


default search action
Xiaolong Bai
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j9]Jie Yin
, Gang Tan
, Hao Li, Xiaolong Bai, Yu-Ping Wang
, Shi-Min Hu:
Debugopt: Debugging fully optimized natively compiled programs using multistage instrumentation. Sci. Comput. Program. 169: 18-32 (2019) - 2017
- [j8]Xiaolong Bai
, Jie Yin, Yu-Ping Wang
:
Sensor Guardian: prevent privacy inference on Android sensors. EURASIP J. Inf. Secur. 2017: 10 (2017) - [j7]Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos. IEEE Secur. Priv. 15(2): 42-49 (2017) - 2016
- [j6]Swamidoss Issac Niwas, Weisi Lin, Xiaolong Bai, Chee Keong Kwoh, C.-C. Jay Kuo
, Chelvin C. Sng
, Maria Cecilia Aquino, Paul T. K. Chew:
Automated anterior segment OCT image analysis for Angle Closure Glaucoma mechanisms classification. Comput. Methods Programs Biomed. 130: 65-75 (2016) - [j5]Xiaolong Bai, Swamidoss Issac Niwas, Weisi Lin, Bing-Feng Ju, Chee Keong Kwoh, Lipo Wang
, Chelvin C. Sng
, Maria Cecilia Aquino, Paul T. K. Chew:
Learning ECOC Code Matrix for Multiclass Classification with Application to Glaucoma Diagnosis. J. Medical Syst. 40(4): 78:1-78:10 (2016) - 2015
- [j4]Jie Yin, Gang Tan
, Xiaolong Bai, Shi-Min Hu:
WebC: toward a portable framework for deploying legacy code in web browsers. Sci. China Inf. Sci. 58(7): 1-15 (2015) - [j3]S. Issac Niwas, Weisi Lin, Xiaolong Bai, Chee Keong Kwoh, Chelvin C. Sng
, Maria Cecilia Aquino, Paul T. K. Chew:
Reliable Feature Selection for Automated Angle Closure Glaucoma Mechanism Detection. J. Medical Syst. 39(3): 21 (2015) - 2014
- [j2]Xiaolong Bai, Yuming Fang, Weisi Lin, Lipo Wang
, Bing-Feng Ju:
Saliency-Based Defect Detection in Industrial Images by Using Phase Spectrum. IEEE Trans. Ind. Informatics 10(4): 2135-2145 (2014) - 2011
- [j1]Meng Zhang, Yi Zhang, Jijun Tang, Xiaolong Bai:
Multi-pattern Matching with Wildcards. J. Softw. 6(12): 2391-2398 (2011)
Conference and Workshop Papers
- 2024
- [c14]Dexin Liu, Yue Xiao, Chaoqi Zhang, Kaitao Xie, Xiaolong Bai, Shikun Zhang, Luyi Xing:
iHunter: Hunting Privacy Violations at Scale in the Software Supply Chain on iOS. USENIX Security Symposium 2024 - 2023
- [c13]Xinyi Zhang
, Xin Xiao
, Mingda Huo
, Xiaolong Bai
:
Histopathologic Cancer Detection with Hybrid Deep Learning model. ISAIMS 2023: 505-508 - [c12]Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing:
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels. USENIX Security Symposium 2023: 1091-1108 - 2021
- [c11]Yunkun Xu, Zhenyu Liu, Guifang Duan, Jiangcheng Zhu, Xiaolong Bai, Jianrong Tan:
Look Before You Leap: Safe Model-Based Reinforcement Learning with Human Intervention. CoRL 2021: 332-341 - [c10]Rindra Ramamonjison, Amin Banitalebi-Dehkordi, Xinyu Kang, Xiaolong Bai, Yong Zhang
:
SimROD: A Simple Adaptation Method for Robust Object Detection. ICCV 2021: 3550-3559 - [c9]Min Zheng, Xiaolong Bai, Yajin Zhou, Chao Zhang, Fuping Qu:
POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming. NDSS 2021 - 2020
- [c8]Xiaolong Bai, Luyi Xing, Min Zheng, Fuping Qu:
iDEA: Static Analysis on the Security of Apple Kernel Drivers. CCS 2020: 1185-1202 - 2019
- [c7]Mengchen Cao, Xiantong Hou, Tao Wang, Hunter Qu, Yajin Zhou, Xiaolong Bai, Fuwei Wang
:
Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay. CCS 2019: 1883-1897 - 2018
- [c6]Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, XiaoFeng Wang:
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. NDSS 2018 - 2017
- [c5]Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han:
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews. CCS 2017: 829-844 - [c4]Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li
, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang:
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment. USENIX Security Symposium 2017: 593-608 - 2016
- [c3]Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. IEEE Symposium on Security and Privacy 2016: 655-674 - 2015
- [c2]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS. CCS 2015: 31-43 - 2011
- [c1]Xiaolong Bai, Liang Hu, Zixing Song, Feiyan Chen, Kuo Zhao:
Defense against DNS Man-In-The-Middle Spoofing. WISM (1) 2011: 312-319
Informal and Other Publications
- 2025
- [i7]Gursimran Singh, Xinglu Wang, Ivan Hu, Timothy Yu, Linzi Xing, Wei Jiang, Zhefeng Wang, Xiaolong Bai, Yi Li, Ying Xiong, Yong Zhang, Zhenan Fan:
Efficiently serving large multimedia models using EPD Disaggregation. CoRR abs/2501.05460 (2025) - 2022
- [i6]Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing:
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale. CoRR abs/2206.06274 (2022) - 2021
- [i5]Rindra Ramamonjison, Amin Banitalebi-Dehkordi, Xinyu Kang, Xiaolong Bai, Yong Zhang:
SimROD: A Simple Adaptation Method for Robust Object Detection. CoRR abs/2107.13389 (2021) - [i4]Liang Hu, Jiangcheng Zhu, Zirui Zhou, Ruiqing Cheng, Xiaolong Bai, Yong Zhang:
An Optimal Resource Allocator of Elastic Training for Deep Learning Jobs on Cloud. CoRR abs/2109.03389 (2021) - [i3]Yunkun Xu, Zhenyu Liu, Guifang Duan, Jiangcheng Zhu, Xiaolong Bai, Jianrong Tan:
Look Before You Leap: Safe Model-Based Reinforcement Learning with Human Intervention. CoRR abs/2111.05819 (2021) - 2017
- [i2]Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, XiaoFeng Wang:
Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12. CoRR abs/1709.02753 (2017) - 2015
- [i1]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Unauthorized Cross-App Resource Access on MAC OS X and iOS. CoRR abs/1505.06836 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint