Kaixiang Chen

Orcid: 0000-0001-6093-951X

According to our database1, Kaixiang Chen authored at least 13 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Camera-Aware Recurrent Learning and Earth Mover's Test-Time Adaption for Generalizable Person Re-Identification.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

2023
Debiased Contrastive Curriculum Learning for Progressive Generalizable Person Re-Identification.
IEEE Trans. Circuits Syst. Video Technol., October, 2023

Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration.
Comput. Secur., 2023

AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects.
Proceedings of the 32nd USENIX Security Symposium, 2023

1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Dynamically Adaptive Instance Normalization and Attention-Aware Incremental Meta-Learning for Generalizable Person Re-identification.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Multi-Scale Query-Adaptive Convolution for Generalizable Person Re-Identification.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
Exploit-oriented Automated Information Leakage.
Int. J. Softw. Informatics, 2022

Distributed Ranging SLAM for Multiple Robots with Ultra-WideBand and Odometry Measurements.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022

Weighted Supervised Contrastive Learning and Domain Mixture for Generalized Person Re-Identification.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

2021
VScape: Assessing and Escaping Virtual Call Protections.
Proceedings of the 30th USENIX Security Symposium, 2021

iDEV: exploring and exploiting semantic deviations in ARM instruction processing.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

2018
Revery: From Proof-of-Concept to Exploitable.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018


  Loading...