Export 10 results:
Filters: Author is Xiapu Luo  [Clear All Filters]
He N, Zhang R, Wang H, Wu L, Luo X, Guo Y, Yu T, Jiang X.  2021.  EOSAFE: Security Analysis of EOSIO Smart Contracts. 30th USENIX Security Symposium (USENIX Security 21). :1271--1288.
Jing P, Tang Q, Du Y, Xue L, Luo X, Wang T, Nie S, Wu S.  2021.  Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations. 30th USENIX Security Symposium (USENIX Security 21). :3237--3254.
Zhang X, Wang N, Shen H, Ji S, Luo X, Wang T.  2020.  Interpretable Deep Learning under Fire. 29th USENIX Security Symposium (USENIX Security 20). :1659--1676.
Kang Q, Xue L, Morrison A, Tang Y, Chen A, Luo X.  2020.  Programmable In-Network Security for Context-aware BYOD Policies. 29th USENIX Security Symposium (USENIX Security 20). :595-612.
Cheng Z, Hou X, Li R, Zhou Y, Luo X, Li J, Ren K.  2019.  Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :47--60.
Morrison A, Xue L, Chen A, Luo X.  2018.  Enforcing Context-Aware BYOD Policies with In-Network Security. 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18).
Xue L, Zhou Y, Chen T, Luo X, Gu G.  2017.  Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. 26th USENIX Security Symposium (USENIX Security 17). :289--306.
Xue L, Luo X, Chan EWW, Zhan X.  2014.  Towards Detecting Target Link Flooding Attack. 28th Large Installation System Administration Conference (LISA14). :90--105.
Luo X, Chang RKC.  2005.  Novel Approaches to End-to-End Packet Reordering Measurement. Internet Measurement Conference 2005 (IMC 05).