Follow
Xiaopeng Li
Xiaopeng Li
Microsoft
Verified email at email.sc.edu
Title
Cited by
Cited by
Year
Neural machine translation inspired binary code similarity comparison beyond function pairs
F Zuo, X Li, P Young, L Luo, Q Zeng, Z Zhang
Proceedings of the 26th Network and Distributed System Security Symposium (NDSS), 2019
2392019
Touch well before use: Intuitive and secure authentication for iot devices
X Li, F Yan, F Zuo, Q Zeng, L Luo
The 25th annual international conference on mobile computing and networking …, 2019
552019
T2pair: Secure and usable pairing for heterogeneous iot devices
X Li, Q Zeng, L Luo, T Luo
Proceedings of the 2020 acm sigsac conference on computer and communications …, 2020
492020
Identifying child users via touchscreen interactions
Y Cheng, X Ji, X Li, T Zhang, S Malebary, X Qu, W Xu
ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25, 2020
222020
Exploiting the inherent limitation of l0 adversarial examples
F Zuo, B Yang, X Li, Q Zeng
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
17*2019
Review helpfulness assessment based on convolutional neural network
X Qu, X Li, JR Rose
arXiv preprint arXiv:1808.09016, 2018
172018
icare: Automatic and user-friendly child identification on smartphones
X Li, S Malebary, X Qu, X Ji, Y Cheng, W Xu
Proceedings of the 19th International Workshop on Mobile Computing Systems …, 2018
172018
Are you lying: Validating the time-location of outdoor images
X Li, W Xu, S Wang, X Qu
Applied Cryptography and Network Security: 15th International Conference …, 2017
142017
LESS: Link estimation with sparse sampling in intertidal WSNs
X Zhou, X Ji, Y Chen, X Li, W Xu
Sensors 18 (3), 747, 2018
112018
An attention model of customer expectation to improve review helpfulness prediction
X Qu, X Li, C Farkas, J Rose
Advances in Information Retrieval: 42nd European Conference on IR Research …, 2020
92020
Use It-No Need to Shake It! accurate implicit authentication for everyday objects with smart sensing
C Wu, X Li, F Zuo, L Luo, X Du, J Di, Q Zeng
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
82022
G2Auth: secure mutual authentication for drone delivery without special user-side hardware
C Wu, X Li, L Luo, Q Zeng
Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022
82022
Which one to go: Security and usability evaluation of mid-air gestures
W Xu, X Li, J Tian, Y Xiao, X Qu, S Wang, X Ji
arXiv preprint arXiv:1811.10168, 2018
52018
Review helpfulness evaluation and recommendation based on an attention model of customer expectation
X Qu, X Li, C Farkas, J Rose
Information Retrieval Journal 24, 55-83, 2021
22021
Smart Sensing Enabled Secure and Usable Pairing and Authentication
X Li
University of South Carolina, 2020
2020
Validating the Contextual Information of Outdoor Images for Photo Misuse Detection
X Li, X Qu, W Xu, S Wang, Y Tong, L Luo
arXiv preprint arXiv:1811.08951, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–16