USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 14 results:
Filters: Author is Xinyu Xing [Clear All Filters]
AIRS: Explanation for Deep Reinforcement Learning based Security Applications. 32nd USENIX Security Symposium (USENIX Security 23). :7375--7392.
.
2023. Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness. 32nd USENIX Security Symposium (USENIX Security 23). :4247--4264.
.
2023. PATROL: Provable Defense against Adversarial Policy in Two-player Games. 32nd USENIX Security Symposium (USENIX Security 23). :3943--3960.
.
2023. Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. 31st USENIX Security Symposium (USENIX Security 22). :71--88.
.
2022. Adversarial Policy Training against Deep Reinforcement Learning. 30th USENIX Security Symposium (USENIX Security 21). :1883--1900.
.
2021. CADE: Detecting and Explaining Concept Drift Samples for Security Applications. 30th USENIX Security Symposium (USENIX Security 21). :2327--2344.
.
2021. BScout: Direct Whole Patch Presence Test for Java Executables. 29th USENIX Security Symposium (USENIX Security 20). :1147--1164.
.
2020. All Your Clicks Belong to Me: Investigating Click Interception on the Web. 28th USENIX Security Symposium (USENIX Security 19). :941--957.
.
2019. DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. 28th USENIX Security Symposium (USENIX Security 19). :1787--1804.
.
2019. KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. 28th USENIX Security Symposium (USENIX Security 19). :1187--1204.
.
2019. Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. 28th USENIX Security Symposium (USENIX Security 19). :869--885.
.
2019. FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. 27th USENIX Security Symposium (USENIX Security 18). :781--797.
.
2018. Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. 27th USENIX Security Symposium (USENIX Security 18). :919--936.
.
2018. Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. 26th USENIX Security Symposium (USENIX Security 17). :17-32.
.
2017.