Xinyu Xing

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs.
IEEE Trans. Dependable Secur. Comput., 2024

Soft-Label Integration for Robust Toxicity Classification.
CoRR, 2024

UTF:Undertrained Tokens as Fingerprints A Novel Approach to LLM Identification.
CoRR, 2024

BlockFound: Customized blockchain foundation model for anomaly detection.
CoRR, 2024

PROMPTFUZZ: Harnessing Fuzzing Techniques for Robust Testing of Prompt Injection in LLMs.
CoRR, 2024

Decoupled Alignment for Robust Plug-and-Play Adaptation.
CoRR, 2024

Enhancing Jailbreak Attack Against Large Language Models through Silent Tokens.
CoRR, 2024

ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization.
Proceedings of the 33rd USENIX Security Symposium, 2024

SeaK: Rethinking the Design of a Secure Allocator for OS Kernel.
Proceedings of the 33rd USENIX Security Symposium, 2024

CAMP: Compiler and Allocator-based Heap Memory Protection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation.
Proceedings of the 33rd USENIX Security Symposium, 2024

LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks.
Proceedings of the 33rd USENIX Security Symposium, 2024

BandFuzz: A Practical Framework for Collaborative Fuzzing with Reinforcement Learning.
Proceedings of the 17th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, 2024

RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

TGRop: Top Gun of Return-Oriented Programming Automation.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
I can feel AI failure: the impact of service failure type and failure assessment on customer recovery expectation.
Ind. Manag. Data Syst., 2023

Assessing Prompt Injection Risks in 200+ Custom GPTs.
CoRR, 2023

GPTFUZZER: Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts.
CoRR, 2023

AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness.
Proceedings of the 32nd USENIX Security Symposium, 2023

PATROL: Provable Defense against Adversarial Policy in Two-player Games.
Proceedings of the 32nd USENIX Security Symposium, 2023

From Grim Reality to Practical Solution: Malware Classification in Real-World Noise.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

StateMask: Explaining Deep Reinforcement Learning through State Mask.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Should the chatbot "save itself" or "be helped by others"? The influence of service recovery types on consumer perceptions of recovery satisfaction.
Electron. Commer. Res. Appl., 2022

Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation.
CoRR, 2022

Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability.
Proceedings of the 31st USENIX Security Symposium, 2022

GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

DeJITLeak: eliminating JIT-induced timing side-channel leaks.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

DirtyCred: Escalating Privilege in Linux Kernel.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis.
IEEE Trans. Software Eng., 2021

A direct-digitization open-loop gyroscope frontend with +/-8000°/s full-scale range and noise floor of 0.0047°/s/√Hz.
Proceedings of the 2021 Symposium on VLSI Circuits, Kyoto, Japan, June 13-19, 2021, 2021

CADE: Detecting and Explaining Concept Drift Samples for Security Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Adversarial Policy Training against Deep Reinforcement Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

EDGE: Explaining Deep Reinforcement Learning Policies.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

RNNRepair: Automatic RNN Repair via Model-based Analysis.
Proceedings of the 38th International Conference on Machine Learning, 2021

DANCE: Enhancing saliency maps using decoys.
Proceedings of the 38th International Conference on Machine Learning, 2021

Adversarial Policy Learning in Two-player Competitive Games.
Proceedings of the 38th International Conference on Machine Learning, 2021

Facilitating Vulnerability Assessment through PoC Migration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Structure-Aware Pre-Training for Table-to-Text Generation.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

Robust saliency maps with decoy-enhanced saliency score.
CoRR, 2020

BScout: Direct Whole Patch Presence Test for Java Executables.
Proceedings of the 29th USENIX Security Symposium, 2020

Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural Networks.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

HART: Hardware-Assisted Kernel Module Tracing on Arm.
Proceedings of the Computer Security - ESORICS 2020, 2020

PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

A Systematic Study of Elastic Objects in Kernel Exploitation.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Automatic Generation of Citation Texts in Scholarly Papers: A Pilot Study.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019

From proof-of-concept to exploitable.
Cybersecur., 2019

TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems.
CoRR, 2019

All Your Clicks Belong to Me: Investigating Click Interception on the Web.
Proceedings of the 28th USENIX Security Symposium, 2019

KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.
Proceedings of the 28th USENIX Security Symposium, 2019

DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Proceedings of the 28th USENIX Security Symposium, 2019

RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
Proceedings of the Internet Measurement Conference, 2019

Automated Finite State Machine Extraction.
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation, 2019

Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Asking the Crowd: Question Analysis, Evaluation and Generation for Open Discussion on Online Forums.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
An Empirical Evaluation of Rule Extraction from Recurrent Neural Networks.
Neural Comput., 2018

Fine-Grained Library Customization.
CoRR, 2018

A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity.
CoRR, 2018

FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

Explaining Deep Learning Models - A Bayesian Non-parametric Approach.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Defending Against Adversarial Samples Without Security through Obscurity.
Proceedings of the IEEE International Conference on Data Mining, 2018

LEMNA: Explaining Deep Learning based Security Applications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
An Empirical Evaluation of Recurrent Neural Network Rule Extraction.
CoRR, 2017

Towards Interrogating Discriminative Machine Learning Models.
CoRR, 2017

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.
Proceedings of the 26th USENIX Security Symposium, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Adversary Resistant Deep Neural Networks with an Application to Malware Detection.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
WildSense: Monitoring Interactions among Wild Deer in Harsh Outdoor Environments Using a Delay-Tolerant WSN.
J. Sensors, 2016

Random Feature Nullification for Adversary Resistant Deep Architecture.
CoRR, 2016

Learning Adversary-Resistant Deep Neural Networks.
CoRR, 2016

Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks.
CoRR, 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

Exploiting Insurance Telematics for Fun and Profit.
CoRR, 2016

TrackMeOrNot: Enabling Flexible Control on Web Tracking.
Proceedings of the 25th International Conference on World Wide Web, 2016

WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
ISC: An Iterative Social Based Classifier for Adult Account Detection on Twitter.
IEEE Trans. Knowl. Data Eng., 2015

Understanding Malvertising Through Ad-Injecting Browser Extensions.
Proceedings of the 24th International Conference on World Wide Web, 2015

UCognito: Private Browsing without Tears.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Exposing Inconsistent Web Search Results with Bobble.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
SafeVchat: A System for Obscene Content Detection in Online Video Chat Services.
ACM Trans. Internet Techn., 2013

Take This Personally: Pollution Attacks on Personalized Services.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services
CoRR, 2012

Efficient misbehaving user detection in online video chat services.
Proceedings of the Fifth International Conference on Web Search and Web Data Mining, 2012

Demo: MVChat: flasher detection for mobile video chat.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Scalable misbehavior detection in online video chat services.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

2011
Understanding Characteristics of Available Bandwidth in Wireless Environment.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

SafeVchat: detecting obscene content and misbehaving users in online video chat services.
Proceedings of the 20th International Conference on World Wide Web, 2011

A 6.7nV/√Hz Sub-mHz-1/f-corner 14b analog-to-digital interface for rail-to-rail precision voltage sensing.
Proceedings of the IEEE International Solid-State Circuits Conference, 2011

A highly scalable bandwidth estimation of commercial hotspot access points.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Fault reconnaissance agent for sensor networks.
Mob. Inf. Syst., 2010

Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures
CoRR, 2010

Fusing mobile, sensor, and social data to fully enable context-aware computing.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

ARBOR: Hang Together Rather Than Hang Separately in 802.11 WiFi Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Enhancing group recommendation by incorporating social relationship interactions.
Proceedings of the 2010 International ACM SIGGROUP Conference on Supporting Group Work, 2010

2009
Where is the tight link in a home wireless broadband environment?
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

An intelligent agent for fault reconnaissance in sensor networks.
Proceedings of the iiWAS'2009, 2009

Tracking Anonymous Sinks in Wireless Sensor Networks.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Security Analysis and Authentication Improvement for IEEE 802.11i Specification.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Fault Inference Mechanism in Sensor Networks Using Markov Chain.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Agent based approach towards energy aware routing in wireless sensor networks.
Proceedings of the IEEE International Conference on Systems, 2007

Agent-Based Routing for Wireless Sensor Network.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Agent-based Fault Detection Mechanism in Wireless Sensor Networks.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

2004
CGRED: class guided random early discarding.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004


  Loading...