Xueqiang Wang

Orcid: 0000-0002-9038-4460

According to our database1, Xueqiang Wang authored at least 33 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Station: Gesture-Based Authentication for Voice Interfaces.
IEEE Internet Things J., June, 2024

Exclusively in-store: Acoustic location authentication for stationary business devices.
J. Netw. Comput. Appl., 2024

CryptoTrain: Fast Secure Training on Encrypted Dataset.
CoRR, 2024

On-Line Measurement Method for Rheology of Straight Tubular Oil-Based Drilling Fluid Under Pulsating Flow.
IEEE Access, 2024

Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs.
Proceedings of the 33rd USENIX Security Symposium, 2024

Seeing is Not Always Believing: An Empirical Analysis of Fake Evidence Generators.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Skeleton-Based Fall Detection with Multiple Inertial Sensors Using Spatial-Temporal Graph Convolutional Networks.
Sensors, February, 2023

Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference.
Proceedings of the 32nd USENIX Security Symposium, 2023

Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
Proceedings of the 32nd USENIX Security Symposium, 2023

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

PHEP: Paillier Homomorphic Encryption Processors for Privacy-Preserving Applications in Cloud Computing.
Proceedings of the 35th IEEE Hot Chips Symposium, 2023

DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2021
Understanding Illicit UI in iOS Apps Through Hidden UI Analysis.
IEEE Trans. Dependable Secur. Comput., 2021

Understanding Malicious Cross-library Data Harvesting on Android.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Bibliometric evaluation of 2000-2019 publications on functional near-infrared spectroscopy.
NeuroImage, 2020

Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Fast vision-based autonomous detection of moving cooperative target for unmanned aerial vehicle landing.
J. Field Robotics, 2019

Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps.
Proceedings of the 28th USENIX Security Symposium, 2019

Understanding iOS-based Crowdturfing Through Hidden UI Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12.
CoRR, 2017

Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Nonbinary multi-parallel-concatenated single-parity-check (NB-MPCSPC) codes over partial-response channels.
Proceedings of the 10th International Conference on Information, 2015

2014
WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2010
A novel high-speed and low-power negative voltage level shifter for low voltage applications.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Parallel sequential pattern mining by transaction decomposition.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
A High-Speed Two-Cell BCH Decoder for Error Correcting in MLC <i>nor</i> Flash Memories.
IEEE Trans. Circuits Syst. II Express Briefs, 2009

Embedded high-speed BCH decoder for new-generation NOR flash memories.
Proceedings of the IEEE Custom Integrated Circuits Conference, 2009


  Loading...