Neural machine translation inspired binary code similarity comparison beyond function pairs F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019 | 247 | 2019 |
Touch well before use: Intuitive and secure authentication for iot devices X Li, F Yan, F Zuo, Q Zeng, L Luo The 25th annual international conference on mobile computing and networking …, 2019 | 59 | 2019 |
T2pair: Secure and usable pairing for heterogeneous iot devices X Li, Q Zeng, L Luo, T Luo Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020 | 52 | 2020 |
Identifying child users via touchscreen interactions Y Cheng, X Ji, X Li, T Zhang, S Malebary, X Qu, W Xu ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25, 2020 | 23 | 2020 |
icare: Automatic and user-friendly child identification on smartphones X Li, S Malebary, X Qu, X Ji, Y Cheng, W Xu Proceedings of the 19th International Workshop on Mobile Computing Systems …, 2018 | 18 | 2018 |
Exploiting the inherent limitation of l0 adversarial examples F Zuo, B Yang, X Li, Q Zeng 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 17* | 2019 |
Review helpfulness assessment based on convolutional neural network X Qu, X Li, JR Rose arXiv preprint arXiv:1808.09016, 2018 | 17 | 2018 |
Are you lying: Validating the time-location of outdoor images X Li, W Xu, S Wang, X Qu Applied Cryptography and Network Security: 15th International Conference …, 2017 | 14 | 2017 |
LESS: Link estimation with sparse sampling in intertidal WSNs X Zhou, X Ji, Y Chen, X Li, W Xu Sensors 18 (3), 747, 2018 | 11 | 2018 |
An attention model of customer expectation to improve review helpfulness prediction X Qu, X Li, C Farkas, J Rose Advances in Information Retrieval: 42nd European Conference on IR Research …, 2020 | 9 | 2020 |
Use It-No Need to Shake It! accurate implicit authentication for everyday objects with smart sensing C Wu, X Li, F Zuo, L Luo, X Du, J Di, Q Zeng Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022 | 8 | 2022 |
G2Auth: secure mutual authentication for drone delivery without special user-side hardware C Wu, X Li, L Luo, Q Zeng Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022 | 8 | 2022 |
Which one to go: Security and usability evaluation of mid-air gestures W Xu, X Li, J Tian, Y Xiao, X Qu, S Wang, X Ji arXiv preprint arXiv:1811.10168, 2018 | 5 | 2018 |
Review helpfulness evaluation and recommendation based on an attention model of customer expectation X Qu, X Li, C Farkas, J Rose Information Retrieval Journal 24, 55-83, 2021 | 2 | 2021 |
Smart Sensing Enabled Secure and Usable Pairing and Authentication X Li University of South Carolina, 2020 | | 2020 |
Validating the Contextual Information of Outdoor Images for Photo Misuse Detection X Li, X Qu, W Xu, S Wang, Y Tong, L Luo arXiv preprint arXiv:1811.08951, 2018 | | 2018 |