BibTeX records: Fengyuan Xu

download as .bib file

@article{DBLP:journals/tmc/HanXWZZX24,
  author       = {Hao Han and
                  Kunming Xie and
                  Tongyu Wang and
                  Xiaojun Zhu and
                  Yanchao Zhao and
                  Fengyuan Xu},
  title        = {RescQR: Enabling Reliable Data Recovery in Screen-Camera Communication
                  System},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {5},
  pages        = {3510--3522},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3277212},
  doi          = {10.1109/TMC.2023.3277212},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/HanXWZZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/NingXWBXZLY23,
  author       = {Jingyi Ning and
                  Lei Xie and
                  Chuyu Wang and
                  Yanling Bu and
                  Fengyuan Xu and
                  Da{-}Wei Zhou and
                  Sanglu Lu and
                  Baoliu Ye},
  title        = {RF-Badge: Vital Sign-Based Authentication via {RFID} Tag Array on
                  Badges},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {2},
  pages        = {1170--1184},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2021.3097912},
  doi          = {10.1109/TMC.2021.3097912},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/NingXWBXZLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/TongCJXLZ23,
  author       = {Wei Tong and
                  Wenjie Chen and
                  Bingbing Jiang and
                  Fengyuan Xu and
                  Qun Li and
                  Sheng Zhong},
  title        = {Privacy-Preserving Data Integrity Verification for Secure Mobile Edge
                  Storage},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {9},
  pages        = {5463--5478},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2022.3174867},
  doi          = {10.1109/TMC.2022.3174867},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/TongCJXLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/SunWWGXLHZ23,
  author       = {Lizhi Sun and
                  Shuocheng Wang and
                  Hao Wu and
                  Yuhang Gong and
                  Fengyuan Xu and
                  Yunxin Liu and
                  Hao Han and
                  Sheng Zhong},
  title        = {{LEAP:} TrustZone Based Developer-Friendly {TEE} for Intelligent Mobile
                  Apps},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {12},
  pages        = {7138--7155},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2022.3207745},
  doi          = {10.1109/TMC.2022.3207745},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/SunWWGXLHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/TianSSX023,
  author       = {Yulong Tian and
                  Fnu Suya and
                  Anshuman Suri and
                  Fengyuan Xu and
                  David Evans},
  title        = {Manipulating Transfer Learning for Property Inference},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023},
  pages        = {15975--15984},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CVPR52729.2023.01533},
  doi          = {10.1109/CVPR52729.2023.01533},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/TianSSX023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WuYKHXZ23,
  author       = {Hao Wu and
                  Bo Yang and
                  Xiaopeng Ke and
                  Siyi He and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {GAPter: Gray-Box Data Protector for Deep Learning Inference Services
                  at User Side},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing
                  {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICASSP49357.2023.10096286},
  doi          = {10.1109/ICASSP49357.2023.10096286},
  timestamp    = {Sun, 05 Nov 2023 16:51:21 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/WuYKHXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/HuangHXC23,
  author       = {Jiawei Huang and
                  Hao Han and
                  Fengyuan Xu and
                  Bing Chen},
  title        = {{SAPPX:} Securing {COTS} Binaries with Automatic Program Partitioning
                  for Intel {SGX}},
  booktitle    = {34th {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2023, Florence, Italy, October 9-12, 2023},
  pages        = {148--159},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISSRE59848.2023.00016},
  doi          = {10.1109/ISSRE59848.2023.00016},
  timestamp    = {Tue, 14 Nov 2023 16:09:47 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/HuangHXC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/LiWW0X23,
  author       = {Shucheng Li and
                  Runchuan Wang and
                  Hao Wu and
                  Sheng Zhong and
                  Fengyuan Xu},
  editor       = {Abdulmotaleb El{-}Saddik and
                  Tao Mei and
                  Rita Cucchiara and
                  Marco Bertini and
                  Diana Patricia Tobon Vallejo and
                  Pradeep K. Atrey and
                  M. Shamim Hossain},
  title        = {{SIEGE:} Self-Supervised Incremental Deep Graph Learning for Ethereum
                  Phishing Scam Detection},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Multimedia,
                  {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023},
  pages        = {8881--8890},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581783.3612461},
  doi          = {10.1145/3581783.3612461},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/LiWW0X23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/LiCYWZX23,
  author       = {Shucheng Li and
                  Boyu Chang and
                  Bo Yang and
                  Hao Wu and
                  Sheng Zhong and
                  Fengyuan Xu},
  editor       = {Hsin{-}Hsi Chen and
                  Wei{-}Jou (Edward) Duh and
                  Hen{-}Hsen Huang and
                  Makoto P. Kato and
                  Josiane Mothe and
                  Barbara Poblete},
  title        = {Dataset Preparation for Arbitrary Object Detection: An Automatic Approach
                  based on Web Information in English},
  booktitle    = {Proceedings of the 46th International {ACM} {SIGIR} Conference on
                  Research and Development in Information Retrieval, {SIGIR} 2023, Taipei,
                  Taiwan, July 23-27, 2023},
  pages        = {749--759},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3539618.3591661},
  doi          = {10.1145/3539618.3591661},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigir/LiCYWZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-11643,
  author       = {Yulong Tian and
                  Fnu Suya and
                  Anshuman Suri and
                  Fengyuan Xu and
                  David Evans},
  title        = {Manipulating Transfer Learning for Property Inference},
  journal      = {CoRR},
  volume       = {abs/2303.11643},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.11643},
  doi          = {10.48550/ARXIV.2303.11643},
  eprinttype    = {arXiv},
  eprint       = {2303.11643},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-11643.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TangQLLYXL22,
  author       = {Yutao Tang and
                  Zhengrui Qin and
                  Zhiqiang Lin and
                  Yue Li and
                  Shanhe Yi and
                  Fengyuan Xu and
                  Qun Li},
  title        = {vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted
                  {OS}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {71},
  number       = {12},
  pages        = {3349--3360},
  year         = {2022},
  url          = {https://doi.org/10.1109/TC.2022.3152074},
  doi          = {10.1109/TC.2022.3152074},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/TangQLLYXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianSXE22,
  author       = {Yulong Tian and
                  Fnu Suya and
                  Fengyuan Xu and
                  David Evans},
  title        = {Stealthy Backdoors as Compression Artifacts},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1372--1387},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3160359},
  doi          = {10.1109/TIFS.2022.3160359},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TianSXE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuanZPLLX022,
  author       = {Yue Duan and
                  Xin Zhao and
                  Yu Pan and
                  Shucheng Li and
                  Minghao Li and
                  Fengyuan Xu and
                  Mu Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Towards Automated Safety Vetting of Smart Contracts in Decentralized
                  Applications},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {921--935},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559384},
  doi          = {10.1145/3548606.3559384},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DuanZPLLX022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/KeCWXZ22,
  author       = {Xiaopeng Ke and
                  Boyu Chang and
                  Hao Wu and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Towards Practical and Efficient Long Video Summary},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022},
  pages        = {1770--1774},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICASSP43922.2022.9746911},
  doi          = {10.1109/ICASSP43922.2022.9746911},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/KeCWXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/TianKTDXLHZF22,
  author       = {Yulong Tian and
                  Xiaopeng Ke and
                  Zeyi Tao and
                  Shaohua Ding and
                  Fengyuan Xu and
                  Qun Li and
                  Hao Han and
                  Sheng Zhong and
                  Xinyi Fu},
  title        = {Privacy-Preserving and Robust Federated Deep Metric Learning},
  booktitle    = {30th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2022, Oslo, Norway, June 10-12, 2022},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IWQoS54832.2022.9812909},
  doi          = {10.1109/IWQOS54832.2022.9812909},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/TianKTDXLHZF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/ChenHWXQM22,
  author       = {Ligeng Chen and
                  Zhongling He and
                  Hao Wu and
                  Fengyuan Xu and
                  Yi Qian and
                  Bing Mao},
  title        = {DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance
                  with High Accuracy},
  booktitle    = {{IEEE} International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022},
  pages        = {112--122},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SANER53432.2022.00025},
  doi          = {10.1109/SANER53432.2022.00025},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/ChenHWXQM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-07228,
  author       = {Hao Wu and
                  Yuhang Gong and
                  Xiaopeng Ke and
                  Hanzhong Liang and
                  Minghao Li and
                  Fengyuan Xu and
                  Yunxin Liu and
                  Sheng Zhong},
  title        = {Automation Slicing and Testing for in-App Deep Learning Models},
  journal      = {CoRR},
  volume       = {abs/2205.07228},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.07228},
  doi          = {10.48550/ARXIV.2205.07228},
  eprinttype    = {arXiv},
  eprint       = {2205.07228},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-07228.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jscic/LiYHYXY21,
  author       = {Qin Li and
                  Pan Yan and
                  Xiao Huang and
                  Liuqing Yang and
                  Fengyuan Xu and
                  Yancheng You},
  title        = {On Developing Piecewise Rational Mapping with Fine Regulation Capability
                  for {WENO} Schemes},
  journal      = {J. Sci. Comput.},
  volume       = {88},
  number       = {3},
  pages        = {75},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10915-021-01559-z},
  doi          = {10.1007/S10915-021-01559-Z},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jscic/LiYHYXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangMXXZ21,
  author       = {Yuan Zhang and
                  Yunlong Mao and
                  Minze Xu and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1008--1018},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2911502},
  doi          = {10.1109/TDSC.2019.2911502},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangMXXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/GaoSLXQXMKS21,
  author       = {Peng Gao and
                  Fei Shao and
                  Xiaoyuan Liu and
                  Xusheng Xiao and
                  Zheng Qin and
                  Fengyuan Xu and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Dawn Song},
  title        = {Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence},
  booktitle    = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021,
                  Chania, Greece, April 19-22, 2021},
  pages        = {193--204},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDE51399.2021.00024},
  doi          = {10.1109/ICDE51399.2021.00024},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/GaoSLXQXMKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/GaoSLXLQXMKS21,
  author       = {Peng Gao and
                  Fei Shao and
                  Xiaoyuan Liu and
                  Xusheng Xiao and
                  Haoyuan Liu and
                  Zheng Qin and
                  Fengyuan Xu and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Dawn Song},
  title        = {A System for Efficiently Hunting for Cyber Threats in Computer Systems
                  Using Threat Intelligence},
  booktitle    = {37th {IEEE} International Conference on Data Engineering, {ICDE} 2021,
                  Chania, Greece, April 19-22, 2021},
  pages        = {2705--2708},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDE51399.2021.00309},
  doi          = {10.1109/ICDE51399.2021.00309},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/GaoSLXLQXMKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/XuZXZ21,
  author       = {Minze Xu and
                  Yuan Zhang and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment
                  Channels},
  booktitle    = {29th {IEEE/ACM} International Symposium on Quality of Service, {IWQOS}
                  2021, Tokyo, Japan, June 25-28, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IWQOS52092.2021.9521279},
  doi          = {10.1109/IWQOS52092.2021.9521279},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/XuZXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/WangDCLX21,
  author       = {Manni Wang and
                  Shaohua Ding and
                  Ting Cao and
                  Yunxin Liu and
                  Fengyuan Xu},
  title        = {AsyMo: scalable and efficient deep-learning inference on asymmetric
                  mobile CPUs},
  booktitle    = {{ACM} MobiCom '21: The 27th Annual International Conference on Mobile
                  Computing and Networking, New Orleans, Louisiana, USA, October 25-29,
                  2021},
  pages        = {215--228},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447993.3448625},
  doi          = {10.1145/3447993.3448625},
  timestamp    = {Mon, 12 Apr 2021 09:18:20 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/WangDCLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/WuTLLAXZ21,
  author       = {Hao Wu and
                  Xuejin Tian and
                  Minghao Li and
                  Yunxin Liu and
                  Ganesh Ananthanarayanan and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {{PECAM:} privacy-enhanced video streaming and analytics via securely-reversible
                  transformation},
  booktitle    = {{ACM} MobiCom '21: The 27th Annual International Conference on Mobile
                  Computing and Networking, New Orleans, Louisiana, USA, October 25-29,
                  2021},
  pages        = {229--241},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447993.3448618},
  doi          = {10.1145/3447993.3448618},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/WuTLLAXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WuTGSLX21,
  author       = {Hao Wu and
                  Xuejin Tian and
                  Yuhang Gong and
                  Xing Su and
                  Minghao Li and
                  Fengyuan Xu},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {DAPter: Preventing User Data Abuse in Deep Learning Inference Services},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {1017--1028},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3449907},
  doi          = {10.1145/3442381.3449907},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/WuTGSLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-06761,
  author       = {Peng Gao and
                  Fei Shao and
                  Xiaoyuan Liu and
                  Xusheng Xiao and
                  Haoyuan Liu and
                  Zheng Qin and
                  Fengyuan Xu and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Dawn Song},
  title        = {A System for Efficiently Hunting for Cyber Threats in Computer Systems
                  Using Threat Intelligence},
  journal      = {CoRR},
  volume       = {abs/2101.06761},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.06761},
  eprinttype    = {arXiv},
  eprint       = {2101.06761},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-06761.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-11226,
  author       = {Qin Li and
                  Pan Yan and
                  Xiao Huang and
                  Liuqing Yang and
                  Fengyuan Xu},
  title        = {On developing piecewise rational mapping with fine regulation capability
                  for {WENO} schemes},
  journal      = {CoRR},
  volume       = {abs/2101.11226},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.11226},
  eprinttype    = {arXiv},
  eprint       = {2101.11226},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-11226.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-02465,
  author       = {Lizhi Sun and
                  Shuocheng Wang and
                  Hao Wu and
                  Yuhang Gong and
                  Fengyuan Xu and
                  Yunxin Liu and
                  Hao Han and
                  Sheng Zhong},
  title        = {App Developer Centric Trusted Execution Environment},
  journal      = {CoRR},
  volume       = {abs/2102.02465},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.02465},
  eprinttype    = {arXiv},
  eprint       = {2102.02465},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-02465.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-15129,
  author       = {Yulong Tian and
                  Fnu Suya and
                  Fengyuan Xu and
                  David Evans},
  title        = {Stealthy Backdoors as Compression Artifacts},
  journal      = {CoRR},
  volume       = {abs/2104.15129},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.15129},
  eprinttype    = {arXiv},
  eprint       = {2104.15129},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-15129.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-10176,
  author       = {Shucheng Li and
                  Fengyuan Xu and
                  Runchuan Wang and
                  Sheng Zhong},
  title        = {Self-supervised Incremental Deep Graph Learning for Ethereum Phishing
                  Scam Detection},
  journal      = {CoRR},
  volume       = {abs/2106.10176},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.10176},
  eprinttype    = {arXiv},
  eprint       = {2106.10176},
  timestamp    = {Fri, 15 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-10176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-15508,
  author       = {Fengyuan Xu and
                  Pan Yan and
                  Qin Li and
                  Yancheng You},
  title        = {Quasi-linear analysis of dispersion relation preservation for nonlinear
                  schemes},
  journal      = {CoRR},
  volume       = {abs/2110.15508},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.15508},
  eprinttype    = {arXiv},
  eprint       = {2110.15508},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-15508.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/LiWFXXZ20,
  author       = {Shucheng Li and
                  Lingfei Wu and
                  Shiwei Feng and
                  Fangli Xu and
                  Fengyuan Xu and
                  Sheng Zhong},
  editor       = {Trevor Cohn and
                  Yulan He and
                  Yang Liu},
  title        = {Graph-to-Tree Neural Networks for Learning Structured Input-Output
                  Translation with Applications to Semantic Parsing and Math Word Problem},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2020, Online Event, 16-20 November 2020},
  series       = {Findings of {ACL}},
  volume       = {{EMNLP} 2020},
  pages        = {2841--2852},
  publisher    = {Association for Computational Linguistics},
  year         = {2020},
  url          = {https://doi.org/10.18653/v1/2020.findings-emnlp.255},
  doi          = {10.18653/V1/2020.FINDINGS-EMNLP.255},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/LiWFXXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/XiongXZ20,
  author       = {Yayuan Xiong and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Detecting GAN-based Privacy Attack in Distributed Learning},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149430},
  doi          = {10.1109/ICC40277.2020.9149430},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/XiongXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeesec/GaoTYXFZ20,
  author       = {Han Gao and
                  Yulong Tian and
                  Rongchun Yao and
                  Fengyuan Xu and
                  Xinyi Fu and
                  Sheng Zhong},
  title        = {Exploiting Adversarial Examples to Drain Computational Resources on
                  Mobile Deep Learning Systems},
  booktitle    = {5th {IEEE/ACM} Symposium on Edge Computing, {SEC} 2020, San Jose,
                  CA, USA, November 12-14, 2020},
  pages        = {334--339},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SEC50012.2020.00048},
  doi          = {10.1109/SEC50012.2020.00048},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ieeesec/GaoTYXFZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/YuKXH20,
  author       = {Jin Yu and
                  Xiaopeng Ke and
                  Fengyuan Xu and
                  Hao Huang},
  title        = {Efficient Architecture Paradigm for Deep Learning Inference as a Service},
  booktitle    = {39th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2020, Austin, TX, USA, November 6-8, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IPCCC50635.2020.9391551},
  doi          = {10.1109/IPCCC50635.2020.9391551},
  timestamp    = {Wed, 14 Apr 2021 10:06:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ipccc/YuKXH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/WuFTSLDXZ20,
  author       = {Hao Wu and
                  Jinghao Feng and
                  Xuejin Tian and
                  Edward Sun and
                  Yunxin Liu and
                  Bo Dong and
                  Fengyuan Xu and
                  Sheng Zhong},
  editor       = {Eyal de Lara and
                  Iqbal Mohomed and
                  Jason Nieh and
                  Elizabeth M. Belding},
  title        = {{EMO:} real-time emotion recognition from single-eye images for resource-constrained
                  eyewear devices},
  booktitle    = {MobiSys '20: The 18th Annual International Conference on Mobile Systems,
                  Applications, and Services, Toronto, Ontario, Canada, June 15-19,
                  2020},
  pages        = {448--461},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386901.3388917},
  doi          = {10.1145/3386901.3388917},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/WuFTSLDXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/XiongXZL20,
  author       = {Yayuan Xiong and
                  Fengyuan Xu and
                  Sheng Zhong and
                  Qun Li},
  editor       = {Marko H{\"{o}}lbl and
                  Kai Rannenberg and
                  Tatjana Welzer},
  title        = {Escaping Backdoor Attack Detection of Deep Learning},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11
                  International Conference, {SEC} 2020, Maribor, Slovenia, September
                  21-23, 2020, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {580},
  pages        = {431--445},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58201-2\_29},
  doi          = {10.1007/978-3-030-58201-2\_29},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/XiongXZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/ZhuLXZ20,
  author       = {Yu Zhu and
                  Zongfei Li and
                  Fengyuan Xu and
                  Sheng Zhong},
  editor       = {Guojun Wang and
                  Bing Chen and
                  Wei Li and
                  Roberto Di Pietro and
                  Xuefeng Yan and
                  Hao Han},
  title        = {Improving Deep Neural Network Robustness with Siamese Empowered Adversarial
                  Training},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 13th International Conference, SpaCCS 2020, Nanjing, China,
                  December 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12382},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68851-6\_4},
  doi          = {10.1007/978-3-030-68851-6\_4},
  timestamp    = {Fri, 15 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/ZhuLXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/FangZLTHX20,
  author       = {Ziyan Fang and
                  Weijun Zhang and
                  Zongfei Li and
                  Huaao Tang and
                  Hao Han and
                  Fengyuan Xu},
  editor       = {Guojun Wang and
                  Bing Chen and
                  Wei Li and
                  Roberto Di Pietro and
                  Xuefeng Yan and
                  Hao Han},
  title        = {Revisiting Attacks and Defenses in Connected and Autonomous Vehicles},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 13th International Conference, SpaCCS 2020, Nanjing, China,
                  December 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12382},
  pages        = {104--117},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68851-6\_7},
  doi          = {10.1007/978-3-030-68851-6\_7},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/FangZLTHX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-13781,
  author       = {Shucheng Li and
                  Lingfei Wu and
                  Shiwei Feng and
                  Fangli Xu and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Graph-to-Tree Neural Networks for Learning Structured Input-Output
                  Translation with Applications to Semantic Parsing and Math Word Problem},
  journal      = {CoRR},
  volume       = {abs/2004.13781},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.13781},
  eprinttype    = {arXiv},
  eprint       = {2004.13781},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-13781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-13637,
  author       = {Peng Gao and
                  Fei Shao and
                  Xiaoyuan Liu and
                  Xusheng Xiao and
                  Zheng Qin and
                  Fengyuan Xu and
                  Prateek Mittal and
                  Sanjeev R. Kulkarni and
                  Dawn Song},
  title        = {Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence},
  journal      = {CoRR},
  volume       = {abs/2010.13637},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.13637},
  eprinttype    = {arXiv},
  eprint       = {2010.13637},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-13637.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/GaoXLJXKM19,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Zhichun Li and
                  Kangkook Jee and
                  Fengyuan Xu and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  title        = {A Query System for Efficiently Investigating Complex Attack Behaviors
                  for Enterprise Security},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {12},
  number       = {12},
  pages        = {1802--1805},
  year         = {2019},
  url          = {http://www.vldb.org/pvldb/vol12/p1802-gao.pdf},
  doi          = {10.14778/3352063.3352070},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/GaoXLJXKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiYXYXXWGL0L19,
  author       = {Shengqu Xi and
                  Shao Yang and
                  Xusheng Xiao and
                  Yuan Yao and
                  Yayuan Xiong and
                  Fengyuan Xu and
                  Haoyu Wang and
                  Peng Gao and
                  Zhuotao Liu and
                  Feng Xu and
                  Jian Lu},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior
                  Discrepancy in Mobile Apps},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2421--2436},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363193},
  doi          = {10.1145/3319535.3363193},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XiYXYXXWGL0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/WuQTSXZ19,
  author       = {Hao Wu and
                  Zheng Qin and
                  Xuejin Tian and
                  Edward Sun and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Broken Relationship of Mobile User Intentions and Permission Control
                  of Shared System Resources},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937600},
  doi          = {10.1109/DSC47296.2019.8937600},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/WuQTSXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/TongJXLZ19,
  author       = {Wei Tong and
                  Bingbing Jiang and
                  Fengyuan Xu and
                  Qun Li and
                  Sheng Zhong},
  title        = {Privacy-Preserving Data Integrity Verification in Mobile Edge Computing},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1007--1018},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00104},
  doi          = {10.1109/ICDCS.2019.00104},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/TongJXLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/WuFTXLWZ19,
  author       = {Hao Wu and
                  Jinghao Feng and
                  Xuejin Tian and
                  Fengyuan Xu and
                  Yunxin Liu and
                  XiaoFeng Wang and
                  Sheng Zhong},
  editor       = {Ganesh Ananthanarayanan and
                  Yunxin Liu and
                  Yuanchao Shu},
  title        = {secGAN: {A} Cycle-Consistent {GAN} for Securely-Recoverable Video
                  Transformation},
  booktitle    = {Proceedings of the 2019 Workshop on Hot Topics in Video Analytics
                  and Intelligent Edges, HotEdgeVideo@MobiCom 2019, Los Cabos, Mexico,
                  October 21-25, 2019},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3349614.3356024},
  doi          = {10.1145/3349614.3356024},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/WuFTXLWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/LeeLPLLLXXZS19,
  author       = {Taegyeong Lee and
                  Zhiqi Lin and
                  Saumay Pushp and
                  Caihua Li and
                  Yunxin Liu and
                  Youngki Lee and
                  Fengyuan Xu and
                  Chenren Xu and
                  Lintao Zhang and
                  Junehwa Song},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {Occlumency: Privacy-preserving Remote Deep-learning Inference Using
                  {SGX}},
  booktitle    = {The 25th Annual International Conference on Mobile Computing and Networking,
                  MobiCom 2019, Los Cabos, Mexico, October 21-25, 2019},
  pages        = {46:1--46:17},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3300061.3345447},
  doi          = {10.1145/3300061.3345447},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/LeeLPLLLXXZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/DingTXLZ19,
  author       = {Shaohua Ding and
                  Yulong Tian and
                  Fengyuan Xu and
                  Qun Li and
                  Sheng Zhong},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Trojan Attack on Deep Generative Models in Autonomous Driving},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {304},
  pages        = {299--318},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37228-6\_15},
  doi          = {10.1007/978-3-030-37228-6\_15},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/DingTXLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaoZZXZ18,
  author       = {Yunlong Mao and
                  Yuan Zhang and
                  Xiaoyan Zhang and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Location privacy in public access points positioning: An optimization
                  and geometry approach},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {425--438},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.005},
  doi          = {10.1016/J.COSE.2017.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaoZZXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuaTXZ18,
  author       = {Jingyu Hua and
                  Wei Tong and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based
                  Services Supporting Frequent Queries},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1155--1168},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779402},
  doi          = {10.1109/TIFS.2017.2779402},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuaTXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TangLLZJXWRXL18,
  author       = {Yutao Tang and
                  Ding Li and
                  Zhichun Li and
                  Mu Zhang and
                  Kangkook Jee and
                  Xusheng Xiao and
                  Zhenyu Wu and
                  Junghwan Rhee and
                  Fengyuan Xu and
                  Qun Li},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality
                  Analysis},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1324--1337},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243763},
  doi          = {10.1145/3243734.3243763},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TangLLZJXWRXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/MaoYLFXZ18,
  author       = {Yunlong Mao and
                  Shanhe Yi and
                  Qun Li and
                  Jinghao Feng and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {Learning from Differentially Private Neural Activations with Edge
                  Computing},
  booktitle    = {2018 {IEEE/ACM} Symposium on Edge Computing, {SEC} 2018, Seattle,
                  WA, USA, October 25-27, 2018},
  pages        = {90--102},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SEC.2018.00014},
  doi          = {10.1109/SEC.2018.00014},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edge/MaoYLFXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TianWLXZ18,
  author       = {Yulong Tian and
                  Wei Wei and
                  Qun Li and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {2726--2734},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486433},
  doi          = {10.1109/INFOCOM.2018.8486433},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/TianWLXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/XuXC18,
  author       = {Haitao Xu and
                  Fengyuan Xu and
                  Bo Chen},
  editor       = {Robert Beverly and
                  Georgios Smaragdakis and
                  Anja Feldmann},
  title        = {Internet Protocol Cameras with No Password Protection: An Empirical
                  Investigation},
  booktitle    = {Passive and Active Measurement - 19th International Conference, {PAM}
                  2018, Berlin, Germany, March 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10771},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76481-8\_4},
  doi          = {10.1007/978-3-319-76481-8\_4},
  timestamp    = {Sat, 30 Sep 2023 09:54:28 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/XuXC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/GaoXLXKM18,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Zhichun Li and
                  Fengyuan Xu and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {{AIQL:} Enabling Efficient Attack Investigation from System Monitoring
                  Data},
  booktitle    = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston,
                  MA, USA, July 11-13, 2018},
  pages        = {113--126},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/gao},
  timestamp    = {Sat, 25 Feb 2023 23:39:37 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/GaoXLXKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02290,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Zhichun Li and
                  Kangkook Jee and
                  Fengyuan Xu and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  title        = {{AIQL:} Enabling Efficient Attack Investigation from System Monitoring
                  Data},
  journal      = {CoRR},
  volume       = {abs/1806.02290},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02290},
  eprinttype    = {arXiv},
  eprint       = {1806.02290},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02290.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-03464,
  author       = {Peng Gao and
                  Xusheng Xiao and
                  Zhichun Li and
                  Kangkook Jee and
                  Fengyuan Xu and
                  Sanjeev R. Kulkarni and
                  Prateek Mittal},
  title        = {A Query Tool for Efficiently Investigating Risky Software Behaviors},
  journal      = {CoRR},
  volume       = {abs/1810.03464},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.03464},
  eprinttype    = {arXiv},
  eprint       = {1810.03464},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-03464.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/0001XNTLC17,
  author       = {Xiaojun Zhu and
                  Fengyuan Xu and
                  Edmund Novak and
                  Chiu C. Tan and
                  Qun Li and
                  Guihai Chen},
  title        = {Using Wireless Link Dynamics to Extract a Secret Key in Vehicular
                  Scenarios},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {16},
  number       = {7},
  pages        = {2065--2078},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMC.2016.2557784},
  doi          = {10.1109/TMC.2016.2557784},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/0001XNTLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuWLJRXXWJ16,
  author       = {Zhang Xu and
                  Zhenyu Wu and
                  Zhichun Li and
                  Kangkook Jee and
                  Junghwan Rhee and
                  Xusheng Xiao and
                  Fengyuan Xu and
                  Haining Wang and
                  Guofei Jiang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {High Fidelity Data Reduction for Big Data Security Dependency Analyses},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {504--516},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978378},
  doi          = {10.1145/2976749.2978378},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuWLJRXXWJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhangTXHL15,
  author       = {Yifan Zhang and
                  Chiu C. Tan and
                  Fengyuan Xu and
                  Hao Han and
                  Qun Li},
  title        = {VProof: Lightweight Privacy-Preserving Vehicle Location Proofs},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {64},
  number       = {1},
  pages        = {378--385},
  year         = {2015},
  url          = {https://doi.org/10.1109/TVT.2014.2321666},
  doi          = {10.1109/TVT.2014.2321666},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhangTXHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsci/YanUOX14,
  author       = {Tan Yan and
                  Liudmila Ulanova and
                  Ye Ouyang and
                  Fengyuan Xu},
  title        = {Data Mining in Time Series: Current Study and Future Trend},
  journal      = {J. Comput. Sci.},
  volume       = {10},
  number       = {12},
  pages        = {2358--2359},
  year         = {2014},
  url          = {https://doi.org/10.3844/jcssp.2014.2358.2359},
  doi          = {10.3844/JCSSP.2014.2358.2359},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsci/YanUOX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HanXTZL14,
  author       = {Hao Han and
                  Fengyuan Xu and
                  Chiu C. Tan and
                  Yifan Zhang and
                  Qun Li},
  title        = {VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru
                  Internet},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {63},
  number       = {8},
  pages        = {3927--3934},
  year         = {2014},
  url          = {https://doi.org/10.1109/TVT.2014.2311015},
  doi          = {10.1109/TVT.2014.2311015},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/HanXTZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/XuZTLY013,
  author       = {Fengyuan Xu and
                  Xiaojun Zhu and
                  Chiu C. Tan and
                  Qun Li and
                  Guanhua Yan and
                  Jie Wu},
  title        = {SmartAssoc: Decentralized Access Point Selection Algorithm to Improve
                  Throughput},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {24},
  number       = {12},
  pages        = {2482--2491},
  year         = {2013},
  url          = {https://doi.org/10.1109/TPDS.2013.10},
  doi          = {10.1109/TPDS.2013.10},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/XuZTLY013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WeiXTL13,
  author       = {Wei Wei and
                  Fengyuan Xu and
                  Chiu C. Tan and
                  Qun Li},
  title        = {SybilDefender: {A} Defense Mechanism for Sybil Attacks in Large Social
                  Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {24},
  number       = {12},
  pages        = {2492--2502},
  year         = {2013},
  url          = {https://doi.org/10.1109/TPDS.2013.9},
  doi          = {10.1109/TPDS.2013.9},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/WeiXTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WeiGXL13,
  author       = {Wei Wei and
                  Harry Tian Gao and
                  Fengyuan Xu and
                  Qun Li},
  title        = {Fast Mencius: Mencius with low commit latency},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {881--889},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6566876},
  doi          = {10.1109/INFCOM.2013.6566876},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WeiGXL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhuXNTLC13,
  author       = {Xiaojun Zhu and
                  Fengyuan Xu and
                  Edmund Novak and
                  Chiu C. Tan and
                  Qun Li and
                  Guihai Chen},
  title        = {Extracting secret key from wireless link dynamics in vehicular environments},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {2283--2291},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6567032},
  doi          = {10.1109/INFCOM.2013.6567032},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhuXNTLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/XuLMCJZL13,
  author       = {Fengyuan Xu and
                  Yunxin Liu and
                  Thomas Moscibroda and
                  Ranveer Chandra and
                  Long Jin and
                  Yongguang Zhang and
                  Qun Li},
  editor       = {Hao{-}Hua Chu and
                  Polly Huang and
                  Romit Roy Choudhury and
                  Feng Zhao},
  title        = {Optimizing background email sync on smartphones},
  booktitle    = {The 11th Annual International Conference on Mobile Systems, Applications,
                  and Services, MobiSys'13, Taipei, Taiwan, June 25-28, 2013},
  pages        = {55--68},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462456.2464444},
  doi          = {10.1145/2462456.2464444},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/XuLMCJZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/XuLLZ13,
  author       = {Fengyuan Xu and
                  Yunxin Liu and
                  Qun Li and
                  Yongguang Zhang},
  editor       = {Nick Feamster and
                  Jeffrey C. Mogul},
  title        = {V-edge: Fast Self-constructive Power Modeling of Smartphones Based
                  on Battery Voltage Dynamics},
  booktitle    = {Proceedings of the 10th {USENIX} Symposium on Networked Systems Design
                  and Implementation, {NSDI} 2013, Lombard, IL, USA, April 2-5, 2013},
  pages        = {43--55},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/xu\_fengyuan},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/XuLLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WeiXTL12,
  author       = {Wei Wei and
                  Fengyuan Xu and
                  Chiu C. Tan and
                  Qun Li},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {SybilDefender: Defend against sybil attacks in large social networks},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {1951--1959},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195572},
  doi          = {10.1109/INFCOM.2012.6195572},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WeiXTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WeiXL12,
  author       = {Wei Wei and
                  Fengyuan Xu and
                  Qun Li},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {MobiShare: Flexible privacy-preserving location sharing in mobile
                  online social networks},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2616--2620},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195664},
  doi          = {10.1109/INFCOM.2012.6195664},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WeiXL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HanXTZL11,
  author       = {Hao Han and
                  Fengyuan Xu and
                  Chiu C. Tan and
                  Yifan Zhang and
                  Qun Li},
  title        = {Defending against vehicular rogue APs},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {1665--1673},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5934960},
  doi          = {10.1109/INFCOM.2011.5934960},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HanXTZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XuQTWL11,
  author       = {Fengyuan Xu and
                  Zhengrui Qin and
                  Chiu C. Tan and
                  Baosheng Wang and
                  Qun Li},
  title        = {IMDGuard: Securing implantable medical devices with the external wearable
                  guardian},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {1862--1870},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5934987},
  doi          = {10.1109/INFCOM.2011.5934987},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/XuQTWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/GaoUPHXWL10,
  author       = {Harry Gao and
                  Seth Utecht and
                  Gregory Patrick and
                  George Hsieh and
                  Fengyuan Xu and
                  Haodong Wang and
                  Qun Li},
  title        = {High Speed Data Routing in Vehicular Sensor Networks},
  journal      = {J. Commun.},
  volume       = {5},
  number       = {3},
  pages        = {181--188},
  year         = {2010},
  url          = {https://doi.org/10.4304/jcm.5.3.181-188},
  doi          = {10.4304/JCM.5.3.181-188},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/GaoUPHXWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XuTLYW10,
  author       = {Fengyuan Xu and
                  Chiu C. Tan and
                  Qun Li and
                  Guanhua Yan and
                  Jie Wu},
  title        = {Designing a Practical Access Point Association Protocol},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {1361--1369},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5461909},
  doi          = {10.1109/INFCOM.2010.5461909},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/XuTLYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/GaoUXWL09,
  author       = {Harry Gao and
                  Seth Utecht and
                  Fengyuan Xu and
                  Haodong Wang and
                  Qun Li},
  editor       = {Benyuan Liu and
                  Azer Bestavros and
                  Ding{-}Zhu Du and
                  Jie Wang},
  title        = {Experimental Study on Secure Data Collection in Vehicular Sensor Networks},
  booktitle    = {Wireless Algorithms, Systems, and Applications, 4th International
                  Conference, {WASA} 2009, Boston, MA, USA, August 16-18, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5682},
  pages        = {22--31},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03417-6\_3},
  doi          = {10.1007/978-3-642-03417-6\_3},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/GaoUXWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/XuF07,
  author       = {Fengyuan Xu and
                  Zhiyi Fang},
  editor       = {Shahram Latifi},
  title        = {Individuation Learning Components in Intelligent Education Games},
  booktitle    = {Fourth International Conference on Information Technology: New Generations
                  {(ITNG} 2007), 2-4 April 2007, Las Vegas, Nevada, {USA}},
  pages        = {955--956},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ITNG.2007.110},
  doi          = {10.1109/ITNG.2007.110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/XuF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saint/XuFH07,
  author       = {Fengyuan Xu and
                  Zhiyi Fang and
                  Xiao Han},
  title        = {Gippy: Campus {GIS} Information System Supported by {P2P}},
  booktitle    = {2007 International Symposium on Applications and the Internet - Workshops
                  {(SAINT} 2007 Workshops), 15-19 January 2007, Hiroshima, Japan},
  pages        = {63},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SAINT-W.2007.49},
  doi          = {10.1109/SAINT-W.2007.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saint/XuFH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics