Lemna: Explaining deep learning based security applications W Guo, D Mu, J Xu, P Su, G Wang, X Xing proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 343 | 2018 |
Enhancing group recommendation by incorporating social relationship interactions M Gartrell, X Xing, Q Lv, A Beach, R Han, S Mishra, K Seada Proceedings of the 2010 ACM International Conference on Supporting Group …, 2010 | 270 | 2010 |
Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise F Liu, Y Wen, D Zhang, X Jiang, X Xing, D Meng Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 235 | 2019 |
Adversary Resistant Deep Neural Networks with an Application to Malware Detection Q Wang, W Guo, K Zhang, AG Ororbia II, X Xing, CL Giles, X Liu arXiv preprint arXiv:1610.01239, 2016 | 213 | 2016 |
Tabor: A highly accurate approach to inspecting and restoring trojan backdoors in ai systems W Guo, L Wang, X Xing, M Du, D Song arXiv preprint arXiv:1908.01763, 2019 | 206* | 2019 |
Fusing mobile, sensor, and social data to fully enable context-aware computing A Beach, M Gartrell, X Xing, R Han, Q Lv, S Mishra, K Seada Proceedings of the eleventh workshop on mobile computing systems …, 2010 | 191 | 2010 |
Trustshadow: Secure execution of unmodified applications with arm trustzone L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 168 | 2017 |
Towards the detection of inconsistencies in public security vulnerability reports Y Dong, W Guo, Y Chen, X Xing, Y Zhang, G Wang 28th USENIX security symposium (USENIX Security 19), 869-885, 2019 | 145 | 2019 |
{CADE}: Detecting and explaining concept drift samples for security applications L Yang, W Guo, Q Hao, A Ciptadi, A Ahmadzadeh, X Xing, G Wang 30th USENIX Security Symposium (USENIX Security 21), 2327-2344, 2021 | 136 | 2021 |
Understanding malvertising through ad-injecting browser extensions X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee Proceedings of the 24th international conference on world wide web, 1286-1295, 2015 | 131 | 2015 |
Understanding the reproducibility of crowd-reported security vulnerabilities D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang 27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018 | 117 | 2018 |
{FUZE}: Towards facilitating exploit generation for kernel {Use-After-Free} vulnerabilities W Wu, Y Chen, J Xu, X Xing, X Gong, W Zou 27th USENIX Security Symposium (USENIX Security 18), 781-797, 2018 | 116 | 2018 |
Min Du, and Dawn Song. Tabor: A highly accurate approach to inspecting and restoring trojan backdoors in ai systems W Guo, L Wang, X Xing arXiv preprint arXiv:1908.01763 2 (4), 16, 2019 | 98 | 2019 |
Gptfuzzer: Red teaming large language models with auto-generated jailbreak prompts J Yu, X Lin, X Xing arXiv preprint arXiv:2309.10253, 2023 | 97 | 2023 |
Flashguard: Leveraging intrinsic flash properties to defend against encryption ransomware J Huang, J Xu, X Xing, P Liu, MK Qureshi Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 91 | 2017 |
Defending against adversarial samples without security through obscurity W Guo, Q Wang, K Zhang, AG Ororbia, S Huang, X Liu, CL Giles, L Lin, ... 2018 IEEE International Conference on Data Mining (ICDM), 137-146, 2018 | 86* | 2018 |
Backdoorl: Backdoor attack against competitive reinforcement learning L Wang, Z Javed, X Wu, W Guo, X Xing, D Song arXiv preprint arXiv:2105.00579, 2021 | 79 | 2021 |
An empirical evaluation of rule extraction from recurrent neural networks Q Wang, K Zhang, AG Ororbia II, X Xing, X Liu, CL Giles Neural computation 30 (9), 2568-2591, 2018 | 77* | 2018 |
Take this personally: Pollution attacks on personalized services X Xing, W Meng, D Doozan, AC Snoeren, N Feamster, W Lee 22nd USENIX Security Symposium (USENIX Security 13), 671-686, 2013 | 73 | 2013 |
Exposing inconsistent web search results with bobble X Xing, W Meng, D Doozan, N Feamster, W Lee, AC Snoeren Passive and Active Measurement: 15th International Conference, PAM 2014, Los …, 2014 | 68 | 2014 |