Xuewei Feng

Orcid: 0000-0003-3736-6623

According to our database1, Xuewei Feng authored at least 27 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks.
CoRR, 2024

BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy.
CoRR, 2024

Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
CoRR, 2024

Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

2023
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Inf. Forensics Secur., 2023

A Fixed-Wing UAV Formation Algorithm Based on Vector Field Guidance.
IEEE Trans Autom. Sci. Eng., 2023

Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Traffic Hijacking in Wi-Fi Networks via ICMP Redirects.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.
IEEE/ACM Trans. Netw., 2022

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

D3: Lightweight Secure Fault Localization in Edge Cloud.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
The Side-Channel Vulnerability in Network Protocol.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021

The Overview of SPIN in Software Model Checking.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Off-Path TCP Exploits of the Mixed IPID Assignment.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A Reliable Lightweight Communication Method via Chain Verification.
Proceedings of the 4th International Conference on System Reliability and Safety, 2019

An Approach of Code Pointer Hiding Based on a Resilient Area.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
A Comparison of Moving Target Defense Strategies.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Web Service Applying Moving Target Defense.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2016
基于PCA降维的云资源状态监控数据压缩技术 (Data Dimension Reduction Method Based on PCA for Monitoring Data of Virtual Resources in Cloud Computing).
计算机科学, 2016

2014
An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

Implemention of Cyber Security Situation Awareness Based on Knowledge Discovery with Trusted Computer.
Proceedings of the Web Technologies and Applications, 2014

2011
Research on survivability metrics based on survivable process of network system.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Analyzing and Correlating Security Events Using State Machine.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...