default search action
Xinyu Xing
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j12]Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. IEEE Trans. Dependable Secur. Comput. 21(1): 93-109 (2024) - [c85]Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing:
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation. ICML 2024 - [c84]Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing:
LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks. USENIX Security Symposium 2024 - [c83]Ziyi Guo, Dang K. Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing:
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. USENIX Security Symposium 2024 - [c82]Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter A. Dinda, Xinyu Xing:
CAMP: Compiler and Allocator-based Heap Memory Protection. USENIX Security Symposium 2024 - [c81]Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael V. Le, Dang K. Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom:
SeaK: Rethinking the Design of a Secure Allocator for OS Kernel. USENIX Security Symposium 2024 - [c80]Zheng Yu, Ganxiang Yang, Xinyu Xing:
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization. USENIX Security Symposium 2024 - [i27]Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing:
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation. CoRR abs/2405.03064 (2024) - [i26]Jiahao Yu, Haozheng Luo, Jerry Yao-Chieh Hu, Wenbo Guo, Han Liu, Xinyu Xing:
Enhancing Jailbreak Attack Against Large Language Models through Silent Tokens. CoRR abs/2405.20653 (2024) - [i25]Haozheng Luo, Jiahao Yu, Wenxin Zhang, Jialong Li, Jerry Yao-Chieh Hu, Xinyu Xing, Han Liu:
Decoupled Alignment for Robust Plug-and-Play Adaptation. CoRR abs/2406.01514 (2024) - [i24]Zheng Yu, Ganxiang Yang, Xinyu Xing:
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization. CoRR abs/2406.02023 (2024) - [i23]Ziyi Guo, Dang K. Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing:
Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation. CoRR abs/2406.02624 (2024) - [i22]Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter A. Dinda, Xinyu Xing:
CAMP: Compiler and Allocator-based Heap Memory Protection. CoRR abs/2406.02737 (2024) - 2023
- [j11]Mengmeng Song, Xinyu Xing, Yucong Duan, Jian Mou:
I can feel AI failure: the impact of service failure type and failure assessment on customer recovery expectation. Ind. Manag. Data Syst. 123(12): 2949-2975 (2023) - [c79]Sijia Li, Gaopeng Gou, Chang Liu, Gang Xiong, Zhen Li, Junchao Xiao, Xinyu Xing:
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection. ACSAC 2023: 352-365 - [c78]Kyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. CCS 2023: 3093-3107 - [c77]Zelei Cheng, Xian Wu, Jiahao Yu, Wenhai Sun, Wenbo Guo, Xinyu Xing:
StateMask: Explaining Deep Reinforcement Learning through State Mask. NeurIPS 2023 - [c76]Xian Wu, Wenbo Guo, Jia Yan, Baris Coskun, Xinyu Xing:
From Grim Reality to Practical Solution: Malware Classification in Real-World Noise. SP 2023: 2602-2619 - [c75]Wenbo Guo, Xian Wu, Lun Wang, Xinyu Xing, Dawn Song:
PATROL: Provable Defense against Adversarial Policy in Two-player Games. USENIX Security Symposium 2023: 3943-3960 - [c74]Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang K. Le, Dongliang Mu, Xinyu Xing:
Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness. USENIX Security Symposium 2023: 4247-4264 - [c73]Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing:
AIRS: Explanation for Deep Reinforcement Learning based Security Applications. USENIX Security Symposium 2023: 7375-7392 - [i21]Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing:
GPTFUZZER: Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts. CoRR abs/2309.10253 (2023) - [i20]Jiahao Yu, Yuhang Wu, Dong Shu, Mingyu Jin, Xinyu Xing:
Assessing Prompt Injection Risks in 200+ Custom GPTs. CoRR abs/2311.11538 (2023) - 2022
- [j10]Mengmeng Song, Jingzhe Du, Xinyu Xing, Jian Mou:
Should the chatbot "save itself" or "be helped by others"? The influence of service recovery types on consumer perceptions of recovery satisfaction. Electron. Commer. Res. Appl. 55: 101199 (2022) - [c72]Zhenpeng Lin, Yuhang Wu, Xinyu Xing:
DirtyCred: Escalating Privilege in Linux Kernel. CCS 2022: 1963-1976 - [c71]Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang:
An In-depth Analysis of Duplicated Linux Kernel Bug Reports. NDSS 2022 - [c70]Qi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing:
DeJITLeak: eliminating JIT-induced timing side-channel leaks. ESEC/SIGSOFT FSE 2022: 872-884 - [c69]Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Dongliang Mu, Chensheng Yu, Xinyu Xing, Kang Li:
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs. SP 2022: 2078-2095 - [c68]Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. USENIX Security Symposium 2022: 71-88 - [i19]Qi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing:
Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation. CoRR abs/2202.13134 (2022) - 2021
- [j9]Dongliang Mu, Yunlan Du, Jianhao Xu, Jun Xu, Xinyu Xing, Bing Mao, Peng Liu:
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis. IEEE Trans. Software Eng. 47(9): 1929-1942 (2021) - [c67]Xinyu Xing, Xiaojun Wan:
Structure-Aware Pre-Training for Table-to-Text Generation. ACL/IJCNLP (Findings) 2021: 2273-2278 - [c66]Jiarun Dai, Yuan Zhang, Hailong Xu, Haiming Lyu, Zicheng Wu, Xinyu Xing, Min Yang:
Facilitating Vulnerability Assessment through PoC Migration. CCS 2021: 3300-3317 - [c65]Wenbo Guo, Xian Wu, Sui Huang, Xinyu Xing:
Adversarial Policy Learning in Two-player Competitive Games. ICML 2021: 3910-3919 - [c64]Yang Young Lu, Wenbo Guo, Xinyu Xing, William Stafford Noble:
DANCE: Enhancing saliency maps using decoys. ICML 2021: 7124-7133 - [c63]Xiaofei Xie, Wenbo Guo, Lei Ma, Wei Le, Jian Wang, Lingjun Zhou, Yang Liu, Xinyu Xing:
RNNRepair: Automatic RNN Repair via Model-based Analysis. ICML 2021: 11383-11392 - [c62]Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, Dawn Song:
BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning. IJCAI 2021: 3699-3705 - [c61]Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G. Honavar, Gang Wang, Xinyu Xing:
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data. NDSS 2021 - [c60]Wenbo Guo, Xian Wu, Usmann Khan, Xinyu Xing:
EDGE: Explaining Deep Reinforcement Learning Policies. NeurIPS 2021: 12222-12236 - [c59]Xian Wu, Wenbo Guo, Hua Wei, Xinyu Xing:
Adversarial Policy Training against Deep Reinforcement Learning. USENIX Security Symposium 2021: 1883-1900 - [c58]Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang:
CADE: Detecting and Explaining Concept Drift Samples for Security Applications. USENIX Security Symposium 2021: 2327-2344 - [c57]Chinwuba D. Ezekwe, Saikrishna Ganta, Xinyu Xing, Anton Grad, Thomas Mayer, Andrea Visconti, Francesco Diazzi, Man-Chia Chen, Danielle Morton, Luca Valli, Robert Wolf, Ashkan Eghtesadi, Tobias Wolfer, Michael Pietzko, Alexander Grathwohl, Thomas Northemann, Richard Schoenleber, Ruslan Khalilyulin, Ishita Mukhopadhyay, Alexandru Negut, Artjom Kosov, Andreas Christian Serafin, Jan Hayek, Lin Sun:
A direct-digitization open-loop gyroscope frontend with +/-8000°/s full-scale range and noise floor of 0.0047°/s/√Hz. VLSI Circuits 2021: 1-2 - [i18]Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, Dawn Song:
BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning. CoRR abs/2105.00579 (2021) - 2020
- [j8]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput. 19(12): 2946-2964 (2020) - [c56]Xinyu Xing, Xiaosheng Fan, Xiaojun Wan:
Automatic Generation of Citation Texts in Scholarly Papers: A Pilot Study. ACL 2020: 6181-6190 - [c55]Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang:
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. CCS 2020: 1149-1163 - [c54]Yueqi Chen, Zhenpeng Lin, Xinyu Xing:
A Systematic Study of Elastic Objects in Kernel Exploitation. CCS 2020: 1165-1184 - [c53]Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao:
HART: Hardware-Assisted Kernel Module Tracing on Arm. ESORICS (1) 2020: 316-337 - [c52]Wenbo Guo, Lun Wang, Yan Xu, Xinyu Xing, Min Du, Dawn Song:
Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural Networks. ICDM 2020: 162-171 - [c51]Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang:
BScout: Direct Whole Patch Presence Test for Java Executables. USENIX Security Symposium 2020: 1147-1164 - [i17]Yang Lu, Wenbo Guo, Xinyu Xing, William Stafford Noble:
Robust saliency maps with decoy-enhanced saliency score. CoRR abs/2002.00526 (2020)
2010 – 2019
- 2019
- [j7]Yan Wang, Wei Wu, Chao Zhang, Xinyu Xing, Xiaorui Gong, Wei Zou:
From proof-of-concept to exploitable. Cybersecur. 2(1): 12 (2019) - [j6]Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c50]Zi Chai, Xinyu Xing, Xiaojun Wan, Bo Huang:
Asking the Crowd: Question Analysis, Evaluation and Generation for Open Discussion on Online Forums. ACL (1) 2019: 5032-5046 - [c49]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. AsiaCCS 2019: 633-645 - [c48]Yueqi Chen, Xinyu Xing:
SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel. CCS 2019: 1707-1722 - [c47]Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. CCS 2019: 1777-1794 - [c46]Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang:
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems. Internet Measurement Conference 2019: 230-244 - [c45]Dongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song:
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis. ASE 2019: 924-935 - [c44]Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang:
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. USENIX Security Symposium 2019: 869-885 - [c43]Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, Xinyu Xing:
All Your Clicks Belong to Me: Investigating Click Interception on the Web. USENIX Security Symposium 2019: 941-957 - [c42]Wei Wu, Yueqi Chen, Xinyu Xing, Wei Zou:
KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. USENIX Security Symposium 2019: 1187-1204 - [c41]Wenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, Dawn Song:
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. USENIX Security Symposium 2019: 1787-1804 - [i16]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. CoRR abs/1905.10499 (2019) - [i15]Wenbo Guo, Lun Wang, Xinyu Xing, Min Du, Dawn Song:
TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems. CoRR abs/1908.01763 (2019) - 2018
- [j5]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
An Empirical Evaluation of Rule Extraction from Recurrent Neural Networks. Neural Comput. 30(9) (2018) - [c40]Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing:
LEMNA: Explaining Deep Learning based Security Applications. CCS 2018: 364-379 - [c39]Wenbo Guo, Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Sui Huang, Xue Liu, C. Lee Giles, Lin Lin, Xinyu Xing:
Defending Against Adversarial Samples Without Security through Obscurity. ICDM 2018: 137-146 - [c38]Wenbo Guo, Sui Huang, Yunzhe Tao, Xinyu Xing, Lin Lin:
Explaining Deep Learning Models - A Bayesian Non-parametric Approach. NeurIPS 2018: 4519-4529 - [c37]Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, Wei Zou:
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. USENIX Security Symposium 2018: 781-797 - [c36]Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang:
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. USENIX Security Symposium 2018: 919-936 - [i14]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity. CoRR abs/1801.05420 (2018) - [i13]Linhai Song, Xinyu Xing:
Fine-Grained Library Customization. CoRR abs/1810.11128 (2018) - [i12]Wenbo Guo, Sui Huang, Yunzhe Tao, Xinyu Xing, Lin Lin:
Explaining Deep Learning Models - A Bayesian Non-parametric Approach. CoRR abs/1811.03422 (2018) - 2017
- [c35]Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - [c34]Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi:
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware. CCS 2017: 2231-2244 - [c33]Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. DSN 2017: 451-462 - [c32]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
Adversary Resistant Deep Neural Networks with an Application to Malware Detection. KDD 2017: 1145-1153 - [c31]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation. MobiSys 2017: 225-238 - [c30]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. MobiSys 2017: 488-501 - [c29]Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao:
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. USENIX Security Symposium 2017: 17-32 - [i11]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. CoRR abs/1704.05600 (2017) - [i10]Wenbo Guo, Kaixuan Zhang, Lin Lin, Sui Huang, Xinyu Xing:
Towards Interrogating Discriminative Machine Learning Models. CoRR abs/1705.08564 (2017) - [i9]Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles:
An Empirical Evaluation of Recurrent Neural Network Rule Extraction. CoRR abs/1709.10380 (2017) - 2016
- [j4]Junho Ahn, Akshay Mysore, Kati Zybko, Caroline Krumm, Sravan Thokala, Xinyu Xing, Ming Lian, Richard O. Han, Shivakant Mishra, Thompson Hobbs:
WildSense: Monitoring Interactions among Wild Deer in Harsh Outdoor Environments Using a Delay-Tolerant WSN. J. Sensors 2016: 1693460:1-1693460:17 (2016) - [c28]Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu:
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. CCS 2016: 529-540 - [c27]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance. SenSys 2016: 42-55 - [c26]Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, Patrick Th. Eugster:
WebRanz: web page randomization for better advertisement delivery and web-bot prevention. SIGSOFT FSE 2016: 205-216 - [c25]Wei Meng, Byoungyoung Lee, Xinyu Xing, Wenke Lee:
TrackMeOrNot: Enabling Flexible Control on Web Tracking. WWW 2016: 99-109 - [i8]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
Exploiting Insurance Telematics for Fun and Profit. CoRR abs/1609.02234 (2016) - [i7]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Xinyu Xing, C. Lee Giles, Xue Liu:
Random Feature Nullification for Adversary Resistant Deep Architecture. CoRR abs/1610.01239 (2016) - [i6]Qinglong Wang, Wenbo Guo, Alexander G. Ororbia II, Xinyu Xing, Lin Lin, C. Lee Giles, Xue Liu, Peng Liu, Gang Xiong:
Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks. CoRR abs/1610.01934 (2016) - [i5]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation. CoRR abs/1611.00837 (2016) - [i4]Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, C. Lee Giles, Xue Liu:
Learning Adversary-Resistant Deep Neural Networks. CoRR abs/1612.01401 (2016) - 2015
- [j3]Hanqiang Cheng, Xinyu Xing, Xue Liu, Qin Lv:
ISC: An Iterative Social Based Classifier for Adult Account Detection on Twitter. IEEE Trans. Knowl. Data Eng. 27(4): 1045-1056 (2015) - [c24]Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee:
UCognito: Private Browsing without Tears. CCS 2015: 438-449 - [c23]Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee:
Understanding Malvertising Through Ad-Injecting Browser Extensions. WWW 2015: 1286-1295 - 2014
- [c22]Wei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee:
Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising. CCS 2014: 129-140 - [c21]Xinyu Xing, Wei Meng, Dan Doozan, Nick Feamster, Wenke Lee, Alex C. Snoeren:
Exposing Inconsistent Web Search Results with Bobble. PAM 2014: 131-140 - 2013
- [j2]Yu-Li Liang, Xinyu Xing, Hanqiang Cheng, Jianxun Dang, Sui Huang, Richard Han, Xue Liu, Qin Lv, Shivakant Mishra:
SafeVchat: A System for Obscene Content Detection in Online Video Chat Services. ACM Trans. Internet Techn. 12(4): 13:1-13:26 (2013) - [c20]Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee:
Take This Personally: Pollution Attacks on Personalized Services. USENIX Security Symposium 2013: 671-686 - 2012
- [c19]Xinyu Xing, Yu-Li Liang, Sui Huang, Hanqiang Cheng, Richard Han, Qin Lv, Xue Liu, Shivakant Mishra, Yi Zhu:
Scalable misbehavior detection in online video chat services. KDD 2012: 552-560 - [c18]Lei Tian, Junho Ahn, Hanqiang Cheng, Xinyu Xing, Yu-Li Liang, Shivakant Mishra, David Chu, Xue Liu, Richard Han, Qin Lv:
Demo: MVChat: flasher detection for mobile video chat. MobiSys 2012: 457-458 - [c17]Hanqiang Cheng, Yu-Li Liang, Xinyu Xing, Xue Liu, Richard Han, Qin Lv, Shivakant Mishra:
Efficient misbehaving user detection in online video chat services. WSDM 2012: 23-32 - [i3]Xinyu Xing, Junho Ahn, Wenke Lee, Richard Han, Shivakant Mishra:
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services. CoRR abs/1204.2774 (2012) - 2011
- [c16]Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Liu:
A highly scalable bandwidth estimation of commercial hotspot access points. INFOCOM 2011: 1143-1151 - [c15]Chinwuba D. Ezekwe, Johan P. Vanderhaegen, Xinyu Xing, Ganesh K. Balachandran:
A 6.7nV/√Hz Sub-mHz-1/f-corner 14b analog-to-digital interface for rail-to-rail precision voltage sensing. ISSCC 2011: 246-248 - [c14]Xinyu Xing, Yu-Li Liang, Hanqiang Cheng, Jianxun Dang, Sui Huang, Richard Han, Xue Liu, Qin Lv, Shivakant Mishra:
SafeVchat: detecting obscene content and misbehaving users in online video chat services. WWW 2011: 685-694 - [c13]Xinyu Xing, Yifei Jiang, Shivakant Mishra:
Understanding Characteristics of Available Bandwidth in Wireless Environment. ANT/MobiWIS 2011: 248-254 - [i2]Xinyu Xing, Yu-Li Liang, Hanqiang Cheng, Jianxun Dang, Sui Huang, Richard Han, Xue Liu, Qin Lv, Shivakant Mishra:
SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services. CoRR abs/1101.3124 (2011) - 2010
- [j1]Elhadi M. Shakshuki, Xinyu Xing, Tarek R. Sheltami:
Fault reconnaissance agent for sensor networks. Mob. Inf. Syst. 6(3): 229-247