Xiangyu Zhang

Google Scholar
85 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling.
2025
conf/ndss
Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary.
2025
conf/uss
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks.
2024
conf/uss
Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion.
2024
conf/uss
Cost-effective Attack Forensics by Recording and Correlating File System Changes.
Le Yu Yapeng Ye Zhuo Zhang Xiangyu Zhang
2023
conf/uss
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
2023
conf/uss
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis.
Qingkai Shi Xiangzhe Xu Xiangyu Zhang
2023
conf/uss
Hard-label Black-box Universal Adversarial Patch Attack.
2023
conf/uss
PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
2023
conf/ndss
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
2022
conf/uss
ProFactory: Improving IoT Security via Formalized Protocol Customization.
2022
conf/ndss
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity.
2022
conf/ndss
RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning.
Hongjun Choi Zhiyuan Cheng Xiangyu Zhang
2021
conf/uss
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
2021
conf/uss
ATLAS: A Sequence-based Learning Approach for Attack Investigation.
2021
conf/ndss
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
2021
conf/ndss
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
2020
conf/uss
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY.
2020
conf/ndss
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
2019
conf/uss
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing.
2019
conf/ndss
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking.
2018
conf/ndss
Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
2018
conf/ndss
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
2018
conf/ndss
Trojaning Attack on Neural Networks.
2018
conf/ndss
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
2018
conf/ndss
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
2017
conf/uss
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
2017
conf/ndss
Self Destructing Exploit Executions via Input Perturbation.
2016
conf/uss
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
2016
conf/ndss
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
Shiqing Ma Xiangyu Zhang Dongyan Xu
2016
conf/acsac
HERCULE: attack story reconstruction via community discovery on correlated log graph.
2015
conf/uss
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
2015
conf/ndss
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
2014
conf/uss
X-Force: Force-Executing Binary Programs for Security Applications.
2014
conf/uss
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
2013
conf/ndss
High Accuracy Attack Provenance via Binary-based Execution Partition.
Kyu Hyung Lee Xiangyu Zhang Dongyan Xu
2012
conf/ndss
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
2011
conf/ndss
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
2010
conf/ndss
Automatic Reverse Engineering of Data Structures from Binary Execution.
Zhiqiang Lin Xiangyu Zhang Dongyan Xu
2008
conf/ndss
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.

Coauthors

Abdulellah Alsaheel (1)
Aisha I. Ali-Gombe (1)
Altay Ozen (1)
Andrew Chu (1)
Anuran Makur (1)
Ashish Gehani (3)
Ashish Kundu (1)
Bardh Hoxha (1)
Bin Liang (2)
Brendan Saltaformaggio (11)
Bruno Ribeiro (1)
Byoungyoung Lee (1)
Carson Harmon (1)
Chao Su (1)
Chao Wu (1)
Charles Fleming (1)
Chen Tian (1)
Chung Hwan Kim (5)
Chunrong Fang (1)
Danning Xie (2)
Dave (Jing) Tian (1)
Dohyeong Kim (1)
Dongyan Xu (41)
Fan Fei (3)
Fei Peng (3)
Fei Wang (3)
Fei Wang (3)
Gabriela F. Ciocarlie (3)
Golden G. Richard III (2)
Gregory Walkup (2)
Guangyu Shen (15)
Guanhong Tao (20)
Guofei Jiang (1)
Haining Chen (1)
Haitao Xu (1)
Han Wei Lin (1)
Hanwei Qian (1)
Hanxi Guo (2)
Hao Sun (1)
Hassaan Irshad (1)
Heng Yin (1)
Hongjun Choi (5)
I Luk Kim (1)
Ian Kelk (1)
Jianjun Huang (4)
Jianliang Wu (1)
Jiaxun Li (1)
Jignesh M. Patel (1)
Jingwei Xu (1)
Jingzhe Li (1)
John Qian (1)
Juan Zhai (2)
Junghwan Rhee (4)
Junyang Shao (1)
Junyu Lin (1)
Junyuan Zeng (1)
Kaiyuan Zhang (9)
Kangjie Lu (1)
Kenneth A. Miller (1)
Kexin Pei (2)
Kyu Hyung Lee (8)
Kyungtae Kim (1)
Le Yu (3)
Lei Xu (1)
Lili Wei (1)
Lin Tan (2)
Lu Liu (1)
Lu Yan (2)
Luo Si (2)
Marcelo Morales (1)
Mathias Payer (1)
Mingwei Zheng (1)
Muslum Ozgur Ozmen (1)
Nan Jiang (2)
Nick Sumner (1)
Ninghui Li (5)
Patrick Eugster (1)
Pin-Yu Chen (1)
Qifan Wang (1)
Qingkai Shi (4)
Qingkai Zeng (1)
Qiuling Xu (6)
Rohit Bhatia (4)
Runqing Yang (1)
Sayali Kate (1)
Seung Jei Yang (1)
Shengwei An (14)
Shing-Chi Cheung (1)
Shiqing Ma (21)
Shiwei Feng (3)
Siyuan Cheng (12)
Somesh Jha (2)
Taegyu Kim (4)
Tingxu Han (1)
Vincent E. Urias (1)
Vinod Yegneswaran (4)
Wei You (6)
Weihang Wang (2)
Weisong Sun (1)
Wen-Chuan Lee (6)
Wenchang Shi (1)
William Enck (1)
William N. Sumner (1)
Wuqi Zhang (1)
Xiangyu Zhang (85)
Xiangzhe Xu (5)
XiaoFeng Wang (1)
Xiaolong Jin (1)
Xinyan Deng (3)
Xuansong Li (1)
Xueqiang Wang (1)
Xusheng Xiao (1)
Xuwei Liu (1)
Xuxian Jiang (2)
Yan Chen (1)
Yangchun Fu (1)
Yaoxuan Wu (1)
Yapeng Ye (7)
Yepang Liu (1)
Yi Sun (2)
Yingqi Li (1)
Yingqi Liu (11)
Yonghwi Kwon (8)
Yousra Aafer (13)
Yu Shi (2)
Yuan Yao (2)
Yuetian Chen (1)
Yuhong Nan (2)
Yunshu Mao (1)
Yuntao Du (1)
Z. Berkay Celik (2)
Zhan Tu (3)
Zhendong Su (1)
Zhenting Wang (2)
Zhenyu Chen (1)
Zhenyu Wu (1)
Zhichun Li (1)
Zhiqiang Lin (9)
Zhiwei Zhang (1)
Zhiyuan Cheng (1)
Zhongshu Gu (9)
Zhui Deng (5)
Zhuo Zhang (17)
Zian Su (2)
Ziqi Ding (1)
Ziyang Huang (1)
Filters
Years:  to