• 587 Citations
  • 12 h-Index
20072019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 587 Citations
  • 12 h-Index
  • 45 Conference contribution
  • 6 Article
  • 2 Conference article
  • 1 Letter
Filter
Conference contribution

Your online interests-Pwned! A pollution attack against targeted advertising

Meng, W., Xing, X., Sheth, A., Weinsberg, U. & Lee, W., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 129-140 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Where is the tight link in a home wireless broadband environment?

Xing, X. & Mishra, S., Dec 1 2009, 2009 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS 2009. p. 49-58 10 p. 5366789. (Proceedings - IEEE Computer Society's Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, MASCOTS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon

Chen, P., Xu, J., Hu, Z., Xing, X., Zhu, M., Mao, B. & Liu, P., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 451-462 12 p. 8023144. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

WebRanz: Web page randomization for better advertisement delivery and web-bot prevention

Wang, W., Zheng, Y., Xing, X., Kwon, Y., Zhang, X. & Eugster, P., Nov 1 2016, FSE 2016 - Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. Su, Z., Zimmermann, T. & Cleland-Huang, J. (eds.). Association for Computing Machinery, p. 205-216 12 p. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering; vol. 13-18-November-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Understanding the reproducibility of crowd-reported security vulnerabilities

Mu, D., Cuevas, A., Yang, L., Hu, H., Xing, X., Mao, B. & Wang, G., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 919-936 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Understanding malvertising through ad-injecting browser extensions

Xing, X., Meng, W., Lee, B., Weinsberg, U., Sheth, A., Perdisci, R. & Lee, W., May 18 2015, WWW 2015 - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 1286-1295 10 p. (WWW 2015 - Proceedings of the 24th International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations

UCognito: Private browsing without tears

Xu, M., Jang, Y., Xing, X., Kim, T. & Lee, W., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 438-449 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

TrustShadow: Secure execution of unmodified applications with ARM TrustZone

Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 488-501 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Scopus citations

Trackmeornot: Enabling flexible control on web tracking

Meng, W., Lee, B., Xing, X. & Lee, W., Jan 1 2016, 25th International World Wide Web Conference, WWW 2016. International World Wide Web Conferences Steering Committee, p. 99-109 11 p. (25th International World Wide Web Conference, WWW 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Tracking anonymous sinks in wireless sensor networks

Shakshuki, E. M., Sheltami, T. R., Kang, N. & Xing, X., Oct 5 2009, Proceedings - 2009 International Conference on Advanced Information Networking and Applications, AINA 2009. p. 510-516 7 p. 5076241. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Towards the detection of inconsistencies in public security vulnerability reports

Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y. & Wang, G., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 869-885 17 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

System service call-oriented symbolic execution of Android Framework with applications to vulnerability discovery and exploit generation

Luo, L., Zeng, Q., Cao, C., Chen, K., Liu, J., Liu, L., Gao, N., Yang, M., Xing, X. & Liu, P., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 225-238 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Supporting transparent snapshot for bare-metal malware analysis on mobile devices

Guan, L., Jia, S., Chen, B., Zhang, F., Luo, B., Lin, J., Liu, P., Xing, X. & Xia, L., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 339-349 11 p. (ACM International Conference Proceeding Series; vol. Part F132521).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Slake: Facilitating slab manipulation for exploiting vulnerabilities in the linux kernel

Chen, Y. & Xing, X., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1707-1722 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Security analysis and authentication improvement for IEEE 802.11i specification

Xing, X., Shakshuki, E., Benoit, D. & Sheltami, T., Dec 1 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 1887-1891 5 p. 4698140. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Scalable misbehavior detection in online video chat services

Xing, X., Liang, Y. L., Huang, S., Cheng, H., Han, R., Lv, Q., Liu, X., Mishra, S. & Zhu, Y., Sep 14 2012, KDD'12 - 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. p. 552-560 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

SafeVchat: Detecting obscene content and misbehaving users in online video chat services

Xing, X., Liang, Y. L., Cheng, H., Dang, J., Huang, S., Han, R., Liu, X., Lv, Q. & Mishra, S., Jan 1 2011, Proceedings of the 20th International Conference on World Wide Web, WWW 2011. Association for Computing Machinery, p. 685-694 10 p. (Proceedings of the 20th International Conference on World Wide Web, WWW 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

RENN: Efficient reverse execution with neural-network-assisted alias analysis

Mu, D., Guo, W., Cuevas, A., Chen, Y., Gai, J., Xing, X., Mao, B. & Song, C., Nov 2019, Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019. Institute of Electrical and Electronics Engineers Inc., p. 924-935 12 p. 8952186. (Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

PTrix: Efficient hardware-assisted fuzzing for COTS binary

Chen, Y., Mu, D., Xu, J., Sun, Z., Shen, W., Xing, X., Lu, L. & Mao, B., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 633-645 13 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

PoMP: Postmortem program analysis with hardware-enhanced post-crash artifacts

Xu, J., Mu, D., Xing, X., Liu, P., Chen, P. & Mao, B., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 17-32 16 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Mobile agent for efficient routing among source nodes in wireless sensor networks

Shakshuki, E., Xing, X. & Malik, H., 2007, 3rd International Conference on Autonomic and Autonomous Systems, ICAS 2007. 4437916

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise

Liu, F., Jiang, X., Wen, Y., Xing, X., Zhang, D. & Meng, D., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1777-1794 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Lemna: Explaining deep learning based security applications

Guo, W., Mu, D., Xu, J., Su, P., Wang, G. & Xing, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-379 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

Kepler: Facilitating control-flow hijacking primitive evaluation for linux kernel vulnerabilities

Wu, W., Chen, Y., Xing, X. & Zou, W., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1187-1204 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

FUZE: Towards facilitating exploit generation for kernel use-after-free vulnerabilities

Wu, W., Chen, Y., Xu, J., Xing, X., Gong, X. & Zou, W., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 781-797 17 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Fusing mobile, sensor, and social data to fully enable context-aware computing

Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S. & Seada, K., May 3 2010, HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications. p. 60-65 6 p. (HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

92 Scopus citations

From physical to cyber: Escalating protection for personalized auto insurance

Guan, L., Xu, J., Wang, S., Xing, X., Lin, L., Huang, H., Liu, P. & Lee, W., Nov 14 2016, Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016. Association for Computing Machinery, Inc, p. 42-55 14 p. (Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware

Huang, J., Xu, J., Xing, X., Liu, P. & Qureshi, M. K., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2231-2244 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Exposing inconsistent web search results with bobble

Xing, X., Meng, W., Doozan, D., Feamster, N., Lee, W. & Snoeren, A. C., Jan 1 2014, Passive and Active Measurement - 15th International Conference, PAM 2014, Proceedings. Springer Verlag, p. 131-140 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8362 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems

Alrizah, M., Xing, X. & Zhu, S., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 230-244 15 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Enhancing group recommendation by incorporating social relationship interactions

Gartrell, M., Xing, X., Lv, Q., Beach, A., Han, R., Mishra, S. & Seada, K., Dec 1 2010, Proceedings of the 16th ACM International Conference on Supporting Group Work, GROUP'10. p. 97-106 10 p. (Proceedings of the 16th ACM International Conference on Supporting Group Work, GROUP'10).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

130 Scopus citations

Efficient misbehaving user detection in online video chat services

Cheng, H., Liang, Y. L., Xing, X., Liu, X., Han, R., Lv, Q. & Mishra, S., Mar 15 2012, WSDM 2012 - Proceedings of the 5th ACM International Conference on Web Search and Data Mining. p. 23-32 10 p. (WSDM 2012 - Proceedings of the 5th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Defending Against Adversarial Samples Without Security through Obscurity

Guo, W., Wang, Q., Zhang, K., Ororbia, A. G., Huang, S., Liu, X., Giles, C. L., Lin, L. & Xing, X., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 137-146 10 p. 8594838. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DeepVSA: Facilitating value-set analysis with deep learning for postmortem program analysis

Guo, W., Mu, D., Xing, X., Du, M. & Song, D., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1787-1804 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

CREDAL: Towards locating a memory corruption vulnerability with your core dump

Xu, J., Mu, D., Chen, P., Xing, X., Wang, P. & Liu, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 529-540 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Automated finite state machine extraction

Chen, Y., Song, L., Xing, X., Xu, F. & Wu, W., Nov 15 2019, FEAST 2019 - Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation. Association for Computing Machinery, p. 9-15 7 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ARBOR: Hang together rather than hang separately in 802.11 WiFi networks

Xing, X., Mishra, S. & Liu, X., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5461908. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

An intelligent agent for fault reconnaissance in sensor networks

Shakshuki, E. M., Xing, X. & Sheltami, T. R., Dec 1 2009, iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services. p. 139-146 8 p. (iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

All your clicks belong to me: Investigating click interception on the web

Zhang, M., Meng, W., Lee, S., Lee, B. & Xing, X., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 941-957 17 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A highly scalable bandwidth estimation of commercial hotspot access points

Xing, X., Dang, J., Mishra, S. & Liu, X., Aug 2 2011, 2011 Proceedings IEEE INFOCOM. p. 1143-1151 9 p. 5934891. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Agent-based routing for wireless sensor network

Shakshuki, E., Malik, H. & Xing, X., 2007, Advanced Intelligent Computing Theories and Applications: With Aspects of Theoretical and Methodological Issues - Third International Conference on Intelligent Computing, ICIC 2007, Proceedings. Vol. 4681 LNCS. p. 68-79 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4681 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Agent-based fault detection mechanism in wireless sensor networks

Shakshuki, E., Xing, X. & Zhang, H., Jan 1 2007, Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2007. Institute of Electrical and Electronics Engineers Inc., p. 31-34 4 p. 4407253. (Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Agent based approach towards energy aware routing in wireless sensor networks

Malik, H., Shakshuki, E. & Xing, X., Dec 1 2007, 2007 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2007. p. 2149-2154 6 p. 4414095. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A fault inference mechanism in sensor networks using Markov Chain

Shakshuki, E. & Xinyu, X., Sep 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications, AINA 2008. p. 628-635 8 p. 4482765. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Adversary resistant deep neural networks with an application to malware detection

Wang, Q., Guo, W., Zhang, K., Ororbia, A. G., Xing, X., Liu, X. & Giles, C. L., Aug 13 2017, KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1145-1153 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. Part F129685).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

33 Scopus citations