Xiangqun Chen

Orcid: 0000-0002-7366-5906

According to our database1, Xiangqun Chen authored at least 109 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024

2023
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
CoRR, 2023

No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML.
CoRR, 2023

Beyond Fine-Tuning: Efficient and Effective Fed-Tuning for Mobile/Web Users.
Proceedings of the ACM Web Conference 2023, 2023

Towards Efficient Hugepage-aware Memory Deduplication.
Proceedings of the 4th Workshop on Resource Disaggregation and Serverless, 2023

Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Shared Account Problem in Super Apps.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

How Android Apps Break the Data Minimization Principle: An Empirical Study.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence Matching.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

APIMind: API-driven Assessment of Runtime Description-to-permission Fidelity in Android Apps.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

A Dual Self-supervised Deep Trajectory Clustering Method.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Graph-Based Temporal Attention Framework for Multi-Sensor Traffic Flow Forecasting.
IEEE Trans. Intell. Transp. Syst., 2022

Toward a Systematic Survey on Wearable Computing for Education Applications.
IEEE Internet Things J., 2022

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation.
CoRR, 2022

City-Scale Fingerprint Positioning Framework based on MDT Data.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model Slicing.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

MOBA-E2C: Generating MOBA Game Commentaries via Capturing Highlight Events from the Meta-Data.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

2021
DistFL: Distribution-aware Federated Learning for Mobile Scenarios.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

State Evaluation Method of Robot Lubricating Oil Based on Support Vector Regression.
Comput. Intell. Neurosci., 2021

PFA: Privacy-preserving Federated Adaptation for Effective Model Personalization.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Dependency-aware Form Understanding.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Robot Predictive Maintenance Method Based on Program-Position Cycle.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

TransTailor: Pruning the Pre-trained Model for Improved Transfer Learning.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
PMC: A Privacy-preserving Deep Learning Model Customization Framework for Edge Computing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

S3ML: A Secure Serving System for Machine Learning Inference.
CoRR, 2020

Adversarial Attacks on Monocular Depth Estimation.
CoRR, 2020

Dynamic slicing for deep neural networks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

PrTaurus: An Availability-Enhanced EMR Service on Preemptible Cloud Instances.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Comprehensive Evaluation Method of Multi-meter Integrated Energy Metering Operating State Based on Hierarchical Structure.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Research on the knowledge hierarchy and practice teaching of operating system course under the background of emerging engineering.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

2019
A Deep Learning based Approach to Automated Android App Testing.
CoRR, 2019

Policy-Based Access Control for Robotic Applications.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

WealthAdapt: A General Network Adaptation Framework for Small Data Tasks.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App Testing.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DCStore: A Deduplication-Based Cloud-of-Clouds Storage Service.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

How to Find It Better?: Cross-Learning for WeChat Mini Programs.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage between Teams in MOBA Games.
CoRR, 2018

Building application-specific operating systems: a profile-guided approach.
Sci. China Inf. Sci., 2018

Comparing Container-Based Microservices and Workspace as a Service: Which One to Choose?
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Inferring UI States of Mobile Applications Through Power Side Channel Exploitation.
Proceedings of the Security and Privacy in Communication Networks, 2018

Device-Specific Linux Kernel Optimization for Android Smartphones.
Proceedings of the 6th IEEE International Conference on Mobile Cloud Computing, 2018

What's inside my app?: understanding feature redundancy in mobile apps.
Proceedings of the 26th Conference on Program Comprehension, 2018

Shaping program repair space with existing patches and similar code.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage Between Teams in MOBA Games.
Proceedings of the Computer Games - 7th Workshop, 2018

Self-similarity Modeling Research on Information Gathering Service for Power Utilization of Smart Grid.
Proceedings of the 14th International Conference on Natural Computation, 2018

DistGear: A Lightweight Event-Driven Framework for Developing Distributed Applications.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Towards Light-Weight Deep Learning Based Malware Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Automated Extraction of Personal Knowledge from Smartphone Push Notifications.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Traffic Danger Recognition With Surveillance Cameras Without Training Data.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

2017
Mining User Reviews for Mobile App Comparisons.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study.
IEEE Access, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

Freeze It If You Can: Challenges and Future Directions in Benchmarking Smartphone Performance.
Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, 2017

FreeNavi: Landmark-Based Mapless Indoor Navigation Based on WiFi Fingerprints.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Looxy: Web Access Optimization for Mobile Applications with a Local Proxy.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

E-Spector: Online energy inspection for Android applications.
Proceedings of the 2017 IEEE/ACM International Symposium on Low Power Electronics and Design, 2017

AgileRabbit: A Feedback-Driven Offloading Middleware for Smartwatch Apps.
Proceedings of the 9th Asia-Pacific Symposium on Internetware, 2017

DroidBot: a lightweight UI-guided test input generator for Android.
Proceedings of the 39th International Conference on Software Engineering, 2017

Design of the intelligent detection instrument used in user electricity lines missort fault.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

2016
Standby Energy Analysis and Optimization for Smartphones.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

LibRadar: fast and accurate detection of third-party libraries in Android apps.
Proceedings of the 38th International Conference on Software Engineering, 2016

PERUIM: understanding mobile application privacy with permission-UI mapping.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Self-Adaptive Step Counting on Smartphones under Unrestricted Stepping Modes.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications.
Proceedings of the Security and Privacy in Communication Networks, 2015

JavaScript Offloading for Web Applications in Mobile-Cloud Computing.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Uniport: A Uniform Programming Support Framework for Mobile Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Cloud-Based Programmable Sensor Data Provision.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

WuKong: a scalable and accurate two-phase approach to Android app clone detection.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Fixing sensor-related energy bugs through automated sensing policy instrumentation.
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2015

A Study on Power Side Channels on Mobile Devices.
Proceedings of the 7th Asia-Pacific Symposium on Internetware, 2015

Reevaluating Android Permission Gaps with Static and Dynamic Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Rethinking Compiler Optimizations for the Linux Kernel: An Explorative Study.
Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015

2014
Context-aware usage control for web of things.
Secur. Commun. Networks, 2014

Similarity-based web browser optimization.
Proceedings of the 23rd International World Wide Web Conference, 2014

Topic Evolutions in Scientific Conferences.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Collaborative privacy management: mobile privacy beyond your own devices.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014

An empirical study of indoor localization algorithms with densely deployed APs.
Proceedings of the IEEE Global Communications Conference, 2014

Preserving Location-Related Privacy Collaboratively in Geo-social Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Experiences in profile-guided operating system kernel optimization.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

2013
Supporting Localized Interactions among Heterogeneous Smart Things with ThingWare.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Patronus: Augmented Privacy Protection for Resource Publication in Online Social Networks.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Mobile Web Browser Optimizations in the Cloud Era: A Survey.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Power estimation for mobile applications with profile-driven battery traces.
Proceedings of the International Symposium on Low Power Electronics and Design (ISLPED), 2013

Towards an operating system for the campus.
Proceedings of the 5th Asia-Pacific Symposium on Internetware, 2013

2012
Security model oriented attestation on dynamically reconfigurable component-based systems.
J. Netw. Comput. Appl., 2012

2011
Jupiter: transparent augmentation of smartphone capabilities through cloud computing.
Proceedings of the 3rd ACM SOSP Workshop on Networking, 2011

A system context-aware approach for battery lifetime prediction in smart phones.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2010
Context-Aware Usage Control for Android.
Proceedings of the Security and Privacy in Communication Networks, 2010

An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining Determinism.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Transaction-based adaptive dynamic voltage scaling for interactive applications.
Proceedings of the 2009 International Symposium on Low Power Electronics and Design, 2009

A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009

SAConf: Semantic Attestation of Software Configurations.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

FPValidator: Validating Type Equivalence of Function Pointers on the Fly.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
AspectC2C: a symmetric aspect extension to the C language.
ACM SIGPLAN Notices, 2008

Automated Aspect Recommendation through Clustering-Based Fan-in Analysis.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Data Prefetching Driven by User Preference and Global Coordination for Mobile Environments.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

Keep Passwords Away from Memory: Password Caching and Verification Using TPM.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Towards a Software Framework for Building Highly Flexible Component-Based Embedded Operating Systems.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007

Toward Efficient Aspect Mining for Linux.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

2005
A HAL for Component-Based Embedded Operating Systems.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
On Generalizing Interrupt Handling into a Flexible Binding Model for Kernel Components.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

Research Directions for Embedded Operating Systems.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

Extraction and Visualization of Architectural Structure Based on Cross References among Object Files.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004


  Loading...