Description: C:\my-data\My Homepage\me.jpg

Shouhuai Xu (PhD: Fudan University, 2000)
Full Professor, Department of Computer Science, University of Texas at San Antonio

I direct the Laboratory for Cybersecurity Dynamics (LCD).

office: PNB 3.342
phone: (210)458-5739
fax: (210)458-4437
email: shxu(at)cs(dot)utsa(dot)edu

mailing address:
Department of Computer Science
University of Texas at San Antonio
One UTSA Circle
San Antonio, TX 78249

What's new?




Professional Activities/Services           


Research Thrusts

v  Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity (click the link)

v  Cybersecurity Mechanisms: Moving-Target Defense; Defense Against Malware/Botnets/APT; Trustworthy Cloud Computing (Cryptographic Multi-Party Computing, Storage, Systems); Assured Information Sharing and Provenance

Funded Research Projects

RA openings!

I am always seeking highly motivated PhD students who have a strong desire to pursue excellent PhD work.

Current PhD/MS Students I supervise

Graduated students I supervised with Thesis

1.     Moustafa Saleh (PhD Dissertation: Detection and Classification of Obfuscated Malware), April 2016. First employment: Security Engineer, Microsoft. 

2.     Li Xu (PhD Dissertation: Characterizing and Detecting Malicious Websites), May 2014. First employment: Research Engineer, Yahoo! Labs

3.     Zhenxin Zhan (PhD Dissertation: A Statistical Framework for Analyzing Cyber Threats), May 2014. First Employment: Security Researcher, Juniper Networks

4.     Qingji Zheng (PhD Dissertation: Verifiable Delegation of Computing over Outsourced Data), April 2014. First Employment: Staff Researcher, Huawei Research Center in San Jose, CA

5.     Paul Parker (PhD Dissertation: Protecting Cryptographic Keys and Functions from Software-based Attacks), Dec 2010. First employment: Assistant Professor at Dallas Baptist University

6.     Asma Alshehri (MS Thesis: A Study on Complex Network Resilience), Dec. 2013. (Asma is now PhD student at UTSA)

7.     Adam Tyra (MS Thesis: A Characterization of Complex Network Attack Resilience), Dec. 2012. (Adam was a part-time student.)

8.     Giovanni Del Valle (Masters Thesis: Protecting Cryptographic Keys from Memory Disclosure Attacks), May 2010. First employment: Rackspace

9.     Erhan John Kartaltepe (Masters Thesis: Malicious Impostor Emails: Emerging Threats and Countermeasures), April 2006. First employment: SouthWest Research Institute.

Defended PhD Thesis Committees I Served

1.     Khalid Zaman (CS@UTSA), PhD Thesis: Constraints for Attribute Based Access Control with Application in Cloud IaaS, Defended in April 2015.

2.     Yiming Han (CS@UTSA), PhD Thesis: Hierarchical Distributed Loop Self-Scheduling Schemes on Cluster and Cloud Systems, Defended in April 2014.

3.     Yuan Cheng (CS@UTSA), PhD Thesis: Access Control for Online Social Networks Using Relationship Type Patterns. Defended in April 2014.

4.     Pengjun Pan. PhD Thesis: Energy-efficient Secure and Anonymous Communication Protocols for Wireless Sensor Networks. May 2013.

5.     Weisong Tian (ECE). PhD Thesis: Generalized Homogeneous Methodologies and New Solutions to Control Problems of Nonlinear Systems. April 2013.

6.     Hongwei Tian. PhD Thesis: Privacy-preserving Data Mining Through Data Publishing and Knowledge Model Sharing. 2012

7.     Lijie Zhang. PhD Thesis: Privacy-Preservation in Social Graphs. 2012.

8.     Ruting Jia (ECE). PhD Thesis: Semi-global Stabilization of Nonlinear Systems via Output Feedback and Sampled-Data Controls with Applications to Power Systems. 2012.


CS 4593 AT: Security Metrics (Fall 2016; Undergraduate)

CS 5323: Principles of Information Security (Fall 2016; Graduate)

CS 4363: Cryptography (Spring 2016; Undergraduate)

CS 6393 AT: Cyber Security Data analytics (Fall 2015; Graduate)

CS 5323 Principles of Information Security (Fall 2015; Graduate)

CS 6393 SP: Cyber Security (Spring 2015; Graduate)

CS 4363 Cryptography (Spring 2015; Undergraduate)

CS 5323 Principles of Information Security (Fall 2014; Graduate)

CS 4593 Cloud Security (Spring 2014; Undergraduate)

CS 4363 Cryptography (Fall 2013; Undergraduate)

CS 6353 Unix and Network Security (Spring 2013; Graduate)

CS 4363 Cryptography (Spring 2013; Undergraduate)

CS 6393 AT: Cyber Security (Fall 2012; Graduate)

CS 4363 Cryptography (Spring 2012; Undergraduate)
CS 2233 Discrete Mathematical Structures (Spring 2012; Undergraduate)

CS 6373 Applied Cryptography (Fall 2011; Graduate)
CS 4363 Cryptography (Spring 2011; Undergraduate)
CS 2233 Discrete Mathematical Structures (Spring 2011; Undergraduate)
CS 6393 AT: Cyber Security (Fall 2010; Graduate)
CS 4363 Cryptography (Spring 2010; Undergraduate)
CS 6373 Applied Cryptography (Fall 2009; Graduate)
CS 4363 Cryptography (Spring 2009; Undergraduate)
CS 6373 Applied Cryptography (Fall 2008; Graduate)
CS 4363 Cryptography (Spring 2008; Undergraduate)
CS 6393 Advanced Topics in Computer Security: Reliable and Secure Distributed Systems (Fall 2007; Graduate)
CS 4363 Cryptography (Spring 2007; Undergraduate)
CS 6463 AT: Applied Cryptography (Fall 2006; Graduate)
CS 4363 Cryptography (Spring 2006; Undergraduate)
CS 6973 Special Problems: Applied Cryptography (Fall 2005; Graduate)
CS 4363 Cryptography (Spring 2005; Undergraduate)

CS 6973 Principles of Information Security (Fall 2004; Graduate)

CS 4363 Cryptography (Spring 2004; Undergraduate)

CS 6973 Special Problems: Applied Cryptography (Fall 2003; Graduate)


Professional Activities/Services

o  The 9th International Conference on Network and System Security (NSS'15) ---Nov. 3-5, 2015 in New York City

o  The 9th China International Conference on Information Security and Cryptology (Inscrypt'13)

o  2013 ACM Asia Public-Key Cryptography Workshop (AsiaPKC 2013)

o  The Second ACM Workshop on Scalable Trusted Computing (STC'07)

o  The First ACM Workshop on Scalable Trusted Computing (STC'06)


Copyright notice: The copyright of the papers available online had already been transferred to the corresponding organizations or presses. Most of the recent papers that cannot be downloaded here can be downloaded at

Other Publications (in Chinese):