Xiaoxiao Tang

According to our database1, Xiaoxiao Tang authored at least 6 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Traffic Anomaly Detection for Data Communication Networks.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2018
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Control Flow Integrity Enforcement with Dynamic Code Optimization.
Proceedings of the Information Security - 19th International Conference, 2016

On the Effectiveness of Code-Reuse-Based Android Application Obfuscation.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

2015
Stack Layout Randomization with Minimal Rewriting of Android Binaries.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015


  Loading...