default search action
Xiaobo Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz:
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks. IEEE Trans. Inf. Forensics Secur. 19: 777-792 (2024) - [j28]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
On Smartly Scanning of the Internet of Things. IEEE/ACM Trans. Netw. 32(2): 1019-1034 (2024) - [j27]Yang Li, Zhenhua Li, Zhenhua Han, Quanlu Zhang, Xiaobo Ma:
Automating Cloud Deployment for Real-Time Online Foundation Model Inference. IEEE/ACM Trans. Netw. 32(2): 1509-1523 (2024) - [j26]Xiaobo Ma, Jian Qu, Mawei Shi, Bingyu An, Jianfeng Li, Xiapu Luo, Junjie Zhang, Zhenhua Li, Xiaohong Guan:
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures. IEEE/ACM Trans. Netw. 32(3): 1904-1919 (2024) - [c31]Jianfeng Li, Zheng Lin, Xiaobo Ma, Jianhao Li, Jian Qu, Xiapu Luo, Xiaohong Guan:
DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization. INFOCOM 2024: 1651-1660 - [i9]Jian Qu, Xiaobo Ma, Jianfeng Li:
TrafficGPT: Breaking the Token Barrier for Efficient Long Traffic Analysis and Generation. CoRR abs/2403.05822 (2024) - [i8]Xiaobo Ma, Pengyu Pan, Jianfeng Li, Wei Wang, Weizhi Meng, Xiaohong Guan:
ABC-Channel: An Advanced Blockchain-based Covert Channel. CoRR abs/2403.06261 (2024) - [i7]Zijian Zhang, Yujie Sun, Zepu Wang, Yuqi Nie, Xiaobo Ma, Peng Sun, Ruolin Li:
Large Language Models for Mobility in Transportation Systems: A Survey on Forecasting Tasks. CoRR abs/2405.02357 (2024) - [i6]Zepu Wang, Xiaobo Ma, Huajie Yang, Weimin Lvu, Peng Sun, Sharath Chandra Guntuku:
Uncertainty-Aware Crime Prediction With Spatial Temporal Multivariate Graph Neural Networks. CoRR abs/2408.04193 (2024) - 2023
- [j25]Qing Wang, Cong Dong, Shijie Jian, Dan Du, Zhigang Lu, Yinhao Qi, Dongxu Han, Xiaobo Ma, Fei Wang, Yuling Liu:
HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection. Comput. Secur. 125: 103059 (2023) - [j24]Jian Qu, Xiaobo Ma, Wenmao Liu:
Who is DNS serving for? A human-software perspective of modeling DNS services. Knowl. Based Syst. 263: 110279 (2023) - [j23]Jinpeng Han, Manzhi Yang, Xiaoguang Chen, Hongtao Liu, Yuntao Wang, Jianhao Li, Zhou Su, Zhen Li, Xiaobo Ma:
ParaDefender: A Scenario-Driven Parallel System for Defending Metaverses. IEEE Trans. Syst. Man Cybern. Syst. 53(4): 2118-2127 (2023) - [c30]Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan:
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. USENIX Security Symposium 2023: 589-606 - [i5]Xiaobo Ma, Abolfazl Karimpour, Yao-Jan Wu:
On-ramp and Off-ramp Traffic Flows Estimation Based on A Data-driven Transfer Learning Framework. CoRR abs/2308.03538 (2023) - [i4]Xiaobo Ma, Adrian Cottam, Mohammad Razaur Rahman Shaon, Yao-Jan Wu:
A Transfer Learning Framework for Proactive Ramp Metering Performance Assessment. CoRR abs/2308.03542 (2023) - 2022
- [j22]Xiaobo Ma, Yongbin Liu, Chunping Ouyang:
Capturing semantic features to improve Chinese event detection. CAAI Trans. Intell. Technol. 7(2): 219-227 (2022) - [j21]Jingtao Liang, Jihong Dong, Su Zhang, Cong Zhao, Bin Liu, Lei Yang, Shengwu Yan, Xiaobo Ma:
Discussion on InSAR Identification Effectivity of Potential Landslides and Factors That Influence the Effectivity. Remote. Sens. 14(8): 1952 (2022) - [j20]Cong Zhao, Jingtao Liang, Su Zhang, Jihong Dong, Shengwu Yan, Lei Yang, Bin Liu, Xiaobo Ma, Weile Li:
Integration of Sentinel-1A, ALOS-2 and GF-1 Datasets for Identifying Landslides in the Three Parallel Rivers Region, China. Remote. Sens. 14(19): 5031 (2022) - [j19]Bing Sun, Xinjiang Wang, Xiaobo Ma, Zhongyuan Sun, Zhiqiang Wang, Zuxing Zhang, Kaiming Zhou:
Magnetic-Based Polydimethylsiloxane Microspheres for Magnetic Field Measurement. IEEE Trans. Instrum. Meas. 71: 1-7 (2022) - [j18]Liangyi Gong, Zhenhua Li, Hongyi Wang, Hao Lin, Xiaobo Ma, Yunhao Liu:
Overlay-Based Android Malware Detection at Market Scales: Systematically Adapting to the New Technological Landscape. IEEE Trans. Mob. Comput. 21(12): 4488-4501 (2022) - [j17]Xiaobo Ma, Jian Qu, Jianfeng Li, John C. S. Lui, Zhenhua Li, Wenmao Liu, Xiaohong Guan:
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting. IEEE/ACM Trans. Netw. 30(1): 394-408 (2022) - [j16]Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, Xiaobo Ma:
PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Trans. Software Eng. 48(2): 551-570 (2022) - [c29]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
Landing Reinforcement Learning onto Smart Scanning of The Internet of Things. INFOCOM 2022: 2088-2097 - [c28]Jianfeng Li, Shuohan Wu, Hao Zhou, Xiapu Luo, Ting Wang, Yangyang Liu, Xiaobo Ma:
Packet-Level Open-World App Fingerprinting on Wireless Traffic. NDSS 2022 - [c27]Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma:
FOAP: Fine-Grained Open-World Android App Fingerprinting. USENIX Security Symposium 2022: 1579-1596 - 2021
- [j15]Xin Wang, Xiaobo Ma, Jiahao Peng, Jianfeng Li, Lei Xue, Wenjun Hu, Li Feng:
On Modeling Link Flooding Attacks and Defenses. IEEE Access 9: 159198-159217 (2021) - [j14]Xiaobo Ma, Jian Qu, Feitong Chen, Wenmao Liu, Jianfeng Li, Jing Tao, Hongshan Jiao, Mawei Shi, Zhi-Li Zhang:
One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers. IEEE Commun. Mag. 59(2): 64-69 (2021) - [j13]Liangyi Gong, Hao Lin, Zhenhua Li, Feng Qian, Yang Li, Xiaobo Ma, Yunhao Liu:
Systematically Landing Machine Learning onto Market-Scale Mobile Malware Detection. IEEE Trans. Parallel Distributed Syst. 32(7): 1615-1628 (2021) - [c26]Jian Qu, Xiaobo Ma, Wenmao Liu:
Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery. DSA 2021: 152-160 - [c25]Xin Wang, Xiaobo Ma, Jian Qu:
A Link Flooding Attack Detection Method based on Non-Cooperative Active Measurement. DSA 2021: 172-177 - [c24]Shuangshuang Huang, Xiaobo Ma, Huafeng Bian:
Effectively and Efficiently Defending Shadowsocks against Website Fingerprinting Attacks. DSA 2021: 251-256 - [c23]Huafeng Bian, Xiaobo Ma, Pengyu Pan:
On the Performance Evaluation of Congestion Control Algorithms against DDoS Attacks. DSA 2021: 284-288 - [c22]Pengyu Pan, Xiaobo Ma, Huafeng Bian:
Exploiting Bitcoin Mining Pool for Stealthy and Flexible Botnet Channels. DSA 2021: 741-742 - [c21]Xiaobo Ma, Mawei Shi, Bingyu An, Jianfeng Li, Daniel Xiapu Luo, Junjie Zhang, Xiaohong Guan:
Context-aware Website Fingerprinting over Encrypted Proxies. INFOCOM 2021: 1-10 - [c20]Jianfeng Li, Kaifa Zhao, Yajuan Tang, Xiapu Luo, Xiaobo Ma:
Inaccurate Prediction Is Not Always Bad: Open-World Driver Recognition via Error Analysis. VTC Spring 2021: 1-7 - 2020
- [j12]Yang Hu, John C. S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang:
Taming energy cost of disk encryption software on data-intensive mobile devices. Future Gener. Comput. Syst. 107: 681-691 (2020) - [j11]Xiaobo Ma, Bo An, Mengchen Zhao, Xiapu Luo, Lei Xue, Zhenhua Li, Tony T. N. Miu, Xiaohong Guan:
Randomized Security Patrolling for Link Flooding Attack Detection. IEEE Trans. Dependable Secur. Comput. 17(4): 795-812 (2020) - [c19]Xiaobo Ma, Yongbin Liu, Chunping Ouyang:
Hybrid Syntactic Graph Convolutional Networks for Chinese Event Detection. CCKS 2020: 147-159 - [c18]Xianlei Zhang, Xiaobo Ma, Xiao Han, Bo She, Wei Li:
An Uncertainty-Based Traffic Training Approach to Efficiently Identifying Encrypted Proxies. ICAIT 2020: 95-99 - [c17]Jun Zhang, Daoxing Guo, Xiaobo Ma:
RSS-Based Localization Using Bayesian Hierarchical Model with Spatially Correlated Shadow Fading. ICCT 2020: 147-152 - [c16]Xiaobo Ma, Jian Qu, Jianfeng Li, John C. S. Lui, Zhenhua Li, Xiaohong Guan:
Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting. INFOCOM 2020: 894-903 - [c15]Binbin Wu, Bangning Zhang, Bing Zhao, Daoxing Guo, Xiaobo Ma, Guofeng Wei:
A Potential Game Approach to Multiple UAVs 3D Placement in Iot Communication Networks. WCSP 2020: 660-665
2010 – 2019
- 2019
- [j10]Tao Zhang, Wenjun Hu, Xiapu Luo, Xiaobo Ma:
A Commit Messages-Based Bug Localization for Android Applications. Int. J. Softw. Eng. Knowl. Eng. 29(4): 457-487 (2019) - [j9]Xiaobo Ma, Jianfeng Li, Yajuan Tang, Bo An, Xiaohong Guan:
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective. Inf. Sci. 479: 486-502 (2019) - [j8]Zhenhua Li, Yongfeng Zhang, Yunhao Liu, Tianyin Xu, Ennan Zhai, Yao Liu, Xiaobo Ma, Zhenyu Li:
A Quantitative and Comparative Study of Network-Level Efficiency for Cloud Storage Services. ACM Trans. Model. Perform. Evaluation Comput. Syst. 4(1): 3:1-3:32 (2019) - [c14]Shuang Zhao, Xiaobo Ma, Wei Zou, Bo Bai:
DeepCG: Classifying Metamorphic Malware Through Deep Learning of Call Graphs. SecureComm (1) 2019: 171-190 - 2018
- [j7]Xiaobo Ma, Yihui He, Xiapu Luo, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan:
Camera Placement Based on Vehicle Traffic for Better City Security Surveillance. IEEE Intell. Syst. 33(4): 49-61 (2018) - [j6]Shuang Zhao, Xiapu Luo, Xiaobo Ma, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. Secur. Commun. Networks 2018: 3182402:1-3182402:22 (2018) - [j5]Lei Xue, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, TungNgai Miu, Guofei Gu:
LinkScope: Toward Detecting Target Link Flooding Attacks. IEEE Trans. Inf. Forensics Secur. 13(10): 2423-2438 (2018) - [c13]Jianfeng Li, Xiaobo Ma, Guodong Li, Xiapu Luo, Junjie Zhang, Wei Li, Xiaohong Guan:
Can We Learn what People are Doing from Raw DNS Queries? INFOCOM 2018: 2240-2248 - [c12]Yankang Zhao, Xiaobo Ma, Jianfeng Li, Shui Yu, Wei Li:
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks. NSS 2018: 319-336 - [c11]Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu:
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks. NSS 2018: 436-451 - 2017
- [j4]Jianfeng Li, Xiaobo Ma, Junjie Zhang, Jing Tao, Pinghui Wang, Xiaohong Guan:
Mining repeating pattern in packet arrivals: Metrics, models, and applications. Inf. Sci. 408: 1-22 (2017) - [c10]Lei Xue, Xiaobo Ma, Xiapu Luo, Le Yu, Shuai Wang, Ting Chen:
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement. INFOCOM 2017: 1-9 - [c9]Shengtuo Hu, Xiaobo Ma, Muhui Jiang, Xiapu Luo, Man Ho Au:
AutoFlowLeaker: Circumventing Web Censorship through Automation Services. SRDS 2017: 214-223 - [i3]Xiaobo Ma, Yihui He, Xiapu Luo, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan:
Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance. CoRR abs/1705.08508 (2017) - 2016
- [c8]Shuang Zhao, Xiapu Luo, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, Man Ho Au:
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing. ACISP (1) 2016: 3-19 - [c7]Yang Hu, John C. S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang:
Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices. FNC/MobiSPC 2016: 83-90 - [i2]Yang Hu, John C. S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang:
Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices. CoRR abs/1604.07543 (2016) - 2015
- [j3]Xiaobo Ma, Junjie Zhang, Zhenhua Li, Jianfeng Li, Jing Tao, Xiaohong Guan, John C. S. Lui, Don Towsley:
Accurate DNS query characteristics estimation via active probing. J. Netw. Comput. Appl. 47: 72-84 (2015) - [j2]Shanyu Huang, Yuxin Miao, Guangming Zhao, Fei Yuan, Xiaobo Ma, Chuanxiang Tan, Weifeng Yu, Martin L. Gnyp, Victoria I. S. Lenz-Wiedemann, Uwe Rascher, Georg Bareth:
Satellite Remote Sensing-Based In-Season Diagnosis of Rice Nitrogen Status in Northeast China. Remote. Sens. 7(8): 10646-10667 (2015) - [c6]Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan:
Modeling repeating behaviors in packet arrivals: Detection and measurement. INFOCOM 2015: 2461-2469 - 2014
- [j1]Xiaobo Ma, Junjie Zhang, Jing Tao, Jianfeng Li, Jue Tian, Xiaohong Guan:
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints. IEEE Trans. Inf. Forensics Secur. 9(11): 1906-1921 (2014) - [c5]Wenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, Ting Han:
MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph. ICCCN 2014: 1-7 - 2013
- [c4]Jianfeng Li, Xiaobo Ma, Jing Tao, Xiaohong Guan:
Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting. ICC 2013: 2540-2544 - [i1]Junzhou Zhao, Pinghui Wang, Jing Tao, Xiaobo Ma, Xiaohong Guan:
A Peep on the Interplays between Online Video Websites and Online Social Networks. CoRR abs/1305.4018 (2013) - 2012
- [c3]Shuang Zhao, Patrick P. C. Lee, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao:
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. ACSAC 2012: 119-128 - [c2]Xiaobo Ma, Jianfeng Li, Jing Tao, Xiaohong Guan:
Towards active measurement for DNS query behavior of botnets. GLOBECOM 2012: 845-849 - 2010
- [c1]Xiaobo Ma, Xiaohong Guan, Jing Tao, Qinghua Zheng, Yun Guo, Lu Liu, Shuang Zhao:
A Novel IRC Botnet Detection Method Based on Packet Size Sequence. ICC 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint