• 549 Citations
  • 11 h-Index
20072019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Xinyu Xing is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 23 Similar Profiles
Wireless sensor networks Engineering & Materials Science
Sensor networks Engineering & Materials Science
Bandwidth Engineering & Materials Science
Mobile agents Engineering & Materials Science
Internet Engineering & Materials Science
Sensor nodes Engineering & Materials Science
Intelligent agents Engineering & Materials Science
Sensors Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2007 2019

  • 549 Citations
  • 11 h-Index
  • 44 Conference contribution
  • 6 Article
  • 2 Conference article
  • 1 Letter

All your clicks belong to me: Investigating click interception on the web

Zhang, M., Meng, W., Lee, S., Lee, B. & Xing, X., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 941-957 17 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Marketing
Ecosystems

Automated finite state machine extraction

Chen, Y., Song, L., Xing, X., Xu, F. & Wu, W., Nov 15 2019, FEAST 2019 - Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation. Association for Computing Machinery, p. 9-15 7 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Finite automata
Software engineering
1 Citation (Scopus)

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

Dynamic random access storage
Random access storage
Dynamic mechanical analysis
Cryptography
Internet of things

DeepVSA: Facilitating value-set analysis with deep learning for postmortem program analysis

Guo, W., Mu, D., Xing, X., Du, M. & Song, D., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1787-1804 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Neural networks
Flow control
Data flow analysis
Deep learning

Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems

Alrizah, M., Xing, X. & Zhu, S., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 230-244 15 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites