default search action
Pulei Xiong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Euclides Carlos Pinto Neto, Hamideh Taslimasa, Sajjad Dadkhah, Shahrear Iqbal, Pulei Xiong, Taufiq Rahman, Ali A. Ghorbani:
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus. Internet Things 26: 101209 (2024) - [j6]Jwen Fai Low, Benjamin C. M. Fung, Pulei Xiong:
Better entity matching with transformers through ensembles. Knowl. Based Syst. 293: 111678 (2024) - [c17]Amirhossein Ansari, Ke Wang, Pulei Xiong:
Out-of-Distribution Aware Classification for Tabular Data. CIKM 2024: 65-75 - 2023
- [j5]Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Philippe Lamontagne, Suprio Ray, Ali A. Ghorbani:
Internet of Things (IoT) security dataset evolution: Challenges and future directions. Internet Things 22: 100780 (2023) - [j4]Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Suprio Ray, Ali A. Ghorbani:
Security issues in Internet of Vehicles (IoV): A comprehensive survey. Internet Things 22: 100809 (2023) - [j3]Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal:
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. Peer Peer Netw. Appl. 16(3): 1380-1431 (2023) - [c16]Le Wang, Haonan Yan, Xiaodong Lin, Pulei Xiong:
Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense. AIS&P (1) 2023: 237-252 - [c15]Liang Xue, Xiaodong Lin, Pulei Xiong:
Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication. AIS&P (1) 2023: 400-414 - [c14]Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol. BigDataSecurity/HPSC/IDS 2023: 122-129 - [c13]Yunguo Guan, Ellen Z. Zhang, Pulei Xiong, Rongxing Lu:
Achieve Edge-Based Privacy-Preserving Dynamic Aggregation Query in Smart Transportation Systems. GLOBECOM 2023: 880-885 - 2022
- [j2]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a robust and trustworthy machine learning system development: An engineering perspective. J. Inf. Secur. Appl. 65: 103121 (2022) - [c12]Mahdi Abrishami, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study. FRUCT 2022: 3-14 - [c11]Yunguo Guan, Pulei Xiong, Songnian Zhang, Rongxing Lu:
Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing. GLOBECOM 2022: 4854-4859 - [c10]Yunguo Guan, Pulei Xiong, Rongxing Lu:
EVRQ: Achieving Efficient and Verifiable Range Query over Encrypted Traffic Data. ICC 2022: 553-558 - 2021
- [c9]Barjinder Kaur, Sajjad Dadkhah, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
Verification Based Scheme to Restrict IoT Attacks. BDCAT 2021: 63-68 - [c8]Masoud Erfani, Farzaneh Shoeleh, Sajjad Dadkhah, Barjinder Kaur, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
A feature exploration approach for IoT attack type classification. DASC/PiCom/CBDCom/CyberSciTech 2021: 582-588 - [c7]Yunguo Guan, Pulei Xiong, Rongxing Lu:
Privacy-Preserving Fog-Based Multi-Location Task Allocation in Mobile Crowdsourcing. GLOBECOM 2021: 1-6 - [c6]Jiacheng Jin, Yandong Zheng, Pulei Xiong:
EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences. PST 2021: 1-10 - [c5]Fuyuan Song, Zheng Qin, Jinwen Liang, Pulei Xiong, Xiaodong Lin:
Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing. PST 2021: 1-9 - [i1]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a Robust and Trustworthy Machine Learning System Development. CoRR abs/2101.03042 (2021)
2010 – 2019
- 2011
- [c4]Bernard Stepien, Pulei Xiong, Liam Peyton:
A Systematic Approach to Web Application Penetration Testing Using TTCN-3. MCETECH 2011: 1-16 - 2010
- [c3]Pulei Xiong, Liam Peyton:
A model-driven penetration test framework for Web applications. PST 2010: 173-180
2000 – 2009
- 2009
- [c2]Pulei Xiong, Bernard Stepien, Liam Peyton:
Model-Based Penetration Test Framework for Web Applications Using TTCN-3. MCETECH 2009: 141-154 - 2008
- [j1]Bernard Stepien, Liam Peyton, Pulei Xiong:
Framework testing of web applications using TTCN-3. Int. J. Softw. Tools Technol. Transf. 10(4): 371-381 (2008) - 2004
- [c1]Robert L. Probert, Pulei Xiong, Bernard Stepien:
Life-Cycle E-commerce Testing with OO-TTCN-3. FORTE Workshops 2004: 16-29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint