1. SIGL: Securing Software Installations Through Deep Graph Learning (To appear, Preprint)
    Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, and Haifeng Chen
    30th USENIX Security Symposium (USENIX Security’21).
  2. This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage (doi, PDF)
    Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, and Adam Bates
    36th Annual Computer Security Applications Conference 2020 (ACSAC’20).
  3. Vessels: Efficient and Scalable Deep Learning Prediction on Trusted Processors (doi, PDF)
    Kyungtae Kim, Chung Hwan Kim, Junghwan Rhee, Xiao Yu, Haifeng Chen, Dave (Jing) Tian, and Byoungyoung Lee
    ACM Symposium on Cloud Computing 2020 (SoCC’20).
  4. Anomaly Detection on Web-User Behaviors through Deep Learning (doi, PDF)
    Jiaping Gui, Zhengzhang Chen, Xiao Yu, Cristian Lumezanu, and Haifeng Chen
    16th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’20, Posters Session).
  5. Database-Access Performance Antipatterns in Database-Backed Web Applications (doi, PDF)
    Shudi Shao, Zhengyi Qiu, Xiao Yu, Wei Yang, Guoliang Jin, Tao Xie, and Xintao Wu
    36th International Conference on Software Maintenance and Evolution (ICSME’20).
  6. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis (doi, PDF)
    Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, and Haifeng Chen
    27th Network and Distributed System Security Symposium (NDSS’20).
  7. BARRIERFINDER: Recognizing Ad Hoc Barriers (doi)
    Tao Wang, Xiao Yu, Zhengyi Qiu, Guoliang Jin, and Frank Mueller
    Empirical Software Engineering 2020 (Full Paper).
  8. BARRIERFINDER: Recognizing Ad Hoc Barriers (doi, PDF)
    Tao Wang, Xiao Yu, Zhengyi Qiu, Guoliang Jin, and Frank Mueller
    35th International Conference on Software Maintenance and Evolution (ICSME’19, Short Papers Track).
  9. Heterogeneous Graph Matching Networks for Unknown Malware Detection (doi, PDF)
    Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, and Philip Yu
    28th International Joint Conference on Artificial Intelligence (IJCAI’19).
  10. Adversarial Defense Framework for Graph Neural Network (arXiv)
    Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, and Philip S. Yu
  11. Dataflow Tunneling: Mining Inter-request Data Dependencies for Request-based Applications (doi, PDF)
    Xiao Yu and Guoliang Jin
    40th International Conference on Software Engineering (ICSE’18).
  12. CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs (doi, PDF)
    Xiao Yu, Pallavi Joshi, Jianwu Xu, Guoliang Jin, Hui Zhang, and Guofei Jiang
    21st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’16).
  13. Comprehending Performance from Real-World Execution Traces: A Device-Driver Case (doi, PDF)
    Xiao Yu, Shi Han, Dongmei Zhang, and Tao Xie
    19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’14).
  14. AT-EASE: A Tool for Early and Quick Usability Evaluation of Smartphone Applications (PDF)
    Wei Yang and Xiao Yu
    Technical Report, 2013.
  15. A Parallel Approach to Concolic Testing with Low-Cost Synchronization (doi)
    Xiao Yu, Shuai Sun, Geguang Pu, Siyuan Jiang, and Zheng Wang
    Electronic Notes in Theoretical Computer Science, Special Issue on 4th International Workshop on Harnessing Theories for Tool Support in Software (TTSS’10).
  16. Run-time Discovery of Java Design Patterns (doi)
    Kang Miao, Xiao Yu, Siyuan Jiang, and Ji Zhao
    2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC’11).
  17. Java Design Pattern Recognition Based on Relational Calculus (doi, in Chinese)
    Kang Miao, Xiao Yu, Ji Zhao, and Yu Shen
    Application Research of Computers, 2010.
  18. Property Checking for Design Patterns (doi)
    Libo Feng, Xiao Yu, Geguang Pu, Huibiao Zhu, and Bin Gu
    2010 IASTED International Conference on Software Engineering (SE’10).
  19. Towards Scalable Compositional Test Generation (doi)
    Tao Sun, Zheng Wang, Geguang Pu, Xiao Yu, Zongyan Qiu, and Bin Gu
    9th International Conference on Quality Software (QISC’09).
  20. Test Data Generation for Derived Types in C Program (doi)
    Zheng Wang, Xiao Yu, Tao Sun, Geguang Pu, Zuohua Ding, and JueLiang Hu
    3rd IEEE International Symposium on Theoretical Aspects of Software Engineering (TASE’09).
  21. Execution Semantics for rCOS (doi)
    Zheng Wang, Xiao Yu, Geguang Pu, Libo Feng, Huibiao Zhu, and Jifeng He
    15th Asia-Pacific Software Engineering Conference (APSEC’08).
  22. The Verification of rCOS Using Spin (doi)
    Xiao Yu, Zheng Wang, Geguang Pu, Dingding Mao, and Jing Liu
    Electronic Notes in Theoretical Computer Science, Special Issue on 1st International Workshop on Harnessing Theories for Tool Support in Software (TTSS’07).