D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 60 Citations 12,165 194 World Ranking 2139 National Ranking 1158

Research.com Recognitions

Awards & Achievements

2015 - Fellow of the American Association for the Advancement of Science (AAAS)

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Dongyan Xu spends much of his time researching Computer network, Virtual machine, Distributed computing, Operating system and Malware. The concepts of his Computer network study are interwoven with issues in Key and Service level requirement. His research in Virtual machine intersects with topics in Temporal isolation among virtual machines, Virtualization and Hypervisor.

His research integrates issues of Network topology, Randomized algorithm, Resource and Brooks–Iyengar algorithm in his study of Distributed computing. His work in Operating system addresses issues such as Kernel, which are connected to fields such as Privilege level and Embedded system. When carried out as part of a general Malware research project, his work on Rootkit is frequently linked to work in Semantic gap, therefore connecting diverse disciplines of study.

His most cited work include:

  • Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction (507 citations)
  • PROMISE: peer-to-peer media streaming using CollectCast (414 citations)
  • Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing (288 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Distributed computing, Computer network, Operating system, Virtual machine and Virtualization. His Distributed computing research focuses on subjects like Middleware, which are linked to Scalability. His biological study spans a wide range of topics, including Service delivery framework and The Internet.

Dongyan Xu works mostly in the field of Operating system, limiting it down to topics relating to Embedded system and, in certain cases, Software. His Virtual machine research is multidisciplinary, relying on both Computer security and Virtual network. The Hypervisor study which covers Rootkit that intersects with Kernel.

He most often published in these fields:

  • Distributed computing (26.24%)
  • Computer network (25.74%)
  • Operating system (20.30%)

What were the highlights of his more recent work (between 2015-2021)?

  • Embedded system (9.41%)
  • Computer security (12.87%)
  • Software (10.40%)

In recent papers he was focusing on the following fields of study:

Dongyan Xu mostly deals with Embedded system, Computer security, Software, Real-time computing and Operating system. His Computer security research incorporates elements of Cloud computing and Cyber-physical system. Dongyan Xu has included themes like Binary code, Reverse engineering and Compile time in his Software study.

His Reverse engineering study combines topics from a wide range of disciplines, such as Probabilistic logic and Computer network, Communications protocol, Encryption. His Android, Virtualization, Usability and Malware study, which is part of a larger body of work in Operating system, is frequently linked to Smartwatch, bridging the gap between disciplines. Dongyan Xu performs integrative study on Reuse and Distributed computing in his works.

Between 2015 and 2021, his most popular works were:

  • ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. (98 citations)
  • HERCULE: attack story reconstruction via community discovery on correlated log graph (57 citations)
  • Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach (46 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Dongyan Xu mainly focuses on Inference, Exploit, Real-time computing, Computer security and Theoretical computer science. His studies deal with areas such as Program analysis and Audit as well as Inference. His study looks at the relationship between Real-time computing and fields such as Aspect-oriented programming, as well as how they intersect with chemical problems.

His work on Exploit kit, Evasion and Obfuscation as part of general Computer security study is frequently linked to Multiple stages, bridging the gap between disciplines. His research investigates the connection between Theoretical computer science and topics such as Granularity that intersect with issues in Distributed computing. His Malware study results in a more complete grasp of Operating system.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction

Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
ACM Transactions on Information and System Security (2010)

919 Citations

Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction

Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
computer and communications security (2007)

724 Citations

PROMISE: peer-to-peer media streaming using CollectCast

Mohamed Hefeeda;Ahsan Habib;Boyan Botev;Dongyan Xu.
acm multimedia (2003)

650 Citations

Automatic reverse engineering of data structures from binary execution

Zhiqiang Lin;Xiangyu Zhang;Dongyan Xu.
annual information security symposium (2010)

531 Citations

On peer-to-peer media streaming

Dongyan Xu;M. Hefeeda;S. Hambrusch;B. Bhargava.
international conference on distributed computing systems (2002)

473 Citations

Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing

Ryan Riley;Xuxian Jiang;Dongyan Xu.
recent advances in intrusion detection (2008)

467 Citations

Analysis of a CDN---P2P hybrid architecture for cost-effective streaming media distribution

Dongyan Xu;Sunil Suresh Kulkarni;Catherine Rosenberg;Heung-Keung Chai.
Multimedia Systems (2006)

342 Citations

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.

Zhiqiang Lin;Xuxian Jiang;Dongyan Xu;Xiangyu Zhang.
network and distributed system security symposium (2008)

304 Citations

VIOLIN: virtual internetworking on overlay infrastructure

Xuxian Jiang;Dongyan Xu.
international symposium on parallel and distributed processing and applications (2004)

269 Citations

Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis

J.-Y. Chen;G. Pandurangan;D. Xu.
IEEE Transactions on Parallel and Distributed Systems (2006)

255 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Dongyan Xu

Hai Jin

Hai Jin

Huazhong University of Science and Technology

Publications: 57

Klara Nahrstedt

Klara Nahrstedt

University of Illinois at Urbana-Champaign

Publications: 43

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 43

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 39

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 39

Howard Jay Siegel

Howard Jay Siegel

Colorado State University

Publications: 33

Jiangchuan Liu

Jiangchuan Liu

Simon Fraser University

Publications: 26

Heng Yin

Heng Yin

University of California, Riverside

Publications: 25

Anthony A. Maciejewski

Anthony A. Maciejewski

Colorado State University

Publications: 24

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 24

Angelos Stavrou

Angelos Stavrou

Virginia Tech

Publications: 22

Rajkumar Buyya

Rajkumar Buyya

University of Melbourne

Publications: 21

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 21

Timothy Wood

Timothy Wood

George Washington University

Publications: 19

Haining Wang

Haining Wang

Virginia Tech

Publications: 18

Danfeng Yao

Danfeng Yao

Virginia Tech

Publications: 18

Trending Scientists

Sri Niwas Singh

Sri Niwas Singh

Indian Institute of Technology Kanpur

Qilin Wang

Qilin Wang

University of Technology Sydney

Ming Zhang

Ming Zhang

China Jiliang University

Jianhua Hu

Jianhua Hu

Fudan University

Feng Xu

Feng Xu

Xi'an Jiaotong University

Georges Lacaud

Georges Lacaud

University of Manchester

Thomas L. Carroll

Thomas L. Carroll

Rockefeller University

Brian J. Wilkinson

Brian J. Wilkinson

Illinois State University

Joshua B. Fisher

Joshua B. Fisher

Chapman University

William Fleeson

William Fleeson

Wake Forest University

Bernhard T. Baune

Bernhard T. Baune

Florey Institute of Neuroscience and Mental Health

Eric Raymond

Eric Raymond

St. Joseph Hospital

Robin Room

Robin Room

La Trobe University

Malcolm M Feeley

Malcolm M Feeley

University of California, Berkeley

D. J. Lennon

D. J. Lennon

University of La Laguna

Paola Caselli

Paola Caselli

University of Leeds

Something went wrong. Please try again later.