| 2008 |
| 16 | EE | Rui Wang,
XiaoFeng Wang,
Kehuan Zhang,
Zhuowei Li:
Towards automatic reverse engineering of software security configurations.
ACM Conference on Computer and Communications Security 2008: 245-256 |
| 15 | EE | Zhuowei Li,
XiaoFeng Wang,
Zhenkai Liang,
Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures.
DSN 2008: 237-246 |
| 14 | EE | Rui Wang,
XiaoFeng Wang,
Zhuowei Li:
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software .
USENIX Security Symposium 2008: 291-306 |
| 13 | EE | XiaoFeng Wang,
Zhuowei Li,
Jong Youl Choi,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil:
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software.
ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
| 2007 |
| 12 | EE | Zhuowei Li,
XiaoFeng Wang,
Jong Youl Choi:
SpyShield: Preserving Privacy from Spy Add-Ons.
RAID 2007: 296-316 |
| 11 | EE | Zhuowei Li,
Amitabha Das,
Jianying Zhou:
Evaluating the Effects of Model Generalization on Intrusion Detection Performance.
SEC 2007: 421-432 |
| 10 | EE | Zhuowei Li,
Amitabha Das,
Jianying Zhou:
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.
TrustBus 2007: 54-64 |
| 2006 |
| 9 | EE | XiaoFeng Wang,
Zhuowei Li,
Jun Xu,
Michael K. Reiter,
Chongkyung Kil,
Jong Youl Choi:
Packet vaccine: black-box exploit detection and signature generation.
ACM Conference on Computer and Communications Security 2006: 37-46 |
| 8 | EE | Zhuowei Li,
Amitabha Das:
Analyzing and evaluating dynamics in stide performance for intrusion detection.
Knowl.-Based Syst. 19(7): 576-591 (2006) |
| 2005 |
| 7 | EE | Zhuowei Li,
Amitabha Das,
Jianying Zhou:
Model Generalization and Its Implications on Intrusion Detection.
ACNS 2005: 222-237 |
| 6 | EE | Zhuowei Li,
Amitabha Das:
M of N Features vs. Intrusion Detection.
ICCSA (1) 2005: 994-1003 |
| 5 | EE | Zhuowei Li,
Amitabha Das,
Sabu Emmanuel:
Model Redundancy vs. Intrusion Detection.
ISPEC 2005: 217-229 |
| 4 | EE | Zhuowei Li,
Amitabha Das,
Jianying Zhou:
USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection.
PAKDD 2005: 702-712 |
| 2004 |
| 3 | EE | Zhuowei Li,
Amitabha Das:
Visualizing and Identifying Intrusion Context from System Calls Trace.
ACSAC 2004: 61-70 |
| 2 | EE | Zhuowei Li,
Amitabha Das:
Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors
CoRR cs.CR/0410068: (2004) |
| 2003 |
| 1 | EE | Zhuowei Li,
Amitabha Das,
Sukumar Nandi:
Utilizing Statistical Characteristics of N-grams for Intrusion Detection.
CW 2003: 486-493 |