关注
Lili Xu
Lili Xu
Institute of Information Engineering, Chinese Academy of Sciences and Ecole Polytechnique
在 lix.polytechnique.fr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Generalized bisimulation metrics
K Chatzikokolakis, D Gebler, C Palamidessi, L Xu
International Conference on Concurrency Theory, 32-46, 2014
682014
A Survey on Adversarial Attacks in Computer Vision: Taxonomy, Visualization and Future Directions
T Long, Q Gao, L Xu, Z Zhou
Computers & Security, 102847, 2022
522022
1dVul: Discovering 1-Day Vulnerabilities through Binary Patches
J Peng, F Li, B Liu, L Xu, B Liu, K Chen, W Huo
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
352019
Metrics for differential privacy in concurrent systems
L Xu, K Chatzikokolakis, H Lin
International Conference on Formal Techniques for Distributed Objects …, 2014
242014
B2SMatcher: fine-Grained version identification of open-Source software in binary files
G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo
Cybersecurity 4 (1), 1-21, 2021
112021
Modular reasoning about differential privacy in a probabilistic process calculus
L Xu
International Symposium on Trustworthy Global Computing, 198-212, 2012
92012
A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection
M Xu, S Li, L Xu, F Li, W Huo, J Ma, X Li, Q Huang
International Conference on Information Security and Cryptology, 404-423, 2018
82018
A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs
H Su, L Xu, H Chao, F Li, Z Yuan, J Zhou, W Huo
2022 IEEE 33rd International Symposium on Software Reliability Engineering …, 2022
62022
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
L Xu, M Xu, F Li, W Huo
Cybersecurity 3 (1), 1-19, 2020
62020
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis
Q Sun, L Xu, Y Xiao, F Li, H Su, Y Liu, H Huang, W Huo
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
42022
Formal verification of differential privacy in concurrent systems
L Xu
Ecole Polytechnique (Palaiseau, France), 2015
42015
Splendor: Static Detection of Stored XSS in Modern Web Applications
H Su, F Li, L Xu, W Hu, Y Sun, Q Sun, H Chao, W Huo
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
32023
Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines Algorithm
K Zhan, L Xu, Z Yuan, W Zhang
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
32018
Complete proof systems for amortised probabilistic bisimulations
LL Xu, HM Lin
Journal of Computer Science and Technology 31 (2), 300-316, 2016
12016
分摊概率互模拟的完备证明系统
LL Xu, HM Lin
计算机科学技术学报 31 (2), 300-316, 2016
2016
A Multiplicative Variant of the Kantorovich distance for Differential Privacy
L Xu, K Chatzikokolakis, C Palamidessi
系统目前无法执行此操作,请稍后再试。
文章 1–16