Xiaofeng Zheng

Orcid: 0000-0002-7130-6029

According to our database1, Xiaofeng Zheng authored at least 29 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Switched Capacitor Modified Fibonacci Cell Used for a DC-AC Circuit Supplied by Solar Energy.
IEEE Trans. Circuits Syst. I Regul. Pap., April, 2024

2023
Multioutput Switched-Capacitor Multilevel Inverter With Intrinsic Elimination of the Photovoltaics Induced Leakage Current and High Boost Factor.
IEEE Trans. Ind. Electron., June, 2023

Detecting and Measuring Security Risks of Hosting-Based Dangling Domains.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

2022
Teleoperated Locomotion for Biobot between Japan and Bangladesh.
Comput., 2022

Building an Open, Robust, and Stable Voting-Based Domain Top List.
Proceedings of the 31st USENIX Security Symposium, 2022

A Large-scale and Longitudinal Measurement Study of DKIM Deployment.
Proceedings of the 31st USENIX Security Symposium, 2022

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

An Extensive Study of Residential Proxies in China.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Towards Clean and Safe Water: A Review on the Emerging Role of Imprinted Polymer-Based Electrochemical Sensors.
Sensors, 2021

Mean-square stability of stochastic system with Markov jump and Lévy noise via adaptive control.
J. Frankl. Inst., 2021

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

Uplink Channel Estimation and Signal Extraction Against Malicious IRS in Massive MIMO System.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Fast IPv6 Network Periphery Discovery and Security Implications.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

2020
Guaranteeing Information Transfer Integrity Through Two Non-Colluding Malicious Nodes Against i.i.d. Attacks.
IEEE Trans. Veh. Technol., 2020

Uplink Channel Estimation and Signal Extraction Against Malicious Intelligent Reflecting Surface in Massive MIMO System.
CoRR, 2020

Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Proceedings of the 29th USENIX Security Symposium, 2020

Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2018
Path Leaks of HTTPS Side-Channel by Cookie Injection.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2017
Local sequence and sequencing depth dependent accuracy of RNA-seq reads.
BMC Bioinform., 2017

2016
Forwarding-Loop Attacks in Content Delivery Networks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

A FEHT algorithm for detecting and tracking VLO targets.
Proceedings of the 19th International Conference on Information Fusion, 2016

2015
Knowledge-Based Analysis for Detecting Key Signaling Events from Time-Series Phosphoproteomics Data.
PLoS Comput. Biol., 2015

Cookies Lack Integrity: Real-World Implications.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
BM-SNP: A Bayesian Model for SNP Calling Using High Throughput Sequencing Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2014

2012
A Bayesian model for SNP discovery based on next-generation sequencing data.
Proceedings of the Proceedings 2012 IEEE International Workshop on Genomic Signal Processing and Statistics, 2012

2010
A Human-Specific <i>De Novo</i> Protein-Coding Gene Associated with Human Brain Functions.
PLoS Comput. Biol., 2010


  Loading...