Fengyuan Xu

Orcid: 0000-0003-3388-7544

According to our database1, Fengyuan Xu authored at least 72 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RescQR: Enabling Reliable Data Recovery in Screen-Camera Communication System.
IEEE Trans. Mob. Comput., May, 2024

2023
LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps.
IEEE Trans. Mob. Comput., December, 2023

Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage.
IEEE Trans. Mob. Comput., September, 2023

RF-Badge: Vital Sign-Based Authentication via RFID Tag Array on Badges.
IEEE Trans. Mob. Comput., 2023

Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

SIEGE: Self-Supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGX.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User Side.
Proceedings of the IEEE International Conference on Acoustics, 2023

Manipulating Transfer Learning for Property Inference.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Stealthy Backdoors as Compression Artifacts.
IEEE Trans. Inf. Forensics Secur., 2022

vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS.
IEEE Trans. Computers, 2022

Automation Slicing and Testing for in-App Deep Learning Models.
CoRR, 2022

DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Privacy-Preserving and Robust Federated Deep Metric Learning.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Towards Practical and Efficient Long Video Summary.
Proceedings of the IEEE International Conference on Acoustics, 2022

Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications.
IEEE Trans. Dependable Secur. Comput., 2021

On Developing Piecewise Rational Mapping with Fine Regulation Capability for WENO Schemes.
J. Sci. Comput., 2021

Quasi-linear analysis of dispersion relation preservation for nonlinear schemes.
CoRR, 2021

Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection.
CoRR, 2021

App Developer Centric Trusted Execution Environment.
CoRR, 2021

On developing piecewise rational mapping with fine regulation capability for WENO schemes.
CoRR, 2021

DAPter: Preventing User Data Abuse in Deep Learning Inference Services.
Proceedings of the WWW '21: The Web Conference 2021, 2021

PECAM: privacy-enhanced video streaming and analytics via securely-reversible transformation.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

AsyMo: scalable and efficient deep-learning inference on asymmetric mobile CPUs.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

2020
Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Revisiting Attacks and Defenses in Connected and Autonomous Vehicles.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Escaping Backdoor Attack Detection of Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

EMO: real-time emotion recognition from single-eye images for resource-constrained eyewear devices.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Efficient Architecture Paradigm for Deep Learning Inference as a Service.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020

Detecting GAN-based Privacy Attack in Distributed Learning.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019

Trojan Attack on Deep Generative Models in Autonomous Driving.
Proceedings of the Security and Privacy in Communication Networks, 2019

secGAN: A Cycle-Consistent GAN for Securely-Recoverable Video Transformation.
Proceedings of the 2019 Workshop on Hot Topics in Video Analytics and Intelligent Edges, 2019

Occlumency: Privacy-preserving Remote Deep-learning Inference Using SGX.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Privacy-Preserving Data Integrity Verification in Mobile Edge Computing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries.
IEEE Trans. Inf. Forensics Secur., 2018

A Query Tool for Efficiently Investigating Risky Software Behaviors.
CoRR, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
CoRR, 2018

Location privacy in public access points positioning: An optimization and geometry approach.
Comput. Secur., 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Internet Protocol Cameras with No Password Protection: An Empirical Investigation.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Learning from Differentially Private Neural Activations with Edge Computing.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios.
IEEE Trans. Mob. Comput., 2017

2016
High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
VProof: Lightweight Privacy-Preserving Vehicle Location Proofs.
IEEE Trans. Veh. Technol., 2015

2014
VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet.
IEEE Trans. Veh. Technol., 2014

Data Mining in Time Series: Current Study and Future Trend.
J. Comput. Sci., 2014

2013
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput.
IEEE Trans. Parallel Distributed Syst., 2013

SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks.
IEEE Trans. Parallel Distributed Syst., 2013

V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Optimizing background email sync on smartphones.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Extracting secret key from wireless link dynamics in vehicular environments.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Fast Mencius: Mencius with low commit latency.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
SybilDefender: Defend against sybil attacks in large social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

MobiShare: Flexible privacy-preserving location sharing in mobile online social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
IMDGuard: Securing implantable medical devices with the external wearable guardian.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Defending against vehicular rogue APs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
High Speed Data Routing in Vehicular Sensor Networks.
J. Commun., 2010

Designing a Practical Access Point Association Protocol.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Experimental Study on Secure Data Collection in Vehicular Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

2007
Gippy: Campus GIS Information System Supported by P2P.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Individuation Learning Components in Intelligent Education Games.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007


  Loading...