Xinyang Ge

According to our database1, Xinyang Ge
  • authored at least 13 papers between 2011 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
CoRR, 2017

Lazy Diagnosis of In-Production Concurrency Bugs.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

An Evil Copy: How the Loader Betrays You.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

GRIFFIN: Guarding Control Flows Using Intel Processor Trace.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
Fine-Grained Control-Flow Integrity for Kernel Software.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Pileus: protecting user resources from vulnerable cloud services.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

2014
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture.
CoRR, 2014

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Policy models to protect resource retrieval.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

2012
An SVD-based Collaborative Filtering approach to alleviate cold-start problems.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
A new prediction approach based on linear regression for collaborative filtering.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011


  Loading...