Xiaolong Bai

According to our database1, Xiaolong Bai authored at least 17 papers between 2011 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation.
Sci. Comput. Program., 2019

OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Security & Privacy, 2017

Sensor Guardian: prevent privacy inference on Android sensors.
EURASIP J. Information Security, 2017

Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12.
CoRR, 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Learning ECOC Code Matrix for Multiclass Classification with Application to Glaucoma Diagnosis.
J. Medical Systems, 2016

Automated anterior segment OCT image analysis for Angle Closure Glaucoma mechanisms classification.
Computer Methods and Programs in Biomedicine, 2016

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Reliable Feature Selection for Automated Angle Closure Glaucoma Mechanism Detection.
J. Medical Systems, 2015

Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR, 2015

WebC: toward a portable framework for deploying legacy code in web browsers.
SCIENCE CHINA Information Sciences, 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Saliency-Based Defect Detection in Industrial Images by Using Phase Spectrum.
IEEE Trans. Industrial Informatics, 2014

Multi-pattern Matching with Wildcards.
JSW, 2011

Defense against DNS Man-In-The-Middle Spoofing.
Proceedings of the Web Information Systems and Mining - International Conference, 2011