D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 55 Citations 19,117 96 World Ranking 2192 National Ranking 217

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His main research concerns Computer security, Android, Malware, Operating system and Hypervisor. His Computer security research integrates issues from Short Message Service and Scalability. Xuxian Jiang usually deals with Android and limits it to topics linked to World Wide Web and Exploit.

His work on Cryptovirology and Mobile malware as part of general Malware research is often related to Call stack, thus linking different fields of science. In his research, Mobile computing and Computer virus is intimately related to Android malware, which falls under the overarching field of Mobile malware. His work on Offset, Reverse engineering and Byte as part of general Operating system research is frequently linked to Dynamic Host Configuration Protocol and Open Shortest Path First, thereby connecting diverse disciplines of science.

His most cited work include:

  • Dissecting Android Malware: Characterization and Evolution (1634 citations)
  • Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets (612 citations)
  • Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction (507 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer security, Operating system, Malware, Android and Virtual machine. His research in Computer security intersects with topics in Control flow, Computer network and World Wide Web. His work on Rootkit as part of general Operating system study is frequently connected to Hypervisor, Hardware virtualization and Call stack, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.

His work on Cryptovirology and Android malware is typically connected to Static program analysis as part of general Malware study, connecting several disciplines of science. When carried out as part of a general Android research project, his work on Mobile malware is frequently linked to work in Phone, therefore connecting diverse disciplines of study. His study in Embedded system is interdisciplinary in nature, drawing from both Code injection and Software.

He most often published in these fields:

  • Computer security (54.63%)
  • Operating system (25.00%)
  • Malware (24.07%)

What were the highlights of his more recent work (between 2012-2021)?

  • Computer security (54.63%)
  • Android (23.15%)
  • World Wide Web (14.81%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Android, World Wide Web, Malware and Mobile device. Computer security is often connected to Personalization in his work. He has included themes like Virtual machine, Information sensitivity and Internet privacy in his Android study.

His World Wide Web research is multidisciplinary, incorporating perspectives in Credential, Static analysis and Login. In general Malware, his work in Cryptovirology and Mobile malware is often linked to Static program analysis linking many areas of study. His Rendering study combines topics in areas such as Embedded system and Operating system.

Between 2012 and 2021, his most popular works were:

  • DroidChameleon: evaluating Android anti-malware against transformation attacks (268 citations)
  • Fast, scalable detection of "Piggybacked" mobile applications (178 citations)
  • Detecting Passive Content Leaks and Pollution in Android Applications. (171 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Xuxian Jiang mainly focuses on Computer security, Android, World Wide Web, Mobile device and Malware. In the field of Computer security, his study on Cyber-collection overlaps with subjects such as Static program analysis. His work on Mobile malware as part of his general Android study is frequently connected to Repackaging, thereby bridging the divide between different branches of science.

His primary area of study in Malware is in the field of Cryptovirology. His work carried out in the field of Internet privacy brings together such families of science as Short Message Service and Access control. Xuxian Jiang combines subjects such as Scalability, Computer network and Feature vector with his study of Search algorithm.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Dissecting Android Malware: Characterization and Evolution

Yajin Zhou;Xuxian Jiang.
ieee symposium on security and privacy (2012)

2505 Citations

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

Yajin Zhou;Zhi Wang;Wu Zhou;Xuxian Jiang.
network and distributed system security symposium (2012)

1115 Citations

Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction

Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
ACM Transactions on Information and System Security (2010)

908 Citations

RiskRanker: scalable and accurate zero-day android malware detection

Michael Grace;Yajin Zhou;Qiang Zhang;Shihong Zou.
international conference on mobile systems, applications, and services (2012)

824 Citations

Detecting repackaged smartphone applications in third-party android marketplaces

Wu Zhou;Yajin Zhou;Xuxian Jiang;Peng Ning.
conference on data and application security and privacy (2012)

728 Citations

Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction

Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
computer and communications security (2007)

722 Citations

Jump-oriented programming: a new class of code-reuse attack

Tyler Bletsch;Xuxian Jiang;Vince W. Freeh;Zhenkai Liang.
computer and communications security (2011)

617 Citations

Systematic Detection of Capability Leaks in Stock Android Smartphones.

Michael C. Grace;Yajin Zhou;Zhi Wang;Xuxian Jiang.
network and distributed system security symposium (2012)

591 Citations

Taming information-stealing smartphone applications (on Android)

Yajin Zhou;Xinwen Zhang;Xuxian Jiang;Vincent W. Freeh.
trust and trustworthy computing (2011)

589 Citations

Unsafe exposure analysis of mobile in-app advertisements

Michael C. Grace;Wu Zhou;Xuxian Jiang;Ahmad-Reza Sadeghi.
wireless network security (2012)

549 Citations

Best Scientists Citing Xuxian Jiang

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 64

Jacques Klein

Jacques Klein

University of Luxembourg

Publications: 50

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 49

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 46

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 46

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 45

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 43

Tegawendé F. Bissyandé

Tegawendé F. Bissyandé

University of Luxembourg

Publications: 40

Xiangyu Zhang

Xiangyu Zhang

Purdue University West Lafayette

Publications: 38

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 38

Angelos Stavrou

Angelos Stavrou

Virginia Tech

Publications: 37

Mauro Conti

Mauro Conti

University of Padua

Publications: 36

Heng Yin

Heng Yin

University of California, Riverside

Publications: 36

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 34

Xiapu Luo

Xiapu Luo

Hong Kong Polytechnic University

Publications: 34

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 34

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.