Xiaohui Kuang

Orcid: 0000-0003-3816-402X

According to our database1, Xiaohui Kuang authored at least 95 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
When Moving Target Defense Meets Attack Prediction in Digital Twins: A Convolutional and Hierarchical Reinforcement Learning Approach.
IEEE J. Sel. Areas Commun., October, 2023

A Mutation-Enabled Proactive Defense Against Service-Oriented Man-in-The-Middle Attack in Kubernetes.
IEEE Trans. Computers, July, 2023

How to Mitigate DDoS Intelligently in SD-IoV: A Moving Target Defense Approach.
IEEE Trans. Ind. Informatics, 2023

How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2023

A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach.
IEEE Trans. Dependable Secur. Comput., 2023

Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Risk Scenario Generation for Autonomous Driving Systems based on Scenario Evaluation Model.
Proceedings of the International Joint Conference on Neural Networks, 2023

ADV-POST: Physically Realistic Adversarial Poster for Attacking Semantic Segmentation Models in Autonomous Driving.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Automated Software Vulnerability Detection via Curriculum Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Joint Geometrical and Statistical Domain Adaptation for Cross-domain Code Vulnerability Detection.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Machine Learning Security Analysis Framework Based on Threat Matrix.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Survey on Fuzzing Techniques in Deep Learning Libraries.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

A Study on Vulnerability Code Labeling Method in Open-Source C Programs.
Proceedings of the Database and Expert Systems Applications, 2023

Fine-Grained Software Vulnerability Detection via Neural Architecture Search.
Proceedings of the Database Systems for Advanced Applications, 2023

Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNN.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Toward Attack-Resistant Route Mutation for VANETs: An Online and Adaptive Multiagent Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., 2022

ICDF: Intrusion collaborative detection framework based on confidence.
Int. J. Intell. Syst., 2022

An intelligent proactive defense against the client-side DNS cache poisoning attack via self-checking deep reinforcement learning.
Int. J. Intell. Syst., 2022

Multidomain security authentication for the Internet of things.
Concurr. Comput. Pract. Exp., 2022

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Dynamic and Diverse Transformations for Defending Against Adversarial Examples.
Proceedings of the IEEE International Conference on Trust, 2022

Group-based corpus scheduling for parallel fuzzing.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Improving Transferability of Adversarial Examples with Virtual Step and Auxiliary Gradients.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Detecting Backdoor Attacks on Deep Neural Networks Based on Model Parameters Analysis.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Black-Box Adversarial Attacks on Deep Neural Networks: A Survey.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

A Proactive Defense Strategy Against SGX Side-channel Attacks via self-checking DRL in the Cloud.
Proceedings of the IEEE International Conference on Communications, 2022

A Data-free Black-box Attack for Generating Transferable Adversarial Examples.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Code Vulnerability Detection via Nearest Neighbor Mechanism.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Fuzzing DBMS via NNLM.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
IEEE Trans. Intell. Transp. Syst., 2021

An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers.
Mob. Networks Appl., 2021

Towards a physical-world adversarial patch for blinding object detection models.
Inf. Sci., 2021

A discrete cosine transform-based query efficient attack on black-box object detectors.
Inf. Sci., 2021

Context-Aware Adaptive Route Mutation Scheme: A Reinforcement Learning Approach.
IEEE Internet Things J., 2021

PPO-RM: Proximal Policy Optimization Based Route Mutation for Multimedia Services.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Free Adversarial Training with Layerwise Heuristic Learning.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Gradient-oriented gray-box protocol fuzzing.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Generating Highly Structured Inputs: A Survey.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Detecting Adversarial Samples in Neural Network with Statistical Metrics: A Practical Approach.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features.
Wirel. Commun. Mob. Comput., 2020

Adaptive iterative attack towards explainable adversarial robustness.
Pattern Recognit., 2020

An adversarial attack on DNN-based black-box object detectors.
J. Netw. Comput. Appl., 2020

Privacy preservation for machine learning training and classification based on homomorphic encryption schemes.
Inf. Sci., 2020

Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service.
IEEE Commun. Mag., 2020

I-HMM-Based Multidimensional Network Security Risk Assessment.
IEEE Access, 2020

Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Real-Time Audio and Video Streaming Transmission Scheme for Social Media.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

An Android Data Protection Scheme for System-as-Root Architectures.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

An Intelligent File Transfer Optimization for Poor Network Conditions.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Keeping Privacy Data Secure Under Factory Recovery.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

A VirtualXposed-Based Inline Hooking Framework for Android Native Methods.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

A Hybrid Interface Recovery Method for Android Kernels Fuzzing.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

An Adaptive Data Protection Scheme for Optimizing Storage Space.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

DQ-RM: Deep Reinforcement Learning-based Route Mutation Scheme for Multimedia Services.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A Study on Mesh Hybrid Memory Cube Network.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2020

Non-norm-bounded Attack for Generating Adversarial Examples.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Two-Way Feature-Aligned And Attention-Rectified Adversarial Training.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

Multi-vNIC Intelligent Mutation: A Moving Target Defense to thwart Client-side DNS Cache Attack.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Intelligent-driven Adapting Defense Against the Client-side DNS Cache Poisoning in the Cloud.
Proceedings of the IEEE Global Communications Conference, 2020

2019
一种基于程序切片相似度匹配的脆弱性发现方法 (Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing).
计算机科学, 2019

The security of machine learning in an adversarial setting: A survey.
J. Parallel Distributed Comput., 2019

Detecting adversarial examples via prediction difference for deep neural networks.
Inf. Sci., 2019

A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks.
IEEE Access, 2019

A heuristic fuzz test generator for Java native interface.
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019

SE-PSO: Resource Scheduling Strategy for Multimedia Cloud Platform Based on Security Enhanced Virtual Migration.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Untargeted Adversarial Attack via Expanding the Semantic Gap.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

An Intelligent Route Mutation Mechanism against Mixed Attack Based on Security Awareness.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Boosting Training for PDF Malware Classifier via Active Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Evading PDF Malware Classifiers with Generative Adversarial Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
A General Testing Framework Based on Veins for Securing VANET Applications.
Proceedings of the 2018 IEEE SmartWorld, 2018

Balancing the QOS and Security in Dijkstra Algorithm by SDN Technology.
Proceedings of the Network and Parallel Computing, 2018

Network Traffic Generator Based on Distributed Agent for Large-Scale Network Emulation Environment.
Proceedings of the Intelligence Science and Big Data Engineering, 2018

Security Analysis of Intelligent Transportation Systems Based on Simulation Data.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

A Vulnerability Test Method for Speech Recognition Systems Based on Frequency Signal Processing.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Machine Learning in Vulnerability Databases.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

2016
一种基于多层拓扑的大规模分布式系统结构脆弱性分析算法 (Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System).
计算机科学, 2016

Survey on Software Vulnerability Analysis Method Based on Machine Learning.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
A clustering approach based on convergence degree chain for wireless sensor networks.
Secur. Commun. Networks, 2015

2014
On Effectiveness of Clustering Principles in Maximizing Wireless Sensor Network Lifespan.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

2013
Architecture of Network Environment for High-Risk Security Experimentation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
Secure Service and Management for Security-Critical Wireless Sensor Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Research on survivability metrics based on survivable process of network system.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

2010
Implicit detection of stealth software with a local-booted virtual machine.
Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), 2010

2009
Research on Technologies of Building Experimental Environment for Network Worm Simulation.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

An Emulation Environment for Vulnerability Analysis of Large-Scale Distributed System.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2005
A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...