D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 57 Citations 19,284 102 World Ranking 2500 National Ranking 251

Overview

What is he best known for?

The fields of study Xuxian Jiang is best known for:

  • The Internet
  • Operating system
  • Computer security

Xuxian Jiang is investigating Malware as part of his Rootkit and Android malware and Malware study. He applies his multidisciplinary studies on Rootkit and Malware in his research. Personally identifiable information is connected with Internet privacy and Information sensitivity in his study. He integrates Internet privacy with World Wide Web in his study. His World Wide Web study frequently draws connections to other fields, such as Mobile device. He incorporates Mobile device and Android (operating system) in his research. His research combines Android malware and Android (operating system). He undertakes multidisciplinary investigations into Information sensitivity and Personally identifiable information in his work. Operating system and Overlay are two areas of study in which he engages in interdisciplinary work.

His most cited work include:

  • Taming Information-Stealing Smartphone Applications (on Android) (230 citations)
  • Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing (214 citations)
  • Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks (155 citations)

What are the main themes of his work throughout his whole career to date

While working in this field, Xuxian Jiang studies both Operating system and Process (computing). He carries out multidisciplinary research, doing studies in Computer security and Honeypot. In his research, he undertakes multidisciplinary study on Malware and Malware analysis. In his articles, he combines various disciplines, including Malware analysis and Malware. His Artificial intelligence study frequently links to related topics such as Image (mathematics). His work in Image (mathematics) is not limited to one particular discipline; it also encompasses Artificial intelligence. Programming language is often connected to Smart contract in his work. His Programming language research extends to Smart contract, which is thematically connected. He combines Computer network and Server in his studies.

Xuxian Jiang most often published in these fields:

  • Operating system (77.42%)
  • Computer security (70.97%)
  • Malware (32.26%)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Dissecting Android Malware: Characterization and Evolution

Yajin Zhou;Xuxian Jiang.
ieee symposium on security and privacy (2012)

2685 Citations

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

Yajin Zhou;Zhi Wang;Wu Zhou;Xuxian Jiang.
network and distributed system security symposium (2012)

1143 Citations

Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction

Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
ACM Transactions on Information and System Security (2010)

919 Citations

RiskRanker: scalable and accurate zero-day android malware detection

Michael Grace;Yajin Zhou;Qiang Zhang;Shihong Zou.
international conference on mobile systems, applications, and services (2012)

867 Citations

Detecting repackaged smartphone applications in third-party android marketplaces

Wu Zhou;Yajin Zhou;Xuxian Jiang;Peng Ning.
conference on data and application security and privacy (2012)

828 Citations

Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction

Xuxian Jiang;Xinyuan Wang;Dongyan Xu.
computer and communications security (2007)

724 Citations

Jump-oriented programming: a new class of code-reuse attack

Tyler Bletsch;Xuxian Jiang;Vince W. Freeh;Zhenkai Liang.
computer and communications security (2011)

684 Citations

Unsafe exposure analysis of mobile in-app advertisements

Michael C. Grace;Wu Zhou;Xuxian Jiang;Ahmad-Reza Sadeghi.
wireless network security (2012)

644 Citations

Taming information-stealing smartphone applications (on Android)

Yajin Zhou;Xinwen Zhang;Xuxian Jiang;Vincent W. Freeh.
trust and trustworthy computing (2011)

604 Citations

Systematic Detection of Capability Leaks in Stock Android Smartphones.

Michael C. Grace;Yajin Zhou;Zhi Wang;Xuxian Jiang.
network and distributed system security symposium (2012)

603 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Xuxian Jiang

Peng Liu

Peng Liu

Pennsylvania State University

Publications: 64

Jacques Klein

Jacques Klein

University of Luxembourg

Publications: 50

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 49

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 46

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 46

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 45

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 43

Tegawendé F. Bissyandé

Tegawendé F. Bissyandé

University of Luxembourg

Publications: 40

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 38

Xiangyu Zhang

Xiangyu Zhang

Purdue University West Lafayette

Publications: 38

Angelos Stavrou

Angelos Stavrou

Virginia Tech

Publications: 37

Mauro Conti

Mauro Conti

University of Padua

Publications: 36

Heng Yin

Heng Yin

University of California, Riverside

Publications: 36

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 34

Xiapu Luo

Xiapu Luo

Hong Kong Polytechnic University

Publications: 34

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 34

Trending Scientists

Lynn Wilcox

Lynn Wilcox

FX Palo Alto Laboratory

Merton H. Miller

Merton H. Miller

University of Chicago

Ching S. Chang

Ching S. Chang

University of Massachusetts Amherst

Guozhao Fang

Guozhao Fang

Central South University

Luigi Bubacco

Luigi Bubacco

University of Padua

Jin-Ming Yang

Jin-Ming Yang

Penn State Cancer Institute

Kathryn J. H. Robson

Kathryn J. H. Robson

University of Oxford

Claudia Ringler

Claudia Ringler

International Food Policy Research Institute

Klaus Willeke

Klaus Willeke

University of Cincinnati

Monica Martinez

Monica Martinez

Max Planck Institute for Chemistry

Jorge Kalil

Jorge Kalil

Universidade de São Paulo

Ulrike Hahn

Ulrike Hahn

Birkbeck, University of London

Dennis L. Murphy

Dennis L. Murphy

National Institutes of Health

Gary R. Bond

Gary R. Bond

Westat (United States)

Daniela Galimberti

Daniela Galimberti

University of Milan

Hal B. Gregersen

Hal B. Gregersen

Brigham Young University

Something went wrong. Please try again later.