Xinhui Han
Orcid: 0000-0003-4481-1641
According to our database1,
Xinhui Han
authored at least 39 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Successive Interference Cancellation-Enabled Timely Status Update in Linear Multi-Hop Wireless Networks.
IEEE Trans. Mob. Comput., June, 2025
Age of collection with non-orthogonal multiple access: A theoretical-plus-experimental study.
Comput. Networks, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation.
Proceedings of the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025
2024
Research on blind reversible database watermarking algorithm based on dual embedding strategy.
Comput. J., 2024
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
2023
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023
Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph Features.
Proceedings of the Security and Privacy in Communication Networks, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
2022
Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined Rules.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Poster: MSILDiffer - A Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large Software.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
LPET - Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2018
STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on Clustering.
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
Sci. China Inf. Sci., 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2015
Comput. Commun., 2015
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2012
SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012
2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007