Tongxin Li
Orcid: 0000-0002-9806-8964
According to our database1,
Tongxin Li
authored at least 58 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Data-Driven Approach for Optimizing Early-Stage Electric Vehicle Charging Station Placement.
IEEE Trans. Ind. Informatics, October, 2024
IEA-DP: Information Entropy-driven Adaptive Differential Privacy Protection Scheme for social networks.
J. Supercomput., September, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
TENSILE: A Tensor Granularity Dynamic GPU Memory Scheduling Method Toward Multiple Dynamic Workloads System.
IEEE Trans. Knowl. Data Eng., August, 2023
J. Vis., August, 2023
CoRR, 2023
CoRR, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Beyond Black-Box Advice: Learning-Augmented Algorithms for MDPs with Q-Value Predictions.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Bedtime Pals: A Deployment Study of Sleep Management Technology for Families with Young Children.
Proceedings of the 2023 ACM Designing Interactive Systems Conference, 2023
2022
Proc. ACM Meas. Anal. Comput. Syst., 2022
CoRR, 2022
Towards Balanced Three-phase Charging: Phase Optimization in Adaptive Charging Networks.
CoRR, 2022
Bounded-Regret MPC via Perturbation Analysis: Prediction Error, Constraints, and Nonlinearity.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
2021
IEEE Trans. Smart Grid, 2021
Proc. ACM Meas. Anal. Comput. Syst., 2021
Optimal Bidding of Energy Storage: A Surrogate Method with Combined Spatial-Temporal Entropy.
CoRR, 2021
TENSILE: A Tensor granularity dynamic GPU memory scheduler method towards multiple dynamic workloads system.
CoRR, 2021
Disentangling Observed Causal Effects from Latent Confounders using Method of Moments.
CoRR, 2021
WeChat use among family caregivers of people living with schizophrenia and its relationship to caregiving experiences.
Comput. Hum. Behav., 2021
Data-driven Electric Vehicle Charging Station Placement for Incentivizing Potential Demand.
Proceedings of the IEEE International Conference on Communications, 2021
2020
IEEE Trans. Signal Inf. Process. over Networks, 2020
Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging.
Proc. ACM Meas. Anal. Comput. Syst., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020
Real-time Flexibility Feedback for Closed-loop Aggregator and System Operator Coordination.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020
ORC: An Online Competitive Algorithm for Recommendation and Charging Schedule in Electric Vehicle Charging Network.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Tenth ACM International Conference on Future Energy Systems, 2019
Learning Graph Parameters from Linear Measurements: Fundamental Trade-offs and Application to Electric Grids.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
2018
Cybersecur., 2018
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Maximum Likelihood Upper Bounds on the Capacities of Discrete Information Stable Channels.
Proceedings of the IEEE Information Theory Workshop, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 IEEE Data Science Workshop, 2018
2017
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017
Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Fundamental limits and achievable strategies for low energy compressed sensing with applications in wireless communication.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016
2015
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014