2008 | ||
---|---|---|
20 | Hugo de Garis, Jian Yu Tang, Zhiyong Huang, Lu Bai, Cong Chen, Shuo Chen, Junfei Guo, Xianjin Tan, Hao Tian, Xiaohan Tian, Xianjian Wu, Ye Xiong, Xiangqian Yu, Di Huang: The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach. AGI 2008: 107-121 | |
19 | EE | Karthik Pattabiraman, Shuo Chen, Zbigniew Kalbarczyk: Workshop on compiler and architectural techniques for application reliability and security (CATARS). DSN 2008: 544-545 |
18 | EE | Hugo de Garis, Jian Yu Tang, Zhiyong Huang, Lu Bai, Cong Chen, Shuo Chen, Junfei Guo, Xianjin Tan, Tian Hao, Xiaohan Tian, Xianjian Wu, Ye Xiong, Yu Xianggian, Di Huang: The "China-brain" project A four year, 3 million RMB project to build a 15, 000 evolved neural net module artificial brain in China. IEEE Congress on Evolutionary Computation 2008: 503-510 |
17 | EE | Qixing Du, Chi-Hung Chi, Shuo Chen, Jianming Deng: Modeling Service Quality for Dynamic QoS Publishing. IEEE SCC (2) 2008: 307-314 |
2007 | ||
16 | EE | Shuo Chen, David Ross, Yi-Min Wang: An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. ACM Conference on Computer and Communications Security 2007: 2-11 |
15 | EE | José Carlos Brustoloni, Shuo Chen: Automatically Segregating Greedy and Malicious Internet Flows. ICC 2007: 1949-1954 |
14 | EE | SiMing Li, Chi-Hung Chi, Chen Ding, Shuo Chen, Ying Huang: Automatic Recommendation of Quality Requirements for Software Services. ICEBE 2007: 679-685 |
13 | EE | Shuo Chen, Don Hong, Yu Shyr: Wavelet-based procedures for proteomic mass spectrometry data processing. Computational Statistics & Data Analysis 52(1): 211-220 (2007) |
2006 | ||
12 | EE | Guozheng Yan, Banghua Yang, Shuo Chen, Rongguo Yan: Pattern Recognition Using Hybrid Optimization for a Robot Controlled by Human Thoughts. CBMS 2006: 396-400 |
11 | EE | Jinglong Fang, Shuo Chen, Zhigeng Pan, Yigang Wang: A Simplification to Support Vector Machine for the Second Training. ICAT Workshops 2006: 73-78 |
10 | EE | Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King: Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. NDSS 2006 |
2005 | ||
9 | EE | Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Defeating Memory Corruption Attacks via Pointer Taintedness Detection. DSN 2005: 378-387 |
8 | EE | Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang: A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. NDSS 2005 |
2004 | ||
7 | Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer: Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. SEC 2004: 83-100 | |
6 | EE | Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Keith Whisnant: Modeling and evaluating the security threats of transient errors in firewall software. Perform. Eval. 56(1-4): 53-72 (2004) |
2003 | ||
5 | EE | Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer: A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. DSN 2003: 605-614 |
4 | EE | Ravishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk: Security Vulnerabilities - From Data Analysis to Protection Mechanisms. WORDS Fall 2003: 331-338 |
2002 | ||
3 | EE | Shuo Chen, Jun Xu, Ravishankar K. Iyer, Keith Whisnant: Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. DSN 2002: 495-504 |
2001 | ||
2 | Chang-Shyh Peng, Shuo Chen, Daisy F. Sang: Virtual Net: An Efficient Simulation for Parallel Computation. CAINE 2001: 215-219 | |
1 | EE | Jun Xu, Shuo Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer: An Experimental Study of Security Vulnerabilities Caused by Errors. DSN 2001: 421-432 |