Publications:
- Xiaojing Liao, Sumayah Alrwais, Kan Yuan, Luyi Xing, Xiaofeng Wang, Shuang Hao, and Raheem Beyah. "Cloud repository as a malicious service: challenge, identification and implication." In the Cybersecurity.
- Zhen Hong, Qian Shao, Xiaojing Liao, and Raheem Beyah. "A Secure Routing Protocol with Regional Partitioned Clustering and Beta Trust Management in Smart Home." In the Springer Journal of Wireless Networks, December 2018.
- Xiaojing Liao, Preethi Srinivasan, David Formby, and Raheem Beyah. "Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid." In the IEEE Transactions on Dependable and Secure Computing.
- Peng Wang, Xianghang Mi, Xiaojing Liao, Xiaofeng Wang, Kan Yuan, Feng Qian, and Raheem Beyah. "Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations." In the Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2018.
- Sumayah Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, XiaoFeng Wang, Feng Qian, Raheem Beyah, and Damon McCoy. "Under the Shadow of Sunshine: Understanding and Detecting BulletProof Hosting on Legitimate Service Provider Networks." IEEE Security and Privacy Symposium (Oakland), 2017.
- Xiaojing Liao, Sumach Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, and Raheem Beyah. "Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service." In the Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2016.
- Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, and Raheem Beyah. "Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence." In the Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2016.
- Xiaojing Liao, Kan Yuan, Xiaofeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Haixin Duan, Kun Du, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, and Raheem Beyah. "Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search." In the proceedings of the IEEE Symposium on Security & Privacy (Oakland), May 2016.
- Xiaojing Liao, Chang Liu, Damon Mccoy, Elaine Shi, Shuang Hao, and Raheem Beyah. "Characterizing Long-tail SEO Spam on Cloud Web Hosting Services." In the Proceedings of the International World Wide Web (WWW) Conference, April 2016.
- Xiaojing Liao, David Formby, Carson Day and Raheem Beyah. "Towards Secure Meter Data Analysis via Distributed Differential Privacy." In the International Workshop on Trustworthiness of Smart Grids (ToSG), June 2014.
- Xiaojing Liao, Selcuk Uluagac, and Raheem A. Beyah. "S-MATCH: Verifiable Privacy-preserving Profile Matching for Mobile Social Services." In the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2014.
- Jing (Selena) He, Shouling Ji, Xiaojing Liao, Hisham Haddad, and Raheem Beyah. "Minimum-sized Positive Influential Node Set Selection for Social Networks: Considering Both Positive and Negative Influences." In the IEEE International Performance, Computing, and Communication Conference (IPCCC), December 2013.
- Shouling Ji, Shukun Yang, Weiqing Li, Xiaojing Liao, and Raheem Beyah. "Password Cracking: A Large-Scale Empirical Study." Usenix Security Conference (USENIX Security Posters), August 2014.
- Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah. "Di-PriDA: A Privacy-preserving Meter Querying System for Smart Grid Load Balancing." The IEEE Symposium on Security & Privacy (Oakland Poster), May 2014.
- Xiaojing Liao, Arif Selcuk Uluagac, and Raheem Beyah. "S-Match: An Efficient Privacy-preserving Profile Matching Scheme." The IEEE Conference on Communications and Network Security (CNS Poster), October 2013. (Poster)
- Xiaofeng Wang, Kan Yuan, Xiaojing Liao, and Raheem A. Beyah. "Systems and methods for detection of infected websites." Utility Patent #10,880,330. Awarded 12/29/2020.
|