• 497 Citations
  • 11 h-Index
20072019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2007 2019

  • 497 Citations
  • 11 h-Index
  • 34 Conference contribution
  • 6 Article
  • 2 Conference article
  • 1 Letter
2019

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T. R., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

Dynamic random access storage
Random access storage
Dynamic mechanical analysis
Cryptography
Internet of things

Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems

Alrizah, M., Xing, X. & Zhu, S., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 230-244 15 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites

PTrix: Efficient hardware-assisted fuzzing for COTS binary

Chen, Y., Mu, D., Xu, J., Sun, Z., Shen, W., Xing, X., Lu, L. & Mao, B., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 633-645 13 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Hardware
Defects
Program processors
Testing
2018
5 Citations (Scopus)

An empirical evaluation of rule extraction from recurrent neural networks

Wang, Q., Zhang, K., Ororbia, A. G., Xing, X., Liu, X. & Giles, C. L., Sep 1 2018, In : Neural Computation. 30, 9, p. 2568-2591 24 p.

Research output: Contribution to journalLetter

Nonlinear Dynamics
Learning
Evaluation
Recurrent Neural Networks

Defending Against Adversarial Samples Without Security through Obscurity

Guo, W., Wang, Q., Zhang, K., Ororbia, A. G., Huang, S., Liu, X., Giles, C. L., Lin, L. & Xing, X., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 137-146 10 p. 8594838. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning algorithms
Defects
Deep neural networks
Malware

Explaining deep learning models - A Bayesian non-parametric approach

Guo, W., Huang, S., Tao, Y., Xing, X. & Lin, L., Jan 1 2018, In : Advances in Neural Information Processing Systems. 2018-December, p. 4514-4524 11 p.

Research output: Contribution to journalConference article

Learning systems
Image recognition
Deep learning
12 Citations (Scopus)

Lemna: Explaining deep learning based security applications

Guo, W., Mu, D., Xu, J., Su, P., Wang, G. & Xing, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-379 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Reverse engineering
Transparency
Image analysis
Learning systems
2017
24 Citations (Scopus)

Adversary resistant deep neural networks with an application to malware detection

Wang, Q., Guo, W., Zhang, K., Ororbia, A. G., Xing, X., Liu, X. & Giles, C. L., Aug 13 2017, KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1145-1153 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. Part F129685).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image recognition
Tides
Information retrieval
Speech recognition
Computer vision
14 Citations (Scopus)

FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware

Huang, J., Xu, J., Xing, X., Liu, P. & Qureshi, M. K., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2231-2244 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Recovery
Malware
Firmware
Flash memory
3 Citations (Scopus)

Supporting transparent snapshot for bare-metal malware analysis on mobile devices

Guan, L., Jia, S., Chen, B., Zhang, F., Luo, B., Lin, J., Liu, P., Xing, X. & Xia, L., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 339-349 11 p. (ACM International Conference Proceeding Series; vol. Part F132521).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bolts
Mobile devices
Restoration
Metals
Metal analysis
4 Citations (Scopus)

System service call-oriented symbolic execution of Android Framework with applications to vulnerability discovery and exploit generation

Luo, L., Zeng, Q., Cao, C., Chen, K., Liu, J., Liu, L., Gao, N., Yang, M., Xing, X. & Liu, P., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 225-238 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Middleware
22 Citations (Scopus)

TrustShadow: Secure execution of unmodified applications with ARM TrustZone

Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T. R., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 488-501 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Communication
Processing
Internet of things
2 Citations (Scopus)

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon

Chen, P., Xu, J., Hu, Z., Xing, X., Zhu, M., Mao, B. & Liu, P., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 451-462 12 p. 8023144. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer operating systems
Data storage equipment
Linux
2016
8 Citations (Scopus)

CREDAL: Towards locating a memory corruption vulnerability with your core dump

Xu, J., Mu, D., Chen, P., Xing, X., Wang, P. & Liu, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 529-540 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Computer debugging
7 Citations (Scopus)

From physical to cyber: Escalating protection for personalized auto insurance

Guan, L., Xu, J., Wang, S., Xing, X., Lin, L., Huang, H., Liu, P. & Lee, W., Nov 14 2016, Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016. Association for Computing Machinery, Inc, p. 42-55 14 p. (Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Insurance
Industry
Railroad cars
Hardware
7 Citations (Scopus)

Trackmeornot: Enabling flexible control on web tracking

Meng, W., Lee, B., Xing, X. & Lee, W., Jan 1 2016, 25th International World Wide Web Conference, WWW 2016. International World Wide Web Conferences Steering Committee, p. 99-109 11 p. (25th International World Wide Web Conference, WWW 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chromium
4 Citations (Scopus)

WebRanz: Web page randomization for better advertisement delivery and web-bot prevention

Wang, W., Zheng, Y., Xing, X., Kwon, Y., Zhang, X. & Eugster, P., Nov 1 2016, FSE 2016 - Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. Su, Z., Zimmermann, T. & Cleland-Huang, J. (eds.). Association for Computing Machinery, p. 205-216 12 p. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering; vol. 13-18-November-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Websites
HTML
Web browsers
Bandwidth
2 Citations (Scopus)

WildSense: Monitoring Interactions among Wild Deer in Harsh Outdoor Environments Using a Delay-Tolerant WSN

Ahn, J., Mysore, A., Zybko, K., Krumm, C., Thokala, S., Xing, X., Lian, M., Han, R., Mishra, S. & Hobbs, T., Jan 1 2016, In : Journal of Sensors. 2016, 1693460.

Research output: Contribution to journalArticle

deer
Global positioning system
Monitoring
wilderness
interactions
2015
7 Citations (Scopus)

ISC: An Iterative Social Based Classifier for Adult Account Detection on Twitter

Cheng, H., Xing, X., Liu, X. & Lv, Q., Apr 1 2015, In : IEEE Transactions on Knowledge and Data Engineering. 27, 4, p. 1045-1056 12 p., 6895278.

Research output: Contribution to journalArticle

Classifiers
Labeling
5 Citations (Scopus)

UCognito: Private browsing without tears

Xu, M., Jang, Y., Xing, X., Kim, T. & Lee, W., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 438-449 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linux
27 Citations (Scopus)

Understanding malvertising through ad-injecting browser extensions

Xing, X., Meng, W., Lee, B., Weinsberg, U., Sheth, A., Perdisci, R. & Lee, W., May 18 2015, WWW 2015 - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 1286-1295 10 p. (WWW 2015 - Proceedings of the 24th International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
Landing
Internet
Industry
Malware
2014
3 Citations (Scopus)

Exposing inconsistent web search results with bobble

Xing, X., Meng, W., Doozan, D., Feamster, N., Lee, W. & Snoeren, A. C., Jan 1 2014, Passive and Active Measurement - 15th International Conference, PAM 2014, Proceedings. Springer Verlag, p. 131-140 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8362 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web Search
Search engines
World Wide Web
Inconsistent
Gateways (computer networks)
5 Citations (Scopus)

Your online interests-Pwned! A pollution attack against targeted advertising

Meng, W., Xing, X., Sheth, A., Weinsberg, U. & Lee, W., Jan 1 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 129-140 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
Pollution
2013

Safe V chat: A system for obscene content detection in online video chat services

Liang, Y. L., Xing, X., Cheng, H., Dang, J., Huang, S., Han, R., Liu, X., Lv, Q. & Mishra, S., Jan 1 2013, In : ACM Transactions on Internet Technology. 12, 4, 2499927.

Research output: Contribution to journalArticle

Skin
Detectors
4 Citations (Scopus)

Testing the functionality and contact error of a GPS-based wildlife tracking network

Davis, M. J., Thokala, S., Xing, X., Hobbs, N. T., Miller, M. W., Han, R. & Mishra, S., Dec 2013, In : Wildlife Society Bulletin. 37, 4, p. 855-861 7 p.

Research output: Contribution to journalArticle

GPS
telemetry
social network
communication
triangulation
2012
10 Citations (Scopus)

Efficient misbehaving user detection in online video chat services

Cheng, H., Liang, Y. L., Xing, X., Liu, X., Han, R., Lv, Q. & Mishra, S., Mar 15 2012, WSDM 2012 - Proceedings of the 5th ACM International Conference on Web Search and Data Mining. p. 23-32 10 p. (WSDM 2012 - Proceedings of the 5th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feature extraction
Lighting
Color
Costs
7 Citations (Scopus)

Scalable misbehavior detection in online video chat services

Xing, X., Liang, Y. L., Huang, S., Cheng, H., Han, R., Lv, Q., Liu, X., Mishra, S. & Zhu, Y., Sep 14 2012, KDD'12 - 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. p. 552-560 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Processing
Costs
2011
12 Citations (Scopus)

A highly scalable bandwidth estimation of commercial hotspot access points

Xing, X., Dang, J., Mishra, S. & Liu, X., Aug 2 2011, 2011 Proceedings IEEE INFOCOM. p. 1143-1151 9 p. 5934891. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Testbeds
Scalability
Internet
Communication
15 Citations (Scopus)

SafeVchat: Detecting obscene content and misbehaving users in online video chat services

Xing, X., Liang, Y. L., Cheng, H., Dang, J., Huang, S., Han, R., Liu, X., Lv, Q. & Mishra, S., Jan 1 2011, Proceedings of the 20th International Conference on World Wide Web, WWW 2011. Association for Computing Machinery, p. 685-694 10 p. (Proceedings of the 20th International Conference on World Wide Web, WWW 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Skin
Detectors
1 Citation (Scopus)

Understanding characteristics of available bandwidth in wireless environment

Xing, X., Jiang, Y. & Mishra, S., Jan 1 2011, In : Procedia Computer Science. 5, p. 248-254 7 p.

Research output: Contribution to journalConference article

Bandwidth
Internet
Experiments
2010
9 Citations (Scopus)

ARBOR: Hang together rather than hang separately in 802.11 WiFi networks

Xing, X., Mishra, S. & Liu, X., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5461908. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Internet
DSL
Authentication
Wireless networks
125 Citations (Scopus)

Enhancing group recommendation by incorporating social relationship interactions

Gartrell, M., Xing, X., Lv, Q., Beach, A., Han, R., Mishra, S. & Seada, K., Dec 1 2010, Proceedings of the 16th ACM International Conference on Supporting Group Work, GROUP'10. p. 97-106 10 p. (Proceedings of the 16th ACM International Conference on Supporting Group Work, GROUP'10).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
7 Citations (Scopus)

Fault reconnaissance agent for sensor networks

Shakshuki, E. M., Xing, X. & Sheltami, T. R., Jan 1 2010, In : Mobile Information Systems. 6, 3, p. 229-247 19 p.

Research output: Contribution to journalArticle

Intelligent agents
Sensor networks
Sensor nodes
Inference engines
Testbeds
91 Citations (Scopus)

Fusing mobile, sensor, and social data to fully enable context-aware computing

Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S. & Seada, K., May 3 2010, HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications. p. 60-65 6 p. (HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile computing
Sensors
Sensor networks
mHealth
2009
2 Citations (Scopus)

An intelligent agent for fault reconnaissance in sensor networks

Shakshuki, E. M., Xing, X. & Sheltami, T. R., Dec 1 2009, iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services. p. 139-146 8 p. (iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent agents
Sensor nodes
Sensor networks
Hardware
Inference engines
5 Citations (Scopus)

Tracking anonymous sinks in wireless sensor networks

Shakshuki, E. M., Sheltami, T. R., Kang, N. & Xing, X., Oct 5 2009, Proceedings - 2009 International Conference on Advanced Information Networking and Applications, AINA 2009. p. 510-516 7 p. 5076241. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Experiments
7 Citations (Scopus)

Where is the tight link in a home wireless broadband environment?

Xing, X. & Mishra, S., Dec 1 2009, 2009 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2009. p. 49-58 10 p. 5366789. (Proceedings - IEEE Computer Society's Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, MASCOTS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadband
Telecommunication links
Bandwidth
Internet
Routers
2008
4 Citations (Scopus)

A fault inference mechanism in sensor networks using Markov Chain

Shakshuki, E. & Xinyu, X., Sep 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications, AINA 2008. p. 628-635 8 p. 4482765. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Markov processes
Sensor networks
Wireless sensor networks
Sensors
Finite automata
4 Citations (Scopus)

Agent-based fault detection mechanism in wireless sensor networks

Shakshuki, E., Xing, X. & Zhang, H., 2008, Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2007. p. 31-34 4 p. 4407253

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault detection
Wireless sensor networks
Inference engines
Sensors
Sensor nodes
14 Citations (Scopus)

Security analysis and authentication improvement for IEEE 802.11i specification

Xing, X., Shakshuki, E., Benoit, D. & Sheltami, T., Dec 1 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 1887-1891 5 p. 4698140. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Specifications
Wi-Fi
Wireless local area networks (WLAN)
Cryptography
2007
2 Citations (Scopus)

Agent based approach towards energy aware routing in wireless sensor networks

Malik, H., Shakshuki, E. & Xing, X., Dec 1 2007, 2007 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2007. p. 2149-2154 6 p. 4414095. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Wireless sensor networks
Sensor networks
Redundancy
Analytical models
4 Citations (Scopus)

Agent-based routing for wireless sensor network

Shakshuki, E., Malik, H. & Xing, X., 2007, Advanced Intelligent Computing Theories and Applications: With Aspects of Theoretical and Methodological Issues - Third International Conference on Intelligent Computing, ICIC 2007, Proceedings. Vol. 4681 LNCS. p. 68-79 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4681 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Wireless Sensor Networks
Wireless sensor networks
Routing
Vertex of a graph
13 Citations (Scopus)

Mobile agent for efficient routing among source nodes in wireless sensor networks

Shakshuki, E., Xing, X. & Malik, H., 2007, 3rd International Conference on Autonomic and Autonomous Systems, ICAS 2007. 4437916

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Wireless sensor networks
Sensor networks
Redundancy
Agglomeration