Description: C:\my-data\My Homepage\me.jpg

Shouhuai Xu (PhD: Fudan University, 2000)
Full Professor, Department of Computer Science, University of Texas at San Antonio

I direct the Laboratory for Cybersecurity Dynamics (LCD).

office: PNB 3.342
phone: (210)458-5739
fax: (210)458-4437
email: shxu(at)cs(dot)utsa(dot)edu

mailing address:
Department of Computer Science
University of Texas at San Antonio
One UTSA Circle
San Antonio, TX 78249

What's new?




Professional Activities/Services           


Research Thrusts

v  Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity (click the link)

v  Cybersecurity Mechanisms: Moving-Target Defense; Defense Against Malware/Botnets/APT; Trustworthy Cloud Computing (Cryptographic Multi-Party Computing, Storage, Systems); Assured Information Sharing and Provenance

Funded Research Projects

RA openings!

I am always seeking highly motivated PhD students who have a strong desire to pursue excellent PhD work.

Current PhD/MS Students I supervise

Graduated students I supervised with Thesis

1.     Li Xu (PhD Thesis: Characterizing and Detecting Malicious Websites), May 2014. First employment: Research Engineer, Yahoo! Labs

2.     Zhenxin Zhan (PhD Thesis: A Statistical Framework for Analyzing Cyber Threats), May 2014. First Employment: Security Researcher, Juniper Networks

3.     Qingji Zheng (PhD Thesis: Verifiable Delegation of Computing over Outsourced Data), April 2014. First Employment: Staff Researcher, Huawei Research Center in San Jose, CA

4.     Paul Parker (PhD Thesis: Protecting Cryptographic Keys and Functions from Software-based Attacks), Dec 2010. First employment: Assistant Professor at Dallas Baptist University

5.     Asma Alshehri (MS Thesis: A Study on Complex Network Resilience), Dec. 2013. (Asma is now PhD student at UTSA)

6.     Adam Tyra (MS Thesis: A Characterization of Complex Network Attack Resilience), Dec. 2012. (Adam was a part-time student.)

7.     Giovanni Del Valle (Masters Thesis: Protecting Cryptographic Keys from Memory Disclosure Attacks), May 2010. First employment: Rackspace

8.     Erhan John Kartaltepe (Masters Thesis: Malicious Impostor Emails: Emerging Threats and Countermeasures), April 2006. First employment: SouthWest Research Institute.

Defended PhD Thesis Committees I Served

1.     Yiming Han (CS@UTSA), PhD Thesis: Hierarchical Distributed Loop Self-Scheduling Schemes on Cluster and Cloud Systems, Defended in April 2014.

2.     Yuan Cheng (CS@UTSA), PhD Thesis: Access Control for Online Social Networks Using Relationship Type Patterns. Defended in April 2014.

3.     Pengjun Pan. PhD Thesis: Energy-efficient Secure and Anonymous Communication Protocols for Wireless Sensor Networks. May 2013.

4.     Weisong Tian (ECE). PhD Thesis: Generalized Homogeneous Methodologies and New Solutions to Control Problems of Nonlinear Systems. April 2013.

5.     Hongwei Tian. PhD Thesis: Privacy-preserving Data Mining Through Data Publishing and Knowledge Model Sharing. 2012

6.     Lijie Zhang. PhD Thesis: Privacy-Preservation in Social Graphs. 2012.

7.     Ruting Jia (ECE). PhD Thesis: Semi-global Stabilization of Nonlinear Systems via Output Feedback and Sampled-Data Controls with Applications to Power Systems. 2012.


CS 6393 SP: Cyber Security (Spring 2015; Graduate)

CS 4363 Cryptography (Spring 2015; Undergraduate)

CS 5323 Principles of Information Security (Fall 2014; Graduate)

CS 4593 Cloud Security (Spring 2014; Undergraduate)

CS 4363 Cryptography (Fall 2013; Undergraduate)

CS 6353 Unix and Network Security (Spring 2013; Graduate)

CS 4363 Cryptography (Spring 2013; Undergraduate)

CS 6393 AT: Cyber Security (Fall 2012; Graduate)

CS 4363 Cryptography (Spring 2012; Undergraduate)
CS 2233 Discrete Mathematical Structures (Spring 2012; Undergraduate)

CS 6373 Applied Cryptography (Fall 2011; Graduate)
CS 4363 Cryptography (Spring 2011; Undergraduate)
CS 2233 Discrete Mathematical Structures (Spring 2011; Undergraduate)
CS 6393 AT: Cyber Security (Fall 2010; Graduate)
CS 4363 Cryptography (Spring 2010; Undergraduate)
CS 6373 Applied Cryptography (Fall 2009; Graduate)
CS 4363 Cryptography (Spring 2009; Undergraduate)
CS 6373 Applied Cryptography (Fall 2008; Graduate)
CS 4363 Cryptography (Spring 2008; Undergraduate)
CS 6393 Advanced Topics in Computer Security: Reliable and Secure Distributed Systems (Fall 2007; Graduate)
CS 4363 Cryptography (Spring 2007; Undergraduate)
CS 6463 AT: Applied Cryptography (Fall 2006; Graduate)
CS 4363 Cryptography (Spring 2006; Undergraduate)
CS 6973 Special Problems: Applied Cryptography (Fall 2005; Graduate)
CS 4363 Cryptography (Spring 2005; Undergraduate)

CS 6973 Principles of Information Security (Fall 2004; Graduate)

CS 4363 Cryptography (Spring 2004; Undergraduate)

CS 6973 Special Problems: Applied Cryptography (Fall 2003; Graduate)


Professional Activities/Services

o  The 9th International Conference on Network and System Security (NSS'15) ---Nov. 3-5, 2015 in New York City

o  The 9th China International Conference on Information Security and Cryptology (Inscrypt'13)

o  2013 ACM Asia Public-Key Cryptography Workshop (AsiaPKC 2013)

o  The Second ACM Workshop on Scalable Trusted Computing (STC'07)

o  The First ACM Workshop on Scalable Trusted Computing (STC'06)


Copyright notice: The copyright of the papers available online had already been transferred to the corresponding organizations or presses. Most of the recent papers can be downloaded at

Other Publications (in Chinese):