Hongxin Hu
Orcid: 0000-0001-8710-247X
According to our database1,
Hongxin Hu
authored at least 188 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024
IEEE Trans. Neural Networks Learn. Syst., February, 2024
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches.
IEEE Trans. Inf. Forensics Secur., 2024
Penetralium: Privacy-preserving and memory-efficient neural network inference at the edge.
Future Gener. Comput. Syst., 2024
CoRR, 2024
Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities.
CoRR, 2024
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
CoRR, 2024
Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces.
Proceedings of the ACM on Web Conference 2024, 2024
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Understanding and Mitigating New Harms in Immersive and Embodied Virtual Spaces: A Speculative Dystopian Design Fiction Approach.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit.
Cyberpsychology Behav. Soc. Netw., July, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Internet Comput., 2023
xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the International Conference on Machine Learning and Applications, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023
2022
IEEE Trans. Cloud Comput., 2022
SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022
Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning.
IEEE/ACM Trans. Netw., 2021
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches.
IEEE/ACM Trans. Netw., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Secur. Priv., 2021
ACM Comput. Surv., 2021
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
HierTopo: Towards High-Performance and Efficient Topology Optimization for Dynamic Networks.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
COVID-HateBERT: a Pre-trained Language Model for COVID-19 related Hate Speech Detection.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Switches are Scanners Too!: A Fast and Scalable In-Network Scanner with Programmable Switches.
Proceedings of the HotNets '21: The 20th ACM Workshop on Hot Topics in Networks, 2021
2020
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020
Proceedings of the 2020 ACM SIGCOMM 2020 Workshop on Secure Programmable Network Infrastructure, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Martini: Bridging the Gap between Network Measurement and Control Using Switching ASICs.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020
SmartChain: Enabling High-Performance Service Chain Partition between SmartNIC and CPU.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE J. Sel. Areas Commun., 2019
IEEE J. Sel. Areas Commun., 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the 27th ACM International Conference on Multimedia, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Proceedings of the SDN-NFV@CODASPY 2019, 2019
2018
IEEE J. Sel. Areas Commun., 2018
Vision-based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards.
CoRR, 2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018
2017
IEEE/ACM Trans. Netw., 2017
Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos.
Proc. ACM Hum. Comput. Interact., 2017
IEEE J. Sel. Areas Commun., 2017
Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention.
CoRR, 2017
CoRR, 2017
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Proceedings of the Symposium on SDN Research, 2017
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017
2016
IEEE Netw., 2016
TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
J. Comput. Secur., 2016
Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT).
Int. J. Distributed Sens. Networks, 2016
IEEE Secur. Priv., 2016
SLA-NFV: an SLA-aware High Performance Framework for Network Function Virtualization.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
HetSDN: Exploiting SDN for intelligent network usage in heterogeneous wireless networks.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016
Proceedings of the 2016 International Conference on Connected Vehicles and Expo, 2016
Proceedings of the 2016 International Conference on Computing, 2016
2015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
ACM Trans. Inf. Syst. Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
2014
J. Netw. Comput. Appl., 2014
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Open Networking Summit 2014 - Research Track, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
IEEE Trans. Serv. Comput., 2013
IEEE Trans. Knowl. Data Eng., 2013
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, 2013
2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
J. Syst. Softw., 2012
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL.
Inf. Softw. Technol., 2012
Int. J. Comput. Model. Algorithms Medicine, 2012
Int. J. Cooperative Inf. Syst., 2012
Efficient construction of provably secure steganography under ordinary covert channels.
Sci. China Inf. Sci., 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the ACM International Health Informatics Symposium, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
J. Comput. Sci. Technol., 2011
Comput. Secur., 2011
Proceedings of the 18th Working Conference on Reverse Engineering, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
IEEE Trans. Syst. Man Cybern. Part C, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Computer Security, 2010
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
2009
IEEE Trans. Syst. Man Cybern. Part C, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008
2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007