2008 |
20 | | Hugo de Garis,
Jian Yu Tang,
Zhiyong Huang,
Lu Bai,
Cong Chen,
Shuo Chen,
Junfei Guo,
Xianjin Tan,
Hao Tian,
Xiaohan Tian,
Xianjian Wu,
Ye Xiong,
Xiangqian Yu,
Di Huang:
The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach.
AGI 2008: 107-121 |
19 | EE | Karthik Pattabiraman,
Shuo Chen,
Zbigniew Kalbarczyk:
Workshop on compiler and architectural techniques for application reliability and security (CATARS).
DSN 2008: 544-545 |
18 | EE | Hugo de Garis,
Jian Yu Tang,
Zhiyong Huang,
Lu Bai,
Cong Chen,
Shuo Chen,
Junfei Guo,
Xianjin Tan,
Tian Hao,
Xiaohan Tian,
Xianjian Wu,
Ye Xiong,
Yu Xianggian,
Di Huang:
The "China-brain" project A four year, 3 million RMB project to build a 15, 000 evolved neural net module artificial brain in China.
IEEE Congress on Evolutionary Computation 2008: 503-510 |
17 | EE | Qixing Du,
Chi-Hung Chi,
Shuo Chen,
Jianming Deng:
Modeling Service Quality for Dynamic QoS Publishing.
IEEE SCC (2) 2008: 307-314 |
2007 |
16 | EE | Shuo Chen,
David Ross,
Yi-Min Wang:
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism.
ACM Conference on Computer and Communications Security 2007: 2-11 |
15 | EE | José Carlos Brustoloni,
Shuo Chen:
Automatically Segregating Greedy and Malicious Internet Flows.
ICC 2007: 1949-1954 |
14 | EE | SiMing Li,
Chi-Hung Chi,
Chen Ding,
Shuo Chen,
Ying Huang:
Automatic Recommendation of Quality Requirements for Software Services.
ICEBE 2007: 679-685 |
13 | EE | Shuo Chen,
Don Hong,
Yu Shyr:
Wavelet-based procedures for proteomic mass spectrometry data processing.
Computational Statistics & Data Analysis 52(1): 211-220 (2007) |
2006 |
12 | EE | Guozheng Yan,
Banghua Yang,
Shuo Chen,
Rongguo Yan:
Pattern Recognition Using Hybrid Optimization for a Robot Controlled by Human Thoughts.
CBMS 2006: 396-400 |
11 | EE | Jinglong Fang,
Shuo Chen,
Zhigeng Pan,
Yigang Wang:
A Simplification to Support Vector Machine for the Second Training.
ICAT Workshops 2006: 73-78 |
10 | EE | Yi-Min Wang,
Doug Beck,
Xuxian Jiang,
Roussi Roussev,
Chad Verbowski,
Shuo Chen,
Samuel T. King:
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
NDSS 2006 |
2005 |
9 | EE | Shuo Chen,
Jun Xu,
Nithin Nakka,
Zbigniew Kalbarczyk,
Ravishankar K. Iyer:
Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
DSN 2005: 378-387 |
8 | EE | Shuo Chen,
John Dunagan,
Chad Verbowski,
Yi-Min Wang:
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities.
NDSS 2005 |
2004 |
7 | | Shuo Chen,
Karthik Pattabiraman,
Zbigniew Kalbarczyk,
Ravishankar K. Iyer:
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
SEC 2004: 83-100 |
6 | EE | Shuo Chen,
Jun Xu,
Zbigniew Kalbarczyk,
Ravishankar K. Iyer,
Keith Whisnant:
Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Eval. 56(1-4): 53-72 (2004) |
2003 |
5 | EE | Shuo Chen,
Zbigniew Kalbarczyk,
Jun Xu,
Ravishankar K. Iyer:
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
DSN 2003: 605-614 |
4 | EE | Ravishankar K. Iyer,
Shuo Chen,
Jun Xu,
Zbigniew Kalbarczyk:
Security Vulnerabilities - From Data Analysis to Protection Mechanisms.
WORDS Fall 2003: 331-338 |
2002 |
3 | EE | Shuo Chen,
Jun Xu,
Ravishankar K. Iyer,
Keith Whisnant:
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors.
DSN 2002: 495-504 |
2001 |
2 | | Chang-Shyh Peng,
Shuo Chen,
Daisy F. Sang:
Virtual Net: An Efficient Simulation for Parallel Computation.
CAINE 2001: 215-219 |
1 | EE | Jun Xu,
Shuo Chen,
Zbigniew Kalbarczyk,
Ravishankar K. Iyer:
An Experimental Study of Security Vulnerabilities Caused by Errors.
DSN 2001: 421-432 |