USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 23 results:
Filters: Author is Xiapu Luo [Clear All Filters]
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information. 32nd USENIX Security Symposium (USENIX Security 23). :1181--1198.
.
2023. DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. 32nd USENIX Security Symposium (USENIX Security 23). :6575--6592.
.
2023. An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. 32nd USENIX Security Symposium (USENIX Security 23). :589--606.
.
2023. Panda: Security Analysis of Algorand Smart Contracts. 32nd USENIX Security Symposium (USENIX Security 23). :1811--1828.
.
2023. PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems. 32nd USENIX Security Symposium (USENIX Security 23). :1379--1396.
.
2023. On the Security Risks of Knowledge Graph Reasoning. 32nd USENIX Security Symposium (USENIX Security 23). :3259--3276.
.
2023. SHELTER: Extending Arm CCA with Isolation in User Space. 32nd USENIX Security Symposium (USENIX Security 23). :6257--6274.
.
2023. FOAP: Fine-Grained Open-World Android App Fingerprinting. 31st USENIX Security Symposium (USENIX Security 22). :1579--1596.
.
2022. PolyCruise: A Cross-Language Dynamic Information Flow Analysis. 31st USENIX Security Symposium (USENIX Security 22). :2513--2530.
.
2022. SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. 31st USENIX Security Symposium (USENIX Security 22). :1921--1938.
.
2022. On the Security Risks of AutoML. 31st USENIX Security Symposium (USENIX Security 22). :3953--3970.
.
2022. SOTER: Guarding Black-box Inference for General Neural Networks at the Edge. 2022 USENIX Annual Technical Conference (USENIX ATC 22). :723--738.
.
2022. Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. 31st USENIX Security Symposium (USENIX Security 22). :1939--1956.
.
2022. EOSAFE: Security Analysis of EOSIO Smart Contracts. 30th USENIX Security Symposium (USENIX Security 21). :1271--1288.
.
2021. Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations. 30th USENIX Security Symposium (USENIX Security 21). :3237--3254.
.
2021. Interpretable Deep Learning under Fire. 29th USENIX Security Symposium (USENIX Security 20). :1659--1676.
.
2020. Programmable In-Network Security for Context-aware BYOD Policies. 29th USENIX Security Symposium (USENIX Security 20). :595-612.
.
2020. Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :47--60.
.
2019. Enforcing Context-Aware BYOD Policies with In-Network Security. 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18).
.
2018. Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. 26th USENIX Security Symposium (USENIX Security 17). :289--306.
.
2017. Towards Detecting Target Link Flooding Attack. 28th Large Installation System Administration Conference (LISA14). :90--105.
.
2014. Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring. 2009 USENIX Annual Technical Conference (USENIX ATC 09).
.
2009. Novel Approaches to End-to-End Packet Reordering Measurement. Internet Measurement Conference 2005 (IMC 05).
.
2005.