According to our database1, Xiaolong Bai authored at least 15 papers between 2011 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation.
Sci. Comput. Program., 2019
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Security & Privacy, 2017
Sensor Guardian: prevent privacy inference on Android sensors.
EURASIP J. Information Security, 2017
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017
Learning ECOC Code Matrix for Multiclass Classification with Application to Glaucoma Diagnosis.
J. Medical Systems, 2016
Automated anterior segment OCT image analysis for Angle Closure Glaucoma mechanisms classification.
Computer Methods and Programs in Biomedicine, 2016
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Reliable Feature Selection for Automated Angle Closure Glaucoma Mechanism Detection.
J. Medical Systems, 2015
WebC: toward a portable framework for deploying legacy code in web browsers.
SCIENCE CHINA Information Sciences, 2015
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Saliency-Based Defect Detection in Industrial Images by Using Phase Spectrum.
IEEE Trans. Industrial Informatics, 2014
Multi-pattern Matching with Wildcards.
Defense against DNS Man-In-The-Middle Spoofing.
Proceedings of the Web Information Systems and Mining - International Conference, 2011