default search action
Xinyang Ge
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j3]Jianming Wen, Ao Su, Xiaolin Wang, Hao Xu, Jijie Ma, Kang Chen, Xinyang Ge, Zisheng Xu, Zhong Lv:
Virtual sample generation for small sample learning: A survey, recent developments and future prospects. Neurocomputing 615: 128934 (2025) - 2024
- [j2]Ya Xiao, Wenjia Song, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng (Daphne) Yao:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. ACM Trans. Softw. Eng. Methodol. 33(3): 56:1-56:30 (2024) - [c20]Zilong Wang, Xinyang Ge, Xiaorong Chen, Lei Li, Wangbin Ding, Yuanye Liu, Fuping Wu, Dengqiang Jia:
Deep Combined Computing of Vascular Images with Tubular Shape-Guided Convolution. ShapeMI@MICCAI 2024: 48-58 - 2023
- [c19]Tianqi Wang, Xinyang Ge, Xuanyu Li, Taiwei Liu, Fuyou Liang, Zunqiang Zhou:
A 0D-3D multi-scale model of the portal venous system coupled with the entire cardiovascular system applied to predict postsplenectomy hemodynamic metrics. EMBC 2023: 1-4 - [c18]Ziqiao Zhou, Yizhou Shan, Weidong Cui, Xinyang Ge, Marcus Peinado, Andrew Baumann:
Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud. OSDI 2023: 247-267 - 2022
- [c17]Xinyang Ge, Hsuan-Chi Kuo, Weidong Cui:
Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud. CCS 2022: 1231-1242 - [c16]Ya Xiao, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng Daphne Yao:
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion. ICSE-Companion 2022: 360-361 - [c15]Jiyong Yu, Xinyang Ge, Trent Jaeger, Christopher W. Fletcher, Weidong Cui:
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. SEED 2022: 133-144 - 2021
- [c14]Xinyang Ge, Ben Niu, Robert Brotzman, Yaohui Chen, HyungSeok Han, Patrice Godefroid, Weidong Cui:
HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs. CCS 2021: 366-378 - [i3]Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao:
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons. CoRR abs/2103.08747 (2021) - 2020
- [c13]Xinyang Ge, Ben Niu, Weidong Cui:
Reverse Debugging of Kernel Failures in Deployed Systems. USENIX ATC 2020: 281-292
2010 – 2019
- 2019
- [j1]Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - 2018
- [c12]Weidong Cui, Xinyang Ge, Baris Kasikci, Ben Niu, Upamanyu Sharma, Ruoyu Wang, Insu Yun:
REPT: Reverse Debugging of Failures in Deployed Software. OSDI 2018: 17-32 - 2017
- [c11]Xinyang Ge, Weidong Cui, Trent Jaeger:
GRIFFIN: Guarding Control Flows Using Intel Processor Trace. ASPLOS 2017: 585-598 - [c10]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. MobiSys 2017: 488-501 - [c9]Xinyang Ge, Mathias Payer, Trent Jaeger:
An Evil Copy: How the Loader Betrays You. NDSS 2017 - [c8]Baris Kasikci, Weidong Cui, Xinyang Ge, Ben Niu:
Lazy Diagnosis of In-Production Concurrency Bugs. SOSP 2017: 582-598 - [i2]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. CoRR abs/1704.05600 (2017) - 2016
- [c7]Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger:
Pileus: protecting user resources from vulnerable cloud services. ACSAC 2016: 52-64 - [c6]Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger:
Fine-Grained Control-Flow Integrity for Kernel Software. EuroS&P 2016: 179-194 - 2015
- [c5]Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Julieta Rueda, Joshua Schiffman, Hayawardh Vijayakumar:
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer. SPACE 2015: 55-74 - 2014
- [c4]Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger:
Policy models to protect resource retrieval. SACMAT 2014: 211-222 - [c3]Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger:
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. USENIX Security Symposium 2014: 973-988 - [i1]Xinyang Ge, Hayawardh Vijayakumar, Trent Jaeger:
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture. CoRR abs/1410.7747 (2014) - 2012
- [c2]Shien Ge, Xinyang Ge:
An SVD-based Collaborative Filtering approach to alleviate cold-start problems. FSKD 2012: 1474-1477 - 2011
- [c1]Xinyang Ge, Jia Liu, Qi Qi, Zhenyu Chen:
A new prediction approach based on linear regression for collaborative filtering. FSKD 2011: 2586-2590
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint