Renjie Xie

Orcid: 0009-0004-1742-4122

According to our database1, Renjie Xie authored at least 26 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Deep CSI Compression for Dual-Polarized Massive MIMO Channels with Disentangled Representation Learning.
CoRR, 2024

From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
CoRR, 2024

Self-Information Domain-Based Neural CSI Compression With Feature Coupling.
IEEE Trans. Veh. Technol., October, 2023

Disentangled Representation Learning for RF Fingerprint Extraction Under Unknown Channel Statistics.
IEEE Trans. Commun., July, 2023

VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints.
CoRR, 2023

Understanding and Improving Deep Graph Neural Networks: A Probabilistic Graphical Model Perspective.
CoRR, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Unsupervised Stock Clustering Based on Adversarial Learning and Its Application in Quantitative Investment.
Proceedings of the 14th International Conference on E-business, Management and Economics, 2023

RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features.
Proceedings of the IEEE International Conference on Communications, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

Deep CSI Compression for Massive MIMO: A Self-Information Model-Driven Neural Network.
IEEE Trans. Wirel. Commun., 2022

Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw., 2022

Modeling Submarket Effect for Real Estate Hedonic Valuation: A Probabilistic Approach.
IEEE Trans. Knowl. Data Eng., 2021

A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

On Breaking Deep Generative Model-based Defenses and Beyond.
Proceedings of the 37th International Conference on Machine Learning, 2020

Deep Secure Quantization: On secure biometric hashing against similarity-based attacks.
Signal Process., 2019

Unsupervised Classification of Street Architectures Based on InfoGAN.
CoRR, 2019

A Deep, Information-theoretic Framework for Robust Biometric Recognition.
CoRR, 2019

The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Proceedings of the 28th USENIX Security Symposium, 2019

Adversarial Training for Video Disentangled Representation.
Proceedings of the MultiMedia Modeling - 25th International Conference, 2019

SoftGuard: Defend Against the Low-Rate TCP Attack in SDN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Hardware design methodology using lightweight dataflow and its integration with low power techniques.
J. Syst. Archit., 2017

Resource-constrained implementation and optimization of a deep neural network for vehicle classification.
Proceedings of the 24th European Signal Processing Conference, 2016

Low power design methodology for signal processing systems using lightweight dataflow techniques.
Proceedings of the 2016 Conference on Design and Architectures for Signal and Image Processing (DASIP), 2016