CruParamer: Learning on Parameter-augmented API Sequences for Malware Detection X Chen, Z Hao, L Li, L Cui, Y Zhu, Z Ding, Y Liu IEEE Transactions on Information Forensics and Security, 2022 | 60 | 2022 |
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches H Sun, L Cui, L Li, Z Ding, Z Hao, J Cui, P Liu Computers & Security 110, 102417, 2021 | 58 | 2021 |
VMScatter: migrate virtual machines to many hosts L Cui, J Li, B Li, J Huai, C Hu, T Wo, H Al-Aqrabi, L Liu Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013 | 46 | 2013 |
VulDetector: Detecting Vulnerabilities using Weighted Feature Graph Comparison L Cui, Z Hao, Y Jiao, H Fei, X Yun IEEE Transactions on Information Forensics and Security, 2020 | 44 | 2020 |
Buggraph: Differentiating source-binary code similarity with graph triplet-loss network Y Ji, L Cui, HH Huang Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 43 | 2021 |
Hotsnap: A hot distributed snapshot system for virtual machine cluster L Cui, B Li, Y Zhang, J Li Presented as part of the 27th Large Installation System Administration …, 2013 | 34 | 2013 |
irow: An efficient live snapshot system for virtual machine disk J Li, H Liu, L Cui, B Li, T Wo Parallel and Distributed Systems (ICPADS), 2012 IEEE 18th International …, 2012 | 32 | 2012 |
ShadowMonitor: An effective in-VM monitoring framework with hardware-enforced isolation B Shi, L Cui, B Li, X Liu, Z Hao, H Shen International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018 | 27 | 2018 |
Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters C Lei, H Zhiyu, P Yaqiong, Y Xiaochun IEEE Transactions on Parallel and Distributed Systems, 2017 | 22 | 2017 |
Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters L Cui, Z Hao, C Wang, H Fei, Z Ding Parallel Processing (ICPP), 2016 45th International Conference on, 87-92, 2016 | 22 | 2016 |
Black box attack and network intrusion detection using machine learning for malicious traffic Y Zhu, L Cui, Z Ding, L Li, Y Liu, Z Hao Computers & Security 123, 102922, 2022 | 20 | 2022 |
iMIG: Toward an adaptive live migration method for KVM virtual machines J Li, J Zhao, Y Li, L Cui, B Li, L Liu, J Panneerselvam The Computer Journal 58 (6), 1227-1242, 2014 | 18 | 2014 |
Faceted search in business intelligence on the cloud H Al-Aqrabi, L Liu, R Hill, L Cui, J Li IEEE International Conference on Green Computing and Communications and IEEE …, 2013 | 18 | 2013 |
Software aging in virtualized environments: detection and prediction L Cui, B Li, J Li, J Hardy, L Liu Parallel and Distributed Systems (ICPADS), 2012 IEEE 18th International …, 2012 | 18 | 2012 |
API2Vec: Learning Representations of API Sequences for Malware Detection L Cui, J Cui, Y Ji, Z Hao, L Li, Z Ding Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 17 | 2023 |
Introspection-based memory pruning for live VM migration C Wang, Z Hao, L Cui, X Zhang, X Yun International Journal of Parallel Programming 45, 1298-1309, 2017 | 17 | 2017 |
Vestige: Identifying Binary Code Provenance for Vulnerability Detection Y Ji, L Cui, HH Huang International Conference on Applied Cryptography and Network Security, 287-310, 2021 | 16 | 2021 |
VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory Deduplication Y Huang, R Yang, L Cui, T Wo, C Hu, B Li Service Oriented System Engineering (SOSE), 2014 IEEE 8th International …, 2014 | 16 | 2014 |
HotRestore: a fast restore system for virtual machine cluster L Cui, J Li, T Wo, B Li, R Yang, Y Cao, J Huai 28th Large Installation System Administration Conference (LISA14), 10-25, 2014 | 15 | 2014 |
An empirical study of vulnerability discovery methods over the past ten years L Cui, J Cui, Z Hao, L Li, Z Ding, Y Liu Computers & Security 120, 102817, 2022 | 13 | 2022 |