XiaoFeng Wang
Cited by
Cited by
Effective and efficient malware detection at the end host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang
NDSS 11, 17-33, 2011
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
2010 IEEE Symposium on Security and Privacy, 191-206, 2010
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
NDSS, 2018
Reinforcement learning to play an optimal Nash equilibrium in team Markov games
X Wang, T Sandholm
Advances in neural information processing systems 15, 2002
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
R Wang, S Chen, XF Wang
2012 IEEE Symposium on Security and Privacy, 365-379, 2012
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Learning your identity and disease from research papers: information leaks in genome wide association study
R Wang, YF Li, XF Wang, H Tang, X Zhou
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Privacy loss in apple's implementation of differential privacy on macos 10.12
J Tang, A Korolova, X Bai, X Wang, X Wang
arXiv preprint arXiv:1709.02753, 2017
Understanding membership inferences on well-generalized learning models
Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ...
arXiv preprint arXiv:1802.04889, 2018
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Defending against denial-of-service attacks with puzzle auctions
XF Wang, MK Reiter
2003 Symposium on Security and Privacy, 2003., 78-92, 2003
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
{SmartAuth}:{User-Centered} authorization for the internet of things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th USENIX Security Symposium (USENIX Security 17), 361-378, 2017
Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
Sedic: privacy-aware data intensive computing on hybrid clouds
K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
{CommanderSong}: a systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64, 2018
The system can't perform the operation now. Try again later.
Articles 1–20