Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fengyuan Xu
@article{DBLP:journals/tmc/HanXWZZX24, author = {Hao Han and Kunming Xie and Tongyu Wang and Xiaojun Zhu and Yanchao Zhao and Fengyuan Xu}, title = {RescQR: Enabling Reliable Data Recovery in Screen-Camera Communication System}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {23}, number = {5}, pages = {3510--3522}, year = {2024}, url = {https://doi.org/10.1109/TMC.2023.3277212}, doi = {10.1109/TMC.2023.3277212}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/HanXWZZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/NingXWBXZLY23, author = {Jingyi Ning and Lei Xie and Chuyu Wang and Yanling Bu and Fengyuan Xu and Da{-}Wei Zhou and Sanglu Lu and Baoliu Ye}, title = {RF-Badge: Vital Sign-Based Authentication via {RFID} Tag Array on Badges}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {2}, pages = {1170--1184}, year = {2023}, url = {https://doi.org/10.1109/TMC.2021.3097912}, doi = {10.1109/TMC.2021.3097912}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/NingXWBXZLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/TongCJXLZ23, author = {Wei Tong and Wenjie Chen and Bingbing Jiang and Fengyuan Xu and Qun Li and Sheng Zhong}, title = {Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {9}, pages = {5463--5478}, year = {2023}, url = {https://doi.org/10.1109/TMC.2022.3174867}, doi = {10.1109/TMC.2022.3174867}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/TongCJXLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/SunWWGXLHZ23, author = {Lizhi Sun and Shuocheng Wang and Hao Wu and Yuhang Gong and Fengyuan Xu and Yunxin Liu and Hao Han and Sheng Zhong}, title = {{LEAP:} TrustZone Based Developer-Friendly {TEE} for Intelligent Mobile Apps}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {12}, pages = {7138--7155}, year = {2023}, url = {https://doi.org/10.1109/TMC.2022.3207745}, doi = {10.1109/TMC.2022.3207745}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/SunWWGXLHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/TianSSX023, author = {Yulong Tian and Fnu Suya and Anshuman Suri and Fengyuan Xu and David Evans}, title = {Manipulating Transfer Learning for Property Inference}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {15975--15984}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.01533}, doi = {10.1109/CVPR52729.2023.01533}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/TianSSX023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WuYKHXZ23, author = {Hao Wu and Bo Yang and Xiaopeng Ke and Siyi He and Fengyuan Xu and Sheng Zhong}, title = {GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User Side}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10096286}, doi = {10.1109/ICASSP49357.2023.10096286}, timestamp = {Sun, 05 Nov 2023 16:51:21 +0100}, biburl = {https://dblp.org/rec/conf/icassp/WuYKHXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/HuangHXC23, author = {Jiawei Huang and Hao Han and Fengyuan Xu and Bing Chen}, title = {{SAPPX:} Securing {COTS} Binaries with Automatic Program Partitioning for Intel {SGX}}, booktitle = {34th {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2023, Florence, Italy, October 9-12, 2023}, pages = {148--159}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISSRE59848.2023.00016}, doi = {10.1109/ISSRE59848.2023.00016}, timestamp = {Tue, 14 Nov 2023 16:09:47 +0100}, biburl = {https://dblp.org/rec/conf/issre/HuangHXC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/LiWW0X23, author = {Shucheng Li and Runchuan Wang and Hao Wu and Sheng Zhong and Fengyuan Xu}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {{SIEGE:} Self-Supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {8881--8890}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612461}, doi = {10.1145/3581783.3612461}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/LiWW0X23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/LiCYWZX23, author = {Shucheng Li and Boyu Chang and Bo Yang and Hao Wu and Sheng Zhong and Fengyuan Xu}, editor = {Hsin{-}Hsi Chen and Wei{-}Jou (Edward) Duh and Hen{-}Hsen Huang and Makoto P. Kato and Josiane Mothe and Barbara Poblete}, title = {Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English}, booktitle = {Proceedings of the 46th International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, {SIGIR} 2023, Taipei, Taiwan, July 23-27, 2023}, pages = {749--759}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3539618.3591661}, doi = {10.1145/3539618.3591661}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigir/LiCYWZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-11643, author = {Yulong Tian and Fnu Suya and Anshuman Suri and Fengyuan Xu and David Evans}, title = {Manipulating Transfer Learning for Property Inference}, journal = {CoRR}, volume = {abs/2303.11643}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.11643}, doi = {10.48550/ARXIV.2303.11643}, eprinttype = {arXiv}, eprint = {2303.11643}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-11643.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/TangQLLYXL22, author = {Yutao Tang and Zhengrui Qin and Zhiqiang Lin and Yue Li and Shanhe Yi and Fengyuan Xu and Qun Li}, title = {vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted {OS}}, journal = {{IEEE} Trans. Computers}, volume = {71}, number = {12}, pages = {3349--3360}, year = {2022}, url = {https://doi.org/10.1109/TC.2022.3152074}, doi = {10.1109/TC.2022.3152074}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/TangQLLYXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TianSXE22, author = {Yulong Tian and Fnu Suya and Fengyuan Xu and David Evans}, title = {Stealthy Backdoors as Compression Artifacts}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1372--1387}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3160359}, doi = {10.1109/TIFS.2022.3160359}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TianSXE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuanZPLLX022, author = {Yue Duan and Xin Zhao and Yu Pan and Shucheng Li and Minghao Li and Fengyuan Xu and Mu Zhang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {921--935}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559384}, doi = {10.1145/3548606.3559384}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuanZPLLX022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/KeCWXZ22, author = {Xiaopeng Ke and Boyu Chang and Hao Wu and Fengyuan Xu and Sheng Zhong}, title = {Towards Practical and Efficient Long Video Summary}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022}, pages = {1770--1774}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICASSP43922.2022.9746911}, doi = {10.1109/ICASSP43922.2022.9746911}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/KeCWXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/TianKTDXLHZF22, author = {Yulong Tian and Xiaopeng Ke and Zeyi Tao and Shaohua Ding and Fengyuan Xu and Qun Li and Hao Han and Sheng Zhong and Xinyi Fu}, title = {Privacy-Preserving and Robust Federated Deep Metric Learning}, booktitle = {30th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2022, Oslo, Norway, June 10-12, 2022}, pages = {1--11}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IWQoS54832.2022.9812909}, doi = {10.1109/IWQOS54832.2022.9812909}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/TianKTDXLHZF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/ChenHWXQM22, author = {Ligeng Chen and Zhongling He and Hao Wu and Fengyuan Xu and Yi Qian and Bing Mao}, title = {DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy}, booktitle = {{IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022}, pages = {112--122}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SANER53432.2022.00025}, doi = {10.1109/SANER53432.2022.00025}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcre/ChenHWXQM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-07228, author = {Hao Wu and Yuhang Gong and Xiaopeng Ke and Hanzhong Liang and Minghao Li and Fengyuan Xu and Yunxin Liu and Sheng Zhong}, title = {Automation Slicing and Testing for in-App Deep Learning Models}, journal = {CoRR}, volume = {abs/2205.07228}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.07228}, doi = {10.48550/ARXIV.2205.07228}, eprinttype = {arXiv}, eprint = {2205.07228}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-07228.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jscic/LiYHYXY21, author = {Qin Li and Pan Yan and Xiao Huang and Liuqing Yang and Fengyuan Xu and Yancheng You}, title = {On Developing Piecewise Rational Mapping with Fine Regulation Capability for {WENO} Schemes}, journal = {J. Sci. Comput.}, volume = {88}, number = {3}, pages = {75}, year = {2021}, url = {https://doi.org/10.1007/s10915-021-01559-z}, doi = {10.1007/S10915-021-01559-Z}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jscic/LiYHYXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangMXXZ21, author = {Yuan Zhang and Yunlong Mao and Minze Xu and Fengyuan Xu and Sheng Zhong}, title = {Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1008--1018}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2911502}, doi = {10.1109/TDSC.2019.2911502}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangMXXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/GaoSLXQXMKS21, author = {Peng Gao and Fei Shao and Xiaoyuan Liu and Xusheng Xiao and Zheng Qin and Fengyuan Xu and Prateek Mittal and Sanjeev R. Kulkarni and Dawn Song}, title = {Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence}, booktitle = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021, Chania, Greece, April 19-22, 2021}, pages = {193--204}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDE51399.2021.00024}, doi = {10.1109/ICDE51399.2021.00024}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icde/GaoSLXQXMKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/GaoSLXLQXMKS21, author = {Peng Gao and Fei Shao and Xiaoyuan Liu and Xusheng Xiao and Haoyuan Liu and Zheng Qin and Fengyuan Xu and Prateek Mittal and Sanjeev R. Kulkarni and Dawn Song}, title = {A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence}, booktitle = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021, Chania, Greece, April 19-22, 2021}, pages = {2705--2708}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDE51399.2021.00309}, doi = {10.1109/ICDE51399.2021.00309}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icde/GaoSLXLQXMKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/XuZXZ21, author = {Minze Xu and Yuan Zhang and Fengyuan Xu and Sheng Zhong}, title = {Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels}, booktitle = {29th {IEEE/ACM} International Symposium on Quality of Service, {IWQOS} 2021, Tokyo, Japan, June 25-28, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IWQOS52092.2021.9521279}, doi = {10.1109/IWQOS52092.2021.9521279}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/XuZXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/WangDCLX21, author = {Manni Wang and Shaohua Ding and Ting Cao and Yunxin Liu and Fengyuan Xu}, title = {AsyMo: scalable and efficient deep-learning inference on asymmetric mobile CPUs}, booktitle = {{ACM} MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, New Orleans, Louisiana, USA, October 25-29, 2021}, pages = {215--228}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447993.3448625}, doi = {10.1145/3447993.3448625}, timestamp = {Mon, 12 Apr 2021 09:18:20 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/WangDCLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/WuTLLAXZ21, author = {Hao Wu and Xuejin Tian and Minghao Li and Yunxin Liu and Ganesh Ananthanarayanan and Fengyuan Xu and Sheng Zhong}, title = {{PECAM:} privacy-enhanced video streaming and analytics via securely-reversible transformation}, booktitle = {{ACM} MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, New Orleans, Louisiana, USA, October 25-29, 2021}, pages = {229--241}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447993.3448618}, doi = {10.1145/3447993.3448618}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/WuTLLAXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WuTGSLX21, author = {Hao Wu and Xuejin Tian and Yuhang Gong and Xing Su and Minghao Li and Fengyuan Xu}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {DAPter: Preventing User Data Abuse in Deep Learning Inference Services}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {1017--1028}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3449907}, doi = {10.1145/3442381.3449907}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/WuTGSLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-06761, author = {Peng Gao and Fei Shao and Xiaoyuan Liu and Xusheng Xiao and Haoyuan Liu and Zheng Qin and Fengyuan Xu and Prateek Mittal and Sanjeev R. Kulkarni and Dawn Song}, title = {A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence}, journal = {CoRR}, volume = {abs/2101.06761}, year = {2021}, url = {https://arxiv.org/abs/2101.06761}, eprinttype = {arXiv}, eprint = {2101.06761}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-06761.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-11226, author = {Qin Li and Pan Yan and Xiao Huang and Liuqing Yang and Fengyuan Xu}, title = {On developing piecewise rational mapping with fine regulation capability for {WENO} schemes}, journal = {CoRR}, volume = {abs/2101.11226}, year = {2021}, url = {https://arxiv.org/abs/2101.11226}, eprinttype = {arXiv}, eprint = {2101.11226}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-11226.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-02465, author = {Lizhi Sun and Shuocheng Wang and Hao Wu and Yuhang Gong and Fengyuan Xu and Yunxin Liu and Hao Han and Sheng Zhong}, title = {App Developer Centric Trusted Execution Environment}, journal = {CoRR}, volume = {abs/2102.02465}, year = {2021}, url = {https://arxiv.org/abs/2102.02465}, eprinttype = {arXiv}, eprint = {2102.02465}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-02465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-15129, author = {Yulong Tian and Fnu Suya and Fengyuan Xu and David Evans}, title = {Stealthy Backdoors as Compression Artifacts}, journal = {CoRR}, volume = {abs/2104.15129}, year = {2021}, url = {https://arxiv.org/abs/2104.15129}, eprinttype = {arXiv}, eprint = {2104.15129}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-15129.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-10176, author = {Shucheng Li and Fengyuan Xu and Runchuan Wang and Sheng Zhong}, title = {Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection}, journal = {CoRR}, volume = {abs/2106.10176}, year = {2021}, url = {https://arxiv.org/abs/2106.10176}, eprinttype = {arXiv}, eprint = {2106.10176}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-10176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-15508, author = {Fengyuan Xu and Pan Yan and Qin Li and Yancheng You}, title = {Quasi-linear analysis of dispersion relation preservation for nonlinear schemes}, journal = {CoRR}, volume = {abs/2110.15508}, year = {2021}, url = {https://arxiv.org/abs/2110.15508}, eprinttype = {arXiv}, eprint = {2110.15508}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-15508.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/LiWFXXZ20, author = {Shucheng Li and Lingfei Wu and Shiwei Feng and Fangli Xu and Fengyuan Xu and Sheng Zhong}, editor = {Trevor Cohn and Yulan He and Yang Liu}, title = {Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2020, Online Event, 16-20 November 2020}, series = {Findings of {ACL}}, volume = {{EMNLP} 2020}, pages = {2841--2852}, publisher = {Association for Computational Linguistics}, year = {2020}, url = {https://doi.org/10.18653/v1/2020.findings-emnlp.255}, doi = {10.18653/V1/2020.FINDINGS-EMNLP.255}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/LiWFXXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/XiongXZ20, author = {Yayuan Xiong and Fengyuan Xu and Sheng Zhong}, title = {Detecting GAN-based Privacy Attack in Distributed Learning}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149430}, doi = {10.1109/ICC40277.2020.9149430}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/XiongXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeesec/GaoTYXFZ20, author = {Han Gao and Yulong Tian and Rongchun Yao and Fengyuan Xu and Xinyi Fu and Sheng Zhong}, title = {Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems}, booktitle = {5th {IEEE/ACM} Symposium on Edge Computing, {SEC} 2020, San Jose, CA, USA, November 12-14, 2020}, pages = {334--339}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SEC50012.2020.00048}, doi = {10.1109/SEC50012.2020.00048}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ieeesec/GaoTYXFZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/YuKXH20, author = {Jin Yu and Xiaopeng Ke and Fengyuan Xu and Hao Huang}, title = {Efficient Architecture Paradigm for Deep Learning Inference as a Service}, booktitle = {39th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2020, Austin, TX, USA, November 6-8, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IPCCC50635.2020.9391551}, doi = {10.1109/IPCCC50635.2020.9391551}, timestamp = {Wed, 14 Apr 2021 10:06:40 +0200}, biburl = {https://dblp.org/rec/conf/ipccc/YuKXH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/WuFTSLDXZ20, author = {Hao Wu and Jinghao Feng and Xuejin Tian and Edward Sun and Yunxin Liu and Bo Dong and Fengyuan Xu and Sheng Zhong}, editor = {Eyal de Lara and Iqbal Mohomed and Jason Nieh and Elizabeth M. Belding}, title = {{EMO:} real-time emotion recognition from single-eye images for resource-constrained eyewear devices}, booktitle = {MobiSys '20: The 18th Annual International Conference on Mobile Systems, Applications, and Services, Toronto, Ontario, Canada, June 15-19, 2020}, pages = {448--461}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3386901.3388917}, doi = {10.1145/3386901.3388917}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/WuFTSLDXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/XiongXZL20, author = {Yayuan Xiong and Fengyuan Xu and Sheng Zhong and Qun Li}, editor = {Marko H{\"{o}}lbl and Kai Rannenberg and Tatjana Welzer}, title = {Escaping Backdoor Attack Detection of Deep Learning}, booktitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {580}, pages = {431--445}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58201-2\_29}, doi = {10.1007/978-3-030-58201-2\_29}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/XiongXZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/ZhuLXZ20, author = {Yu Zhu and Zongfei Li and Fengyuan Xu and Sheng Zhong}, editor = {Guojun Wang and Bing Chen and Wei Li and Roberto Di Pietro and Xuefeng Yan and Hao Han}, title = {Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12382}, pages = {62--75}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68851-6\_4}, doi = {10.1007/978-3-030-68851-6\_4}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/ZhuLXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/FangZLTHX20, author = {Ziyan Fang and Weijun Zhang and Zongfei Li and Huaao Tang and Hao Han and Fengyuan Xu}, editor = {Guojun Wang and Bing Chen and Wei Li and Roberto Di Pietro and Xuefeng Yan and Hao Han}, title = {Revisiting Attacks and Defenses in Connected and Autonomous Vehicles}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12382}, pages = {104--117}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68851-6\_7}, doi = {10.1007/978-3-030-68851-6\_7}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/FangZLTHX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-13781, author = {Shucheng Li and Lingfei Wu and Shiwei Feng and Fangli Xu and Fengyuan Xu and Sheng Zhong}, title = {Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem}, journal = {CoRR}, volume = {abs/2004.13781}, year = {2020}, url = {https://arxiv.org/abs/2004.13781}, eprinttype = {arXiv}, eprint = {2004.13781}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-13781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-13637, author = {Peng Gao and Fei Shao and Xiaoyuan Liu and Xusheng Xiao and Zheng Qin and Fengyuan Xu and Prateek Mittal and Sanjeev R. Kulkarni and Dawn Song}, title = {Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence}, journal = {CoRR}, volume = {abs/2010.13637}, year = {2020}, url = {https://arxiv.org/abs/2010.13637}, eprinttype = {arXiv}, eprint = {2010.13637}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-13637.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/GaoXLJXKM19, author = {Peng Gao and Xusheng Xiao and Zhichun Li and Kangkook Jee and Fengyuan Xu and Sanjeev R. Kulkarni and Prateek Mittal}, title = {A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security}, journal = {Proc. {VLDB} Endow.}, volume = {12}, number = {12}, pages = {1802--1805}, year = {2019}, url = {http://www.vldb.org/pvldb/vol12/p1802-gao.pdf}, doi = {10.14778/3352063.3352070}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/GaoXLJXKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiYXYXXWGL0L19, author = {Shengqu Xi and Shao Yang and Xusheng Xiao and Yuan Yao and Yayuan Xiong and Fengyuan Xu and Haoyu Wang and Peng Gao and Zhuotao Liu and Feng Xu and Jian Lu}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2421--2436}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363193}, doi = {10.1145/3319535.3363193}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XiYXYXXWGL0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuQTSXZ19, author = {Hao Wu and Zheng Qin and Xuejin Tian and Edward Sun and Fengyuan Xu and Sheng Zhong}, title = {Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937600}, doi = {10.1109/DSC47296.2019.8937600}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/WuQTSXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/TongJXLZ19, author = {Wei Tong and Bingbing Jiang and Fengyuan Xu and Qun Li and Sheng Zhong}, title = {Privacy-Preserving Data Integrity Verification in Mobile Edge Computing}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1007--1018}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00104}, doi = {10.1109/ICDCS.2019.00104}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/TongJXLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/WuFTXLWZ19, author = {Hao Wu and Jinghao Feng and Xuejin Tian and Fengyuan Xu and Yunxin Liu and XiaoFeng Wang and Sheng Zhong}, editor = {Ganesh Ananthanarayanan and Yunxin Liu and Yuanchao Shu}, title = {secGAN: {A} Cycle-Consistent {GAN} for Securely-Recoverable Video Transformation}, booktitle = {Proceedings of the 2019 Workshop on Hot Topics in Video Analytics and Intelligent Edges, HotEdgeVideo@MobiCom 2019, Los Cabos, Mexico, October 21-25, 2019}, pages = {33--38}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3349614.3356024}, doi = {10.1145/3349614.3356024}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/WuFTXLWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/LeeLPLLLXXZS19, author = {Taegyeong Lee and Zhiqi Lin and Saumay Pushp and Caihua Li and Yunxin Liu and Youngki Lee and Fengyuan Xu and Chenren Xu and Lintao Zhang and Junehwa Song}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {Occlumency: Privacy-preserving Remote Deep-learning Inference Using {SGX}}, booktitle = {The 25th Annual International Conference on Mobile Computing and Networking, MobiCom 2019, Los Cabos, Mexico, October 21-25, 2019}, pages = {46:1--46:17}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3300061.3345447}, doi = {10.1145/3300061.3345447}, timestamp = {Fri, 06 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/LeeLPLLLXXZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/DingTXLZ19, author = {Shaohua Ding and Yulong Tian and Fengyuan Xu and Qun Li and Sheng Zhong}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Trojan Attack on Deep Generative Models in Autonomous Driving}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {304}, pages = {299--318}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37228-6\_15}, doi = {10.1007/978-3-030-37228-6\_15}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/DingTXLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaoZZXZ18, author = {Yunlong Mao and Yuan Zhang and Xiaoyan Zhang and Fengyuan Xu and Sheng Zhong}, title = {Location privacy in public access points positioning: An optimization and geometry approach}, journal = {Comput. Secur.}, volume = {73}, pages = {425--438}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.005}, doi = {10.1016/J.COSE.2017.11.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaoZZXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuaTXZ18, author = {Jingyu Hua and Wei Tong and Fengyuan Xu and Sheng Zhong}, title = {A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1155--1168}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779402}, doi = {10.1109/TIFS.2017.2779402}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuaTXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TangLLZJXWRXL18, author = {Yutao Tang and Ding Li and Zhichun Li and Mu Zhang and Kangkook Jee and Xusheng Xiao and Zhenyu Wu and Junghwan Rhee and Fengyuan Xu and Qun Li}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1324--1337}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243763}, doi = {10.1145/3243734.3243763}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TangLLZJXWRXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/MaoYLFXZ18, author = {Yunlong Mao and Shanhe Yi and Qun Li and Jinghao Feng and Fengyuan Xu and Sheng Zhong}, title = {Learning from Differentially Private Neural Activations with Edge Computing}, booktitle = {2018 {IEEE/ACM} Symposium on Edge Computing, {SEC} 2018, Seattle, WA, USA, October 25-27, 2018}, pages = {90--102}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SEC.2018.00014}, doi = {10.1109/SEC.2018.00014}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edge/MaoYLFXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/TianWLXZ18, author = {Yulong Tian and Wei Wei and Qun Li and Fengyuan Xu and Sheng Zhong}, title = {MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {2726--2734}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486433}, doi = {10.1109/INFOCOM.2018.8486433}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/TianWLXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/XuXC18, author = {Haitao Xu and Fengyuan Xu and Bo Chen}, editor = {Robert Beverly and Georgios Smaragdakis and Anja Feldmann}, title = {Internet Protocol Cameras with No Password Protection: An Empirical Investigation}, booktitle = {Passive and Active Measurement - 19th International Conference, {PAM} 2018, Berlin, Germany, March 26-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10771}, pages = {47--59}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76481-8\_4}, doi = {10.1007/978-3-319-76481-8\_4}, timestamp = {Sat, 30 Sep 2023 09:54:28 +0200}, biburl = {https://dblp.org/rec/conf/pam/XuXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/GaoXLXKM18, author = {Peng Gao and Xusheng Xiao and Zhichun Li and Fengyuan Xu and Sanjeev R. Kulkarni and Prateek Mittal}, editor = {Haryadi S. Gunawi and Benjamin C. Reed}, title = {{AIQL:} Enabling Efficient Attack Investigation from System Monitoring Data}, booktitle = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston, MA, USA, July 11-13, 2018}, pages = {113--126}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/atc18/presentation/gao}, timestamp = {Sat, 25 Feb 2023 23:39:37 +0100}, biburl = {https://dblp.org/rec/conf/usenix/GaoXLXKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02290, author = {Peng Gao and Xusheng Xiao and Zhichun Li and Kangkook Jee and Fengyuan Xu and Sanjeev R. Kulkarni and Prateek Mittal}, title = {{AIQL:} Enabling Efficient Attack Investigation from System Monitoring Data}, journal = {CoRR}, volume = {abs/1806.02290}, year = {2018}, url = {http://arxiv.org/abs/1806.02290}, eprinttype = {arXiv}, eprint = {1806.02290}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02290.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-03464, author = {Peng Gao and Xusheng Xiao and Zhichun Li and Kangkook Jee and Fengyuan Xu and Sanjeev R. Kulkarni and Prateek Mittal}, title = {A Query Tool for Efficiently Investigating Risky Software Behaviors}, journal = {CoRR}, volume = {abs/1810.03464}, year = {2018}, url = {http://arxiv.org/abs/1810.03464}, eprinttype = {arXiv}, eprint = {1810.03464}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-03464.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/0001XNTLC17, author = {Xiaojun Zhu and Fengyuan Xu and Edmund Novak and Chiu C. Tan and Qun Li and Guihai Chen}, title = {Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {16}, number = {7}, pages = {2065--2078}, year = {2017}, url = {https://doi.org/10.1109/TMC.2016.2557784}, doi = {10.1109/TMC.2016.2557784}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/0001XNTLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuWLJRXXWJ16, author = {Zhang Xu and Zhenyu Wu and Zhichun Li and Kangkook Jee and Junghwan Rhee and Xusheng Xiao and Fengyuan Xu and Haining Wang and Guofei Jiang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {High Fidelity Data Reduction for Big Data Security Dependency Analyses}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {504--516}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978378}, doi = {10.1145/2976749.2978378}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuWLJRXXWJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhangTXHL15, author = {Yifan Zhang and Chiu C. Tan and Fengyuan Xu and Hao Han and Qun Li}, title = {VProof: Lightweight Privacy-Preserving Vehicle Location Proofs}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {64}, number = {1}, pages = {378--385}, year = {2015}, url = {https://doi.org/10.1109/TVT.2014.2321666}, doi = {10.1109/TVT.2014.2321666}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ZhangTXHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsci/YanUOX14, author = {Tan Yan and Liudmila Ulanova and Ye Ouyang and Fengyuan Xu}, title = {Data Mining in Time Series: Current Study and Future Trend}, journal = {J. Comput. Sci.}, volume = {10}, number = {12}, pages = {2358--2359}, year = {2014}, url = {https://doi.org/10.3844/jcssp.2014.2358.2359}, doi = {10.3844/JCSSP.2014.2358.2359}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsci/YanUOX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HanXTZL14, author = {Hao Han and Fengyuan Xu and Chiu C. Tan and Yifan Zhang and Qun Li}, title = {VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {63}, number = {8}, pages = {3927--3934}, year = {2014}, url = {https://doi.org/10.1109/TVT.2014.2311015}, doi = {10.1109/TVT.2014.2311015}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/HanXTZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/XuZTLY013, author = {Fengyuan Xu and Xiaojun Zhu and Chiu C. Tan and Qun Li and Guanhua Yan and Jie Wu}, title = {SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {12}, pages = {2482--2491}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2013.10}, doi = {10.1109/TPDS.2013.10}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/XuZTLY013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WeiXTL13, author = {Wei Wei and Fengyuan Xu and Chiu C. Tan and Qun Li}, title = {SybilDefender: {A} Defense Mechanism for Sybil Attacks in Large Social Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {12}, pages = {2492--2502}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2013.9}, doi = {10.1109/TPDS.2013.9}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/WeiXTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WeiGXL13, author = {Wei Wei and Harry Tian Gao and Fengyuan Xu and Qun Li}, title = {Fast Mencius: Mencius with low commit latency}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {881--889}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6566876}, doi = {10.1109/INFCOM.2013.6566876}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WeiGXL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhuXNTLC13, author = {Xiaojun Zhu and Fengyuan Xu and Edmund Novak and Chiu C. Tan and Qun Li and Guihai Chen}, title = {Extracting secret key from wireless link dynamics in vehicular environments}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {2283--2291}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6567032}, doi = {10.1109/INFCOM.2013.6567032}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhuXNTLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/XuLMCJZL13, author = {Fengyuan Xu and Yunxin Liu and Thomas Moscibroda and Ranveer Chandra and Long Jin and Yongguang Zhang and Qun Li}, editor = {Hao{-}Hua Chu and Polly Huang and Romit Roy Choudhury and Feng Zhao}, title = {Optimizing background email sync on smartphones}, booktitle = {The 11th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys'13, Taipei, Taiwan, June 25-28, 2013}, pages = {55--68}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462456.2464444}, doi = {10.1145/2462456.2464444}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisys/XuLMCJZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/XuLLZ13, author = {Fengyuan Xu and Yunxin Liu and Qun Li and Yongguang Zhang}, editor = {Nick Feamster and Jeffrey C. Mogul}, title = {V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics}, booktitle = {Proceedings of the 10th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2013, Lombard, IL, USA, April 2-5, 2013}, pages = {43--55}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/xu\_fengyuan}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/XuLLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WeiXTL12, author = {Wei Wei and Fengyuan Xu and Chiu C. Tan and Qun Li}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {SybilDefender: Defend against sybil attacks in large social networks}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {1951--1959}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195572}, doi = {10.1109/INFCOM.2012.6195572}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WeiXTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WeiXL12, author = {Wei Wei and Fengyuan Xu and Qun Li}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {MobiShare: Flexible privacy-preserving location sharing in mobile online social networks}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2616--2620}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195664}, doi = {10.1109/INFCOM.2012.6195664}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WeiXL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HanXTZL11, author = {Hao Han and Fengyuan Xu and Chiu C. Tan and Yifan Zhang and Qun Li}, title = {Defending against vehicular rogue APs}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {1665--1673}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934960}, doi = {10.1109/INFCOM.2011.5934960}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HanXTZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XuQTWL11, author = {Fengyuan Xu and Zhengrui Qin and Chiu C. Tan and Baosheng Wang and Qun Li}, title = {IMDGuard: Securing implantable medical devices with the external wearable guardian}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {1862--1870}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934987}, doi = {10.1109/INFCOM.2011.5934987}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/XuQTWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/GaoUPHXWL10, author = {Harry Gao and Seth Utecht and Gregory Patrick and George Hsieh and Fengyuan Xu and Haodong Wang and Qun Li}, title = {High Speed Data Routing in Vehicular Sensor Networks}, journal = {J. Commun.}, volume = {5}, number = {3}, pages = {181--188}, year = {2010}, url = {https://doi.org/10.4304/jcm.5.3.181-188}, doi = {10.4304/JCM.5.3.181-188}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/GaoUPHXWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XuTLYW10, author = {Fengyuan Xu and Chiu C. Tan and Qun Li and Guanhua Yan and Jie Wu}, title = {Designing a Practical Access Point Association Protocol}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {1361--1369}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5461909}, doi = {10.1109/INFCOM.2010.5461909}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/XuTLYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/GaoUXWL09, author = {Harry Gao and Seth Utecht and Fengyuan Xu and Haodong Wang and Qun Li}, editor = {Benyuan Liu and Azer Bestavros and Ding{-}Zhu Du and Jie Wang}, title = {Experimental Study on Secure Data Collection in Vehicular Sensor Networks}, booktitle = {Wireless Algorithms, Systems, and Applications, 4th International Conference, {WASA} 2009, Boston, MA, USA, August 16-18, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5682}, pages = {22--31}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03417-6\_3}, doi = {10.1007/978-3-642-03417-6\_3}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/GaoUXWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/XuF07, author = {Fengyuan Xu and Zhiyi Fang}, editor = {Shahram Latifi}, title = {Individuation Learning Components in Intelligent Education Games}, booktitle = {Fourth International Conference on Information Technology: New Generations {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}}, pages = {955--956}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ITNG.2007.110}, doi = {10.1109/ITNG.2007.110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/XuF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saint/XuFH07, author = {Fengyuan Xu and Zhiyi Fang and Xiao Han}, title = {Gippy: Campus {GIS} Information System Supported by {P2P}}, booktitle = {2007 International Symposium on Applications and the Internet - Workshops {(SAINT} 2007 Workshops), 15-19 January 2007, Hiroshima, Japan}, pages = {63}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SAINT-W.2007.49}, doi = {10.1109/SAINT-W.2007.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saint/XuFH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.