Browsing by Author Luo, Xiapu

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 19 of 19
TitleAuthor(s)Issue DateViews
 
A Survey on Access Control in Fog Computing
Journal:IEEE Communications Magazine
2018
26
An adaptive gas cost mechanism for ethereum to defend against under-priced DoS attacks
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
17
AndroidPerf: A cross-layer profiling system for Android applications
Proceeding/Conference:2015 IEEE 23rd International Symposium on Quality of Service, IWQoS 2015
2016
8
AutoFlowLeaker: Circumventing web censorship through automation services
Proceeding/Conference:Proceedings of the IEEE Symposium on Reliable Distributed Systems
2017
8
 
2017
13
 
CRONUS: Fault-isolated, Secure and High-performance Heterogeneous Computing for Trusted Execution Environment
Proceeding/Conference:2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO) (01/10/2022-05/10/2022, Chicago)
5-Oct-2022
 
CydiOS: a model-based testing framework for iOS apps
Proceeding/Conference:International Symposium on Software Testing and Analysis - ISSTA 2023 (17/07/2023-21/07/2023, Seattle)
13-Jul-2023
 
2018
5
I know where you all are! exploiting mobile social apps for large-scale location privacy probing
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
10
Muse: Towards robust and stealthy mobile botnets via multiple message push services
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
10
 
NDroid: Toward tracking information flows across multiple android contexts
Journal:IEEE Transactions on Information Forensics and Security
2019
12
On measuring one-way path metrics from a web server
Proceeding/Conference:Proceedings - International Conference on Network Protocols, ICNP
2014
3
On tracking information flows through JNI in android applications
Proceeding/Conference:Proceedings of the International Conference on Dependable Systems and Networks
2014
3
 
Revisiting Automotive Attack Surfaces: a Practitioners’ Perspective
Proceeding/Conference:IEEE Symposium on Security and Privacy 2024 (20/05/2024-23/05/2024, San Francisco)
20-May-2024
Revisiting the description-to-behavior fidelity in android applications
Proceeding/Conference:2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER 2016
2016
4
 
2014
3
 
SOTER: Guarding Black-box Inference for General Neural Networks at the Edge
Proceeding/Conference:2022 USENIX Annual Technical Conference (11/07/2022-13/07/2022, Carlsbad)
13-Jul-2022
Towards a scalable resource-driven approach for detecting repackaged android applications
Proceeding/Conference:Proceedings of the 30th Annual Computer Security Applications Conference
2014
7
 
2015
7