Password correlation: Quantification, evaluation and applicationShouling JiShukun Yanget al.2017INFOCOM 2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of PasswordsShouling JiShukun Yanget al.2017IEEE TDSC
BAYWATCH: Robust beaconing detection to identify infected hosts in large-scale enterprise networksXin HuJiyong Janget al.2016DSN 2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysisJialong ZhangXin Huet al.2016INFOCOM 2016
Scalable malware classification with multifaceted content features and threat intelligenceXin HuJiyong Janget al.2016IBM J. Res. Dev
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev
Passive security intelligence to analyze the security risks of mobile/BYOD activitiesMarc StoecklinKapil Singhet al.2016IBM J. Res. Dev
Scalable analytics to detect DNS misuse for establishing stealthy communication channelsDouglas L. SchalesJiyong Janget al.2016IBM J. Res. Dev
Detecting malicious exploit kits using tree-based similarity searchesTeryl TaylorXin Huet al.2016CODASPY 2016