Lei Xu
Lei Xu
Palo Alto Networks
Verified email at - Homepage
Cited by
Cited by
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures
S Hong, L Xu, H Wang, G Gu
NDSS, 2015
Floodguard: A dos attack prevention extension in software-defined networks
H Wang, L Xu, G Gu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
Enhancing network security through software defined networking (SDN)
S Shin, L Xu, S Hong, G Gu
2016 25th international conference on computer communication and networks …, 2016
Srid: State relation based intrusion detection for false data injection attacks in scada
Y Wang, Z Xu, J Zhang, L Xu, H Wang, G Gu
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
Attacking the Brain: Races in the SDN Control Plane.
L Xu, J Huang, S Hong, J Zhang, G Gu
USENIX Security Symposium, 451-468, 2017
Effective topology tampering attacks and defenses in software-defined networks
R Skowyra, L Xu, G Gu, V Dedhia, T Hobson, H Okhravi, J Landry
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security.
S Hong, R Baykov, L Xu, S Nadimpalli, G Gu
NDSS, 2016
Control plane reflection attacks in SDNs: New attacks and countermeasures
M Zhang, G Li, L Xu, J Bi, G Gu, J Bai
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications
Y Zhang, L Xu, A Mendoza, G Yang, P Chinprutthiwong, G Gu
Proc. of the Network and Distributed System Security Symposium (NDSS'19), 2019
Towards fine-grained network security forensics and diagnosis in the SDN era
H Wang, G Yang, P Chinprutthiwong, L Xu, Y Zhang, G Gu
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds
H Wang, A Srivastava, L Xu, S Hong, G Gu
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
Control plane reflection attacks and defenses in software-defined networks
M Zhang, G Li, L Xu, J Bai, M Xu, G Gu, J Wu
IEEE/ACM Transactions on Networking 29 (2), 623-636, 2020
P2P botnet detection using min-vertex cover
L Xu, XL Xu, Y Zhuo
Journal of Networks 7 (8), 1176, 2012
Security protection for a host computer in a computer network using cross-domain security-relevant information
D Ott, L Xu, SUN Ruimin, V Ganti, DR Moreau
US Patent 11,316,879, 2022
SysFlow: Toward a Programmable Zero Trust Framework for System Security
S Hong, L Xu, J Huang, H Li, H Hu, G Gu
IEEE Transactions on Information Forensics and Security 18, 2794-2809, 2023
System and method for managing security-relevant information in a computer network
D Ott, L Xu, DR Moreau
US Patent 11,178,181, 2021
The system can't perform the operation now. Try again later.
Articles 1–16