The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shuo Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chang-Shyh Peng, Shuo Chen, Daisy F. Sang
    Virtual Net: An Efficient Simulation for Parallel Computation. [Citation Graph (0, 0)][DBLP]
    CAINE, 2001, pp:215-219 [Conf]
  2. Guozheng Yan, Banghua Yang, Shuo Chen, Rongguo Yan
    Pattern Recognition Using Hybrid Optimization for a Robot Controlled by Human Thoughts. [Citation Graph (0, 0)][DBLP]
    CBMS, 2006, pp:396-400 [Conf]
  3. Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer
    A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:605-614 [Conf]
  4. Shuo Chen, Jun Xu, Ravishankar K. Iyer, Keith Whisnant
    Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:495-504 [Conf]
  5. Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Defeating Memory Corruption Attacks via Pointer Taintedness Detection. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:378-387 [Conf]
  6. Jun Xu, Shuo Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    An Experimental Study of Security Vulnerabilities Caused by Errors. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:421-432 [Conf]
  7. Jinglong Fang, Shuo Chen, Zhigeng Pan, Yigang Wang
    A Simplification to Support Vector Machine for the Second Training. [Citation Graph (0, 0)][DBLP]
    ICAT Workshops, 2006, pp:73-78 [Conf]
  8. Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang
    A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  9. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
    Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  10. Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:83-100 [Conf]
  11. Ravishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk
    Security Vulnerabilities - From Data Analysis to Protection Mechanisms. [Citation Graph (0, 0)][DBLP]
    WORDS Fall, 2003, pp:331-338 [Conf]
  12. Shuo Chen, Jun Xu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Keith Whisnant
    Modeling and evaluating the security threats of transient errors in firewall software. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2004, v:56, n:1-4, pp:53-72 [Journal]

  13. Modeling Service Quality for Dynamic QoS Publishing. [Citation Graph (, )][DBLP]


  14. What if the Irresponsible Teachers Are Dominating? [Citation Graph (, )][DBLP]


  15. An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. [Citation Graph (, )][DBLP]


  16. Instance- and bag-level manifold regularization for aggregate outputs classification. [Citation Graph (, )][DBLP]


  17. Workshop on compiler and architectural techniques for application reliability and security (CATARS). [Citation Graph (, )][DBLP]


  18. Automatically Segregating Greedy and Malicious Internet Flows. [Citation Graph (, )][DBLP]


  19. Beyond Banditron: A Conservative and Efficient Reduction for Online Multiclass Prediction with Bandit Setting Model. [Citation Graph (, )][DBLP]


  20. Sparse Norm-Regularized Reconstructive Coefficients Learning. [Citation Graph (, )][DBLP]


  21. Kernel K-means Based Framework for Aggregate Outputs Classification. [Citation Graph (, )][DBLP]


  22. Automatic Recommendation of Quality Requirements for Software Services. [Citation Graph (, )][DBLP]


  23. Selecting Informative Universum Sample for Semi-Supervised Learning. [Citation Graph (, )][DBLP]


  24. How to Share Your Favourite Search Results while Preserving Privacy and Quality. [Citation Graph (, )][DBLP]


  25. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. [Citation Graph (, )][DBLP]


  26. Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. [Citation Graph (, )][DBLP]


  27. Residue objects: a challenge to web browser security. [Citation Graph (, )][DBLP]


  28. The "China-brain" project A four year, 3 million RMB project to build a 15, 000 evolved neural net module artificial brain in China. [Citation Graph (, )][DBLP]


  29. The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach. [Citation Graph (, )][DBLP]


  30. A novel comprehensive wave-form MS data processing method. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002