Xiaolong Bai

According to our database1, Xiaolong Bai authored at least 15 papers between 2011 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation.
Sci. Comput. Program., 2019

2018
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Security & Privacy, 2017

Sensor Guardian: prevent privacy inference on Android sensors.
EURASIP J. Information Security, 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Learning ECOC Code Matrix for Multiclass Classification with Application to Glaucoma Diagnosis.
J. Medical Systems, 2016

Automated anterior segment OCT image analysis for Angle Closure Glaucoma mechanisms classification.
Computer Methods and Programs in Biomedicine, 2016

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Reliable Feature Selection for Automated Angle Closure Glaucoma Mechanism Detection.
J. Medical Systems, 2015

WebC: toward a portable framework for deploying legacy code in web browsers.
SCIENCE CHINA Information Sciences, 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Saliency-Based Defect Detection in Industrial Images by Using Phase Spectrum.
IEEE Trans. Industrial Informatics, 2014

2011
Multi-pattern Matching with Wildcards.
JSW, 2011

Defense against DNS Man-In-The-Middle Spoofing.
Proceedings of the Web Information Systems and Mining - International Conference, 2011


  Loading...