Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
20072022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2007

    Agent based approach towards energy aware routing in wireless sensor networks

    Malik, H., Shakshuki, E. & Xing, X., 2007, 2007 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2007. p. 2149-2154 6 p. 4414095. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Agent-based fault detection mechanism in wireless sensor networks

    Shakshuki, E., Xing, X. & Zhang, H., 2007, Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2007. Institute of Electrical and Electronics Engineers Inc., p. 31-34 4 p. 4407253. (Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Agent-based routing for wireless sensor network

    Shakshuki, E., Malik, H. & Xing, X., 2007, Advanced Intelligent Computing Theories and Applications: With Aspects of Theoretical and Methodological Issues - Third International Conference on Intelligent Computing, ICIC 2007, Proceedings. Springer Verlag, p. 68-79 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4681 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Mobile agent for efficient routing among source nodes in wireless sensor networks

    Shakshuki, E., Xing, X. & Malik, H., 2007, 3rd International Conference on Autonomic and Autonomous Systems, ICAS 2007. 4437916. (3rd International Conference on Autonomic and Autonomous Systems, ICAS'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • 2008

    A fault inference mechanism in sensor networks using Markov Chain

    Shakshuki, E. & Xinyu, X., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications, AINA 2008. p. 628-635 8 p. 4482765. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Security analysis and authentication improvement for IEEE 802.11i specification

    Xing, X., Shakshuki, E., Benoit, D. & Sheltami, T., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 1887-1891 5 p. 4698140. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • 2009

    An intelligent agent for fault reconnaissance in sensor networks

    Shakshuki, E. M., Xing, X. & Sheltami, T. R., 2009, iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services. p. 139-146 8 p. (iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Tracking anonymous sinks in wireless sensor networks

    Shakshuki, E. M., Sheltami, T. R., Kang, N. & Xing, X., 2009, Proceedings - 2009 International Conference on Advanced Information Networking and Applications, AINA 2009. p. 510-516 7 p. 5076241. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Where is the tight link in a home wireless broadband environment?

    Xing, X. & Mishra, S., 2009, 2009 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2009. p. 49-58 10 p. 5366789. (Proceedings - IEEE Computer Society's Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, MASCOTS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 2010

    ARBOR: Hang together rather than hang separately in 802.11 WiFi networks

    Xing, X., Mishra, S. & Liu, X., 2010, 2010 Proceedings IEEE INFOCOM. 5461908. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Enhancing group recommendation by incorporating social relationship interactions

    Gartrell, M., Xing, X., Lv, Q., Beach, A., Han, R., Mishra, S. & Seada, K., 2010, Proceedings of the 16th ACM International Conference on Supporting Group Work, GROUP'10. p. 97-106 10 p. (Proceedings of the 16th ACM International Conference on Supporting Group Work, GROUP'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    158 Scopus citations
  • Fusing mobile, sensor, and social data to fully enable context-aware computing

    Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S. & Seada, K., 2010, HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications. p. 60-65 6 p. (HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    99 Scopus citations
  • 2011

    A highly scalable bandwidth estimation of commercial hotspot access points

    Xing, X., Dang, J., Mishra, S. & Liu, X., 2011, 2011 Proceedings IEEE INFOCOM. p. 1143-1151 9 p. 5934891. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • SafeVchat: Detecting obscene content and misbehaving users in online video chat services

    Xing, X., Liang, Y. L., Cheng, H., Dang, J., Huang, S., Han, R., Liu, X., Lv, Q. & Mishra, S., 2011, Proceedings of the 20th International Conference on World Wide Web, WWW 2011. Association for Computing Machinery, p. 685-694 10 p. (Proceedings of the 20th International Conference on World Wide Web, WWW 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2012

    Efficient misbehaving user detection in online video chat services

    Cheng, H., Liang, Y. L., Xing, X., Liu, X., Han, R., Lv, Q. & Mishra, S., 2012, WSDM 2012 - Proceedings of the 5th ACM International Conference on Web Search and Data Mining. p. 23-32 10 p. (WSDM 2012 - Proceedings of the 5th ACM International Conference on Web Search and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Scalable misbehavior detection in online video chat services

    Xing, X., Liang, Y. L., Huang, S., Cheng, H., Han, R., Lv, Q., Liu, X., Mishra, S. & Zhu, Y., 2012, KDD'12 - 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. p. 552-560 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 2013

    Take this personally: Pollution attacks on personalized services

    Xing, X., Meng, W., Doozan, D., Snoeren, A. C., Feamster, N. & Lee, W., 2013, Proceedings of the 22nd USENIX Security Symposium. USENIX Association, p. 671-686 16 p. (Proceedings of the 22nd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • 2014

    Exposing inconsistent web search results with bobble

    Xing, X., Meng, W., Doozan, D., Feamster, N., Lee, W. & Snoeren, A. C., 2014, Passive and Active Measurement - 15th International Conference, PAM 2014, Proceedings. Springer Verlag, p. 131-140 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8362 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Your online interests-Pwned! A pollution attack against targeted advertising

    Meng, W., Xing, X., Sheth, A., Weinsberg, U. & Lee, W., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 129-140 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • 2015

    UCognito: Private browsing without tears

    Xu, M., Jang, Y., Xing, X., Kim, T. & Lee, W., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 438-449 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Understanding malvertising through ad-injecting browser extensions

    Xing, X., Meng, W., Lee, B., Weinsberg, U., Sheth, A., Perdisci, R. & Lee, W., May 18 2015, WWW 2015 - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 1286-1295 10 p. (WWW 2015 - Proceedings of the 24th International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • 2016

    CREDAL: Towards locating a memory corruption vulnerability with your core dump

    Xu, J., Mu, D., Chen, P., Xing, X., Wang, P. & Liu, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 529-540 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • From physical to cyber: Escalating protection for personalized auto insurance

    Guan, L., Xu, J., Wang, S., Xing, X., Lin, L., Huang, H., Liu, P. & Lee, W., Nov 14 2016, Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016. Association for Computing Machinery, Inc, p. 42-55 14 p. (Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • Trackmeornot: Enabling flexible control on web tracking

    Meng, W., Lee, B., Xing, X. & Lee, W., 2016, 25th International World Wide Web Conference, WWW 2016. International World Wide Web Conferences Steering Committee, p. 99-109 11 p. (25th International World Wide Web Conference, WWW 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • WebRanz: Web page randomization for better advertisement delivery and web-bot prevention

    Wang, W., Zheng, Y., Xing, X., Kwon, Y., Zhang, X. & Eugster, P., Nov 1 2016, FSE 2016 - Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. Su, Z., Zimmermann, T. & Cleland-Huang, J. (eds.). Association for Computing Machinery, p. 205-216 12 p. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering; vol. 13-18-November-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    9 Scopus citations
  • 2017

    Adversary resistant deep neural networks with an application to malware detection

    Wang, Q., Guo, W., Zhang, K., Ororbia, A. G., Xing, X., Liu, X. & Giles, C. L., Aug 13 2017, KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1145-1153 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. Part F129685).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    96 Scopus citations
  • FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware

    Huang, J., Xu, J., Xing, X., Liu, P. & Qureshi, M. K., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2231-2244 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Scopus citations
  • PoMP: Postmortem program analysis with hardware-enhanced post-crash artifacts

    Xu, J., Mu, D., Xing, X., Liu, P., Chen, P. & Mao, B., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 17-32 16 p. (Proceedings of the 26th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Supporting transparent snapshot for bare-metal malware analysis on mobile devices

    Guan, L., Jia, S., Chen, B., Zhang, F., Luo, B., Lin, J., Liu, P., Xing, X. & Xia, L., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 339-349 11 p. (ACM International Conference Proceeding Series; vol. Part F132521).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • System service call-oriented symbolic execution of Android Framework with applications to vulnerability discovery and exploit generation

    Luo, L., Zeng, Q., Cao, C., Chen, K., Liu, J., Liu, L., Gao, N., Yang, M., Xing, X. & Liu, P., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 225-238 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    15 Scopus citations
  • TrustShadow: Secure execution of unmodified applications with ARM TrustZone

    Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 488-501 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    63 Scopus citations
  • What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon

    Chen, P., Xu, J., Hu, Z., Xing, X., Zhu, M., Mao, B. & Liu, P., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 451-462 12 p. 8023144. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2018

    Defending Against Adversarial Samples Without Security through Obscurity

    Guo, W., Wang, Q., Zhang, K., Ororbia, A. G., Huang, S., Liu, X., Giles, C. L., Lin, L. & Xing, X., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 137-146 10 p. 8594838. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • FUZE: Towards facilitating exploit generation for kernel use-after-free vulnerabilities

    Wu, W., Chen, Y., Xu, J., Xing, X., Gong, X. & Zou, W., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 781-797 17 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • Lemna: Explaining deep learning based security applications

    Guo, W., Mu, D., Xu, J., Su, P., Wang, G. & Xing, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-379 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    115 Scopus citations
  • Understanding the reproducibility of crowd-reported security vulnerabilities

    Mu, D., Cuevas, A., Yang, L., Hu, H., Xing, X., Mao, B. & Wang, G., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 919-936 18 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    46 Scopus citations
  • 2019

    All your clicks belong to me: Investigating click interception on the web

    Zhang, M., Meng, W., Lee, S., Lee, B. & Xing, X., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 941-957 17 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Automated finite state machine extraction

    Chen, Y., Song, L., Xing, X., Xu, F. & Wu, W., Nov 15 2019, FEAST 2019 - Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation. Association for Computing Machinery, p. 9-15 7 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • DeepVSA: Facilitating value-set analysis with deep learning for postmortem program analysis

    Guo, W., Mu, D., Xing, X., Du, M. & Song, D., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1787-1804 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems

    Alrizah, M., Xing, X. & Zhu, S., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 230-244 15 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    9 Scopus citations
  • Kepler: Facilitating control-flow hijacking primitive evaluation for linux kernel vulnerabilities

    Wu, W., Chen, Y., Xing, X. & Zou, W., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1187-1204 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise

    Liu, F., Jiang, X., Wen, Y., Xing, X., Zhang, D. & Meng, D., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1777-1794 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    64 Scopus citations
  • PTrix: Efficient hardware-assisted fuzzing for COTS binary

    Chen, Y., Mu, D., Xu, J., Sun, Z., Shen, W., Xing, X., Lu, L. & Mao, B., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 633-645 13 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    19 Scopus citations
  • RENN: Efficient reverse execution with neural-network-assisted alias analysis

    Mu, D., Guo, W., Cuevas, A., Chen, Y., Gai, J., Xing, X., Mao, B. & Song, C., Nov 2019, Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019. Institute of Electrical and Electronics Engineers Inc., p. 924-935 12 p. 8952186. (Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Slake: Facilitating slab manipulation for exploiting vulnerabilities in the linux kernel

    Chen, Y. & Xing, X., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1707-1722 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    13 Scopus citations
  • Towards the detection of inconsistencies in public security vulnerability reports

    Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y. & Wang, G., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 869-885 17 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Scopus citations
  • 2020

    A Systematic Study of Elastic Objects in Kernel Exploitation

    Chen, Y., Lin, Z. & Xing, X., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1165-1184 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • BScout: Direct whole patch presence test for Java executables

    Dai, J., Zhang, Y., Jiang, Z., Zhou, Y., Chen, J., Xing, X., Zhang, X., Tan, X., Yang, M. & Yang, Z., 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, p. 1147-1164 18 p. (Proceedings of the 29th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Hart: Hardware-assisted kernel module tracing on arm

    Du, Y., Ning, Z., Xu, J., Wang, Z., Lin, Y. H., Zhang, F., Xing, X. & Mao, B., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 316-337 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • PDiff: Semantic-based Patch Presence Testing for Downstream Kernels

    Jiang, Z., Zhang, Y., Xu, J., Wen, Q., Wang, Z., Zhang, X., Xing, X., Yang, M. & Yang, Z., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1149-1163 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations