Search the dblp DataBase
Shuo Chen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chang-Shyh Peng , Shuo Chen , Daisy F. Sang Virtual Net: An Efficient Simulation for Parallel Computation. [Citation Graph (0, 0)][DBLP ] CAINE, 2001, pp:215-219 [Conf ] Guozheng Yan , Banghua Yang , Shuo Chen , Rongguo Yan Pattern Recognition Using Hybrid Optimization for a Robot Controlled by Human Thoughts. [Citation Graph (0, 0)][DBLP ] CBMS, 2006, pp:396-400 [Conf ] Shuo Chen , Zbigniew Kalbarczyk , Jun Xu , Ravishankar K. Iyer A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities. [Citation Graph (0, 0)][DBLP ] DSN, 2003, pp:605-614 [Conf ] Shuo Chen , Jun Xu , Ravishankar K. Iyer , Keith Whisnant Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. [Citation Graph (0, 0)][DBLP ] DSN, 2002, pp:495-504 [Conf ] Shuo Chen , Jun Xu , Nithin Nakka , Zbigniew Kalbarczyk , Ravishankar K. Iyer Defeating Memory Corruption Attacks via Pointer Taintedness Detection. [Citation Graph (0, 0)][DBLP ] DSN, 2005, pp:378-387 [Conf ] Jun Xu , Shuo Chen , Zbigniew Kalbarczyk , Ravishankar K. Iyer An Experimental Study of Security Vulnerabilities Caused by Errors. [Citation Graph (0, 0)][DBLP ] DSN, 2001, pp:421-432 [Conf ] Jinglong Fang , Shuo Chen , Zhigeng Pan , Yigang Wang A Simplification to Support Vector Machine for the Second Training. [Citation Graph (0, 0)][DBLP ] ICAT Workshops, 2006, pp:73-78 [Conf ] Shuo Chen , John Dunagan , Chad Verbowski , Yi-Min Wang A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Yi-Min Wang , Doug Beck , Xuxian Jiang , Roussi Roussev , Chad Verbowski , Shuo Chen , Samuel T. King Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP ] NDSS, 2006, pp:- [Conf ] Shuo Chen , Karthik Pattabiraman , Zbigniew Kalbarczyk , Ravishankar K. Iyer Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:83-100 [Conf ] Ravishankar K. Iyer , Shuo Chen , Jun Xu , Zbigniew Kalbarczyk Security Vulnerabilities - From Data Analysis to Protection Mechanisms. [Citation Graph (0, 0)][DBLP ] WORDS Fall, 2003, pp:331-338 [Conf ] Shuo Chen , Jun Xu , Zbigniew Kalbarczyk , Ravishankar K. Iyer , Keith Whisnant Modeling and evaluating the security threats of transient errors in firewall software. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2004, v:56, n:1-4, pp:53-72 [Journal ] Modeling Service Quality for Dynamic QoS Publishing. [Citation Graph (, )][DBLP ] What if the Irresponsible Teachers Are Dominating? [Citation Graph (, )][DBLP ] An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism. [Citation Graph (, )][DBLP ] Instance- and bag-level manifold regularization for aggregate outputs classification. [Citation Graph (, )][DBLP ] Workshop on compiler and architectural techniques for application reliability and security (CATARS). [Citation Graph (, )][DBLP ] Automatically Segregating Greedy and Malicious Internet Flows. [Citation Graph (, )][DBLP ] Beyond Banditron: A Conservative and Efficient Reduction for Online Multiclass Prediction with Bandit Setting Model. [Citation Graph (, )][DBLP ] Sparse Norm-Regularized Reconstructive Coefficients Learning. [Citation Graph (, )][DBLP ] Kernel K-means Based Framework for Aggregate Outputs Classification. [Citation Graph (, )][DBLP ] Automatic Recommendation of Quality Requirements for Software Services. [Citation Graph (, )][DBLP ] Selecting Informative Universum Sample for Semi-Supervised Learning. [Citation Graph (, )][DBLP ] How to Share Your Favourite Search Results while Preserving Privacy and Quality. [Citation Graph (, )][DBLP ] Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. [Citation Graph (, )][DBLP ] Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. [Citation Graph (, )][DBLP ] Residue objects: a challenge to web browser security. [Citation Graph (, )][DBLP ] The "China-brain" project A four year, 3 million RMB project to build a 15, 000 evolved neural net module artificial brain in China. [Citation Graph (, )][DBLP ] The China-Brain Project: Building China's Artificial Brain Using an Evolved Neural Net Module Approach. [Citation Graph (, )][DBLP ] A novel comprehensive wave-form MS data processing method. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.305secs