Pulei Xiong

Orcid: 0000-0002-3460-6946

According to our database1, Pulei Xiong authored at least 25 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Better entity matching with transformers through ensembles.
Knowl. Based Syst., 2024

CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus.
Internet Things, 2024

Out-of-Distribution Aware Classification for Tabular Data.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Security issues in Internet of Vehicles (IoV): A comprehensive survey.
Internet Things, July, 2023

Internet of Things (IoT) security dataset evolution: Challenges and future directions.
Internet Things, July, 2023

IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.
Peer Peer Netw. Appl., May, 2023

Achieve Edge-Based Privacy-Preserving Dynamic Aggregation Query in Smart Transportation Systems.
Proceedings of the IEEE Global Communications Conference, 2023

ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Towards a robust and trustworthy machine learning system development: An engineering perspective.
J. Inf. Secur. Appl., 2022

EVRQ: Achieving Efficient and Verifiable Range Query over Encrypted Traffic Data.
Proceedings of the IEEE International Conference on Communications, 2022

Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2022

Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

2021
Towards a Robust and Trustworthy Machine Learning System Development.
CoRR, 2021

Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Privacy-Preserving Fog-Based Multi-Location Task Allocation in Mobile Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2021

A feature exploration approach for IoT attack type classification.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Verification Based Scheme to Restrict IoT Attacks.
Proceedings of the BDCAT '21: 2021 IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies, Leicester, United Kingdom, December 6, 2021

2011
A Systematic Approach to Web Application Penetration Testing Using TTCN-3.
Proceedings of the E-Technologies: Transformation in a Connected World, 2011

2010
A model-driven penetration test framework for Web applications.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
Model-Based Penetration Test Framework for Web Applications Using TTCN-3.
Proceedings of the E-Technologies: Innovation in an Open World, 2009

2008
Framework testing of web applications using TTCN-3.
Int. J. Softw. Tools Technol. Transf., 2008

2004
Life-Cycle E-commerce Testing with OO-TTCN-3.
Proceedings of the Applying Formal Methods: Testing, Performance and M/ECommerce, 2004


  Loading...