Xiaokuan Zhang

Orcid: 0000-0002-4646-7146

According to our database1, Xiaokuan Zhang authored at least 40 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Side-Lobe Denoise Process for ISAR Imaging Applications: Combined Fast Clean and Spatial Focus Technique.
Remote. Sens., July, 2024

Direction-of-Arrival Estimation via Sparse Bayesian Learning Exploiting Hierarchical Priors with Low Complexity.
Sensors, April, 2024

VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2024

Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2024

An off-grid direction-of-arrival estimator based on sparse Bayesian learning with three-stage hierarchical Laplace priors.
Signal Process., 2024

Stealing Trust: Unveiling Vulnerabilities in Web3 Authentication.
CoRR, 2024

Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements.
Proceedings of the 33rd USENIX Security Symposium, 2024

Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

VPVet: Vetting Privacy Policies of Virtual Reality Apps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
CoRR, 2023

An Efficient Parameter Estimation Algorithm of the GTD Model Based on the MMP Algorithm.
IEEE Access, 2023

POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices.
Proceedings of the 32nd USENIX Security Symposium, 2023

Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Veil: A Protected Services Framework for Confidential Virtual Machines.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Defeating traffic analysis via differential privacy: a case study on streaming traffic.
Int. J. Inf. Sec., 2022

An Empirical Study on Ethereum Private Transactions and the Security Implications.
CoRR, 2022

PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Dynamic RCS Statistical Modeling of Stealth Aircraft.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
SOK: On the Analysis of Web Browser Security.
CoRR, 2021

Dissecting Click Fraud Autonomy in the Wild.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
Proceedings of the 29th USENIX Security Symposium, 2020

SurfaceFleet: Exploring Distributed Interactions Unbounded from Device, Application, User, and Time.
Proceedings of the UIST '20: The 33rd Annual ACM Symposium on User Interface Software and Technology, 2020

2019
Statistical Privacy for Streaming Traffic.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation.
Proceedings of the 25th USENIX Security Symposium, 2016

Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
You are where you have been: Sybil detection via geo-location analysis in OSNs.
Proceedings of the IEEE Global Communications Conference, 2014

2012
Novel Compact Dual-Band Rat-Race Coupler Combining Fractal Geometry and CRLH TLs.
Wirel. Pers. Commun., 2012


  Loading...