Biblio

Export 14 results:
Filters: Author is Xinyu Xing  [Clear All Filters]
2023
Yu J, Guo W, Qin Q, Wang G, Wang T, Xing X.  2023.  AIRS: Explanation for Deep Reinforcement Learning based Security Applications. 32nd USENIX Security Symposium (USENIX Security 23). :7375--7392.
Wu Y, Lin Z, Chen Y, Le DK, Mu D, Xing X.  2023.  Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness. 32nd USENIX Security Symposium (USENIX Security 23). :4247--4264.
Guo W, Wu X, Wang L, Xing X, Song D.  2023.  PATROL: Provable Defense against Adversarial Policy in Two-player Games. 32nd USENIX Security Symposium (USENIX Security 23). :3943--3960.
2021
Wu X, Guo W, Wei H, Xing X.  2021.  Adversarial Policy Training against Deep Reinforcement Learning. 30th USENIX Security Symposium (USENIX Security 21). :1883--1900.
Yang L, Guo W, Hao Q, Ciptadi A, Ahmadzadeh A, Xing X, Wang G.  2021.  CADE: Detecting and Explaining Concept Drift Samples for Security Applications. 30th USENIX Security Symposium (USENIX Security 21). :2327--2344.
2020
Dai J, Zhang Y, Jiang Z, Zhou Y, Chen J, Xing X, Zhang X, Tan X, Yang M, Yang Z.  2020.  BScout: Direct Whole Patch Presence Test for Java Executables. 29th USENIX Security Symposium (USENIX Security 20). :1147--1164.
2018
Wu W, Chen Y, Xu J, Xing X, Gong X, Zou W.  2018.  FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. 27th USENIX Security Symposium (USENIX Security 18). :781--797.
Mu D, Cuevas A, Yang L, Hu H, Xing X, Mao B, Wang G.  2018.  Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. 27th USENIX Security Symposium (USENIX Security 18). :919--936.
2017
Xu J, Mu D, Xing X, Liu P, Chen P, Mao B.  2017.  Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. 26th USENIX Security Symposium (USENIX Security 17). :17-32.