Tongxin Li

Orcid: 0009-0002-8633-7394

According to our database1, Tongxin Li authored at least 54 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TENSILE: A Tensor Granularity Dynamic GPU Memory Scheduling Method Toward Multiple Dynamic Workloads System.
IEEE Trans. Knowl. Data Eng., August, 2023

Data assimilation of rotor flow at hovering state using ensemble Kalman filter.
J. Vis., August, 2023

Learning-Augmented Scheduling for Solar-Powered Electric Vehicle Charging.
CoRR, 2023

Nested Game for Coupled Power System with Energy Sharing and Transportation System.
CoRR, 2023

Anytime-Competitive Reinforcement Learning with Policy Prior.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Beyond Black-Box Advice: Learning-Augmented Algorithms for MDPs with Q-Value Predictions.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Bedtime Pals: A Deployment Study of Sleep Management Technology for Families with Young Children.
Proceedings of the 2023 ACM Designing Interactive Systems Conference, 2023

2022
Robustness and Consistency in Linear Quadratic Control with Untrusted Predictions.
Proc. ACM Meas. Anal. Comput. Syst., 2022

Equipping Black-Box Policies with Model-Based Advice for Stable Nonlinear Control.
CoRR, 2022

Towards Balanced Three-phase Charging: Phase Optimization in Adaptive Charging Networks.
CoRR, 2022

Bounded-Regret MPC via Perturbation Analysis: Prediction Error, Constraints, and Nonlinearity.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Learning-Based Predictive Control via Real-Time Aggregate Flexibility.
IEEE Trans. Smart Grid, 2021

Information Aggregation for Constrained Online Control.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Optimal Bidding of Energy Storage: A Surrogate Method with Combined Spatial-Temporal Entropy.
CoRR, 2021

Robustness and Consistency in Linear Quadratic Control with Predictions.
CoRR, 2021

TENSILE: A Tensor granularity dynamic GPU memory scheduler method towards multiple dynamic workloads system.
CoRR, 2021

Disentangling Observed Causal Effects from Latent Confounders using Method of Moments.
CoRR, 2021

WeChat use among family caregivers of people living with schizophrenia and its relationship to caregiving experiences.
Comput. Hum. Behav., 2021

Data-driven Electric Vehicle Charging Station Placement for Incentivizing Potential Demand.
Proceedings of the IEEE International Conference on Communications, 2021

2020
Learning Graphs From Linear Measurements: Fundamental Trade-Offs and Applications.
IEEE Trans. Signal Inf. Process. over Networks, 2020

Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Real-time Aggregate Flexibility via Reinforcement Learning.
CoRR, 2020

Towards Memory Safe Python Enclave for Security Sensitive Computation.
CoRR, 2020

ReDex: Unpacking Android Packed Apps by Executing Every Method.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Building and maintaining a third-party library supply chain for productive and secure SGX enclave development.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020

Real-time Flexibility Feedback for Closed-loop Aggregator and System Operator Coordination.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020

ORC: An Online Competitive Algorithm for Recommendation and Charging Schedule in Electric Vehicle Charging Network.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020

MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

2019
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

ACN-Data: Analysis and Applications of an Open EV Charging Dataset.
Proceedings of the Tenth ACM International Conference on Future Energy Systems, 2019

Learning Graph Parameters from Linear Measurements: Fundamental Trade-offs and Application to Electric Grids.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

2018
Detecting telecommunication fraud by understanding the contents of a call.
Cybersecur., 2018

Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Maximum Likelihood Upper Bounds on the Capacities of Discrete Information Stable Channels.
Proceedings of the IEEE Information Theory Workshop, 2018

Quadratically Constrained Channels with Causal Adversaries.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Spectral efficiency optimization in caching enabled ultra-dense small cell networks.
Proceedings of the IEEE INFOCOM 2018, 2018

Caching in Ultra-Dense Small Cell Networks with Limited Backhaul.
Proceedings of the IEEE Global Communications Conference, 2018

Robust and Consistent Clustering Recovery via SDP Approaches.
Proceedings of the 2018 IEEE Data Science Workshop, 2018

2017
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Secur. Priv., 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Fundamental limits and achievable strategies for low energy compressed sensing with applications in wireless communication.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

VTrust: Regaining Trust on Virtual Calls.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Self-Organized Dynamic Caching Space Sharing in Virtualized Wireless Networks.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR, 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
"Information-Friction" for Noiseless Compressive Sensing Decoding.
CoRR, 2014

Group testing with prior statistics.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

POSTER: AdHoneyDroid - Capture Malicious Android Advertisements.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014


  Loading...