default search action
Xinyu Xing
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. IEEE Trans. Dependable Secur. Comput. 21(1): 93-109 (2024) - [c88]Nanyu Zhong, Yueqi Chen, Yanyan Zou, Xinyu Xing, Jinwei Dong, Bingcheng Xian, Jiaxu Zhao, Menghao Li, Binghong Liu, Wei Huo:
TGRop: Top Gun of Return-Oriented Programming Automation. ESORICS (3) 2024: 130-152 - [c87]Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing:
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation. ICML 2024 - [c86]Wenxuan Shi, Hongwei Li, Jiahao Yu, Wenbo Guo, Xinyu Xing:
BandFuzz: A Practical Framework for Collaborative Fuzzing with Reinforcement Learning. SBFT@ICSE 2024: 55-56 - [c85]Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing:
LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks. USENIX Security Symposium 2024 - [c84]Ziyi Guo, Dang K. Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing:
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. USENIX Security Symposium 2024 - [c83]Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter A. Dinda, Xinyu Xing:
CAMP: Compiler and Allocator-based Heap Memory Protection. USENIX Security Symposium 2024 - [c82]Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael V. Le, Dang K. Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom:
SeaK: Rethinking the Design of a Secure Allocator for OS Kernel. USENIX Security Symposium 2024 - [c81]Zheng Yu, Ganxiang Yang, Xinyu Xing:
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization. USENIX Security Symposium 2024 - [i31]Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing:
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation. CoRR abs/2405.03064 (2024) - [i30]Jiahao Yu, Haozheng Luo, Jerry Yao-Chieh Hu, Wenbo Guo, Han Liu, Xinyu Xing:
Enhancing Jailbreak Attack Against Large Language Models through Silent Tokens. CoRR abs/2405.20653 (2024) - [i29]Haozheng Luo, Jiahao Yu, Wenxin Zhang, Jialong Li, Jerry Yao-Chieh Hu, Xinyu Xing, Han Liu:
Decoupled Alignment for Robust Plug-and-Play Adaptation. CoRR abs/2406.01514 (2024) - [i28]Zheng Yu, Ganxiang Yang, Xinyu Xing:
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization. CoRR abs/2406.02023 (2024) - [i27]Ziyi Guo, Dang K. Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing:
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. CoRR abs/2406.02624 (2024) - [i26]Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter A. Dinda, Xinyu Xing:
CAMP: Compiler and Allocator-based Heap Memory Protection. CoRR abs/2406.02737 (2024) - [i25]Jiahao Yu, Yangguang Shao, Hanwen Miao, Junzheng Shi, Xinyu Xing:
PROMPTFUZZ: Harnessing Fuzzing Techniques for Robust Testing of Prompt Injection in LLMs. CoRR abs/2409.14729 (2024) - [i24]Jiahao Yu, Xian Wu, Hao Liu, Wenbo Guo, Xinyu Xing:
BlockFound: Customized blockchain foundation model for anomaly detection. CoRR abs/2410.04039 (2024) - [i23]Jiacheng Cai, Jiahao Yu, Yangguang Shao, Yuhang Wu, Xinyu Xing:
UTF:Undertrained Tokens as Fingerprints A Novel Approach to LLM Identification. CoRR abs/2410.12318 (2024) - [i22]Zelei Cheng, Xian Wu, Jiahao Yu, Shuo Han, Xin-Qiang Cai, Xinyu Xing:
Soft-Label Integration for Robust Toxicity Classification. CoRR abs/2410.14894 (2024) - 2023
- [j11]Mengmeng Song, Xinyu Xing, Yucong Duan, Jian Mou:
I can feel AI failure: the impact of service failure type and failure assessment on customer recovery expectation. Ind. Manag. Data Syst. 123(12): 2949-2975 (2023) - [c80]Sijia Li, Gaopeng Gou, Chang Liu, Gang Xiong, Zhen Li, Junchao Xiao, Xinyu Xing:
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection. ACSAC 2023: 352-365 - [c79]Kyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. CCS 2023: 3093-3107 - [c78]Zelei Cheng, Xian Wu, Jiahao Yu, Wenhai Sun, Wenbo Guo, Xinyu Xing:
StateMask: Explaining Deep Reinforcement Learning through State Mask. NeurIPS 2023 - [c77]Xian Wu, Wenbo Guo, Jia Yan, Baris Coskun, Xinyu Xing:
From Grim Reality to Practical Solution: Malware Classification in Real-World Noise. SP 2023: 2602-2619 - [c76]Wenbo Guo, Xian Wu, Lun Wang, Xinyu Xing, Dawn Song:
PATROL: Provable Defense against Adversarial Policy in Two-player Games. USENIX Security Symposium 2023: 3943-3960 - [c75]Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang K. Le, Dongliang Mu, Xinyu Xing:
Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness. USENIX Security Symposium 2023: 4247-4264 - [c74]Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing:
AIRS: Explanation for Deep Reinforcement Learning based Security Applications. USENIX Security Symposium 2023: 7375-7392 - [i21]Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing:
GPTFUZZER: Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts. CoRR abs/2309.10253 (2023) - [i20]Jiahao Yu, Yuhang Wu, Dong Shu, Mingyu Jin, Xinyu Xing:
Assessing Prompt Injection Risks in 200+ Custom GPTs. CoRR abs/2311.11538 (2023) - 2022
- [j10]Mengmeng Song, Jingzhe Du, Xinyu Xing, Jian Mou:
Should the chatbot "save itself" or "be helped by others"? The influence of service recovery types on consumer perceptions of recovery satisfaction. Electron. Commer. Res. Appl. 55: 101199 (2022) - [c73]Zhenpeng Lin, Yuhang Wu, Xinyu Xing:
DirtyCred: Escalating Privilege in Linux Kernel. CCS 2022: 1963-1976 - [c72]Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang:
An In-depth Analysis of Duplicated Linux Kernel Bug Reports. NDSS 2022 - [c71]Qi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing:
DeJITLeak: eliminating JIT-induced timing side-channel leaks. ESEC/SIGSOFT FSE 2022: 872-884 - [c70]Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Dongliang Mu, Chensheng Yu, Xinyu Xing, Kang Li:
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs. SP 2022: 2078-2095 - [c69]Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. USENIX Security Symposium 2022: 71-88 - [i19]Qi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing:
Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation. CoRR abs/2202.13134 (2022) - 2021
- [j9]Dongliang Mu, Yunlan Du, Jianhao Xu, Jun Xu, Xinyu Xing, Bing Mao, Peng Liu:
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis. IEEE Trans. Software Eng. 47(9): 1929-1942 (2021) - [c68]Xinyu Xing, Xiaojun Wan:
Structure-Aware Pre-Training for Table-to-Text Generation. ACL/IJCNLP (Findings) 2021: 2273-2278 - [c67]Jiarun Dai, Yuan Zhang, Hailong Xu, Haiming Lyu, Zicheng Wu, Xinyu Xing, Min Yang:
Facilitating Vulnerability Assessment through PoC Migration. CCS 2021: 3300-3317 - [c66]Wenbo Guo, Xian Wu, Sui Huang, Xinyu Xing:
Adversarial Policy Learning in Two-player Competitive Games. ICML 2021: 3910-3919 - [c65]Yang Young Lu, Wenbo Guo, Xinyu Xing, William Stafford Noble:
DANCE: Enhancing saliency maps using decoys. ICML 2021: 7124-7133 - [c64]Xiaofei Xie, Wenbo Guo, Lei Ma, Wei Le, Jian Wang, Lingjun Zhou, Yang Liu, Xinyu Xing:
RNNRepair: Automatic RNN Repair via Model-based Analysis. ICML 2021: 11383-11392 - [c63]Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, Dawn Song:
BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning. IJCAI 2021: 3699-3705 - [c62]Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G. Honavar, Gang Wang, Xinyu Xing:
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data. NDSS 2021 - [c61]Wenbo Guo, Xian Wu, Usmann Khan, Xinyu Xing:
EDGE: Explaining Deep Reinforcement Learning Policies. NeurIPS 2021: 12222-12236 - [c60]Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing:
Adversarial Policy Training against Deep Reinforcement Learning. USENIX Security Symposium 2021: 1883-1900 - [c59]Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang:
CADE: Detecting and Explaining Concept Drift Samples for Security Applications. USENIX Security Symposium 2021: 2327-2344 - [c58]Chinwuba D. Ezekwe, Saikrishna Ganta, Xinyu Xing, Anton Grad, Thomas Mayer, Andrea Visconti, Francesco Diazzi, Man-Chia Chen, Danielle Morton, Luca Valli, Robert Wolf, Ashkan Eghtesadi, Tobias Wolfer, Michael Pietzko, Alexander Grathwohl, Thomas Northemann, Richard Schoenleber, Ruslan Khalilyulin, Ishita Mukhopadhyay, Alexandru Negut, Artjom Kosov, Andreas Christian Serafin, Jan Hayek, Lin Sun:
A direct-digitization open-loop gyroscope frontend with +/-8000°/s full-scale range and noise floor of 0.0047°/s/√Hz. VLSI Circuits 2021: 1-2 - [i18]Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, Dawn Song:
BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning. CoRR abs/2105.00579 (2021) - 2020
- [j8]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput. 19(12): 2946-2964 (2020) - [c57]Xinyu Xing, Xiaosheng Fan, Xiaojun Wan:
Automatic Generation of Citation Texts in Scholarly Papers: A Pilot Study. ACL 2020: 6181-6190 - [c56]Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang:
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. CCS 2020: 1149-1163 - [c55]Yueqi Chen, Zhenpeng Lin, Xinyu Xing:
A Systematic Study of Elastic Objects in Kernel Exploitation. CCS 2020: 1165-1184 - [c54]Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao:
HART: Hardware-Assisted Kernel Module Tracing on Arm. ESORICS (1) 2020: 316-337 - [c53]Wenbo Guo, Lun Wang, Yan Xu, Xinyu Xing, Min Du, Dawn Song:
Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural Networks. ICDM 2020: 162-171 - [c52]Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang:
BScout: Direct Whole Patch Presence Test for Java Executables. USENIX Security Symposium 2020: 1147-1164 - [i17]Yang Lu, Wenbo Guo, Xinyu Xing, William Stafford Noble:
Robust saliency maps with decoy-enhanced saliency score. CoRR abs/2002.00526 (2020)
2010 – 2019
- 2019
- [j7]Yan Wang, Wei Wu, Chao Zhang, Xinyu Xing, Xiaorui Gong, Wei Zou:
From proof-of-concept to exploitable. Cybersecur. 2(1): 12 (2019) - [j6]Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c51]Zi Chai, Xinyu Xing, Xiaojun Wan, Bo Huang:
Asking the Crowd: Question Analysis, Evaluation and Generation for Open Discussion on Online Forums. ACL (1) 2019: 5032-5046 - [c50]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. AsiaCCS 2019: 633-645 - [c49]Yueqi Chen, Xinyu Xing:
SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel. CCS 2019: 1707-1722 - [c48]Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. CCS 2019: 1777-1794 - [c47]Yongheng Chen, Linhai Song, Xinyu Xing, Fengyuan Xu, Wenfei Wu:
Automated Finite State Machine Extraction. FEAST@CCS 2019: 9-15 - [c46]Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang:
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems. Internet Measurement Conference 2019: 230-244 - [c45]Dongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song:
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis. ASE 2019: 924-935 - [c44]Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang:
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. USENIX Security Symposium 2019: 869-885 - [c43]Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing:
All Your Clicks Belong to Me: Investigating Click Interception on the Web. USENIX Security Symposium 2019: 941-957 - [c42]Wei Wu, Yueqi Chen, Xinyu Xing, Wei Zou:
KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. USENIX Security Symposium 2019: 1187-1204 - [c41]Wenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song:
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. USENIX Security Symposium 2019: 1787-1804 - [i16]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. CoRR abs/1905.10499 (2019) - [i15]Wenbo Guo, Lun Wang, Xinyu Xing, Min Du, Dawn Song:
TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems. CoRR abs/1908.01763 (2019) - 2018
- [j5]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
An Empirical Evaluation of Rule Extraction from Recurrent Neural Networks. Neural Comput. 30(9) (2018) - [c40]Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing:
LEMNA: Explaining Deep Learning based Security Applications. CCS 2018: 364-379 - [c39]Wenbo Guo, Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Sui Huang, Xue Liu, C. Lee Giles, Lin Lin, Xinyu Xing:
Defending Against Adversarial Samples Without Security through Obscurity. ICDM 2018: 137-146 - [c38]Wenbo Guo, Sui Huang, Yunzhe Tao, Xinyu Xing, Lin Lin:
Explaining Deep Learning Models - A Bayesian Non-parametric Approach. NeurIPS 2018: 4519-4529 - [c37]Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, Wei Zou:
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. USENIX Security Symposium 2018: 781-797 - [c36]Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang:
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. USENIX Security Symposium 2018: 919-936 - [i14]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity. CoRR abs/1801.05420 (2018) - [i13]Linhai Song, Xinyu Xing:
Fine-Grained Library Customization. CoRR abs/1810.11128 (2018) - [i12]Wenbo Guo, Sui Huang, Yunzhe Tao, Xinyu Xing, Lin Lin:
Explaining Deep Learning Models - A Bayesian Non-parametric Approach. CoRR abs/1811.03422 (2018) - 2017
- [c35]Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - [c34]Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi:
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware. CCS 2017: 2231-2244 - [c33]Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. DSN 2017: 451-462 - [c32]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
Adversary Resistant Deep Neural Networks with an Application to Malware Detection. KDD 2017: 1145-1153 - [c31]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation. MobiSys 2017: 225-238 - [c30]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. MobiSys 2017: 488-501 - [c29]Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao:
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. USENIX Security Symposium 2017: 17-32 - [i11]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. CoRR abs/1704.05600 (2017) - [i10]Wenbo Guo, Kaixuan Zhang, Lin Lin, Sui Huang, Xinyu Xing:
Towards Interrogating Discriminative Machine Learning Models. CoRR abs/1705.08564 (2017) - [i9]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
An Empirical Evaluation of Recurrent Neural Network Rule Extraction. CoRR abs/1709.10380 (2017) - 2016
- [j4]Junho Ahn, Akshay Mysore, Kati Zybko, Caroline Krumm, Sravan Thokala, Xinyu Xing, Ming Lian, Richard O. Han, Shivakant Mishra, Thompson Hobbs:
WildSense: Monitoring Interactions among Wild Deer in Harsh Outdoor Environments Using a Delay-Tolerant WSN. J. Sensors 2016: 1693460:1-1693460:17 (2016) - [c28]Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu:
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. CCS 2016: 529-540 - [c27]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance. SenSys 2016: 42-55 - [c26]Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, Patrick Th. Eugster:
WebRanz: web page randomization for better advertisement delivery and web-bot prevention. SIGSOFT FSE 2016: 205-216 - [c25]Wei Meng, Byoungyoung Lee, Xinyu Xing, Wenke Lee:
TrackMeOrNot: Enabling Flexible Control on Web Tracking. WWW 2016: 99-109 - [i8]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
Exploiting Insurance Telematics for Fun and Profit. CoRR abs/1609.02234 (2016) - [i7]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Xinyu Xing, C. Lee Giles, Xue Liu:
Random Feature Nullification for Adversary Resistant Deep Architecture. CoRR abs/1610.01239 (2016) - [i6]Qinglong Wang, Wenbo Guo, Alexander G. Ororbia II, Xinyu Xing, Lin Lin, C. Lee Giles, Xue Liu, Peng Liu, Gang Xiong:
Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks. CoRR abs/1610.01934 (2016) - [i5]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation. CoRR abs/1611.00837 (2016) - [i4]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, C. Lee Giles, Xue Liu:
Learning Adversary-Resistant Deep Neural Networks. CoRR abs/1612.01401 (2016) - 2015
- [j3]Hanqiang Cheng, Xinyu Xing, Xue Liu, Qin Lv:
ISC: An Iterative Social Based Classifier for Adult Account Detection on Twitter. IEEE Trans. Knowl. Data Eng. 27(4): 1045-1056 (2015) - [c24]Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee:
UCognito: Private Browsing without Tears. CCS 2015: 438-449 - [c23]Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee:
Understanding Malvertising Through Ad-Injecting Browser Extensions. WWW 2015: 1286-1295 - 2014
- [c22]Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee:
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising. CCS 2014: 129-140 - [c21]Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, Alex C. Snoeren:
Exposing Inconsistent Web Search Results with Bobble. PAM 2014: 131-140 - 2013
- [j2]Yu-Li Liang, Xinyu Xing, Hanqiang Cheng, Jianxun Dang, Sui Huang, Richard Han, Xue Liu, Qin Lv, Shivakant Mishra:
SafeVchat: A System for Obscene Content Detection in Online Video Chat Services. ACM Trans. Internet Techn. 12(4): 13:1-13:26 (2013) - [c20]Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee:
Take This Personally: Pollution Attacks on Personalized Services. USENIX Security Symposium 2013: 671-686 - 2012
- [c19]Xinyu Xing, Yu-Li Liang, Sui Huang, Hanqiang Cheng, Richard Han, Qin Lv, Xue Liu, Shivakant Mishra, Yi Zhu:
Scalable misbehavior detection in online video chat services. KDD 2012: 552-560 - [c18]Lei Tian, Junho Ahn, Hanqiang Cheng, Xinyu Xing, Yu-Li Liang, Shivakant Mishra, David Chu, Xue Liu, Richard Han, Qin Lv:
Demo: MVChat: flasher detection for mobile video chat. MobiSys 2012: 457-458 - [c17]Hanqiang Cheng, Yu-Li Liang, Xinyu Xing, Xue Liu, Richard Han, Qin Lv, Shivakant Mishra:
Efficient misbehaving user detection in online video chat services. WSDM 2012: 23-32 - [i3]Xinyu Xing, Junho Ahn, Wenke Lee, Richard Han, Shivakant Mishra:
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services. CoRR abs/1204.2774 (2012) - 2011
- [c16]Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Liu:
A highly scalable bandwidth estimation of commercial hotspot access points. INFOCOM 2011: 1143-1151 - [c15]Chinwuba D. Ezekwe, Johan P. Vanderhaegen, Xinyu Xing, Ganesh K. Balachandran:
A 6.7nV/√Hz Sub-mHz-1/f-corner 14b analog-to-digital interface for rail-to-rail precision voltage sensing. ISSCC 2011: 246-248 - [c14]Xinyu Xing, Yu-Li Liang, Hanqiang Cheng, Jianxun Dang, Sui Huang, Richard Han, Xue Liu, Qin Lv, Shivakant Mishra:
SafeVchat: detecting obscene content and misbehaving users in online video chat services. WWW 2011: 685-694 - [c13]Xinyu Xing, Yifei Jiang, Shivakant Mishra:
Understanding Characteristics of Available Bandwidth in Wireless Environment. ANT/MobiWIS 2011: 248-254 - [i2]Xinyu Xing, Yu-Li Liang, Hanqiang Cheng, Jianxun Dang, Sui Huang, Richard Han, Xue Liu, Qin Lv, Shivakant Mishra:
SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services. CoRR abs/1101.3124 (2011) - 2010
- [j1]Elhadi M. Shakshuki, Xinyu Xing, Tarek R. Sheltami:
Fault reconnaissance agent for sensor networks. Mob. Inf. Syst. 6(3): 229-247 (2010) - [c12]Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Richard Han, Shivakant Mishra, Karim Seada:
Enhancing group recommendation by incorporating social relationship interactions. GROUP 2010: 97-106 - [c11]Xinyu Xing, Shivakant Mishra, Xue Liu:
ARBOR: Hang Together Rather Than Hang Separately in 802.11 WiFi Networks. INFOCOM 2010: 1352-1360 - [c10]Aaron Beach, Mike Gartrell, Xinyu Xing, Richard Han, Qin Lv, Shivakant Mishra, Karim Seada:
Fusing mobile, sensor, and social data to fully enable context-aware computing. HotMobile 2010: 60-65 - [i1]Xinyu Xing, Jianxun Dang, Richard Han, Xue Liu, Shivakant Mishra:
Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures. CoRR abs/1007.1473 (2010)
2000 – 2009
- 2009
- [c9]Elhadi M. Shakshuki, Tarek R. Sheltami, Nan Kang, Xinyu Xing:
Tracking Anonymous Sinks in Wireless Sensor Networks. AINA 2009: 510-516 - [c8]Elhadi M. Shakshuki, Xinyu Xing, Tarek R. Sheltami:
An intelligent agent for fault reconnaissance in sensor networks. iiWAS 2009: 139-146 - [c7]Xinyu Xing, Shivakant Mishra:
Where is the tight link in a home wireless broadband environment? MASCOTS 2009: 1-10 - 2008
- [c6]Elhadi M. Shakshuki, Xinyu Xing:
A Fault Inference Mechanism in Sensor Networks Using Markov Chain. AINA 2008: 628-635 - [c5]Xinyu Xing, Elhadi M. Shakshuki, Darcy G. Benoit, Tarek R. Sheltami:
Security Analysis and Authentication Improvement for IEEE 802.11i Specification. GLOBECOM 2008: 1887-1891 - 2007
- [c4]Elhadi M. Shakshuki, Xinyu Xing, Haiyi Zhang:
Agent-based Fault Detection Mechanism in Wireless Sensor Networks. IAT 2007: 31-34 - [c3]Elhadi M. Shakshuki, Haroon Malik, Xinyu Xing:
Agent-Based Routing for Wireless Sensor Network. ICIC (1) 2007: 68-79 - [c2]Haroon Malik, Elhadi M. Shakshuki, Xinyu Xing:
Agent based approach towards energy aware routing in wireless sensor networks. SMC 2007: 2149-2154 - 2004
- [c1]Yuchun Guo, Yongxiang Zhao, Guangnong Song, Xinyu Xing, Changjia Chen:
CGRED: class guided random early discarding. IPCCC 2004: 179-185
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint