default search action
Xueqiang Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Xueqiang Wang, Yilin Chen, Wen Zhang, Ji Zhang, Yin Lei, Dongxu Tu, Hang Lu, Ke Yan, Guoyong Xia, Haosen Yuan, Han Zhang, Yu Xu:
On-Line Measurement Method for Rheology of Straight Tubular Oil-Based Drilling Fluid Under Pulsating Flow. IEEE Access 12: 72620-72634 (2024) - [j7]Sungbin Park, Xueqiang Wang, Kai Chen, Yeonjoon Lee:
Station: Gesture-Based Authentication for Voice Interfaces. IEEE Internet Things J. 11(12): 22668-22683 (2024) - [j6]Sungbin Park, Chang-Bae Seo, Xueqiang Wang, Yeonjoon Lee, Seung-Hyun Seo:
Exclusively in-store: Acoustic location authentication for stationary business devices. J. Netw. Comput. Appl. 232: 104028 (2024) - [c23]Zhaojie Hu, Jingzhou Ye, Yifan Zhang, Xueqiang Wang:
Seeing is Not Always Believing: An Empirical Analysis of Fake Evidence Generators. EuroS&P 2024: 560-579 - [c22]Yifan Zhang, Zhaojie Hu, Xueqiang Wang, Yuhui Hong, Yuhong Nan, XiaoFeng Wang, Jiatao Cheng, Luyi Xing:
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs. USENIX Security Symposium 2024 - [i2]Jiaqi Xue, Yancheng Zhang, Yanshan Wang, Xueqiang Wang, Hao Zheng, Qian Lou:
CryptoTrain: Fast Secure Training on Encrypted Dataset. CoRR abs/2409.16675 (2024) - 2023
- [j5]Jianjun Yan, Xueqiang Wang, Jiangtao Shi, Shuai Hu:
Skeleton-Based Fall Detection with Multiple Inertial Sensors Using Spatial-Temporal Graph Convolutional Networks. Sensors 23(4): 2153 (2023) - [c21]Zhaoxin Cai, Yuhong Nan, Xueqiang Wang, Mengyi Long, Qihua Ou, Min Yang, Zibin Zheng:
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator. DSN 2023: 480-493 - [c20]Guiming Shi, Yi Li, Xueqiang Wang, Zhanhong Tan, Dapeng Cao, Jingwei Cai, Yuchen Wei, Zehua Li, Wuke Zhang, Yifu Wu, Wei Xu, Kaisheng Ma:
PHEP: Paillier Homomorphic Encryption Processors for Privacy-Preserving Applications in Cloud Computing. HCS 2023: 1-20 - [c19]Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing:
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain. USENIX Security Symposium 2023: 3403-3420 - [c18]Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang:
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference. USENIX Security Symposium 2023: 6007-6024 - [c17]Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang:
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps. USENIX Security Symposium 2023: 6665-6682 - 2021
- [j4]Yeonjoon Lee, Xueqiang Wang, Xiaojing Liao, XiaoFeng Wang:
Understanding Illicit UI in iOS Apps Through Hidden UI Analysis. IEEE Trans. Dependable Secur. Comput. 18(5): 2390-2402 (2021) - [c16]Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:
Understanding Malicious Cross-library Data Harvesting on Android. USENIX Security Symposium 2021: 4133-4150 - 2020
- [j3]Wangwang Yan, Kangyong Zheng, Linman Weng, Changcheng Chen, Suparata Kiartivich, Xue Jiang, Xuan Su, Yuling Wang, Xueqiang Wang:
Bibliometric evaluation of 2000-2019 publications on functional near-infrared spectroscopy. NeuroImage 220: 117121 (2020) - [c15]Haoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, XiaoFeng Wang, Xueqiang Wang:
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems. CCS 2020: 569-585
2010 – 2019
- 2019
- [j2]Zhaoxi Li, Cai Meng, Fugen Zhou, Xilun Ding, Xueqiang Wang, Huan Zhang, Pin Guo, Xin Meng:
Fast vision-based autonomous detection of moving cooperative target for unmanned aerial vehicle landing. J. Field Robotics 36(1): 34-48 (2019) - [c14]Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang:
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. IEEE Symposium on Security and Privacy 2019: 769-786 - [c13]Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi:
Understanding iOS-based Crowdturfing Through Hidden UI Analysis. USENIX Security Symposium 2019: 765-781 - [c12]Xueqiang Wang, Yuqiong Sun, Susanta Nanda, XiaoFeng Wang:
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps. USENIX Security Symposium 2019: 1151-1167 - 2018
- [c11]Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng Wang:
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. NDSS 2018 - [c10]Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, XiaoFeng Wang:
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. NDSS 2018 - 2017
- [c9]Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han:
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews. CCS 2017: 829-844 - [c8]Xiaorui Pan, Xueqiang Wang, Yue Duan, XiaoFeng Wang, Heng Yin:
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps. NDSS 2017 - [i1]Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, XiaoFeng Wang:
Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12. CoRR abs/1709.02753 (2017) - 2016
- [c7]Kai Chen, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou:
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS. IEEE Symposium on Security and Privacy 2016: 357-376 - 2015
- [c6]Zhiliang Qin, Anmin Kong, Xueqiang Wang:
Nonbinary multi-parallel-concatenated single-parity-check (NB-MPCSPC) codes over partial-response channels. ICICS 2015: 1-5 - [c5]Xueqiang Wang, Kun Sun, Yuewu Wang, Jiwu Jing:
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. NDSS 2015 - 2014
- [c4]Xueqiang Wang, Yuewu Wang, Limin Liu, Lingguang Lei, Jiwu Jing:
WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps. ICISC 2014: 255-268 - 2010
- [c3]Xueqiang Wang, Jing Wang, Tengjiao Wang, Hongyan Li, Dongqing Yang:
Parallel sequential pattern mining by transaction decomposition. FSKD 2010: 1746-1750 - [c2]Peijun Liu, Xueqiang Wang, Dong Wu, Zhigang Zhang, Liyang Pan:
A novel high-speed and low-power negative voltage level shifter for low voltage applications. ISCAS 2010: 601-604
2000 – 2009
- 2009
- [j1]Xueqiang Wang, Liyang Pan, Dong Wu, Chaohong Hu, Runde Zhou:
A High-Speed Two-Cell BCH Decoder for Error Correcting in MLC nor Flash Memories. IEEE Trans. Circuits Syst. II Express Briefs 56-II(11): 865-869 (2009) - [c1]Xueqiang Wang, Dong Wu, Chaohong Hu, Liyang Pan, Runde Zhou:
Embedded high-speed BCH decoder for new-generation NOR flash memories. CICC 2009: 195-198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint