Xinyu Xing
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs.
IEEE Trans. Dependable Secur. Comput., 2024
PROMPTFUZZ: Harnessing Fuzzing Techniques for Robust Testing of Prompt Injection in LLMs.
CoRR, 2024
CoRR, 2024
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
BandFuzz: A Practical Framework for Collaborative Fuzzing with Reinforcement Learning.
Proceedings of the 17th ACM/IEEE International Workshop on Search-Based and Fuzz Testing, 2024
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
I can feel AI failure: the impact of service failure type and failure assessment on customer recovery expectation.
Ind. Manag. Data Syst., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Should the chatbot "save itself" or "be helped by others"? The influence of service recovery types on consumer perceptions of recovery satisfaction.
Electron. Commer. Res. Appl., 2022
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Software Eng., 2021
A direct-digitization open-loop gyroscope frontend with +/-8000°/s full-scale range and noise floor of 0.0047°/s/√Hz.
Proceedings of the 2021 Symposium on VLSI Circuits, Kyoto, Japan, June 13-19, 2021, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 20th IEEE International Conference on Data Mining, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019
TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.
Proceedings of the 28th USENIX Security Symposium, 2019
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
Proceedings of the Internet Measurement Conference, 2019
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Asking the Crowd: Question Analysis, Evaluation and Generation for Open Discussion on Online Forums.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019
2018
Neural Comput., 2018
A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity.
CoRR, 2018
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the IEEE International Conference on Data Mining, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
WildSense: Monitoring Interactions among Wild Deer in Harsh Outdoor Environments Using a Delay-Tolerant WSN.
J. Sensors, 2016
Using Non-invertible Data Transformations to Build Adversary-Resistant Deep Neural Networks.
CoRR, 2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
ACM Trans. Internet Techn., 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
CoRR, 2012
Proceedings of the Fifth International Conference on Web Search and Web Data Mining, 2012
Proceedings of the 10th International Conference on Mobile Systems, 2012
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012
2011
Proceedings of the 2nd International Conference on Ambient Systems, 2011
SafeVchat: detecting obscene content and misbehaving users in online video chat services.
Proceedings of the 20th International Conference on World Wide Web, 2011
A 6.7nV/√Hz Sub-mHz-1/f-corner 14b analog-to-digital interface for rail-to-rail precision voltage sensing.
Proceedings of the IEEE International Solid-State Circuits Conference, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
CoRR, 2010
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 2010 International ACM SIGGROUP Conference on Supporting Group Work, 2010
2009
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009
Proceedings of the iiWAS'2009, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the IEEE International Conference on Systems, 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007
2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004