xinyu xing
Penn State University
H-index: 34
North America-United States
Top articles of xinyu xing
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
BandFuzz: A Practical Framework for Collaborative Fuzzing with Reinforcement Learning | Wenxuan Shi Hongwei Li Jiahao Yu Wenbo Guo Xinyu Xing | 2024 | |
Statemask: Explaining deep reinforcement learning through state mask | Advances in Neural Information Processing Systems | Zelei Cheng Xian Wu Jiahao Yu Wenhai Sun Wenbo Guo | 2024/2/13 |
Explaining Deep Learning Based Security Applications | Wenbo Guo Jun Xu Gang Wang Xinyu Xing | 2023/8/11 | |
From grim reality to practical solution: Malware classification in real-world noise | Xian Wu Wenbo Guo Jia Yan Baris Coskun Xinyu Xing | 2023/5/21 | |
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection | Sijia Li Gaopeng Gou Chang Liu Gang Xiong Zhen Li | 2023/12/4 | |
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs | IEEE Transactions on Dependable and Secure Computing | Ziqin Liu Zhenpeng Lin Yueqi Chen Yuhang Wu Yalong Zou | 2023/2/17 |
Assessing prompt injection risks in 200+ custom gpts | arXiv preprint arXiv:2311.11538 | Jiahao Yu Yuhang Wu Dong Shu Mingyu Jin Xinyu Xing | 2023/11/20 |
{PATROL}: Provable Defense against Adversarial Policy in Two-player Games | Wenbo Guo Xian Wu Lun Wang Xinyu Xing Dawn Song | 2023 | |
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections | Kyle Zeng Zhenpeng Lin Kangjie Lu Xinyu Xing Ruoyu Wang | 2023/11/15 | |
Mitigating Security Risks in Linux with {KLAUS}: A Method for Evaluating Patch Correctness | Yuhang Wu Zhenpeng Lin Yueqi Chen Dang K Le Dongliang Mu | 2023 | |
Gptfuzzer: Red teaming large language models with auto-generated jailbreak prompts | arXiv preprint arXiv:2309.10253 | Jiahao Yu Xingwei Lin Xinyu Xing | 2023/9/19 |
{AIRS}: Explanation for Deep Reinforcement Learning based Security Applications | Jiahao Yu Wenbo Guo Qi Qin Gang Wang Ting Wang | 2023 | |
DeJITLeak: eliminating JIT-induced timing side-channel leaks | Qi Qin JulianAndres JiYang Fu Song Taolue Chen Xinyu Xing | 2022/11/7 | |
An In-depth Analysis of Duplicated Linux Kernel Bug Reports. | Dongliang Mu Yuhang Wu Yueqi Chen Zhenpeng Lin Chensheng Yu | 2022 | |
Dirtycred: Escalating privilege in linux kernel | Zhenpeng Lin Yuhang Wu Xinyu Xing | 2022/11/7 | |
GREBE: Unveiling exploitation potential for Linux kernel bugs | Zhenpeng Lin Yueqi Chen Yuhang Wu Dongliang Mu Chensheng Yu | 2022/5/22 | |
Windranger: A directed greybox fuzzer driven by deviation basic blocks | Zhengjie Du Yuekang Li Yang Liu Bing Mao | 2022/5/21 | |
Preventing timing side-channels via security-aware just-in-time compilation | arXiv preprint arXiv:2202.13134 | Qi Qin JulianAndres JiYang Fu Song Taolue Chen Xinyu Xing | 2022/2/26 |
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability | Kyle Zeng Yueqi Chen Haehyun Cho Xinyu Xing Adam Doupé | 2022 | |
Adversarial policy training against deep reinforcement learning | Xian Wu Wenbo Guo Hua Wei Xinyu Xing | 2021 |