Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 76 matches
- 2023
- Jingyi Ning, Lei Xie, Chuyu Wang, Yanling Bu, Fengyuan Xu, Da-Wei Zhou, Sanglu Lu, Baoliu Ye:
RF-Badge: Vital Sign-Based Authentication via RFID Tag Array on Badges. IEEE Trans. Mob. Comput. 22(2): 1170-1184 (2023) - Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong:
LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps. IEEE Trans. Mob. Comput. 22(12): 7138-7155 (2023) - Wei Tong, Wenjie Chen, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage. IEEE Trans. Mob. Comput. 22(9): 5463-5478 (2023) - Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans:
Manipulating Transfer Learning for Property Inference. CVPR 2023: 15975-15984 - Hao Wu, Bo Yang, Xiaopeng Ke, Siyi He, Fengyuan Xu, Sheng Zhong:
GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User Side. ICASSP 2023: 1-5 - Jiawei Huang, Hao Han, Fengyuan Xu, Bing Chen:
SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGX. ISSRE 2023: 148-159 - Shucheng Li, Runchuan Wang, Hao Wu, Sheng Zhong, Fengyuan Xu:
SIEGE: Self-Supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection. ACM Multimedia 2023: 8881-8890 - Shucheng Li, Boyu Chang, Bo Yang, Hao Wu, Sheng Zhong, Fengyuan Xu:
Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English. SIGIR 2023: 749-759 - Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans:
Manipulating Transfer Learning for Property Inference. CoRR abs/2303.11643 (2023) - 2022
- Yutao Tang, Zhengrui Qin, Zhiqiang Lin, Yue Li, Shanhe Yi, Fengyuan Xu, Qun Li:
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. IEEE Trans. Computers 71(12): 3349-3360 (2022) - Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans:
Stealthy Backdoors as Compression Artifacts. IEEE Trans. Inf. Forensics Secur. 17: 1372-1387 (2022) - Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang:
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications. CCS 2022: 921-935 - Xiaopeng Ke, Boyu Chang, Hao Wu, Fengyuan Xu, Sheng Zhong:
Towards Practical and Efficient Long Video Summary. ICASSP 2022: 1770-1774 - Yulong Tian, Xiaopeng Ke, Zeyi Tao, Shaohua Ding, Fengyuan Xu, Qun Li, Hao Han, Sheng Zhong, Xinyi Fu:
Privacy-Preserving and Robust Federated Deep Metric Learning. IWQoS 2022: 1-11 - Ligeng Chen, Zhongling He, Hao Wu, Fengyuan Xu, Yi Qian, Bing Mao:
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy. SANER 2022: 112-122 - Hao Wu, Yuhang Gong, Xiaopeng Ke, Hanzhong Liang, Minghao Li, Fengyuan Xu, Yunxin Liu, Sheng Zhong:
Automation Slicing and Testing for in-App Deep Learning Models. CoRR abs/2205.07228 (2022) - 2021
- Qin Li, Pan Yan, Xiao Huang, Liuqing Yang, Fengyuan Xu, Yancheng You:
On Developing Piecewise Rational Mapping with Fine Regulation Capability for WENO Schemes. J. Sci. Comput. 88(3): 75 (2021) - Yuan Zhang, Yunlong Mao, Minze Xu, Fengyuan Xu, Sheng Zhong:
Towards Thwarting Template Side-Channel Attacks in Secure Cloud Deduplications. IEEE Trans. Dependable Secur. Comput. 18(3): 1008-1018 (2021) - Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. ICDE 2021: 2705-2708 - Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. ICDE 2021: 193-204 - Minze Xu, Yuan Zhang, Fengyuan Xu, Sheng Zhong:
Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels. IWQoS 2021: 1-10 - Manni Wang, Shaohua Ding, Ting Cao, Yunxin Liu, Fengyuan Xu:
AsyMo: scalable and efficient deep-learning inference on asymmetric mobile CPUs. MobiCom 2021: 215-228 - Hao Wu, Xuejin Tian, Minghao Li, Yunxin Liu, Ganesh Ananthanarayanan, Fengyuan Xu, Sheng Zhong:
PECAM: privacy-enhanced video streaming and analytics via securely-reversible transformation. MobiCom 2021: 229-241 - Hao Wu, Xuejin Tian, Yuhang Gong, Xing Su, Minghao Li, Fengyuan Xu:
DAPter: Preventing User Data Abuse in Deep Learning Inference Services. WWW 2021: 1017-1028 - Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. CoRR abs/2101.06761 (2021) - Qin Li, Pan Yan, Xiao Huang, Liuqing Yang, Fengyuan Xu:
On developing piecewise rational mapping with fine regulation capability for WENO schemes. CoRR abs/2101.11226 (2021) - Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong:
App Developer Centric Trusted Execution Environment. CoRR abs/2102.02465 (2021) - Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans:
Stealthy Backdoors as Compression Artifacts. CoRR abs/2104.15129 (2021) - Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong:
Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection. CoRR abs/2106.10176 (2021) - Fengyuan Xu, Pan Yan, Qin Li, Yancheng You:
Quasi-linear analysis of dispersion relation preservation for nonlinear schemes. CoRR abs/2110.15508 (2021)
skipping 46 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-29 02:10 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint