XiaoFeng Wang
Indiana University Bloomington
H-index: 64
North America-United States
Top articles of XiaoFeng Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs | arXiv preprint arXiv:2402.11438 | Wenhao Wang Linke Song Benshan Mei Shuang Liu Shijun Zhao | 2024/2/18 |
Gradient shaping: Enhancing backdoor attack against reverse engineering | arXiv preprint arXiv:2301.12318 | Rui Zhu Di Tang Siyuan Tang Guanhong Tao Shiqing Ma | 2023/1/29 |
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation | Zhi Li Weijie Liu XiaoFeng Wang Bin Yuan Hongliang Tian | 2023/11/15 | |
Credit karma: Understanding security implications of exposed cloud services through automated capability inference | Xueqiang Wang Yuqiong Sun Susanta Nanda XiaoFeng Wang | 2023 | |
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning | Zihao Wang Jiale Guan XiaoFeng Wang Wenhao Wang Luyi Xing | 2023/11/15 | |
HE-Booster: an efficient polynomial arithmetic acceleration on GPUs for fully homomorphic encryption | IEEE Transactions on Parallel and Distributed Systems | Zhiwei Wang Peinan Li Rui Hou Zhihao Li Jiangfeng Cao | 2023/1/9 |
Union under duress: understanding hazards of duplicate resource mismediation in android software supply chain | Xueqiang Wang Yifan Zhang XiaoFeng Wang Yan Jia Luyi Xing | 2023 | |
AutoPwn: Artifact-assisted Heap Exploit Generation for CTF PWN Competitions | IEEE Transactions on Information Forensics and Security | Dandan Xu Kai Chen Miaoqian Lin Chaoyang Lin Xiaofeng Wang | 2023/10/5 |
Are You Spying on Me?{Large-Scale} Analysis on {IoT} Data Exposure through Companion Apps | Yuhong Nan Xueqiang Wang Luyi Xing Xiaojing Liao Ruoyu Wu | 2023 | |
Sherlock on Specs: Building {LTE} Conformance Tests through Automated Reasoning | Yi Chen Di Tang Yepeng Yao Mingming Zha XiaoFeng Wang | 2023 | |
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild | Jiaqi Chen Yibo Wang Yuxuan Zhou Wanning Ding Yuzhe Tang | 2023/7/3 | |
{XCheck}: Verifying Integrity of 3D Printed {Patient-Specific} Devices via Computing Tomography | Zhiyuan Yu Yuanhaur Chang Shixuan Zhai Nicholas Deily Tao Ju | 2023 | |
Selective amnesia: On efficient, high-fidelity and blind suppression of backdoor effects in trojaned machine learning models | Rui Zhu Di Tang Siyuan Tang XiaoFeng Wang Haixu Tang | 2023/5/21 | |
A verified confidential computing as a service framework for privacy preservation | Hongbo Chen Haobin Hiroki Chen Mingshen Sun Kang Li Zhaofeng Chen | 2023 | |
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems. | Mingming Zha Jice Wang Yuhong Nan Xiaofeng Wang Yuqing Zhang | 2022 | |
Order-disorder: Imitation adversarial attacks for black-box neural ranking models | Jiawei Liu Yangyang Kang Di Tang Kaisong Song Changlong Sun | 2022/11/7 | |
Seeing the forest for the trees: Understanding security hazards in the {3GPP} ecosystem through intelligent analysis on change requests | Yi Chen Di Tang Yepeng Yao Mingming Zha XiaoFeng Wang | 2022 | |
Clues in tweets: Twitter-guided discovery and analysis of SMS spam | Siyuan Tang Xianghang Mi Ying Li XiaoFeng Wang Kai Chen | 2022/11/7 | |
Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms | Zhi Li Weijie Liu Hongbo Chen XiaoFeng Wang Xiaojing Liao | 2022/5/22 | |
Sok: A modularized approach to study the security of automatic speech recognition systems | ACM Transactions on Privacy and Security | Yuxuan Chen Jiangshan Zhang Xuejing Yuan Shengzhi Zhang Kai Chen | 2022/5/19 |