default search action
Xiaokuan Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Jia-Hua Xv, Xiaokuan Zhang, Binfeng Zong, Shu-Yu Zheng:
A Side-Lobe Denoise Process for ISAR Imaging Applications: Combined Fast Clean and Spatial Focus Technique. Remote. Sens. 16(13): 2279 (2024) - [j6]Ninghui Li, Xiaokuan Zhang, Fan Lv, Binfeng Zong:
Direction-of-Arrival Estimation via Sparse Bayesian Learning Exploiting Hierarchical Priors with Low Complexity. Sensors 24(7): 2336 (2024) - [j5]Ninghui Li, Xiaokuan Zhang, Binfeng Zong, Fan Lv, Jiahua Xu, Zhaolong Wang:
An off-grid direction-of-arrival estimator based on sparse Bayesian learning with three-stage hierarchical Laplace priors. Signal Process. 218: 109371 (2024) - [j4]Xiaokuan Zhang, Yang Zhang, Yinqian Zhang:
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 21(3): 1032-1049 (2024) - [c25]Yongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue, Xiapu Luo, Qingchuan Zhao:
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. ICSE 2024: 63:1-63:13 - [c24]Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner, Mona Vij, Taesoo Kim:
SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification. NDSS 2024 - [c23]Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. RAID 2024: 298-316 - [c22]Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan:
Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements. USENIX Security Symposium 2024 - [i7]Anh Nguyen, Xiaokuan Zhang, Zhisheng Yan:
Penetration Vision through Virtual Reality Headsets: Identifying 360-degree Videos from Head Movements. CoRR abs/2402.11446 (2024) - [i6]Kailun Yan, Xiaokuan Zhang, Wenrui Diao:
Stealing Trust: Unveiling Vulnerabilities in Web3 Authentication. CoRR abs/2406.00523 (2024) - [i5]Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu:
VPVet: Vetting Privacy Policies of Virtual Reality Apps. CoRR abs/2409.00740 (2024) - 2023
- [j3]Xv Jia-Hua, Xiaokuan Zhang, Zheng Shu-Yu, Binfeng Zong, Ma Qian-Kuo, Wang Yang:
An Efficient Parameter Estimation Algorithm of the GTD Model Based on the MMP Algorithm. IEEE Access 11: 22542-22552 (2023) - [c21]Adil Ahmad, Botong Ou, Congyu Liu, Xiaokuan Zhang, Pedro Fonseca:
Veil: A Protected Services Framework for Confidential Virtual Machines. ASPLOS (4) 2023: 378-393 - [c20]Tao Ni, Xiaokuan Zhang, Qingchuan Zhao:
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. CCS 2023: 253-267 - [c19]Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. MobiCom 2023: 73:1-73:15 - [c18]Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. SP 2023: 3399-3415 - [c17]Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu:
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices. USENIX Security Symposium 2023: 1073-1090 - [i4]Mengya Zhang, Xiaokuan Zhang, Josh Barbee, Yinqian Zhang, Zhiqiang Lin:
SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. CoRR abs/2312.12573 (2023) - 2022
- [j2]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Defeating traffic analysis via differential privacy: a case study on streaming traffic. Int. J. Inf. Sec. 21(3): 689-706 (2022) - [c16]Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang:
NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud. CCS 2022: 2385-2399 - [c15]Qiankuo Ma, Xiaokuan Zhang, Yang Wang, Binfeng Zong, Jiahua Xv, Shuyu Zheng, Yongquan Su:
Dynamic RCS Statistical Modeling of Stealth Aircraft. EITCE 2022: 395-399 - [c14]Fan Sang, Ming-Wei Shih, Sangho Lee, Xiaokuan Zhang, Michael Steiner, Mona Vij, Taesoo Kim:
PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis. USENIX ATC 2022: 455-472 - [i3]Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, Zhiqiang Lin:
An Empirical Study on Ethereum Private Transactions and the Security Implications. CoRR abs/2208.02858 (2022) - 2021
- [c13]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CCS 2021: 271-286 - [c12]Suibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin:
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic. CCS 2021: 287-303 - [i2]Tong Zhu, Yan Meng, Haotian Hu, Xiaokuan Zhang, Minhui Xue, Haojin Zhu:
Dissecting Click Fraud Autonomy in the Wild. CoRR abs/2105.11103 (2021) - [i1]Jungwon Lim, Yonghwi Jin, Mansour Alharthi, Xiaokuan Zhang, Jinho Jung, Rajat Gupta, Kuilin Li, Daehee Jang, Taesoo Kim:
SOK: On the Analysis of Web Browser Security. CoRR abs/2112.15561 (2021) - 2020
- [c11]Frederik Brudy, David Ledo, Michel Pahud, Nathalie Henry Riche, Christian Holz, Anand Waghmare, Hemant Bhaskar Surale, Marcus Peinado, Xiaokuan Zhang, Shannon Joyner, Badrish Chandramouli, Umar Farooq Minhas, Jonathan Goldstein, William Buxton, Ken Hinckley:
SurfaceFleet: Exploring Distributed Interactions Unbounded from Device, Application, User, and Time. UIST 2020: 7-21 - [c10]Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. USENIX Security Symposium 2020: 2775-2792
2010 – 2019
- 2019
- [c9]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. NDSS 2019 - 2018
- [c8]Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin:
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. ACSAC 2018: 89-100 - [c7]Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu:
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. CCS 2018: 1074-1088 - [c6]Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, XiaoFeng Wang:
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. NDSS 2018 - 2017
- [c5]Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. AsiaCCS 2017: 7-18 - 2016
- [c4]Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang:
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices. CCS 2016: 858-870 - [c3]Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, Radu Teodorescu:
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. USENIX Security Symposium 2016: 19-35 - 2015
- [c2]Bett Ben Chirchir, Xiaokuan Zhang, Mengyuan Li, Qiyang Qian, Na Ruan, Haojin Zhu:
SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices. ICCC 2015: 1-6 - 2014
- [c1]Xiaokuan Zhang, Haizhong Zheng, Xiaolong Li, Suguo Du, Haojin Zhu:
You are where you have been: Sybil detection via geo-location analysis in OSNs. GLOBECOM 2014: 698-703 - 2012
- [j1]He-Xiu Xu, Guang-Ming Wang, Xiaokuan Zhang, Xiao-Lei Yang:
Novel Compact Dual-Band Rat-Race Coupler Combining Fractal Geometry and CRLH TLs. Wirel. Pers. Commun. 66(4): 855-864 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint