Renjie Xie

Orcid: 0009-0004-1742-4122

According to our database1, Renjie Xie authored at least 33 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Learning Power Allocation and Channel Estimation for Superimposed Pilot-Assisted Multiuser MIMO.
IEEE Wirel. Commun. Lett., November, 2024

Deep CSI Compression for Dual-Polarized Massive MIMO Channels With Disentangled Representation Learning.
IEEE Trans. Commun., September, 2024

Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side.
IEEE Trans. Inf. Forensics Secur., 2024

${\sf VeriDIP}$VeriDIP: Verifying Ownership of Deep Neural Networks Through Privacy Leakage Fingerprints.
IEEE Trans. Dependable Secur. Comput., 2024

On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective.
CoRR, 2024

Research on Dangerous Flight Weather Prediction based on Machine Learning.
CoRR, 2024

From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

LoRDMA: A New Low-Rate DoS Attack in RDMA Networks.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Self-Information Domain-Based Neural CSI Compression With Feature Coupling.
IEEE Trans. Veh. Technol., October, 2023

Disentangled Representation Learning for RF Fingerprint Extraction Under Unknown Channel Statistics.
IEEE Trans. Commun., July, 2023

VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints.
CoRR, 2023

Understanding and Improving Deep Graph Neural Networks: A Probabilistic Graphical Model Perspective.
CoRR, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Unsupervised Stock Clustering Based on Adversarial Learning and Its Application in Quantitative Investment.
Proceedings of the 14th International Conference on E-business, Management and Economics, 2023

RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features.
Proceedings of the IEEE International Conference on Communications, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Deep CSI Compression for Massive MIMO: A Self-Information Model-Driven Neural Network.
IEEE Trans. Wirel. Commun., 2022

Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw., 2022

2021
Modeling Submarket Effect for Real Estate Hedonic Valuation: A Probabilistic Approach.
IEEE Trans. Knowl. Data Eng., 2021

A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

On Breaking Deep Generative Model-based Defenses and Beyond.
Proceedings of the 37th International Conference on Machine Learning, 2020

2019
Deep Secure Quantization: On secure biometric hashing against similarity-based attacks.
Signal Process., 2019

Unsupervised Classification of Street Architectures Based on InfoGAN.
CoRR, 2019

A Deep, Information-theoretic Framework for Robust Biometric Recognition.
CoRR, 2019

The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Proceedings of the 28th USENIX Security Symposium, 2019

Adversarial Training for Video Disentangled Representation.
Proceedings of the MultiMedia Modeling - 25th International Conference, 2019

SoftGuard: Defend Against the Low-Rate TCP Attack in SDN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2017
Hardware design methodology using lightweight dataflow and its integration with low power techniques.
J. Syst. Archit., 2017

2016
Resource-constrained implementation and optimization of a deep neural network for vehicle classification.
Proceedings of the 24th European Signal Processing Conference, 2016

Low power design methodology for signal processing systems using lightweight dataflow techniques.
Proceedings of the 2016 Conference on Design and Architectures for Signal and Image Processing (DASIP), 2016


  Loading...