Guoxing Chen

Orcid: 0000-0001-8107-5909

According to our database1, Guoxing Chen authored at least 40 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CFD investigation on a novel pen partition-attached jet air supply for mitigating heat stress among lactating sows.
Comput. Electron. Agric., 2024

DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

SoK: Opportunities for Accelerating Multi - Party Computation via Trusted Hardware.
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024

Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

VPVet: Vetting Privacy Policies of Virtual Reality Apps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Securing TEEs With Verifiable Execution Contracts.
IEEE Trans. Dependable Secur. Comput., 2023

Unleashing Cheapfakes through Trojan Plugins of Large Language Models.
CoRR, 2023

POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices.
Proceedings of the 32nd USENIX Security Symposium, 2023

Reusable Enclaves for Confidential Serverless Computing.
Proceedings of the 32nd USENIX Security Symposium, 2023

RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging.
Proceedings of the IEEE INFOCOM 2023, 2023

Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps.
Proceedings of the IEEE Global Communications Conference, 2023

Privacy Computing with Right to Be Forgotten in Trusted Execution Environment.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Green Landscape Design Based on Niche Genetic Algorithm for E-Business Solutions.
Int. J. e Collab., 2022

Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
IACR Cryptol. ePrint Arch., 2022

MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties.
Proceedings of the 31st USENIX Security Symposium, 2022

Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Short-term precipitation prediction using deep learning.
CoRR, 2021

Towards Formal Verification of State Continuity for Enclave Programs.
Proceedings of the 30th USENIX Security Symposium, 2021

Specularizer : Detecting Speculative Execution Attacks via Performance Tracing.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

2020
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution.
IEEE Secur. Priv., 2020

Generative adversarial network-based semi-supervised learning for real-time risk warning of process industries.
Expert Syst. Appl., 2020

2019
Least-squares based rectangular-grid cross and rhombus stencils for acoustic wave propagation and reverse time migration.
J. Comput. Phys., 2019

Defeating Speculative-Execution Attacks on SGX with HyperRace.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

OPERA: Open Remote Attestation for Intel's Secure Enclaves.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution.
CoRR, 2018

Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Differentially Private Access Patterns for Searchable Symmetric Encryption.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Flash-Loc: Flashing mobile phones for accurate indoor localization.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Mobile Data Collection Frameworks: A Survey.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

Accurate Inference of Rice Biomass Based on Support Vector Machine.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
High-Throughput Estimation of Yield for Individual Rice Plant Using Multi-angle RGB Imaging.
Proceedings of the Computer and Computing Technologies in Agriculture VIII, 2014

2012
On Degrees of Freedom of Cognitive Networks with User Cooperation.
IEEE Wirel. Commun. Lett., 2012

2006
RMD: a rice mutant database for functional analysis of the rice genome.
Nucleic Acids Res., 2006


  Loading...