Xinyu Xing

According to our database1, Xinyu Xing authored at least 55 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
An Empirical Evaluation of Rule Extraction from Recurrent Neural Networks.
Neural Computation, 2018

A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity.
CoRR, 2018

FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

LEMNA: Explaining Deep Learning based Security Applications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
An Empirical Evaluation of Recurrent Neural Network Rule Extraction.
CoRR, 2017

Towards Interrogating Discriminative Machine Learning Models.
CoRR, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
CoRR, 2017

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Adversary Resistant Deep Neural Networks with an Application to Malware Detection.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
WildSense: Monitoring Interactions among Wild Deer in Harsh Outdoor Environments Using a Delay-Tolerant WSN.
J. Sensors, 2016

Random Feature Nullification for Adversary Resistant Deep Architecture.
CoRR, 2016

Learning Adversary-Resistant Deep Neural Networks.
CoRR, 2016

Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks.
CoRR, 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

Exploiting Insurance Telematics for Fun and Profit.
CoRR, 2016

TrackMeOrNot: Enabling Flexible Control on Web Tracking.
Proceedings of the 25th International Conference on World Wide Web, 2016

WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
ISC: An Iterative Social Based Classifier for Adult Account Detection on Twitter.
IEEE Trans. Knowl. Data Eng., 2015

Understanding Malvertising Through Ad-Injecting Browser Extensions.
Proceedings of the 24th International Conference on World Wide Web, 2015

UCognito: Private Browsing without Tears.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Exposing Inconsistent Web Search Results with Bobble.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
SafeVchat: A System for Obscene Content Detection in Online Video Chat Services.
ACM Trans. Internet Techn., 2013

Take This Personally: Pollution Attacks on Personalized Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services
CoRR, 2012

Efficient misbehaving user detection in online video chat services.
Proceedings of the Fifth International Conference on Web Search and Web Data Mining, 2012

Demo: MVChat: flasher detection for mobile video chat.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Scalable misbehavior detection in online video chat services.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

2011
Understanding Characteristics of Available Bandwidth in Wireless Environment.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services
CoRR, 2011

SafeVchat: detecting obscene content and misbehaving users in online video chat services.
Proceedings of the 20th International Conference on World Wide Web, 2011

A 6.7nV/√Hz Sub-mHz-1/f-corner 14b analog-to-digital interface for rail-to-rail precision voltage sensing.
Proceedings of the IEEE International Solid-State Circuits Conference, 2011

A highly scalable bandwidth estimation of commercial hotspot access points.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Fault reconnaissance agent for sensor networks.
Mobile Information Systems, 2010

Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures
CoRR, 2010

Fusing mobile, sensor, and social data to fully enable context-aware computing.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

ARBOR: Hang Together Rather Than Hang Separately in 802.11 WiFi Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Enhancing group recommendation by incorporating social relationship interactions.
Proceedings of the 2010 International ACM SIGGROUP Conference on Supporting Group Work, 2010

2009
Where is the tight link in a home wireless broadband environment?
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

An intelligent agent for fault reconnaissance in sensor networks.
Proceedings of the iiWAS'2009, 2009

Tracking Anonymous Sinks in Wireless Sensor Networks.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Security Analysis and Authentication Improvement for IEEE 802.11i Specification.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Fault Inference Mechanism in Sensor Networks Using Markov Chain.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Agent based approach towards energy aware routing in wireless sensor networks.
Proceedings of the IEEE International Conference on Systems, 2007

Agent-Based Routing for Wireless Sensor Network.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Agent-based Fault Detection Mechanism in Wireless Sensor Networks.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

2004
CGRED: class guided random early discarding.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004


  Loading...