default search action
Fengyuan Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Hao Wu, Yuhang Gong, Xiaopeng Ke, Hanzhong Liang, Fengyuan Xu, Yunxin Liu, Sheng Zhong:
TIM: Enabling Large-Scale White-Box Testing on In-App Deep Learning Models. IEEE Trans. Inf. Forensics Secur. 19: 8188-8203 (2024) - [j18]Hao Han, Kunming Xie, Tongyu Wang, Xiaojun Zhu, Yanchao Zhao, Fengyuan Xu:
RescQR: Enabling Reliable Data Recovery in Screen-Camera Communication System. IEEE Trans. Mob. Comput. 23(5): 3510-3522 (2024) - [c50]Han Gao, Hao Wu, Peiwen Dong, Yixin Xu, Fengyuan Xu, Sheng Zhong:
MuSR: Multi-Scale 3D Scenes Reconstruction based on Monocular Video. ICASSP 2024: 2840-2844 - [c49]Han Gao, Yating Liu, Fang Cao, Hao Wu, Fengyuan Xu, Sheng Zhong:
VIDAR: Data Quality Improvement for Monocular 3D Reconstruction through In-situ Visual Interaction. ICRA 2024: 7895-7901 - [i14]Hao Wu, Likun Zhang, Shucheng Li, Fengyuan Xu, Sheng Zhong:
CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation. CoRR abs/2409.02495 (2024) - [i13]Likun Zhang, Hao Wu, Lingcui Zhang, Fengyuan Xu, Jin Cao, Fenghua Li, Ben Niu:
Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine? CoRR abs/2409.15781 (2024) - 2023
- [j17]Jingyi Ning, Lei Xie, Chuyu Wang, Yanling Bu, Fengyuan Xu, Da-Wei Zhou, Sanglu Lu, Baoliu Ye:
RF-Badge: Vital Sign-Based Authentication via RFID Tag Array on Badges. IEEE Trans. Mob. Comput. 22(2): 1170-1184 (2023) - [j16]Wei Tong, Wenjie Chen, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage. IEEE Trans. Mob. Comput. 22(9): 5463-5478 (2023) - [j15]Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong:
LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps. IEEE Trans. Mob. Comput. 22(12): 7138-7155 (2023) - [c48]Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans:
Manipulating Transfer Learning for Property Inference. CVPR 2023: 15975-15984 - [c47]Hao Wu, Bo Yang, Xiaopeng Ke, Siyi He, Fengyuan Xu, Sheng Zhong:
GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User Side. ICASSP 2023: 1-5 - [c46]Jiawei Huang, Hao Han, Fengyuan Xu, Bing Chen:
SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGX. ISSRE 2023: 148-159 - [c45]Shucheng Li, Runchuan Wang, Hao Wu, Sheng Zhong, Fengyuan Xu:
SIEGE: Self-Supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection. ACM Multimedia 2023: 8881-8890 - [c44]Huiping Qian, Hao Han, Xiaojun Zhu, Fengyuan Xu:
ShuffleCAN: Enabling Moving Target Defense for Attack Mitigation on Automotive CAN. MSN 2023: 351-358 - [c43]Shucheng Li, Boyu Chang, Bo Yang, Hao Wu, Sheng Zhong, Fengyuan Xu:
Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English. SIGIR 2023: 749-759 - [i12]Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans:
Manipulating Transfer Learning for Property Inference. CoRR abs/2303.11643 (2023) - 2022
- [j14]Yutao Tang, Zhengrui Qin, Zhiqiang Lin, Yue Li, Shanhe Yi, Fengyuan Xu, Qun Li:
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. IEEE Trans. Computers 71(12): 3349-3360 (2022) - [j13]Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans:
Stealthy Backdoors as Compression Artifacts. IEEE Trans. Inf. Forensics Secur. 17: 1372-1387 (2022) - [c42]Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang:
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications. CCS 2022: 921-935 - [c41]Xiaopeng Ke, Boyu Chang, Hao Wu, Fengyuan Xu, Sheng Zhong:
Towards Practical and Efficient Long Video Summary. ICASSP 2022: 1770-1774 - [c40]Yulong Tian, Xiaopeng Ke, Zeyi Tao, Shaohua Ding, Fengyuan Xu, Qun Li, Hao Han, Sheng Zhong, Xinyi Fu:
Privacy-Preserving and Robust Federated Deep Metric Learning. IWQoS 2022: 1-11 - [c39]Ligeng Chen, Zhongling He, Hao Wu, Fengyuan Xu, Yi Qian, Bing Mao:
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy. SANER 2022: 112-122 - [i11]Hao Wu, Yuhang Gong, Xiaopeng Ke, Hanzhong Liang, Minghao Li, Fengyuan Xu, Yunxin Liu, Sheng Zhong:
Automation Slicing and Testing for in-App Deep Learning Models. CoRR abs/2205.07228 (2022) - 2021
- [j12]Qin Li, Pan Yan, Xiao Huang, Liuqing Yang, Fengyuan Xu, Yancheng You:
On Developing Piecewise Rational Mapping with Fine Regulation Capability for WENO Schemes. J. Sci. Comput. 88(3): 75 (2021) - [j11]Yuan Zhang, Yunlong Mao, Minze Xu, Fengyuan Xu, Sheng Zhong:
Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications. IEEE Trans. Dependable Secur. Comput. 18(3): 1008-1018 (2021) - [c38]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. ICDE 2021: 193-204 - [c37]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. ICDE 2021: 2705-2708 - [c36]Minze Xu, Yuan Zhang, Fengyuan Xu, Sheng Zhong:
Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels. IWQoS 2021: 1-10 - [c35]Manni Wang, Shaohua Ding, Ting Cao, Yunxin Liu, Fengyuan Xu:
AsyMo: scalable and efficient deep-learning inference on asymmetric mobile CPUs. MobiCom 2021: 215-228 - [c34]Hao Wu, Xuejin Tian, Minghao Li, Yunxin Liu, Ganesh Ananthanarayanan, Fengyuan Xu, Sheng Zhong:
PECAM: privacy-enhanced video streaming and analytics via securely-reversible transformation. MobiCom 2021: 229-241 - [c33]Hao Wu, Xuejin Tian, Yuhang Gong, Xing Su, Minghao Li, Fengyuan Xu:
DAPter: Preventing User Data Abuse in Deep Learning Inference Services. WWW 2021: 1017-1028 - [i10]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. CoRR abs/2101.06761 (2021) - [i9]Qin Li, Pan Yan, Xiao Huang, Liuqing Yang, Fengyuan Xu:
On developing piecewise rational mapping with fine regulation capability for WENO schemes. CoRR abs/2101.11226 (2021) - [i8]Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong:
App Developer Centric Trusted Execution Environment. CoRR abs/2102.02465 (2021) - [i7]Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans:
Stealthy Backdoors as Compression Artifacts. CoRR abs/2104.15129 (2021) - [i6]Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong:
Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection. CoRR abs/2106.10176 (2021) - [i5]Fengyuan Xu, Pan Yan, Qin Li, Yancheng You:
Quasi-linear analysis of dispersion relation preservation for nonlinear schemes. CoRR abs/2110.15508 (2021) - 2020
- [c32]Shucheng Li, Lingfei Wu, Shiwei Feng, Fangli Xu, Fengyuan Xu, Sheng Zhong:
Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem. EMNLP (Findings) 2020: 2841-2852 - [c31]Yayuan Xiong, Fengyuan Xu, Sheng Zhong:
Detecting GAN-based Privacy Attack in Distributed Learning. ICC 2020: 1-6 - [c30]Han Gao, Yulong Tian, Rongchun Yao, Fengyuan Xu, Xinyi Fu, Sheng Zhong:
Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems. SEC 2020: 334-339 - [c29]Jin Yu, Xiaopeng Ke, Fengyuan Xu, Hao Huang:
Efficient Architecture Paradigm for Deep Learning Inference as a Service. IPCCC 2020: 1-8 - [c28]Hao Wu, Jinghao Feng, Xuejin Tian, Edward Sun, Yunxin Liu, Bo Dong, Fengyuan Xu, Sheng Zhong:
EMO: real-time emotion recognition from single-eye images for resource-constrained eyewear devices. MobiSys 2020: 448-461 - [c27]Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li:
Escaping Backdoor Attack Detection of Deep Learning. SEC 2020: 431-445 - [c26]Yu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong:
Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training. SpaCCS 2020: 62-75 - [c25]Ziyan Fang, Weijun Zhang, Zongfei Li, Huaao Tang, Hao Han, Fengyuan Xu:
Revisiting Attacks and Defenses in Connected and Autonomous Vehicles. SpaCCS 2020: 104-117 - [i4]Shucheng Li, Lingfei Wu, Shiwei Feng, Fangli Xu, Fengyuan Xu, Sheng Zhong:
Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem. CoRR abs/2004.13781 (2020) - [i3]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. CoRR abs/2010.13637 (2020)
2010 – 2019
- 2019
- [j10]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security. Proc. VLDB Endow. 12(12): 1802-1805 (2019) - [c24]Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. CCS 2019: 2421-2436 - [c23]Hao Wu, Zheng Qin, Xuejin Tian, Edward Sun, Fengyuan Xu, Sheng Zhong:
Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources. DSC 2019: 1-8 - [c22]Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. ICDCS 2019: 1007-1018 - [c21]Hao Wu, Jinghao Feng, Xuejin Tian, Fengyuan Xu, Yunxin Liu, XiaoFeng Wang, Sheng Zhong:
secGAN: A Cycle-Consistent GAN for Securely-Recoverable Video Transformation. HotEdgeVideo@MobiCom 2019: 33-38 - [c20]Taegyeong Lee, Zhiqi Lin, Saumay Pushp, Caihua Li, Yunxin Liu, Youngki Lee, Fengyuan Xu, Chenren Xu, Lintao Zhang, Junehwa Song:
Occlumency: Privacy-preserving Remote Deep-learning Inference Using SGX. MobiCom 2019: 46:1-46:17 - [c19]Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li, Sheng Zhong:
Trojan Attack on Deep Generative Models in Autonomous Driving. SecureComm (1) 2019: 299-318 - 2018
- [j9]Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. Comput. Secur. 73: 425-438 (2018) - [j8]Jingyu Hua, Wei Tong, Fengyuan Xu, Sheng Zhong:
A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Trans. Inf. Forensics Secur. 13(5): 1155-1168 (2018) - [c18]Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. CCS 2018: 1324-1337 - [c17]Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong:
Learning from Differentially Private Neural Activations with Edge Computing. SEC 2018: 90-102 - [c16]Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong:
MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. INFOCOM 2018: 2726-2734 - [c15]Haitao Xu, Fengyuan Xu, Bo Chen:
Internet Protocol Cameras with No Password Protection: An Empirical Investigation. PAM 2018: 47-59 - [c14]Peng Gao, Xusheng Xiao, Zhichun Li, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. USENIX ATC 2018: 113-126 - [i2]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. CoRR abs/1806.02290 (2018) - [i1]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query Tool for Efficiently Investigating Risky Software Behaviors. CoRR abs/1810.03464 (2018) - 2017
- [j7]Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li, Guihai Chen:
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios. IEEE Trans. Mob. Comput. 16(7): 2065-2078 (2017) - 2016
- [c13]Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang:
High Fidelity Data Reduction for Big Data Security Dependency Analyses. CCS 2016: 504-516 - 2015
- [j6]Yifan Zhang, Chiu C. Tan, Fengyuan Xu, Hao Han, Qun Li:
VProof: Lightweight Privacy-Preserving Vehicle Location Proofs. IEEE Trans. Veh. Technol. 64(1): 378-385 (2015) - 2014
- [j5]Tan Yan, Liudmila Ulanova, Ye Ouyang, Fengyuan Xu:
Data Mining in Time Series: Current Study and Future Trend. J. Comput. Sci. 10(12): 2358-2359 (2014) - [j4]Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, Qun Li:
VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet. IEEE Trans. Veh. Technol. 63(8): 3927-3934 (2014) - 2013
- [j3]Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Trans. Parallel Distributed Syst. 24(12): 2482-2491 (2013) - [j2]Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li:
SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks. IEEE Trans. Parallel Distributed Syst. 24(12): 2492-2502 (2013) - [c12]Wei Wei, Harry Tian Gao, Fengyuan Xu, Qun Li:
Fast Mencius: Mencius with low commit latency. INFOCOM 2013: 881-889 - [c11]Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li, Guihai Chen:
Extracting secret key from wireless link dynamics in vehicular environments. INFOCOM 2013: 2283-2291 - [c10]Fengyuan Xu, Yunxin Liu, Thomas Moscibroda, Ranveer Chandra, Long Jin, Yongguang Zhang, Qun Li:
Optimizing background email sync on smartphones. MobiSys 2013: 55-68 - [c9]Fengyuan Xu, Yunxin Liu, Qun Li, Yongguang Zhang:
V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics. NSDI 2013: 43-55 - 2012
- [c8]Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li:
SybilDefender: Defend against sybil attacks in large social networks. INFOCOM 2012: 1951-1959 - [c7]Wei Wei, Fengyuan Xu, Qun Li:
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks. INFOCOM 2012: 2616-2620 - 2011
- [c6]Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, Qun Li:
Defending against vehicular rogue APs. INFOCOM 2011: 1665-1673 - [c5]Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, Qun Li:
IMDGuard: Securing implantable medical devices with the external wearable guardian. INFOCOM 2011: 1862-1870 - 2010
- [j1]Harry Gao, Seth Utecht, Gregory Patrick, George Hsieh, Fengyuan Xu, Haodong Wang, Qun Li:
High Speed Data Routing in Vehicular Sensor Networks. J. Commun. 5(3): 181-188 (2010) - [c4]Fengyuan Xu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
Designing a Practical Access Point Association Protocol. INFOCOM 2010: 1361-1369
2000 – 2009
- 2009
- [c3]Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang, Qun Li:
Experimental Study on Secure Data Collection in Vehicular Sensor Networks. WASA 2009: 22-31 - 2007
- [c2]Fengyuan Xu, Zhiyi Fang:
Individuation Learning Components in Intelligent Education Games. ITNG 2007: 955-956 - [c1]Fengyuan Xu, Zhiyi Fang, Xiao Han:
Gippy: Campus GIS Information System Supported by P2P. SAINT Workshops 2007: 63
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint