dblp.uni-trier.dewww.uni-trier.de

Shuo Chen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
20 Hugo de Garis, Jian Yu Tang, Zhiyong Huang, Lu Bai, Cong Chen, Shuo Chen, Junfei Guo, Xianjin Tan, Hao Tian, Xiaohan Tian, Xianjian Wu, Ye Xiong, Xiangqian Yu, Di Huang: The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach. AGI 2008: 107-121
19EEKarthik Pattabiraman, Shuo Chen, Zbigniew Kalbarczyk: Workshop on compiler and architectural techniques for application reliability and security (CATARS). DSN 2008: 544-545
18EEHugo de Garis, Jian Yu Tang, Zhiyong Huang, Lu Bai, Cong Chen, Shuo Chen, Junfei Guo, Xianjin Tan, Tian Hao, Xiaohan Tian, Xianjian Wu, Ye Xiong, Yu Xianggian, Di Huang: The "China-brain" project A four year, 3 million RMB project to build a 15, 000 evolved neural net module artificial brain in China. IEEE Congress on Evolutionary Computation 2008: 503-510
17EEQixing Du, Chi-Hung Chi, Shuo Chen, Jianming Deng: Modeling Service Quality for Dynamic QoS Publishing. IEEE SCC (2) 2008: 307-314
2007
16EEShuo Chen, David Ross, Yi-Min Wang: An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. ACM Conference on Computer and Communications Security 2007: 2-11
15EEJosé Carlos Brustoloni, Shuo Chen: Automatically Segregating Greedy and Malicious Internet Flows. ICC 2007: 1949-1954
14EESiMing Li, Chi-Hung Chi, Chen Ding, Shuo Chen, Ying Huang: Automatic Recommendation of Quality Requirements for Software Services. ICEBE 2007: 679-685
13EEShuo Chen, Don Hong, Yu Shyr: Wavelet-based procedures for proteomic mass spectrometry data processing. Computational Statistics & Data Analysis 52(1): 211-220 (2007)
2006
12EEGuozheng Yan, Banghua Yang, Shuo Chen, Rongguo Yan: Pattern Recognition Using Hybrid Optimization for a Robot Controlled by Human Thoughts. CBMS 2006: 396-400
11EEJinglong Fang, Shuo Chen, Zhigeng Pan, Yigang Wang: A Simplification to Support Vector Machine for the Second Training. ICAT Workshops 2006: 73-78
10EEYi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006
2005
9EEShuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Defeating Memory Corruption Attacks via Pointer Taintedness Detection. DSN 2005: 378-387
8EEShuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang: A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. NDSS 2005
2004
7 Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. SEC 2004: 83-100
6EEShuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Keith Whisnant: Modeling and evaluating the security threats of transient errors in firewall software. Perform. Eval. 56(1-4): 53-72 (2004)
2003
5EEShuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer: A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. DSN 2003: 605-614
4EERavishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk: Security Vulnerabilities - From Data Analysis to Protection Mechanisms. WORDS Fall 2003: 331-338
2002
3EEShuo Chen, Jun Xu, Ravishankar K. Iyer, Keith Whisnant: Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. DSN 2002: 495-504
2001
2 Chang-Shyh Peng, Shuo Chen, Daisy F. Sang: Virtual Net: An Efficient Simulation for Parallel Computation. CAINE 2001: 215-219
1EEJun Xu, Shuo Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer: An Experimental Study of Security Vulnerabilities Caused by Errors. DSN 2001: 421-432

Coauthor Index

1Lu Bai [18] [20]
2Doug Beck [10]
3José Carlos Brustoloni (Jose Carlos Brustoloni) [15]
4Cong Chen [18] [20]
5Chi-Hung Chi [14] [17]
6Jianming Deng [17]
7Chen Ding [14]
8Qixing Du [17]
9John Dunagan [8]
10Jinglong Fang [11]
11Hugo de Garis [18] [20]
12Junfei Guo [18] [20]
13Tian Hao [18]
14Don Hong [13]
15Di Huang [18] [20]
16Ying Huang [14]
17Zhiyong Huang [18] [20]
18Ravishankar K. Iyer (Ravi K. Iyer) [1] [3] [4] [5] [6] [7] [9]
19Xuxian Jiang [10]
20Zbigniew Kalbarczyk [1] [4] [5] [6] [7] [9] [19]
21Samuel T. King [10]
22SiMing Li [14]
23Nithin Nakka [9]
24Zhigeng Pan [11]
25Karthik Pattabiraman [7] [19]
26Chang-Shyh Peng [2]
27David Ross [16]
28Roussi Roussev [10]
29Daisy F. Sang [2]
30Yu Shyr [13]
31Xianjin Tan [18] [20]
32Jian Yu Tang [18] [20]
33Hao Tian [20]
34Xiaohan Tian [18] [20]
35Chad Verbowski [8] [10]
36Yi-Min Wang [8] [10] [16]
37Yigang Wang [11]
38Keith Whisnant [3] [6]
39Xianjian Wu [18] [20]
40Yu Xianggian [18]
41Ye Xiong [18] [20]
42Jun Xu [1] [3] [4] [5] [6] [9]
43Guozheng Yan [12]
44Rongguo Yan [12]
45Banghua Yang [12]
46Xiangqian Yu [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)