Xiaolong Bai

Orcid: 0009-0002-7411-8485

According to our database1, Xiaolong Bai authored at least 26 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels.
Proceedings of the 32nd USENIX Security Symposium, 2023

Histopathologic Cancer Detection with Hybrid Deep Learning model.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023

2022
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale.
CoRR, 2022

2021
An Optimal Resource Allocator of Elastic Training for Deep Learning Jobs on Cloud.
CoRR, 2021

POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

SimROD: A Simple Adaptation Method for Robust Object Detection.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Look Before You Leap: Safe Model-Based Reinforcement Learning with Human Intervention.
Proceedings of the Conference on Robot Learning, 8-11 November 2021, London, UK., 2021

2020
iDEA: Static Analysis on the Security of Apple Kernel Drivers.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation.
Sci. Comput. Program., 2019

Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Secur. Priv., 2017

Sensor Guardian: prevent privacy inference on Android sensors.
EURASIP J. Inf. Secur., 2017

Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12.
CoRR, 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Learning ECOC Code Matrix for Multiclass Classification with Application to Glaucoma Diagnosis.
J. Medical Syst., 2016

Automated anterior segment OCT image analysis for Angle Closure Glaucoma mechanisms classification.
Comput. Methods Programs Biomed., 2016

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Reliable Feature Selection for Automated Angle Closure Glaucoma Mechanism Detection.
J. Medical Syst., 2015

Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR, 2015

WebC: toward a portable framework for deploying legacy code in web browsers.
Sci. China Inf. Sci., 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Saliency-Based Defect Detection in Industrial Images by Using Phase Spectrum.
IEEE Trans. Ind. Informatics, 2014

2011
Multi-pattern Matching with Wildcards.
J. Softw., 2011

Defense against DNS Man-In-The-Middle Spoofing.
Proceedings of the Web Information Systems and Mining - International Conference, 2011


  Loading...