Pulei Xiong

Orcid: 0000-0002-3460-6946

According to our database1, Pulei Xiong authored at least 29 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
NegRefine: Refining Negative Label-Based Zero-Shot OOD Detection.
CoRR, July, 2025

Towards integration of Privacy Enhancing Technologies in Explainable Artificial Intelligence.
CoRR, July, 2025

Optimism Induction Attack on Deep Reinforcement Learning with Control Barrier Function Safety Filter for Autonomous Driving.
Proceedings of the 2025 American Control Conference, 2025

2024
Better entity matching with transformers through ensembles.
Knowl. Based Syst., 2024

CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus.
Internet Things, 2024

Out-of-Distribution Aware Classification for Tabular Data.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

Large Language Model Empowered Spatio-Visual Queries for Extended Reality Environments.
Proceedings of the IEEE International Conference on Big Data, 2024

2023
Security issues in Internet of Vehicles (IoV): A comprehensive survey.
Internet Things, July, 2023

Internet of Things (IoT) security dataset evolution: Challenges and future directions.
Internet Things, July, 2023

IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.
Peer Peer Netw. Appl., May, 2023

Achieve Edge-Based Privacy-Preserving Dynamic Aggregation Query in Smart Transportation Systems.
Proceedings of the IEEE Global Communications Conference, 2023

ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Towards a robust and trustworthy machine learning system development: An engineering perspective.
J. Inf. Secur. Appl., 2022

EVRQ: Achieving Efficient and Verifiable Range Query over Encrypted Traffic Data.
Proceedings of the IEEE International Conference on Communications, 2022

Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2022

Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

2021
Towards a Robust and Trustworthy Machine Learning System Development.
CoRR, 2021

Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Privacy-Preserving Fog-Based Multi-Location Task Allocation in Mobile Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2021

A feature exploration approach for IoT attack type classification.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Verification Based Scheme to Restrict IoT Attacks.
Proceedings of the BDCAT '21: 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies, Leicester, United Kingdom, December 6, 2021

2011
A Systematic Approach to Web Application Penetration Testing Using TTCN-3.
Proceedings of the E-Technologies: Transformation in a Connected World, 2011

2010
A model-driven penetration test framework for Web applications.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
Model-Based Penetration Test Framework for Web Applications Using TTCN-3.
Proceedings of the E-Technologies: Innovation in an Open World, 2009

2008
Framework testing of web applications using TTCN-3.
Int. J. Softw. Tools Technol. Transf., 2008

2004
Life-Cycle E-commerce Testing with OO-TTCN-3.
Proceedings of the Applying Formal Methods: Testing, Performance and M/ECommerce, 2004


  Loading...