Shengjie Xu

Orcid: 0000-0003-1784-1386

According to our database1, Shengjie Xu authored at least 61 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
HTCSigNet: A Hybrid Transformer and Convolution Signature Network for offline signature verification.
Pattern Recognit., 2025

2024
A Survey of Hardware Improvements to Secure Program Execution.
ACM Comput. Surv., December, 2024

Quantitative Pixel-Level Segmentation and 3D Reconstruction of Concealed Cracks in Asphalt Pavements.
IEEE Trans. Intell. Transp. Syst., November, 2024

Real-Time Detection of Voids in Asphalt Pavement Based on Swin-Transformer-Improved YOLOv5.
IEEE Trans. Intell. Transp. Syst., March, 2024

Statistical verification of autonomous system controllers under timing uncertainties.
Real Time Syst., March, 2024

Dumpling GNN: Hybrid GNN Enables Better ADC Payload Activity Prediction Based on Chemical Structure.
CoRR, 2024

Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code.
CoRR, 2024

Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code.
CoRR, 2024

Certifiable and Efficient Autonomous Cyber-Physical Systems Design.
Proceedings of the 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, 2024

Learning-Enabled CPS for Edge-Cloud Computing.
Proceedings of the 14th IEEE International Symposium on Industrial Embedded Systems, 2024

Poster Abstract: Neural Architecture Sizing for Autonomous Systems.
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024

Quantitative Safety-Driven Co-Synthesis of Cyber-Physical System Implementations.
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024

GPU Partitioning & Neural Architecture Sizing for Safety-Driven Sensing in Autonomous Systems.
Proceedings of the International Conference on Assured Autonomy, 2024

PrepPipe: Prototyping Compiler for Attainable Visual Novel Development.
Proceedings of the IEEE Conference on Games, 2024

Real-Time Fake News Detection on the X (Twitter): An Online Machine Learning Approach.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Application of Reservoir Computing Based on a 2D Hyperchaotic Discrete Memristive Map in Efficient Temporal Signal Processing.
Int. J. Bifurc. Chaos, May, 2023

A rank-two relaxed parallel splitting version of the augmented Lagrangian method with step size in (0,2) for separable convex programming.
Math. Comput., February, 2023

A dual-primal balanced augmented Lagrangian method for linearly constrained convex programming.
J. Appl. Math. Comput., February, 2023

Safety-Aware Implementation of Control Tasks via Scheduling with Period Boosting and Compressing.
Proceedings of the 29th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2023

MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Global dissipativity for stochastic quaternion-valued neural networks with proportional delay.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

Timing Predictability for SOME/IP-based Service-Oriented Automotive In-Vehicle Networks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Towards Adaptive Zero Trust Model for Secure AI.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Statistical Approach to Efficient and Deterministic Schedule Synthesis for Cyber-Physical Systems.
Proceedings of the Automated Technology for Verification and Analysis, 2023

Safety-Aware Flexible Schedule Synthesis for Cyber-Physical Systems Using Weakly-Hard Constraints.
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023

2022
A Generalized Primal-Dual Algorithm with Improved Convergence Condition for Saddle Point Problems.
SIAM J. Imaging Sci., September, 2022

Safety-Guaranteed and Development Cost- Minimized Scheduling of DAG Functionality in an Automotive System.
IEEE Trans. Intell. Transp. Syst., 2022

Safety Analysis of Embedded Controllers Under Implementation Platform Timing Uncertainties.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Inexact rational Krylov subspace method for eigenvalue problems.
Numer. Linear Algebra Appl., 2022

On Convergence of the Arrow-Hurwicz Method for Saddle Point Problems.
J. Math. Imaging Vis., 2022

Counteracting a Saturation Attack in Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Filter Embedded in Homodyne Detector.
Entropy, 2022

The Study of Complex Human Locomotion Behaviors: From Crawling to Walking.
CoRR, 2022

Statistical Hypothesis Testing of Controller Implementations Under Timing Uncertainties.
Proceedings of the 28th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2022

Shellcoding: Hunting for Kernel32 Base Address.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect.
Entropy, 2021

Challenges and Solutions for Cellular Based V2X Communications.
IEEE Commun. Surv. Tutorials, 2021

A parallel splitting ALM-based algorithm for separable convex programming.
Comput. Optim. Appl., 2021

Research on Navigation Attitude of Air Cushion Vehicle Based on BP Neural Network.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

Improving Adversarial Attacks Against Executable Raw Byte Classifiers.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A Metric for Machine Learning Vulnerability to Adversarial Examples.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Aion Attacks: Manipulating Software Timers in Trusted Execution Environment.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
Data-Driven Edge Intelligence for Robust Network Anomaly Detection.
IEEE Trans. Netw. Sci. Eng., 2020

Edge Intelligence Assisted Gateway Defense in Cyber Security.
IEEE Netw., 2020

Automated Post-Breach Penetration Testing through Reinforcement Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Data-Driven Network Intelligence for Anomaly Detection.
IEEE Netw., 2019

SoK: Hardware Security Support for Trustworthy Execution.
CoRR, 2019

Modified Quasi-Newton Optimization Algorithm-Based Iterative Learning Control for Multi-Axial Road Durability Test Rig.
IEEE Access, 2019

A Semi-Supervised Learning Approach for Network Anomaly Detection in Fog Computing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient Network Anomaly Detection for Edge Gateway Defense in 5G.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Security Analysis of Wireless Train Control Systems.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
A D2D Based Clustering Scheme for Public Safety Communications.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

A Predicate Encryption Based Anomaly Detection Scheme for E-Health Communications Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Privacy-Preserving Data Preprocessing for Fog Computing in 5G Network Security.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A data-driven preprocessing scheme on anomaly detection in big data applications.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

A Study on Communication Network Reliability for Advanced Metering Infrastructure in Smart Grid.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
A Secure Data Learning Scheme in Big Data Applications.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
On Reliability of Smart Grid Neighborhood Area Networks.
IEEE Access, 2015

Quantitative study of reliable communication infrastructure in smart grid NAN.
Proceedings of the 11th International Conference on the Design of Reliable Communication Networks, 2015

2010
SafeVanish: An Improved Data Self-Destruction for Protecting Data Privacy.
Proceedings of the Cloud Computing, Second International Conference, 2010


  Loading...