Containerleaks: Emerging security threats of information leakages in container clouds X Gao, Z Gu, M Kayaalp, D Pendarakis, H Wang 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 165 | 2017 |
Packet injection attack and its defense in software-defined networks S Deng, X Gao, Z Lu, X Gao IEEE Transactions on Information Forensics and Security 13 (3), 695-705, 2017 | 97 | 2017 |
Exploiting eye tracking for smartphone authentication D Liu, B Dong, X Gao, H Wang Applied Cryptography and Network Security: 13th International Conference …, 2015 | 66 | 2015 |
Houdini's escape: Breaking the resource rein of linux control groups X Gao, Z Gu, Z Li, H Jamjoom, C Wang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 60 | 2019 |
A study on the security implications of information leakages in container clouds X Gao, B Steenkamer, Z Gu, M Kayaalp, D Pendarakis, H Wang IEEE Transactions on Dependable and Secure Computing 18 (1), 174-191, 2018 | 53 | 2018 |
DoS vulnerabilities and mitigation strategies in software-defined networks S Deng, X Gao, Z Lu, Z Li, X Gao Journal of Network and Computer Applications 125, 209-219, 2019 | 51 | 2019 |
{Charger-Surfing}: Exploiting a Power Line {Side-Channel} for Smartphone Information Leakage P Cronin, X Gao, C Yang, H Wang 30th USENIX Security Symposium (USENIX Security 21), 681-698, 2021 | 39 | 2021 |
Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center. X Gao, Z Xu, H Wang, L Li, X Wang NDSS, 2018 | 37 | 2018 |
E-android: A new energy profiling tool for smartphones X Gao, D Liu, D Liu, H Wang, A Stavrou 2017 IEEE 37th international conference on distributed computing systems …, 2017 | 31 | 2017 |
Pmdroid: Permission supervision for android advertising X Gao, D Liu, H Wang, K Sun 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 120-129, 2015 | 25 | 2015 |
A framework for behavioral biometric authentication using deep metric learning on mobile devices C Wang, Y Xiao, X Gao, L Li, J Wang IEEE Transactions on Mobile Computing 22 (1), 19-36, 2021 | 24 | 2021 |
Location privacy breach: Apps are watching you in background D Liu, X Gao, H Wang 2017 IEEE 37th international conference on distributed computing systems …, 2017 | 20 | 2017 |
Detecting passive cheats in online games via performance-skillfulness inconsistency D Liu, X Gao, M Zhang, H Wang, A Stavrou 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 18 | 2017 |
Red alert for power leakage: Exploiting intel rapl-induced side channels Z Zhang, S Liang, F Yao, X Gao Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 17 | 2021 |
Evade deep image retrieval by stashing private images in the hash space Y Xiao, C Wang, X Gao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 17 | 2020 |
An Exploration of ARM System-Level Cache and GPU Side Channels P Cronin, X Gao, H Wang, C Cotton Annual Computer Security Applications Conference, 784-795, 2021 | 15 | 2021 |
Exploring the Unchartered Space of Container Registry Typosquatting G Liu, X Gao, H Wang, K Sun 31st USENIX Security Symposium (USENIX Security 22), 35-51, 2022 | 14 | 2022 |
Why" Some" Like It Hot Too: Thermal Attack on Data Centers X Gao, Z Xu, H Wang, L Li, X Wang Proceedings of the 2017 ACM SIGMETRICS/International Conference on …, 2017 | 14 | 2017 |
Investigating Package Related Security Threats in Software Registries Y Gu, L Ying, Y Pu, X Hu, H Chai, R Wang, X Gao, H Duan 2023 IEEE Symposium on Security and Privacy (SP), 1578-1595, 2023 | 10 | 2023 |
Investigating security vulnerabilities in a hot data center with reduced cooling redundancy X Gao, G Liu, Z Xu, H Wang, L Li, X Wang IEEE Transactions on Dependable and Secure Computing 19 (1), 208-226, 2020 | 10 | 2020 |