Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security AnalyticsJiacen XuXiaokui Shuet al.2024S&P 2024
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion DetectionIsaiah J. KingXiaokui Shuet al.2023RAID 2023
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan LiuXiaokui Shuet al.2022ACSAC 2022
Streamlining and Automating Threat Hunting With KestrelXiaokui ShuPaul Coccoliet al.2022Black Hat USA 2022
An Open Stack for Threat Hunting in Hybrid Cloud With Connected ObservabilityXiaokui ShuFred Araujoet al.2021Black Hat Europe 2021
Towards an Open Format for Scalable System TelemetryTeryl TaylorFrederico Araujoet al.2020Big Data 2020
Unleashing Cyber Reasoning: DARPA Transparent Computing Threat Hunting RetrospectiveXiaokui Shu2020ACSAC 2020
Scarecrow: Deactivating Evasive Malware via Its Own Evasive LogicJialong ZhangZhongshu Guet al.2020DSN 2020