default search action
Shengjie Xu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Bineet Ghosh, Clara Hobbs, Shengjie Xu, F. Donelson Smith, James H. Anderson, P. S. Thiagarajan, Benjamin Berg, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Statistical verification of autonomous system controllers under timing uncertainties. Real Time Syst. 60(1): 108-149 (2024) - [j18]Bei Zhang, Haoyuan Cheng, Yanhui Zhong, Jing Chi, Guoyin Shen, Zhaoxu Yang, Xiaolong Li, Shengjie Xu:
Real-Time Detection of Voids in Asphalt Pavement Based on Swin-Transformer-Improved YOLOv5. IEEE Trans. Intell. Transp. Syst. 25(3): 2615-2626 (2024) - [c32]Piyush Vyas, Jun Liu, Shengjie Xu:
Real-Time Fake News Detection on the X (Twitter): An Online Machine Learning Approach. AMCIS 2024 - [c31]Shengjie Xu:
PrepPipe: Prototyping Compiler for Attainable Visual Novel Development. CoG 2024: 1-4 - [c30]Clara Hobbs, Shengjie Xu, Bineet Ghosh, Enrico Fraccaroli, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Quantitative Safety-Driven Co-Synthesis of Cyber-Physical System Implementations. ICCPS 2024: 99-110 - [c29]Shengjie Xu, Clara Hobbs, Yukai Song, Bineet Ghosh, Sharmin Aktar, Lei Yang, Yi Sheng, Weiwen Jiang, Jingtong Hu, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Poster Abstract: Neural Architecture Sizing for Autonomous Systems. ICCPS 2024: 289-290 - [c28]Shengjie Xu, Clara Hobbs, Bineet Ghosh, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Certifiable and Efficient Autonomous Cyber-Physical Systems Design. VLSID 2024: 259-263 - [i4]Gary A. McCully, John D. Hastings, Shengjie Xu, Adam Fortier:
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code. CoRR abs/2405.20611 (2024) - [i3]Gary A. McCully, John D. Hastings, Shengjie Xu, Adam Fortier:
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code. CoRR abs/2409.17513 (2024) - 2023
- [j17]Shengjie Xu, Jing Ren, Musha Ji'e, Shukai Duan, Lidan Wang:
Application of Reservoir Computing Based on a 2D Hyperchaotic Discrete Memristive Map in Efficient Temporal Signal Processing. Int. J. Bifurc. Chaos 33(6): 2330015:1-2330015:16 (2023) - [j16]Shengjie Xu:
A dual-primal balanced augmented Lagrangian method for linearly constrained convex programming. J. Appl. Math. Comput. 69(1): 1015-1035 (2023) - [j15]Bingsheng He, Feng Ma, Shengjie Xu, Xiaoming Yuan:
A rank-two relaxed parallel splitting version of the augmented Lagrangian method with step size in (0,2) for separable convex programming. Math. Comput. 92(342): 1633-1663 (2023) - [c27]Shengjie Xu, Bineet Ghosh, Clara Hobbs, P. S. Thiagarajan, Samarjit Chakraborty:
Safety-Aware Flexible Schedule Synthesis for Cyber-Physical Systems Using Weakly-Hard Constraints. ASP-DAC 2023: 46-51 - [c26]Shengjie Xu, Bineet Ghosh, Clara Hobbs, Enrico Fraccaroli, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Statistical Approach to Efficient and Deterministic Schedule Synthesis for Cyber-Physical Systems. ATVA (1) 2023: 312-333 - [c25]Kexin Zhang, Shengjie Xu, Bongsik Shin:
Towards Adaptive Zero Trust Model for Secure AI. CNS 2023: 1-2 - [c24]Enrico Fraccaroli, Prachi Joshi, Shengjie Xu, Khaja Shazzad, Markus Jochim, Samarjit Chakraborty:
Timing Predictability for SOME/IP-based Service-Oriented Automotive In-Vehicle Networks. DATE 2023: 1-6 - [c23]Shengjie Xu, Nan Ding:
Global dissipativity for stochastic quaternion-valued neural networks with proportional delay. EITCE 2023: 1125-1129 - [c22]Eric Liu, Shengjie Xu, David Lie:
FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers. ASE 2023: 1061-1072 - [c21]Shengjie Xu, Eric Liu, Wei Huang, David Lie:
MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking. RAID 2023: 609-622 - [c20]Shengjie Xu, Bineet Ghosh, Clara Hobbs, P. S. Thiagarajan, Prachi Joshi, Samarjit Chakraborty:
Safety-Aware Implementation of Control Tasks via Scheduling with Period Boosting and Compressing. RTCSA 2023: 196-205 - 2022
- [j14]Shengjie Xu, Yin Li, Yun Mao, Ying Guo:
Counteracting a Saturation Attack in Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Filter Embedded in Homodyne Detector. Entropy 24(3): 383 (2022) - [j13]Bingsheng He, Shengjie Xu, Xiaoming Yuan:
On Convergence of the Arrow-Hurwicz Method for Saddle Point Problems. J. Math. Imaging Vis. 64(6): 662-671 (2022) - [j12]Shengjie Xu, Fei Xue:
Inexact rational Krylov subspace method for eigenvalue problems. Numer. Linear Algebra Appl. 29(5) (2022) - [j11]Bingsheng He, Feng Ma, Shengjie Xu, Xiaoming Yuan:
A Generalized Primal-Dual Algorithm with Improved Convergence Condition for Saddle Point Problems. SIAM J. Imaging Sci. 15(3): 1157-1183 (2022) - [j10]Clara Hobbs, Bineet Ghosh, Shengjie Xu, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Safety Analysis of Embedded Controllers Under Implementation Platform Timing Uncertainties. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4016-4027 (2022) - [j9]Biao Hu, Shengjie Xu, Zhengcai Cao, Mengchu Zhou:
Safety-Guaranteed and Development Cost- Minimized Scheduling of DAG Functionality in an Automotive System. IEEE Trans. Intell. Transp. Syst. 23(4): 3074-3086 (2022) - [c19]Tarek Ahmed, Shengjie Xu:
Shellcoding: Hunting for Kernel32 Base Address. INFOCOM Workshops 2022: 1-2 - [c18]Bineet Ghosh, Clara Hobbs, Shengjie Xu, Parasara Sridhar Duggirala, James H. Anderson, P. S. Thiagarajan, Samarjit Chakraborty:
Statistical Hypothesis Testing of Controller Implementations Under Timing Uncertainties. RTCSA 2022: 11-20 - [i2]Shengjie Xu, Kevin Mok:
The Study of Complex Human Locomotion Behaviors: From Crawling to Walking. CoRR abs/2211.06766 (2022) - 2021
- [j8]Shengjie Xu, Bingsheng He:
A parallel splitting ALM-based algorithm for separable convex programming. Comput. Optim. Appl. 80(3): 831-851 (2021) - [j7]Sohan Gyawali, Shengjie Xu, Yi Qian, Rose Qingyang Hu:
Challenges and Solutions for Cellular Based V2X Communications. IEEE Commun. Surv. Tutorials 23(1): 222-255 (2021) - [j6]Shengjie Xu, Yin Li, Yijun Wang, Yun Mao, Xiaodong Wu, Ying Guo:
Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect. Entropy 23(12): 1698 (2021) - [c17]Shengjie Xu, Wei Huang, David Lie:
In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection. ASPLOS 2021: 224-240 - [c16]Wei Huang, Shengjie Xu, Yueqiang Cheng, David Lie:
Aion Attacks: Manipulating Software Timers in Trusted Execution Environment. DIMVA 2021: 173-193 - [c15]Matthew Bradley, Shengjie Xu:
A Metric for Machine Learning Vulnerability to Adversarial Examples. INFOCOM Workshops 2021: 1-2 - [c14]Justin Burr, Shengjie Xu:
Improving Adversarial Attacks Against Executable Raw Byte Classifiers. INFOCOM Workshops 2021: 1-2 - [c13]Kejie Chen, Liuyan Wang, Shengjie Xu:
Research on Navigation Attitude of Air Cushion Vehicle Based on BP Neural Network. ISCSIC 2021: 296-302 - 2020
- [j5]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
Edge Intelligence Assisted Gateway Defense in Cyber Security. IEEE Netw. 34(4): 14-19 (2020) - [j4]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
Data-Driven Edge Intelligence for Robust Network Anomaly Detection. IEEE Trans. Netw. Sci. Eng. 7(3): 1481-1492 (2020) - [c12]Sujita Chaudhary, Austin O'Brien, Shengjie Xu:
Automated Post-Breach Penetration Testing through Reinforcement Learning. CNS 2020: 1-2
2010 – 2019
- 2019
- [j3]Xiao Wang, Dacheng Cong, Zhidong Yang, Shengjie Xu, Junwei Han:
Modified Quasi-Newton Optimization Algorithm-Based Iterative Learning Control for Multi-Axial Road Durability Test Rig. IEEE Access 7: 31286-31296 (2019) - [j2]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
Data-Driven Network Intelligence for Anomaly Detection. IEEE Netw. 33(3): 88-95 (2019) - [c11]Dongfeng Fang, Shengjie Xu, Hamid Sharif:
Security Analysis of Wireless Train Control Systems. GLOBECOM Workshops 2019: 1-6 - [c10]Shengjie Xu, Dongfeng Fang, Hamid Sharif:
Efficient Network Anomaly Detection for Edge Gateway Defense in 5G. GLOBECOM Workshops 2019: 1-5 - [c9]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
A Semi-Supervised Learning Approach for Network Anomaly Detection in Fog Computing. ICC 2019: 1-6 - [i1]Lianying Zhao, He Shuang, Shengjie Xu, Wei Huang, Rongzhen Cui, Pushkar Bettadpur, David Lie:
SoK: Hardware Security Support for Trustworthy Execution. CoRR abs/1910.04957 (2019) - 2018
- [c8]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
Privacy-Preserving Data Preprocessing for Fog Computing in 5G Network Security. GLOBECOM 2018: 1-6 - [c7]Shengjie Xu, Feng Ye:
A Predicate Encryption Based Anomaly Detection Scheme for E-Health Communications Network. ICC 2018: 1-6 - [c6]Sohan Gyawali, Shengjie Xu, Feng Ye, Rose Qingyang Hu, Yi Qian:
A D2D Based Clustering Scheme for Public Safety Communications. VTC Spring 2018: 1-5 - 2017
- [c5]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
A Study on Communication Network Reliability for Advanced Metering Infrastructure in Smart Grid. DASC/PiCom/DataCom/CyberSciTech 2017: 127-132 - [c4]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
A data-driven preprocessing scheme on anomaly detection in big data applications. INFOCOM Workshops 2017: 814-819 - 2016
- [c3]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
A Secure Data Learning Scheme in Big Data Applications. ICCCN 2016: 1-9 - 2015
- [j1]Shengjie Xu, Yi Qian, Rose Qingyang Hu:
On Reliability of Smart Grid Neighborhood Area Networks. IEEE Access 3: 2352-2365 (2015) - [c2]Shengjie Xu, Yi Qian:
Quantitative study of reliable communication infrastructure in smart grid NAN. DRCN 2015: 93-94 - 2010
- [c1]Lingfang Zeng, Zhan Shi, Shengjie Xu, Dan Feng:
SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy. CloudCom 2010: 521-528
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint