xinyu xing
xinyu xing
Verified email at ist.psu.edu - Homepage
Title
Cited by
Cited by
Year
Enhancing group recommendation by incorporating social relationship interactions
M Gartrell, X Xing, Q Lv, A Beach, R Han, S Mishra, K Seada
Proceedings of the 16th ACM international conference on Supporting group …, 2010
2292010
Fusing mobile, sensor, and social data to fully enable context-aware computing
A Beach, M Gartrell, X Xing, R Han, Q Lv, S Mishra, K Seada
Proceedings of the eleventh workshop on mobile computing systems …, 2010
1882010
Adversary Resistant Deep Neural Networks with an Application to Malware Detection
Q Wang, W Guo, K Zhang, AG Ororbia II, X Xing, CL Giles, X Liu
arXiv preprint arXiv:1610.01239, 2016
1272016
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1172018
Understanding malvertising through ad-injecting browser extensions
X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee
Proceedings of the 24th international conference on world wide web, 1286-1295, 2015
842015
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
812017
Tabor: A highly accurate approach to inspecting and restoring trojan backdoors in ai systems
W Guo, L Wang, X Xing, M Du, D Song
arXiv preprint arXiv:1908.01763, 2019
582019
Exposing inconsistent web search results with bobble
X Xing, W Meng, D Doozan, N Feamster, W Lee, AC Snoeren
International Conference on Passive and Active Network Measurement, 131-140, 2014
532014
An empirical evaluation of rule extraction from recurrent neural networks
Q Wang, K Zhang, AG Ororbia II, X Xing, X Liu, CL Giles
Neural computation 30 (9), 2568-2591, 2018
44*2018
FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware
J Huang, J Xu, X Xing, P Liu, MK Qureshi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
432017
Security analysis and authentication improvement for ieee 802.11 i specification
X Xing, E Shakshuki, D Benoit, T Sheltami
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008
412008
Defending Against Adversarial Samples Without Security through Obscurity
W Guo, Q Wang, K Zhang, AG Ororbia, S Huang, X Liu, CL Giles, L Lin, ...
2018 IEEE International Conference on Data Mining (ICDM), 137-146, 2018
37*2018
Credal: Towards locating a memory corruption vulnerability with your core dump
J Xu, D Mu, P Chen, X Xing, P Wang, P Liu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
372016
{FUZE}: Towards facilitating exploit generation for kernel use-after-free vulnerabilities
W Wu, Y Chen, J Xu, X Xing, X Gong, W Zou
27th {USENIX} Security Symposium ({USENIX} Security 18), 781-797, 2018
352018
Take this personally: Pollution attacks on personalized services
X Xing, W Meng, D Doozan, AC Snoeren, N Feamster, W Lee
22nd {USENIX} Security Symposium ({USENIX} Security 13), 671-686, 2013
342013
Log2vec: a heterogeneous graph embedding based approach for detecting cyber threats within enterprise
F Liu, Y Wen, D Zhang, X Jiang, X Xing, D Meng
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
332019
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th {USENIX} Security Symposium ({USENIX} Security 18), 919-936, 2018
332018
Safevchat: Detecting obscene content and misbehaving users in online video chat services
X Xing, YL Liang, H Cheng, J Dang, S Huang, R Han, X Liu, Q Lv, ...
Proceedings of the 20th international conference on World wide web, 685-694, 2011
322011
Explaining deep learning models-a bayesian non-parametric approach
W Guo, S Huang, Y Tao, X Xing, L Lin
arXiv preprint arXiv:1811.03422, 2018
29*2018
Postmortem program analysis with hardware-enhanced post-crash artifacts
J Xu, D Mu, X Xing, P Liu, P Chen, B Mao
26th {USENIX} Security Symposium ({USENIX} Security 17), 17-32, 2017
24*2017
The system can't perform the operation now. Try again later.
Articles 1–20