Xu He
Cited by
Cited by
RusTEE: developing memory-safe ARM TrustZone applications
S Wan, M Sun, K Sun, N Zhang, X He
Annual Computer Security Applications Conference, 442-453, 2020
When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition
S Wang, J Cao, X He, K Sun, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
An automatic annotation method for discovering semantic information of geographical locations from location-based social networks
Z Zou, X He, AX Zhu
ISPRS International Journal of Geo-Information 8 (11), 487, 2019
BinProv: Binary Code Provenance Identification without Disassembly
X He, S Wang, Y Xing, P Feng, H Wang, Q Li, S Chen, K Sun
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
Enhancing the Impression on Cities: Mining Relations of Attractions with Geo-Tagged Photos
Z Zou, X He, X Xie, Q Huang
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots
S Liu, P Feng, J Cao, X He, T Chin, K Sun, Q Li
Detection of Intrusions and Malware, and Vulnerability Assessment: 19th …, 2022
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks
X He, J Cao, S Wang, K Sun, L Xu, Q Li
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1689-1698, 2022
NUPT ST-Data Miner: An Spatio-Temporal Data Analysis and Visualization System
Z Zou, J Xiong, X He, H Dai
Information Science and Applications 2018: ICISA 2018, 41-51, 2019
Sparse Representation of Sensor Network Signals Based on the K-SVD Algorithm
Z Zou, X He, Y Wang, J Wu
Proceedings of the 15th ACM International Symposium on Performance …, 2018
The system can't perform the operation now. Try again later.
Articles 1–9