Shengjie Xu

According to our database1, Shengjie Xu authored at least 45 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Application of Reservoir Computing Based on a 2D Hyperchaotic Discrete Memristive Map in Efficient Temporal Signal Processing.
Int. J. Bifurc. Chaos, May, 2023

A rank-two relaxed parallel splitting version of the augmented Lagrangian method with step size in (0,2) for separable convex programming.
Math. Comput., February, 2023

A dual-primal balanced augmented Lagrangian method for linearly constrained convex programming.
J. Appl. Math. Comput., February, 2023

Safety-Aware Implementation of Control Tasks via Scheduling with Period Boosting and Compressing.
Proceedings of the 29th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2023

MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Timing Predictability for SOME/IP-based Service-Oriented Automotive In-Vehicle Networks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Towards Adaptive Zero Trust Model for Secure AI.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Statistical Approach to Efficient and Deterministic Schedule Synthesis for Cyber-Physical Systems.
Proceedings of the Automated Technology for Verification and Analysis, 2023

Safety-Aware Flexible Schedule Synthesis for Cyber-Physical Systems Using Weakly-Hard Constraints.
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023

2022
A Generalized Primal-Dual Algorithm with Improved Convergence Condition for Saddle Point Problems.
SIAM J. Imaging Sci., September, 2022

Safety-Guaranteed and Development Cost- Minimized Scheduling of DAG Functionality in an Automotive System.
IEEE Trans. Intell. Transp. Syst., 2022

Safety Analysis of Embedded Controllers Under Implementation Platform Timing Uncertainties.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Inexact rational Krylov subspace method for eigenvalue problems.
Numer. Linear Algebra Appl., 2022

On Convergence of the Arrow-Hurwicz Method for Saddle Point Problems.
J. Math. Imaging Vis., 2022

Counteracting a Saturation Attack in Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Filter Embedded in Homodyne Detector.
Entropy, 2022

The Study of Complex Human Locomotion Behaviors: From Crawling to Walking.
CoRR, 2022

Statistical Hypothesis Testing of Controller Implementations Under Timing Uncertainties.
Proceedings of the 28th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2022

Shellcoding: Hunting for Kernel32 Base Address.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect.
Entropy, 2021

Challenges and Solutions for Cellular Based V2X Communications.
IEEE Commun. Surv. Tutorials, 2021

A parallel splitting ALM-based algorithm for separable convex programming.
Comput. Optim. Appl., 2021

Research on Navigation Attitude of Air Cushion Vehicle Based on BP Neural Network.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

Improving Adversarial Attacks Against Executable Raw Byte Classifiers.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A Metric for Machine Learning Vulnerability to Adversarial Examples.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Aion Attacks: Manipulating Software Timers in Trusted Execution Environment.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
Data-Driven Edge Intelligence for Robust Network Anomaly Detection.
IEEE Trans. Netw. Sci. Eng., 2020

Edge Intelligence Assisted Gateway Defense in Cyber Security.
IEEE Netw., 2020

Automated Post-Breach Penetration Testing through Reinforcement Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Data-Driven Network Intelligence for Anomaly Detection.
IEEE Netw., 2019

SoK: Hardware Security Support for Trustworthy Execution.
CoRR, 2019

Modified Quasi-Newton Optimization Algorithm-Based Iterative Learning Control for Multi-Axial Road Durability Test Rig.
IEEE Access, 2019

A Semi-Supervised Learning Approach for Network Anomaly Detection in Fog Computing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient Network Anomaly Detection for Edge Gateway Defense in 5G.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Security Analysis of Wireless Train Control Systems.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
A D2D Based Clustering Scheme for Public Safety Communications.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

A Predicate Encryption Based Anomaly Detection Scheme for E-Health Communications Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Privacy-Preserving Data Preprocessing for Fog Computing in 5G Network Security.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A data-driven preprocessing scheme on anomaly detection in big data applications.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

A Study on Communication Network Reliability for Advanced Metering Infrastructure in Smart Grid.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
A Secure Data Learning Scheme in Big Data Applications.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
On Reliability of Smart Grid Neighborhood Area Networks.
IEEE Access, 2015

Quantitative study of reliable communication infrastructure in smart grid NAN.
Proceedings of the 11th International Conference on the Design of Reliable Communication Networks, 2015

2010
SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy.
Proceedings of the Cloud Computing, Second International Conference, 2010


  Loading...