default search action
Jun Xu 0024
Person information
- affiliation: University of Utah, Salt Lake City, UT, USA
- affiliation (former): Stevens Institute of Technology, Hoboken, NJ, USA
- affiliation (former): Pennsylvania State University, College of Information Sciences and Technology, State College, PA, USA
Other persons with the same name
- Jun Xu — disambiguation page
- Jun Xu 0001 — Renmin University of China, School of Information, Beijing Key Laboratory of Big Data Management and Analysis Methods, China (and 4 more)
- Jun Erik Xu (aka: Jun Xu 0002) — Hughes Network Systems, Germantown, MD, USA (and 1 more)
- Jun Xu 0003 — Google Inc., Mountain View, CA, USA (and 2 more)
- Jun Xu 0004 — Marvell Semiconductor (and 1 more)
- Jun Xu 0005 — Nanjing University of Information Science & Technology, China (and 1 more)
- Jun Xu 0006 — Southern Cross University, Gold Coast, NSW, Australia
- Jun Xu 0007 — University of Texas Health Science Center, Houston, TX, USA (and 1 more)
- Jun Xu 0008 — Tsinghua University, Department of Automation, Beijing, China
- Jun Xu 0009 — New Jersey Institute of Technology, Newark, NJ, USA
- Jun Xu 0010 — Tsinghua University, Department of Computing Science & Technology, Beijing, China
- Jun Xu 0011 — Fudan University, The State Key Lab of ASIC & System, China
- Jun Xu 0012 — Fudan University, Department of Computer Science, China
- Jun Xu 0013 — Nanjing University, Institute of VLSI Design, China
- Jun (Jim) Xu (aka: Jun Xu 0014) — Georgia Institute of Technology, Atlanta, GA, USA (and 1 more)
- Jun Xu 0015 — Western Digital Corp, Singapore (and 1 more)
- Jun Xu 0016 — Jinan University, Institute of Industrial Economics, Guangzhou, China
- Jun Xu 0017 — Sun Yat-Sen University, Research Center for Drug Discovery, Guangzhou, China
- Jun Xu 0018 — Xi'an Jiaotong University, School of Mechanical Engineering, China (and 1 more)
- Jun Xu 0019 — Nankai University, College of Computer Science, TKLNDST, Tianjin, China (and 1 more)
- Jun Xu 0020 — Institute of Geographical Science and Natural Resources Research, Beijing, China (and 1 more)
- Jun Xu 0021 — Wuhan University, Electronic Information School, China (and 1 more)
- Jun Xu 0022 — Chinese Academy of Sciences, Institute of Information Engineering, State Key State Laboratory of Information Security, Beijing, China (and 1 more)
- Jun Xu 0023 — Shenzhen University, College of Computer Science and Software Engineering, China (and 2 more)
- Jun Xu 0025 — University of Central Florida, Department of Computer Science, Orlando, FL, USA
- Jun Xu 0026 — Shanghai University of Electric Power, College of Automation Engineering (and 1 more)
- Jun Xu 0027 — Harbin Institute of Technology, Research Center for Social Computing and Information Retrieval, China
- Jun Xu 0028 — Yunnan University, School of Information Science and Engineering, Kunming, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Da Zhong, Xiuling Wang, Zhichao Xu, Jun Xu, Wendy Hui Wang:
Interaction-level Membership Inference Attack against Recommender Systems with Long-tailed Distribution. CIKM 2024: 3433-3442 - [c36]Yifan Wang, Jun Xu:
Multi-level Fuzzing for Document File Formats with Intermediate Representations. ISSRE 2024: 295-306 - [c35]Ruikai Zhou, Kang Yang, Xiuling Wang, Wendy Hui Wang, Jun Xu:
Revisiting Black-box Ownership Verification for Graph Neural Networks. SP 2024: 2478-2496 - [c34]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. WOOT @ USENIX Security Symposium 2024: 149-169 - [e1]Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda, David Lie:
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-0636-3 [contents] - [i17]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. CoRR abs/2401.15289 (2024) - 2023
- [j6]Chengbin Pang, Hongbin Liu, Yifan Wang, Neil Zhenqiang Gong, Bing Mao, Jun Xu:
Generation-based fuzzing? Don't build a new generator, reuse! Comput. Secur. 129: 103178 (2023) - [j5]Da Zhong, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, Wendy Hui Wang:
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks. Proc. Priv. Enhancing Technol. 2023(4): 149-169 (2023) - [j4]Jinghan Sun, Shaobo Li, Jun Xu, Jian Huang:
The Security War in File Systems: An Empirical Study from A Vulnerability-centric Perspective. ACM Trans. Storage 19(4): 34:1-34:26 (2023) - [c33]Mohamad Mansouri, Jun Xu, Georgios Portokalidis:
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. AsiaCCS 2023: 259-273 - [c32]Yunhang Zhang, Chengbin Pang, Stefan Nagy, Xun Chen, Jun Xu:
Profile-guided System Optimizations for Accelerated Greybox Fuzzing. CCS 2023: 1257-1271 - [c31]Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu, Georgios Portokalidis:
SysPart: Automated Temporal System Call Filtering for Binaries. CCS 2023: 1979-1993 - [c30]Yuchen Zhang, Ashish Kundu, Georgios Portokalidis, Jun Xu:
On the Dual Nature of Necessity in Use of Rust Unsafe Code. ESEC/SIGSOFT FSE 2023: 2032-2037 - [c29]Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang:
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. SP 2023: 2122-2137 - [c28]Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang:
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. SP 2023: 2122-2137 - [i16]Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu, Georgios Portokalidis:
SYSPART: Automated Temporal System Call Filtering for Binaries. CoRR abs/2309.05169 (2023) - 2022
- [j3]Juan Wang, Shirong Hao, Hongxin Hu, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. IEEE Trans. Cloud Comput. 10(2): 1082-1099 (2022) - [c27]Da Zhong, Haipei Sun, Jun Xu, Neil Zhenqiang Gong, Wendy Hui Wang:
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures. AsiaCCS 2022: 959-974 - [c26]Zijian Song, Jun Xu, Zhiwei Li, Dingfeng Ye:
An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015. INDOCRYPT 2022: 644-657 - [c25]Yuchen Zhang, Yunhang Zhang, Georgios Portokalidis, Jun Xu:
Towards Understanding the Runtime Performance of Rust. ASE 2022: 140:1-140:6 - [c24]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. NDSS 2022 - [c23]Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, Jun Xu:
Ground Truth for Binary Disassembly is Not Easy. USENIX Security Symposium 2022: 2479-2495 - [c22]Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, Jun Xu:
Debloating Address Sanitizer. USENIX Security Symposium 2022: 4345-4363 - [i15]Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu:
Building Embedded Systems Like It's 1996. CoRR abs/2203.06834 (2022) - [i14]Jinghan Sun, Shaobo Li, Jun Xu, Jian Huang:
The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective. CoRR abs/2204.12590 (2022) - 2021
- [j2]Dongliang Mu, Yunlan Du, Jianhao Xu, Jun Xu, Xinyu Xing, Bing Mao, Peng Liu:
POMP++: Facilitating Postmortem Program Diagnosis with Value-Set Analysis. IEEE Trans. Software Eng. 47(9): 1929-1942 (2021) - [c21]Yuandong Cyrus Liu, Chengbin Pang, Daniel Dietsch, Eric Koskinen, Ton-Chanh Le, Georgios Portokalidis, Jun Xu:
Proving LTL Properties of Bitvector Programs and Decompiled Binaries. APLAS 2021: 285-304 - [c20]Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, Jun Xu:
Towards Optimal Use of Exception Handling Information for Function Detection. DSN 2021: 338-349 - [c19]Yuekang Li, Guozhu Meng, Jun Xu, Cen Zhang, Hongxu Chen, Xiaofei Xie, Haijun Wang, Yang Liu:
Vall-nut: Principled Anti-Grey box - Fuzzing. ISSRE 2021: 288-299 - [c18]Yifan Wang, Yuchen Zhang, Chengbin Pang, Peng Li, Nikolaos Triandopoulos, Jun Xu:
Facilitating Parallel Fuzzing with Mutually-Exclusive Task Distribution. SecureComm (2) 2021: 185-206 - [c17]Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu:
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. SP 2021: 833-851 - [i13]Chengbin Pang, Ruotong Yu, Dongpeng Xu, Eric Koskinen, Georgios Portokalidis, Jun Xu:
Towards Optimal Use of Exception Handling Information for Function Detection. CoRR abs/2104.03168 (2021) - [i12]Yuandong Cyrus Liu, Chengbin Pang, Daniel Dietsch, Eric Koskinen, Ton-Chanh Le, Georgios Portokalidis, Jun Xu:
Source-Level Bitwise Branching for Temporal Verification of Lifted Binaries. CoRR abs/2105.05159 (2021) - [i11]Yifan Wang, Yuchen Zhang, Chengbin Pang, Peng Li, Nikolaos Triandopoulos, Jun Xu:
Facilitating Parallel Fuzzing with mutually-exclusive Task Distribution. CoRR abs/2109.08635 (2021) - 2020
- [c16]Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang:
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. CCS 2020: 1149-1163 - [c15]Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao:
HART: Hardware-Assisted Kernel Module Tracing on Arm. ESORICS (1) 2020: 316-337 - [c14]Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, Long Lu:
SAVIOR: Towards Bug-Driven Hybrid Testing. SP 2020: 1580-1596 - [i10]Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang:
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. CoRR abs/2001.08855 (2020) - [i9]Sijia Geng, Yuekang Li, Yunlan Du, Jun Xu, Yang Liu, Bing Mao:
An Empirical Study on Benchmarks of Artificial Software Vulnerabilities. CoRR abs/2003.09561 (2020) - [i8]Chengbin Pang, Ruotong Yu, Yaohui Chen, Eric Koskinen, Georgios Portokalidis, Bing Mao, Jun Xu:
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask. CoRR abs/2007.14266 (2020)
2010 – 2019
- 2019
- [c13]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. AsiaCCS 2019: 633-645 - [p1]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [i7]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. CoRR abs/1905.10499 (2019) - [i6]Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, Long Lu:
SAVIOR: Towards Bug-Driven Hybrid Testing. CoRR abs/1906.07327 (2019) - 2018
- [j1]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Peng Liu:
Feedback control can make data structure layout randomization more cost-effective under zero-day attacks. Cybersecur. 1(1): 3 (2018) - [c12]Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing:
LEMNA: Explaining Deep Learning based Security Applications. CCS 2018: 364-379 - [c11]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
RoboADS: Anomaly Detection Against Sensor and Actuator Misbehaviors in Mobile Robots. DSN 2018: 574-585 - [c10]Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, Wei Zou:
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. USENIX Security Symposium 2018: 781-797 - [i5]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
Nonlinear Unknown Input and State Estimation Algorithm in Mobile Robots. CoRR abs/1804.02814 (2018) - 2017
- [c9]Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi:
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware. CCS 2017: 2231-2244 - [c8]Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. DSN 2017: 451-462 - [c7]Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, Bing Mao:
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. USENIX Security Symposium 2017: 17-32 - [c6]Liang Deng, Peng Liu, Jun Xu, Ping Chen, Qingkai Zeng:
Dancing with Wolves: Towards Practical Event-driven VMM Monitoring. VEE 2017: 83-96 - [i4]Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, Peng Liu:
Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots. CoRR abs/1708.01834 (2017) - [i3]Dingfeng Ye, Peng Liu, Jun Xu:
Towards Practical Obfuscation of General Circuits. IACR Cryptol. ePrint Arch. 2017: 321 (2017) - 2016
- [c5]Jun Xu, Pinyao Guo, Bo Chen, Robert F. Erbacher, Ping Chen, Peng Liu:
Demo: A Symbolic N-Variant System. MTD@CCS 2016: 65-68 - [c4]Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu:
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. CCS 2016: 529-540 - [c3]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance. SenSys 2016: 42-55 - [i2]Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee:
Exploiting Insurance Telematics for Fun and Profit. CoRR abs/1609.02234 (2016) - 2015
- [c2]Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu:
A Practical Approach for Adaptive Data Structure Layout Randomization. ESORICS (1) 2015: 69-89 - [i1]Ping Chen, Jun Xu, Jun Wang, Peng Liu:
Instantly Obsoleting the Address-code Associations: A New Principle for Defending Advanced Code Reuse Attack. CoRR abs/1507.02786 (2015) - 2014
- [c1]Jun Xu, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu, Peng Liu:
Comparing Different Moving Target Defense Techniques. MTD@CCS 2014: 97-107
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint