default search action
Renjie Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Suhang Fan, Wei Xu, Renjie Xie, Shi Jin, Derrick Wing Kwan Ng, Naofal Al-Dhahir:
Deep CSI Compression for Dual-Polarized Massive MIMO Channels With Disentangled Representation Learning. IEEE Trans. Commun. 72(9): 5564-5580 (2024) - [j10]Aoting Hu, Zhigang Lu, Renjie Xie, Minhui Xue:
${\sf VeriDIP}$VeriDIP: Verifying Ownership of Deep Neural Networks Through Privacy Leakage Fingerprints. IEEE Trans. Dependable Secur. Comput. 21(4): 2568-2584 (2024) - [j9]Renjie Xie, Jiahao Cao, Yuxi Zhu, Yixiang Zhang, Yi He, Hanyi Peng, Yixiao Wang, Mingwei Xu, Kun Sun, Enhuan Dong, Qi Li, Menghao Zhang, Jiang Li:
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. IEEE Trans. Inf. Forensics Secur. 19: 7659-7673 (2024) - [c14]Shicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang:
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. NDSS 2024 - [c13]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. NDSS 2024 - [i13]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. CoRR abs/2403.15271 (2024) - [i12]Suhang Fan, Wei Xu, Renjie Xie, Shi Jin, Derrick Wing Kwan Ng, Naofal Al-Dhahir:
Deep CSI Compression for Dual-Polarized Massive MIMO Channels with Disentangled Representation Learning. CoRR abs/2403.19185 (2024) - [i11]Haoxing Liu, Renjie Xie, Haoshen Qin, Yizhou Li:
Research on Dangerous Flight Weather Prediction based on Machine Learning. CoRR abs/2406.12298 (2024) - [i10]Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller:
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective. CoRR abs/2409.06130 (2024) - 2023
- [j8]Renjie Xie, Wei Xu, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
Disentangled Representation Learning for RF Fingerprint Extraction Under Unknown Channel Statistics. IEEE Trans. Commun. 71(7): 3946-3962 (2023) - [j7]Ziqing Yin, Renjie Xie, Wei Xu, Zhaohui Yang, Xiaohu You:
Self-Information Domain-Based Neural CSI Compression With Feature Coupling. IEEE Trans. Veh. Technol. 72(10): 13661-13665 (2023) - [c12]Renjie Xie, Yixiao Wang, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. ACM TUR-C 2023: 131-132 - [c11]Jiang Li, Jiahao Cao, Zili Meng, Renjie Xie, Mingwei Xu:
RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features. ICC 2023: 5240-5246 - [c10]Jiachen Ke, Renjie Xie, Wei Xu:
Unsupervised Stock Clustering Based on Adversarial Learning and Its Application in Quantitative Investment. ICEME 2023: 296-302 - [c9]Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. USENIX Security Symposium 2023: 625-642 - [i9]Jiayuan Chen, Xiang Zhang, Yinfei Xu, Tianli Zhao, Renjie Xie, Wei Xu:
Understanding and Improving Deep Graph Neural Networks: A Probabilistic Graphical Model Perspective. CoRR abs/2301.10536 (2023) - [i8]Ziqing Yin, Renjie Xie, Wei Xu, Zhaohui Yang, Xiaohu You:
Self-information Domain-based Neural CSI Compression with Feature Coupling. CoRR abs/2305.07662 (2023) - [i7]Aoting Hu, Zhigang Lu, Renjie Xie, Minhui Xue:
VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints. CoRR abs/2310.10656 (2023) - 2022
- [j6]Renjie Xie, Jiahao Cao, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. IEEE/ACM Trans. Netw. 30(5): 2158-2172 (2022) - [j5]Ziqing Yin, Wei Xu, Renjie Xie, Shaoqing Zhang, Derrick Wing Kwan Ng, Xiaohu You:
Deep CSI Compression for Massive MIMO: A Self-Information Model-Driven Neural Network. IEEE Trans. Wirel. Commun. 21(10): 8872-8886 (2022) - [i6]Ziqing Yin, Wei Xu, Renjie Xie, Shaoqing Zhang, Derrick Wing Kwan Ng, Xiaohu You:
Deep CSI Compression for Massive MIMO: A Self-information Model-driven Neural Network. CoRR abs/2204.11567 (2022) - [i5]Renjie Xie, Wei Xu, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics. CoRR abs/2208.02724 (2022) - 2021
- [j4]Renjie Xie, Wei Xu, Yanzhi Chen, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication. IEEE Trans. Inf. Forensics Secur. 16: 4435-4450 (2021) - [j3]Zhicheng Liu, Jun Cao, Renjie Xie, Junyan Yang, Qiao Wang:
Modeling Submarket Effect for Real Estate Hedonic Valuation: A Probabilistic Approach. IEEE Trans. Knowl. Data Eng. 33(7): 2943-2955 (2021) - [c8]Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue:
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. CCS 2021: 2096-2112 - [i4]Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue:
TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing. CoRR abs/2107.13190 (2021) - [i3]Renjie Xie, Wei Xu, Yanzhi Chen, Jiabao Yu, Aiqun Hu, Derrick Wing Kwan Ng, A. Lee Swindlehurst:
A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication. CoRR abs/2108.04436 (2021) - 2020
- [c7]Yanzhi Chen, Renjie Xie, Zhanxing Zhu:
On Breaking Deep Generative Model-based Defenses and Beyond. ICML 2020: 1736-1745 - [c6]Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020
2010 – 2019
- 2019
- [j2]Yanzhi Chen, Yan Wo, Renjie Xie, Chudan Wu, Guoqiang Han:
Deep Secure Quantization: On secure biometric hashing against similarity-based attacks. Signal Process. 154: 314-323 (2019) - [c5]Renjie Xie, Mingwei Xu, Jiahao Cao, Qi Li:
SoftGuard: Defend Against the Low-Rate TCP Attack in SDN. ICC 2019: 1-6 - [c4]Renjie Xie, Yuancheng Wang, Tian Xie, Yuhao Zhang, Li Xu, Jian Lu, Qiao Wang:
Adversarial Training for Video Disentangled Representation. MMM (2) 2019: 532-543 - [c3]Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. USENIX Security Symposium 2019: 19-36 - [i2]Renjie Xie, Yanzhi Chen, Yan Wo, Qiao Wang:
A Deep, Information-theoretic Framework for Robust Biometric Recognition. CoRR abs/1902.08785 (2019) - [i1]Ning Wang, Xianhan Zeng, Renjie Xie, Zefei Gao, Yi Zheng, Ziran Liao, Junyan Yang, Qiao Wang:
Unsupervised Classification of Street Architectures Based on InfoGAN. CoRR abs/1905.12844 (2019) - 2017
- [j1]Tiziana Fanni, Lin Li, Timo Viitanen, Carlo Sau, Renjie Xie, Francesca Palumbo, Luigi Raffo, Heikki Huttunen, Jarmo Takala, Shuvra S. Bhattacharyya:
Hardware design methodology using lightweight dataflow and its integration with low power techniques. J. Syst. Archit. 78: 15-29 (2017) - 2016
- [c2]Lin Li, Tiziana Fanni, Timo Viitanen, Renjie Xie, Francesca Palumbo, Luigi Raffo, Heikki Huttunen, Jarmo Takala, Shuvra S. Bhattacharyya:
Low power design methodology for signal processing systems using lightweight dataflow techniques. DASIP 2016: 82-89 - [c1]Renjie Xie, Heikki Huttunen, Shuoxin Lin, Shuvra S. Bhattacharyya, Jarmo Takala:
Resource-constrained implementation and optimization of a deep neural network for vehicle classification. EUSIPCO 2016: 1862-1866
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint