2015 - Fellow of the American Association for the Advancement of Science (AAAS)
Dongyan Xu spends much of his time researching Computer network, Virtual machine, Distributed computing, Operating system and Malware. The concepts of his Computer network study are interwoven with issues in Key and Service level requirement. His research in Virtual machine intersects with topics in Temporal isolation among virtual machines, Virtualization and Hypervisor.
His research integrates issues of Network topology, Randomized algorithm, Resource and Brooks–Iyengar algorithm in his study of Distributed computing. His work in Operating system addresses issues such as Kernel, which are connected to fields such as Privilege level and Embedded system. When carried out as part of a general Malware research project, his work on Rootkit is frequently linked to work in Semantic gap, therefore connecting diverse disciplines of study.
His main research concerns Distributed computing, Computer network, Operating system, Virtual machine and Virtualization. His Distributed computing research focuses on subjects like Middleware, which are linked to Scalability. His biological study spans a wide range of topics, including Service delivery framework and The Internet.
Dongyan Xu works mostly in the field of Operating system, limiting it down to topics relating to Embedded system and, in certain cases, Software. His Virtual machine research is multidisciplinary, relying on both Computer security and Virtual network. The Hypervisor study which covers Rootkit that intersects with Kernel.
Dongyan Xu mostly deals with Embedded system, Computer security, Software, Real-time computing and Operating system. His Computer security research incorporates elements of Cloud computing and Cyber-physical system. Dongyan Xu has included themes like Binary code, Reverse engineering and Compile time in his Software study.
His Reverse engineering study combines topics from a wide range of disciplines, such as Probabilistic logic and Computer network, Communications protocol, Encryption. His Android, Virtualization, Usability and Malware study, which is part of a larger body of work in Operating system, is frequently linked to Smartwatch, bridging the gap between disciplines. Dongyan Xu performs integrative study on Reuse and Distributed computing in his works.
Dongyan Xu mainly focuses on Inference, Exploit, Real-time computing, Computer security and Theoretical computer science. His studies deal with areas such as Program analysis and Audit as well as Inference. His study looks at the relationship between Real-time computing and fields such as Aspect-oriented programming, as well as how they intersect with chemical problems.
His work on Exploit kit, Evasion and Obfuscation as part of general Computer security study is frequently linked to Multiple stages, bridging the gap between disciplines. His research investigates the connection between Theoretical computer science and topics such as Granularity that intersect with issues in Distributed computing. His Malware study results in a more complete grasp of Operating system.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
ACM Transactions on Information and System Security (2010)
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
computer and communications security (2007)
PROMISE: peer-to-peer media streaming using CollectCast
Mohamed Hefeeda;Ahsan Habib;Boyan Botev;Dongyan Xu.
acm multimedia (2003)
Automatic reverse engineering of data structures from binary execution
Zhiqiang Lin;Xiangyu Zhang;Dongyan Xu.
annual information security symposium (2010)
On peer-to-peer media streaming
Dongyan Xu;M. Hefeeda;S. Hambrusch;B. Bhargava.
international conference on distributed computing systems (2002)
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing
Ryan Riley;Xuxian Jiang;Dongyan Xu.
recent advances in intrusion detection (2008)
Analysis of a CDN---P2P hybrid architecture for cost-effective streaming media distribution
Dongyan Xu;Sunil Suresh Kulkarni;Catherine Rosenberg;Heung-Keung Chai.
Multimedia Systems (2006)
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Zhiqiang Lin;Xuxian Jiang;Dongyan Xu;Xiangyu Zhang.
network and distributed system security symposium (2008)
VIOLIN: virtual internetworking on overlay infrastructure
Xuxian Jiang;Dongyan Xu.
international symposium on parallel and distributed processing and applications (2004)
Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis
J.-Y. Chen;G. Pandurangan;D. Xu.
IEEE Transactions on Parallel and Distributed Systems (2006)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Purdue University West Lafayette
PeckShield
University of Illinois at Urbana-Champaign
The Ohio State University
University of Toronto
Purdue University West Lafayette
Massey University
Purdue University West Lafayette
École Polytechnique Fédérale de Lausanne
Microsoft (United States)
Indian Institute of Technology Kanpur
University of Technology Sydney
China Jiliang University
Fudan University
Xi'an Jiaotong University
University of Manchester
Rockefeller University
Illinois State University
Chapman University
Wake Forest University
Florey Institute of Neuroscience and Mental Health
St. Joseph Hospital
La Trobe University
University of California, Berkeley
University of La Laguna
University of Leeds