: 755-773 - [c42]Yang Chen, Shengzhi Zhang, Xiaoqi Jia, Qihang Zhou, Heqing Huang, Shaowen Xu, Haochao Du:
SEDSpec: Securing Emulated Devices by Enforcing Execution Specification. DSN 2024: 522-534 - [c41]Xun An, Xiaoqi Jia, Haichao Du, Yamin Xie:
Structure-Sensitive Pointer Analysis for Multi-structure Objects. Internetware 2024 - [c40]Nan Jiang, Qihang Zhou, Xiaoqi Jia, Jiayun Chen, Qingjia Huang, Haichao Du:
LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems. SEC 2024: 206-220 - 2023
- [j19]Jiaqi Chen, Chong Yuan, Jiashuo Li, Donghai Tian, Rui Ma, Xiaoqi Jia:
ELAMD: An ensemble learning framework for adversarial malware defense. J. Inf. Secur. Appl. 75: 103508 (2023) - [j18]Yuxia Fu, Jun Shao, Qingjia Huang, Qihang Zhou, Huamin Feng, Xiaoqi Jia, Ruiyi Wang, Wenzhi Feng:
Non-transferable blockchain-based identity authentication. Peer Peer Netw. Appl. 16(3): 1354-1364 (2023) - [j17]Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei:
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy. IEEE/ACM Trans. Netw. 31(6): 2793-2808 (2023) - [c39]Shaowen Xu, Qihang Zhou, Heqing Huang, Xiaoqi Jia, Haichao Du, Yang Chen, Yamin Xie:
Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch. ACSAC 2023: 229-240 - [c38]Xun An, Qihang Zhou, Haichao Du, Zhenyu Song, Xiaoqi Jia:
Refining Use-After-Free Defense: Eliminating Dangling Pointers in Registers and Memory. APSEC 2023: 493-502 - [c37]Haoxiang Qin, Zhenyu Song, Weijuan Zhang, Sicong Huang, Wentao Yao, Ge Liu, Xiaoqi Jia, Haichao Du:
Protecting Encrypted Virtual Machines from Nested Page Fault Controlled Channel. CODASPY 2023: 165-175 - [c36]Mengting Zhou, Xiaoqi Jia, Hanjian Su, Sicong Huang, Yuejin Du, Haichao Du, Ruiyi Wang, Jing Tang:
Container Privilege Escalation and Escape Detection Method Based on Security-First Architecture. HPCC/DSS/SmartCity/DependSys 2023: 490-498 - 2022
- [j16]Donghai Tian, Runze Zhao, Rui Ma, Xiaoqi Jia, Qi Shen, Changzhen Hu, Wenmao Liu:
MDCD: A malware detection approach in cloud using deep learning. Trans. Emerg. Telecommun. Technol. 33(11) (2022) - [j15]Qianjin Ying, Yulei Yu, Donghai Tian, Xiaoqi Jia, Rui Ma, Changzhen Hu:
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning. J. Grid Comput. 20(3): 31 (2022) - [j14]Chong Yuan, Jingxuan Cai, Donghai Tian, Rui Ma, Xiaoqi Jia, Wenmao Liu:
Towards time evolved malware identification using two-head neural network. J. Inf. Secur. Appl. 65: 103098 (2022) - [c35]Qihang Zhou, Xiaoqi Jia, Nan Jiang:
Protecting Virtual Machines against Untrusted Hypervisor on ARM64 Cloud Platform. ICC 2022: 5451-5456 - [c34]Qihang Zhou, Xiaoqi Jia, Shengzhi Zhang, Nan Jiang, Jiayun Chen, Weijuan Zhang:
SecFortress: Securing Hypervisor using Cross-layer Isolation. IPDPS 2022: 212-222 - [c33]Yuxiao Luo, Jianwei Tai, Xiaoqi Jia, Shengzhi Zhang:
Practical Backdoor Attack Against Speaker Recognition System. ISPEC 2022: 468-484 - [c32]Yue Yu, Xiaoqi Jia, Xun An, Shengzhi Zhang:
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification. SEC 2022: 507-523 - [c31]Yun He, Xiaoqi Jia, Shengzhi Zhang, Lou Chitkushev:
EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave. TrustCom 2022: 225-232 - 2021
- [j13]Donghai Tian, Qianjin Ying, Xiaoqi Jia, Rui Ma, Changzhen Hu, Wenmao Liu:
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning. Comput. Networks 198: 108394 (2021) - [j12]Donghai Tian, Xiaoqi Jia, Rui Ma, Shuke Liu, Wenjing Liu, Changzhen Hu:
BinDeep: A deep learning approach to binary code similarity detection. Expert Syst. Appl. 168: 114348 (2021) - 2020
- [j11]Wenjie Wang, Donghai Tian, Weizhi Meng, Xiaoqi Jia, Runze Zhao, Rui Ma:
MSYM: A multichannel communication system for android devices. Comput. Networks 168 (2020) - [j10]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [c30]Jianwei Tai, Xiaoqi Jia, Qingjia Huang, Weijuan Zhang, Haichao Du, Shengzhi Zhang:
SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation. ACSAC 2020: 939-950 - [c29]Xiaoqi Jia, Jianwei Tai, Hang Zhou, Yakai Li, Weijuan Zhang, Haichao Du, Qingjia Huang:
ET-GAN: Cross-Language Emotion Transfer Based on Cycle-Consistent Generative Adversarial Networks. ECAI 2020: 2038-2045 - [c28]Qingjia Huang, Haiming Li, Yun He, Jianwei Tai, Xiaoqi Jia:
PiDicators: An Efficient Artifact to Detect Various VMs. ICICS 2020: 259-275 - [c27]Yun He, Yihua Xu, Xiaoqi Jia, Shengzhi Zhang, Peng Liu, Shuai Chang:
EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX. RAID 2020: 195-208
2010 – 2019
- 2019
- [j9]Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu:
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning. IEEE Access 7: 91657-91666 (2019) - [j8]Donghai Tian, Xiaoqi Jia, Zhaolong Zhang, Li Zhan, Changzhen Hu, Jingfeng Xue:
An online approach to defeating ROP attacks∗. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j7]Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu:
KEcruiser: A novel control flow protection for kernel extensions. Future Gener. Comput. Syst. 100: 1-9 (2019) - [i2]Xiaoqi Jia, Jianwei Tai, Qingjia Huang, Yakai Li, Weijuan Zhang, Haichao Du:
EG-GAN: Cross-Language Emotion Gain Synthesis based on Cycle-Consistent Adversarial Networks. CoRR abs/1905.11173 (2019) - [i1]Jianwei Tai, Qingjia Huang, Xiaoqi Jia:
Powerful Speaker Embedding Training Framework by Adversarially Disentangled Identity Representation. CoRR abs/1912.02608 (2019) - 2018
- [j6]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [c26]Weijuan Zhang, Xiaoqi Jia, Shengzhi Zhang, Rui Wang, Peng Liu:
Running OS Kernel in Separate Domains: A New Architecture for Applications and OS Services Quarantine. APSEC 2018: 219-228 - [c25]Chang Wang, Zhaolong Zhang, Xiaoqi Jia, Donghai Tian:
Binary Obfuscation Based Reassemble. MALWARE 2018: 153-160 - 2017
- [j5]Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu:
An Online Approach for Kernel-level Keylogger Detection and Defense. J. Inf. Sci. Eng. 33(2): 445-461 (2017) - [c24]Shengzhi Zhang, Xiaoqi Jia, Weijuan Zhang:
Towards comprehensive protection for OpenFlow controllers. APNOMS 2017: 82-87 - [c23]Donghai Tian, Xiaoqi Jia, Li Zhan, Changzhen Hu, Jingfeng Xue:
An Online Approach to Defeating Return-Oriented-Programming Attacks. CSS 2017: 236-247 - [c22]Xiaoqi Jia, Guangzhe Zhou, Qingjia Huang, Weijuan Zhang, Donghai Tian:
FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud. ICDF2C 2017: 3-17 - [c21]Weijuan Zhang, Xiaoqi Jia, Jianwei Tai, Mingsheng Wang:
CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds. WASA 2017: 665-677 - 2016
- [j4]Shengzhi Zhang, Xiaoqi Jia, Peng Liu:
Towards service continuity for transactional applications via diverse device drivers. Int. J. Inf. Comput. Secur. 8(4): 382-400 (2016) - [c20]Xiaoqi Jia, Qing Zhu, Peng Zhang, Menglong Chang:
Face Feature Points Detection Based on Adaboost and AAM. GRMSE (1) 2016: 142-149 - [c19]Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu:
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds. ICICS 2016: 361-375 - [c18]Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu:
Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors. IWSEC 2016: 3-20 - [c17]Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu:
Classifying Android Malware with Dynamic Behavior Dependency Graphs. Trustcom/BigDataSE/ISPA 2016: 378-385 - [c16]Zimin Lin, Rui Wang, Xiaoqi Jia, Jingyu Yang, Daojuan Zhang, Chuankun Wu:
ForceDROID: Extracting Hidden Information in Android Apps by Forced Execution Technique. Trustcom/BigDataSE/ISPA 2016: 386-393 - 2015
- [j3]Yoon-chan Jhi, Xiaoqi Jia, Xinran Wang, Sencun Zhu, Peng Liu, Dinghao Wu:
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection. IEEE Trans. Software Eng. 41(9): 925-943 (2015) - [c15]Hao Zhang, Qing Zhu, Xiaoqi Jia:
An Effective Method for Gender Classification with Convolutional Neural Networks. ICA3PP (2) 2015: 78-91 - 2014
- [c14]Rui Wang, Xiaoqi Jia, Qinlei Li, Shengzhi Zhang:
Machine Learning Based Cross-Site Scripting Detection in Online Social Network. HPCC/CSS/ICESS 2014: 823-826 - 2013
- [j2]Xiaoqi Jia, Rui Wang, Jun Jiang, Shengzhi Zhang, Peng Liu:
Defending return-oriented programming based on virtualization techniques. Secur. Commun. Networks 6(10): 1236-1249 (2013) - 2011
- [j1]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems. IEEE Trans. Inf. Forensics Secur. 6(4): 1323-1334 (2011) - [c13]Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu:
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming. ICICS 2011: 360-373 - [c12]Yoon-chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, Dinghao Wu:
Value-based program characterization and its application to software plagiarism detection. ICSE 2011: 756-765 - [c11]Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian:
An Efficient Group-Based Secret Sharing Scheme. ISPEC 2011: 288-301 - [c10]Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun:
Efficient Secret Sharing Schemes. STA 2011: 114-121 - 2010
- [c9]Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu:
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy. CIT 2010: 1299-1305 - [c8]Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing:
Cross-layer comprehensive intrusion harm analysis for production workload server systems. ACSAC 2010: 297-306 - [c7]Daren Zha, Jiwu Jing, Peng Liu, Jingqiang Lin, Xiaoqi Jia:
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. ICCSA (4) 2010: 468-481 - [c6]Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu:
Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. ISPEC 2010: 153-171 - [c5]Chunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun:
Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Operations. NSS 2010: 136-143 - [p1]Peng Liu, Xiaoqi Jia, Shengzhi Zhang, Xi Xiong, Yoon-chan Jhi, Kun Bai, Jason H. Li:
Cross-Layer Damage Assessment for Cyber Situational Awareness. Cyber Situational Awareness 2010: 155-176
2000 – 2009
- 2009
- [c4]Xi Xiong, Xiaoqi Jia, Peng Liu:
SHELF: Preserving Business Continuity and Availability in an Intrusion Recovery System. ACSAC 2009: 484-493 - [c3]Shengzhi Zhang, Xi Xiong, Xiaoqi Jia, Peng Liu:
Availability-sensitive intrusion recovery. VMSec@CCS 2009: 43-48 - 2008
- [c2]Yuewu Wang, Peng Liu, Jiwu Jing, Xiaoqi Jia:
A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. Annual Simulation Symposium 2008: 308-318 - [c1]Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu:
Using virtual machines to do cross-layer damage assessment. VMSec 2008: 29-38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint