![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
XiaoFeng Wang 0001
Xiaofeng Wang 0006
Person information
- affiliation: Indiana University Bloomington, School of Informatics and Computing, IN, USA
Other persons with the same name
- Xiaofeng Wang (aka: Xiao-Feng Wang) — disambiguation page
- Xiaofeng Wang 0001
— Free University of Bozen-Bolzano, Faculty of Computer Science, Italy
- Xiaofeng Wang 0002
— National University of Defense Technology, School of Computer Science, Changsha, China
- Xiaofeng Wang 0003
— Bohai University, School of Mathematics and Physics, Jinzhou, China (and 1 more)
- Xiaofeng Wang 0004
— Shanghai Jiao Tong University, School of Eectronic Information and Electrical Engineering, China
- Xiaofeng Wang 0005
— Louisiana Tech University, Department of Mathematics, Ruston, LA, USA (and 2 more)
- Xiaofeng Wang 0007
— University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA (and 2 more)
- Xiaofeng Wang 0008 — Ryerson University, Department of Electrical and Computer Engineering, Toronto, ON, Canada
- Xiaofeng Wang 0009
(aka: Xiao-Feng Wang 0009) — Hefei University, Big Data Technology Application for Urban Infrastructure, School of Artificial Intelligence and Big Data, China
Refine list
![note](https://dblp.dagstuhl.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j29]Dandan Xu
, Kai Chen
, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang:
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. IEEE Trans. Inf. Forensics Secur. 19: 293-306 (2024) - [c161]XiaoFeng Wang
:
Security Of AI, By AI and For AI: Charting New Territories in AI-Centered Cybersecurity Research. AsiaCCS 2024 - [c160]Xiaoyi Chen
, Siyuan Tang
, Rui Zhu
, Shijun Yan
, Lei Jin
, Zihao Wang
, Liya Su
, Zhikun Zhang
, Xiaofeng Wang
, Haixu Tang
:
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks. CCS 2024: 1285-1299 - [c159]Mingming Zha
, Zilong Lin
, Siyuan Tang
, Xiaojing Liao
, Yuhong Nan
, XiaoFeng Wang
:
Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion. CCS 2024: 2132-2146 - [c158]Siyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, XiaoFeng Wang, Yanzhi Dou:
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming. DSN 2024: 324-337 - [c157]Yuhui Zhang, Lutan Zhao, Cheng Che, XiaoFeng Wang, Dan Meng, Rui Hou:
SpecFL: An Efficient Speculative Federated Learning System for Tree-based Model Training. HPCA 2024: 817-831 - [c156]Yuehan Zhang
, Yongqiang Ma
, Jiawei Liu
, Xiaozhong Liu
, XiaoFeng Wang
, Wei Lu
:
Detection Vs. Anti-detection: Is Text Generated by AI Detectable? iConference (1) 2024: 209-222 - [c155]Tu Le
, Dongfang Zhao
, Zihao Wang
, XiaoFeng Wang
, Yuan Tian
:
Alexa, is the skill always safe? Uncover Lenient Skill Vetting Process and Protect User Privacy at Run Time. ICSE (SEIS) 2024: 34-45 - [c154]Rui Zhu, Di Tang, Siyuan Tang, Zihao Wang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang:
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. NDSS 2024 - [c153]Zilong Lin
, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu:
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. SP 2024: 388-406 - [c152]Yifan Zhang, Zhaojie Hu, Xueqiang Wang, Yuhui Hong, Yuhong Nan, XiaoFeng Wang, Jiatao Cheng, Luyi Xing:
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs. USENIX Security Symposium 2024 - [c151]Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang:
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. USENIX Security Symposium 2024 - [c150]Huanyao Rong, Wei You, Xiaofeng Wang, Tianhao Mao:
Toward Unbiased Multiple-Target Fuzzing with Path Diversity. USENIX Security Symposium 2024 - [c149]Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang:
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection. USENIX Security Symposium 2024 - [c148]Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, John Mitchell, Haixu Tang, XiaoFeng Wang:
DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training. USENIX Security Symposium 2024 - [c147]Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li:
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples. USENIX Security Symposium 2024 - [i43]Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang:
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. CoRR abs/2401.03315 (2024) - [i42]Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, Xiaofeng Wang, Kai Li:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. CoRR abs/2401.11547 (2024) - [i41]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024) - [i40]Zihao Wang, Rui Zhu, Dongruo Zhou
, Zhikun Zhang, John Mitchell, Haixu Tang, Xiaofeng Wang:
DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training. CoRR abs/2403.02571 (2024) - [i39]Ronghong Huang, Dongfang Zhao, Xianghang Mi, XiaoFeng Wang:
Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies. CoRR abs/2404.10610 (2024) - [i38]Hongbo Chen, Yifan Zhang, Xing Han, Huanyao Rong, Yuheng Zhang, Tianhao Mao, Hang Zhang, XiaoFeng Wang, Luyi Xing, Xun Chen:
WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs. CoRR abs/2405.01668 (2024) - [i37]Huanyao Rong, Yue Duan, Hang Zhang, XiaoFeng Wang, Hongbo Chen, Shengchen Duan, Shen Wang:
Disassembling Obfuscated Executables with LLM. CoRR abs/2407.08924 (2024) - [i36]Hongbo Chen, Quan Zhou, Sen Yang, Xing Han, Fan Zhang, Danfeng Zhang, XiaoFeng Wang:
AGORA: Open More and Trust Less in Binary Verification Service. CoRR abs/2407.15062 (2024) - [i35]Jinhong Yu, Yi Chen, Di Tang, Xiaozhong Liu, XiaoFeng Wang, Chen Wu, Haixu Tang:
LLM-Enhanced Software Patch Localization. CoRR abs/2409.06816 (2024) - [i34]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024) - 2023
- [j28]Wenhao Wang
, Weijie Liu
, Hongbo Chen
, XiaoFeng Wang, Hongliang Tian, Dongdai Lin
:
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. IEEE Trans. Dependable Secur. Comput. 20(1): 522-538 (2023) - [j27]Zhiwei Wang
, Peinan Li
, Rui Hou
, Zhihao Li, Jiangfeng Cao, XiaoFeng Wang, Dan Meng:
HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption. IEEE Trans. Parallel Distributed Syst. 34(4): 1067-1081 (2023) - [c146]Zihao Wang
, Jiale Guan
, XiaoFeng Wang
, Wenhao Wang
, Luyi Xing
, Fares Fahad S. Alharbi
:
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. CCS 2023: 281-295 - [c145]Zhi Li
, Weijie Liu
, XiaoFeng Wang
, Bin Yuan
, Hongliang Tian
, Hai Jin
, Shoumeng Yan
:
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation. CCS 2023: 3063-3077 - [c144]Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, XiaoFeng Wang, Kai Li
:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. EuroS&P 2023: 332-351 - [c143]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts. ICDCS 2023: 1065-1066 - [c142]Rui Zhu, Di Tang, Siyuan Tang, Xiaofeng Wang, Haixu Tang:
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models. SP 2023: 1-19 - [c141]Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, XiaoFeng Wang, Uday Jammalamadaka, Ning Zhang:
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography. USENIX Security Symposium 2023: 2815-2832 - [c140]Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing:
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain. USENIX Security Symposium 2023: 3403-3420 - [c139]Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu:
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning. USENIX Security Symposium 2023: 3529-3545 - [c138]Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, XiaoFeng Wang:
A Verified Confidential Computing as a Service Framework for Privacy Preservation. USENIX Security Symposium 2023: 4733-4750 - [c137]Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang:
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference. USENIX Security Symposium 2023: 6007-6024 - [c136]Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang:
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps. USENIX Security Symposium 2023: 6665-6682 - [e8]Mehdi Tibouchi
, Xiaofeng Wang
:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13905, Springer 2023, ISBN 978-3-031-33487-0 [contents] - [e7]Mehdi Tibouchi
, Xiaofeng Wang
:
Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13906, Springer 2023, ISBN 978-3-031-33490-0 [contents] - [i33]Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang:
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. CoRR abs/2301.12318 (2023) - [i32]Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu:
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. CoRR abs/2304.11300 (2023) - [i31]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. CoRR abs/2305.07067 (2023) - [i30]Huanyao Rong, Wei You, XiaoFeng Wang, Tianhao Mao:
Toward Unbiased Multiple-Target Fuzzing with Path Diversity. CoRR abs/2310.12419 (2023) - [i29]Xiaoyi Chen, Siyuan Tang, Rui Zhu, Shijun Yan, Lei Jin, Zihao Wang, Liya Su, XiaoFeng Wang, Haixu Tang:
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks. CoRR abs/2310.15469 (2023) - [i28]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IACR Cryptol. ePrint Arch. 2023: 672 (2023) - 2022
- [j26]Tsung-Ting Kuo
, Xiaoqian Jiang
, Haixu Tang
, XiaoFeng Wang
, Arif Ozgun Harmanci, Miran Kim
, Kai W. Post
, Diyue Bu, Tyler Bath
, Jihoon Kim
, Weijie Liu, Hongbo Chen
, Lucila Ohno-Machado
:
The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition. J. Am. Medical Informatics Assoc. 29(12): 2182-2190 (2022) - [j25]Yuxuan Chen
, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. ACM Trans. Priv. Secur. 25(3): 17:1-17:31 (2022) - [j24]Ting Chen
, Zihao Li
, Xiapu Luo
, Xiaofeng Wang, Ting Wang
, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li
, Yan Cheng, Xiaosong Zhang
:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IEEE Trans. Software Eng. 48(8): 3066-3086 (2022) - [c135]Han Liu
, Zhiyuan Yu
, Mingming Zha, XiaoFeng Wang, William Yeoh
, Yevgeniy Vorobeychik, Ning Zhang:
When Evil Calls: Targeted Adversarial Voice over IP Network. CCS 2022: 2009-2023 - [c134]Jiawei Liu
, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu:
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. CCS 2022: 2025-2039 - [c133]Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen:
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. CCS 2022: 2751-2764 - [c132]Peng Wang, Zilong Lin, Xiaojing Liao, XiaoFeng Wang:
Demystifying Local Business Search Poisoning for Illicit Drug Promotion. NDSS 2022 - [c131]Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, Zelin Yang:
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems. NDSS 2022 - [c130]Zhi Li
, Weijie Liu
, Hongbo Chen
, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou:
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms. SP 2022: 2397-2412 - [c129]Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao:
Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests. USENIX Security Symposium 2022: 17-34 - [i27]Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen:
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. CoRR abs/2204.01233 (2022) - [i26]Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu:
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. CoRR abs/2209.06506 (2022) - [i25]Di Tang, Rui Zhu, XiaoFeng Wang, Haixu Tang, Yi Chen:
Understanding Impacts of Task Similarity on Backdoor Attack and Detection. CoRR abs/2210.06509 (2022) - [i24]Siyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, XiaoFeng Wang, Yanzhi Dou:
Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming. CoRR abs/2212.02740 (2022) - [i23]Rui Zhu, Di Tang, Siyuan Tang, XiaoFeng Wang, Haixu Tang:
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models. CoRR abs/2212.04687 (2022) - 2021
- [j23]Diyue Bu, XiaoFeng Wang, Haixu Tang:
Haplotype-based membership inference from summary genomic data. Bioinform. 37(Supplement): 161-168 (2021) - [j22]Bin Liang
, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi
, Xiaofeng Wang:
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction. IEEE Trans. Dependable Secur. Comput. 18(1): 72-85 (2021) - [j21]Yeonjoon Lee
, Xueqiang Wang
, Xiaojing Liao, XiaoFeng Wang:
Understanding Illicit UI in iOS Apps Through Hidden UI Analysis. IEEE Trans. Dependable Secur. Comput. 18(5): 2390-2402 (2021) - [c128]Chathura Widanage, Weijie Liu, Jiayu Li, Hongbo Chen
, XiaoFeng Wang, Haixu Tang, Judy Fox
:
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework. CLOUD 2021: 733-743 - [c127]Yan Jia, Bin Yuan, Luyi Xing, Dongfang Zhao, Yifan Zhang, XiaoFeng Wang, Yijing Liu, Kaimin Zheng, Peyton Crnjak, Yuqing Zhang, Deqing Zou, Hai Jin:
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels. CCS 2021: 1289-1305 - [c126]Weijie Liu
, Wenhao Wang, Hongbo Chen
, Xiaofeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang:
Practical and Efficient in-Enclave Verification of Privacy Compliance. DSN 2021: 413-425 - [c125]Dominic Seyler, Wei Liu, XiaoFeng Wang, ChengXiang Zhai:
Towards Dark Jargon Interpretation in Underground Forums. ECIR (2) 2021: 393-400 - [c124]Kai Li
, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, XiaoFeng Wang, Xiapu Luo:
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. NDSS 2021 - [c123]Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, XiaoFeng Wang:
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks. NDSS 2021 - [c122]Dominic Seyler, Wei Liu, Yunan Zhang, XiaoFeng Wang, ChengXiang Zhai:
DarkJargon.net: A Platform for Understanding Underground Conversation with Latent Meaning. SIGIR 2021: 2526-2530 - [c121]Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu:
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. SP 2021: 1197-1214 - [c120]Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu:
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. USENIX Security Symposium 2021: 1307-1324 - [c119]Di Tang, XiaoFeng Wang, Haixu Tang, Kehuan Zhang:
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. USENIX Security Symposium 2021: 1541-1558 - [c118]Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:
Understanding Malicious Cross-library Data Harvesting on Android. USENIX Security Symposium 2021: 4133-4150 - [i22]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. CoRR abs/2103.10651 (2021) - [i21]Chathura Widanage, Weijie Liu, Jiayu Li, Hongbo Chen, XiaoFeng Wang, Haixu Tang, Judy Fox:
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework. CoRR abs/2107.12423 (2021) - [i20]Weijie Liu, Hongbo Chen, XiaoFeng Wang, Zhi Li, Danfeng Zhang, Wenhao Wang, Haixu Tang:
Understanding TEE Containers, Easy to Use? Hard to Trust. CoRR abs/2109.01923 (2021) - 2020
- [j20]Rui Zhu, Chao Jiang
, Xiaofeng Wang, Shuang Wang, Hao Zheng, Haixu Tang:
Privacy-preserving construction of generalized linear mixed model for biomedical computation. Bioinform. 36(Supplement-1): i128-i135 (2020) - [j19]Yeonjoon Lee
, Yue Zhao, Jiutian Zeng, Kwangwuk Lee, Nan Zhang, Faysal Hossain Shezan, Yuan Tian, Kai Chen, XiaoFeng Wang:
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(1): 16:1-16:28 (2020) - [j18]Zeyu Mi
, Haibo Chen
, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter
:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Trans. Dependable Secur. Comput. 17(5): 1094-1108 (2020) - [c117]Haoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, XiaoFeng Wang, Xueqiang Wang
:
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems. CCS 2020: 569-585 - [c116]Eihal Alowaisheq, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, XiaoFeng Wang:
Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral. CCS 2020: 1307-1322 - [c115]Tao Lv, Ruishi Li
, Yi Yang, Kai Chen, Xiaojing Liao, XiaoFeng Wang, Peiwei Hu, Luyi Xing:
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection. CCS 2020: 1837-1852 - [c114]Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler
, XiaoFeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
A Pragmatic Approach to Membership Inferences on Machine Learning Models. EuroS&P 2020: 521-534 - [c113]Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang:
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals. NDSS 2020 - [c112]Yan Jia
, Luyi Xing, Yuhang Mao, Dongfang Zhao, XiaoFeng Wang, Shangru Zhao, Yuqing Zhang:
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds. SP 2020: 465-481 - [c111]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. SP 2020: 1450-1465 - [c110]Bin Yuan, Yan Jia, Luyi Xing, Dongfang Zhao, XiaoFeng Wang, Deqing Zou, Hai Jin, Yuqing Zhang:
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation. USENIX Security Symposium 2020: 1183-1200 - [c109]Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang:
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. USENIX Security Symposium 2020: 2667-2684 - [i19]Weijie Liu, Wenhao Wang, XiaoFeng Wang, Xiaozhu Meng, Yaosong Lu, Hongbo Chen, Xinyu Wang, Qingtao Shen, Kai Chen, Haixu Tang, Yi Chen, Luyi Xing:
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance. CoRR abs/2007.10513 (2020) - [i18]Dominic Seyler, Wei Liu, XiaoFeng Wang, ChengXiang Zhai:
Towards Dark Jargon Interpretation in Underground Forums. CoRR abs/2011.03011 (2020)
2010 – 2019
- 2019
- [c108]Baojun Liu, Zhou Li
, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang:
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. EuroS&P 2019: 560-575 - [c107]Hao Wu, Jinghao Feng, Xuejin Tian, Fengyuan Xu, Yunxin Liu, XiaoFeng Wang, Sheng Zhong:
secGAN: A Cycle-Consistent GAN for Securely-Recoverable Video Transformation. HotEdgeVideo@MobiCom 2019: 33-38 - [c106]Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, XiaoFeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu:
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs. NDSS 2019 - [c105]Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang, Michael Backes:
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. NDSS 2019 - [c104]Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li
, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang:
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. RAID 2019: 261-275 - [c103]Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya
, Yuan Tian, Kai Chen, XiaoFeng Wang, Wei Zou:
Demystifying Hidden Privacy Settings in Mobile Apps. IEEE Symposium on Security and Privacy 2019: 570-586 - [c102]Wei You, Xueqiang Wang
, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang:
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. IEEE Symposium on Security and Privacy 2019: 769-786 - [c101]Kan Yuan, Di Tang, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang:
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion. IEEE Symposium on Security and Privacy 2019: 952-966 - [c100]Xianghang Mi
, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang, Feng Qian, Zhou Li
, Sumayah A. Alrwais, Limin Sun, Ying Liu:
Resident Evil: Understanding Residential IP Proxy as a Dark Service. IEEE Symposium on Security and Privacy 2019: 1185-1201 - [c99]Nan Zhang, Xianghang Mi
, Xuan Feng, XiaoFeng Wang, Yuan Tian, Feng Qian:
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. IEEE Symposium on Security and Privacy 2019: 1381-1396 - [c98]Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou:
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. USENIX Security Symposium 2019: 747-764 - [c97]Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi:
Understanding iOS-based Crowdturfing Through Hidden UI Analysis. USENIX Security Symposium 2019: 765-781 - [c96]