What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiaojiang Du
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller.
Haoqiang Wang
Yiwei Fang
Yichen Liu
Ze Jin
Emma Delph
Xiaojiang Du
Qixu Liu
Luyi Xing
2024
conf/eurosp
NetReach: Guaranteed Network Availability and Reachability to enable Resilient Networks for Embedded Systems.
Tom Van Eyck
Sam Michiels
Xiaojiang Du
Danny Hughes
2024
conf/esorics
Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques.
Zhiqiang Hao
Chuanyi Li
Xiao Fu
Bin Luo
Xiaojiang Du
2024
conf/esorics
Companion Apps or Backdoors? On the Security of Automotive Companion Apps.
Prashanthi Mallojula
Fengjun Li
Xiaojiang Du
Bo Luo
2024
conf/wisec
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events.
Chenglong Fu
Xiaojiang Du
Qiang Zeng
Zhenyu Zhao
Fei Zuo
Jia Di
2023
conf/uss
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes.
Haotian Chi
Qiang Zeng
Xiaojiang Du
2023
conf/dsn
VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers.
Xuening Xu
Chenglong Fu
Xiaojiang Du
E. Paul Ratazzi
2022
conf/sp
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks.
Haotian Chi
Chenglong Fu
Qiang Zeng
Xiaojiang Du
2022
conf/dsn
IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors.
Chenglong Fu
Qiang Zeng
Haotian Chi
Xiaojiang Du
Siva Likitha Valluru
2021
journals/tifs
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
Meng Shen
Jinpeng Zhang
Liehuang Zhu
Ke Xu
Xiaojiang Du
2021
journals/tifs
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
Meng Shen
Yiting Liu
Liehuang Zhu
Xiaojiang Du
Jiankun Hu
2021
conf/uss
HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes.
Chenglong Fu
Qiang Zeng
Xiaojiang Du
2021
conf/ndss
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Haotian Chi
Qiang Zeng
Xiaojiang Du
Lannan Luo
2020
journals/compsec
IoT malicious traffic identification using wrapper-based feature selection mechanisms.
Muhammad Shafiq
Zhihong Tian
Ali Kashif Bashir
Xiaojiang Du
Mohsen Guizani
2020
journals/compsec
A differentially private greedy decision forest classification algorithm with high utility.
Zhitao Guan
Xianwen Sun
Lingyun Shi
Longfei Wu
Xiaojiang Du
2020
conf/dsn
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling.
Haotian Chi
Qiang Zeng
Xiaojiang Du
Jiaping Yu
2020
conf/acsac
Attacking Graph-Based Classification without Changing Existing Connections.
Xuening Xu
Xiaojiang Du
Qiang Zeng
2019
conf/dsn
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
Qiang Zeng
Golam Kayas
Emil Mohammed
Lannan Luo
Xiaojiang Du
Junghwan Rhee
2019
conf/dsn
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
Qiang Zeng
Jianhai Su
Chenglong Fu
Golam Kayas
Lannan Luo
Xiaojiang Du
Chiu C. Tan
Jie Wu
2018
journals/tifs
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
Meng Shen
Baoli Ma
Liehuang Zhu
Rashid Mijumbi
Xiaojiang Du
Jiankun Hu
2018
conf/cns
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Haotian Chi
Longfei Wu
Xiaojiang Du
Qiang Zeng
E. Paul Ratazzi
2016
conf/cns
Analysis of clickjacking attacks and an effective defense scheme for Android devices.
Longfei Wu
Benjamin Brandt
Xiaojiang Du
Bo Ji
Coauthors
Ali Kashif Bashir
(1)
Baoli Ma
(1)
Benjamin Brandt
(1)
Bin Luo
(1)
Bo Ji
(1)
Bo Luo
(1)
Chenglong Fu
(6)
Chiu C. Tan
(1)
Chuanyi Li
(1)
Danny Hughes
(1)
E. Paul Ratazzi
(2)
Emil Mohammed
(1)
Emma Delph
(1)
Fei Zuo
(1)
Fengjun Li
(1)
Golam Kayas
(2)
Haoqiang Wang
(1)
Haotian Chi
(6)
Jia Di
(1)
Jianhai Su
(1)
Jiankun Hu
(2)
Jiaping Yu
(1)
Jie Wu
(1)
Jinpeng Zhang
(1)
Junghwan Rhee
(1)
Ke Xu
(1)
Lannan Luo
(3)
Liehuang Zhu
(3)
Lingyun Shi
(1)
Longfei Wu
(3)
Luyi Xing
(1)
Meng Shen
(3)
Mohsen Guizani
(1)
Muhammad Shafiq
(1)
Prashanthi Mallojula
(1)
Qiang Zeng
(11)
Qixu Liu
(1)
Rashid Mijumbi
(1)
Sam Michiels
(1)
Siva Likitha Valluru
(1)
Tom Van Eyck
(1)
Xianwen Sun
(1)
Xiao Fu
(1)
Xiaojiang Du
(22)
Xuening Xu
(2)
Yichen Liu
(1)
Yiting Liu
(1)
Yiwei Fang
(1)
Ze Jin
(1)
Zhenyu Zhao
(1)
Zhihong Tian
(1)
Zhiqiang Hao
(1)
Zhitao Guan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to