default search action
Guoxing Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Guoxing Chen, Guoqiang Zhang, Bjarne Bjerg, Poul Pedersen, Torben Jensen, Li Rong:
CFD investigation on a novel pen partition-attached jet air supply for mitigating heat stress among lactating sows. Comput. Electron. Agric. 220: 108840 (2024) - [c25]Mengyuan Li, Yuheng Yang, Guoxing Chen, Mengjia Yan, Yinqian Zhang:
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments. AsiaCCS 2024 - [i9]Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu:
VPVet: Vetting Privacy Policies of Virtual Reality Apps. CoRR abs/2409.00740 (2024) - 2023
- [j7]Guoxing Chen, Yinqian Zhang:
Securing TEEs With Verifiable Execution Contracts. IEEE Trans. Dependable Secur. Comput. 20(4): 3222-3237 (2023) - [c24]Hui Liu, Hongzhi Luo, Shaofeng Li, Tian Dong, Guoxing Chen, Yan Meng, Haojin Zhu:
Privacy Computing with Right to Be Forgotten in Trusted Execution Environment. GLOBECOM 2023: 2566-2571 - [c23]Yichi Zhang, Guoxing Chen, Yan Meng, Haojin Zhu:
Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps. GLOBECOM 2023: 6705-6710 - [c22]Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, Xuemin Sherman Shen:
MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging. INFOCOM 2023: 1-10 - [c21]Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu:
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. NDSS 2023 - [c20]Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu:
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices. USENIX Security Symposium 2023: 1073-1090 - [c19]Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin:
Reusable Enclaves for Confidential Serverless Computing. USENIX Security Symposium 2023: 4015-4032 - [i8]Tian Dong, Guoxing Chen, Shaofeng Li, Minhui Xue, Rayne Holland, Yan Meng, Zhen Liu, Haojin Zhu:
Unleashing Cheapfakes through Trojan Plugins of Large Language Models. CoRR abs/2312.00374 (2023) - 2022
- [j6]Guoxing Chen, Ashutosh Sharma:
Green Landscape Design Based on Niche Genetic Algorithm for E-Business Solutions. Int. J. e Collab. 18(2): 1-11 (2022) - [c18]Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue:
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations. CVPR 2022: 13420-13429 - [c17]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. ESORICS (1) 2022: 89-109 - [c16]Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures. NDSS 2022 - [c15]Guoxing Chen, Yinqian Zhang:
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. USENIX Security Symposium 2022: 4095-4110 - [i7]Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue:
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations. CoRR abs/2202.08602 (2022) - [i6]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. IACR Cryptol. ePrint Arch. 2022: 627 (2022) - 2021
- [c14]Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin:
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. DIMVA 2021: 151-172 - [c13]Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Towards Formal Verification of State Continuity for Enclave Programs. USENIX Security Symposium 2021: 573-590 - [i5]Guoxing Chen, Wei-Chyung Wang:
Short-term precipitation prediction using deep learning. CoRR abs/2110.01843 (2021) - 2020
- [j5]Rui He, Xinhong Li, Guoming Chen, Guoxing Chen, Yiwei Liu:
Generative adversarial network-based semi-supervised learning for real-time risk warning of process industries. Expert Syst. Appl. 150: 113244 (2020) - [j4]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution. IEEE Secur. Priv. 18(3): 28-37 (2020) - [i4]Guoxing Chen, Yinqian Zhang:
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. CoRR abs/2008.09501 (2020)
2010 – 2019
- 2019
- [j3]Xiaohui Cai, Guoxing Chen, Xiaoping Fan, Yangkang Chen:
Least-squares based rectangular-grid cross and rhombus stencils for acoustic wave propagation and reverse time migration. J. Comput. Phys. 392: 335-353 (2019) - [c12]Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai:
OPERA: Open Remote Attestation for Intel's Secure Enclaves. CCS 2019: 2317-2331 - [c11]Guoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang:
Defeating Speculative-Execution Attacks on SGX with HyperRace. DSC 2019: 1-8 - [c10]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. EuroS&P 2019: 142-157 - 2018
- [c9]Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang:
Differentially Private Access Patterns for Searchable Symmetric Encryption. INFOCOM 2018: 810-818 - [c8]Guoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin:
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. IEEE Symposium on Security and Privacy 2018: 178-194 - [i3]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. CoRR abs/1802.09085 (2018) - 2017
- [c7]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS 2017: 2421-2434 - [c6]Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao:
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance. ICDCS 2017: 689-698 - [i2]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CoRR abs/1705.07289 (2017) - 2016
- [c5]Fan Yang, Qiang Zhai, Guoxing Chen, Adam C. Champion, Junda Zhu, Dong Xuan:
Flash-Loc: Flashing mobile phones for accurate indoor localization. INFOCOM 2016: 1-9 - 2015
- [c4]Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan:
Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices. ICDCS 2015: 11-20 - [c3]Lingfeng Duan, Wanneng Yang, Guoxing Chen, Lizhong Xiong, Chenglong Huang:
Accurate Inference of Rice Biomass Based on Support Vector Machine. CCTA (1) 2015: 356-365 - [c2]Paul Y. Cao, Gang Li, Guoxing Chen, Biao Chen:
Mobile Data Collection Frameworks: A Survey. Mobidata@MobiHoc 2015: 25-30 - [i1]Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan:
Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices. CoRR abs/1501.02484 (2015) - 2014
- [c1]Lingfeng Duan, Chenglong Huang, Guoxing Chen, Lizhong Xiong, Qian Liu, Wanneng Yang:
High-Throughput Estimation of Yield for Individual Rice Plant Using Multi-angle RGB Imaging. CCTA 2014: 1-12 - 2012
- [j2]Guoxing Chen, Zhengzheng Xiang, Changqing Xu, Meixia Tao:
On Degrees of Freedom of Cognitive Networks with User Cooperation. IEEE Wirel. Commun. Lett. 1(6): 617-620 (2012)
2000 – 2009
- 2006
- [j1]Jianwei Zhang, Caishun Li, Changyin Wu, Lizhong Xiong, Guoxing Chen, Qifa Zhang, Shiping Wang:
RMD: a rice mutant database for functional analysis of the rice genome. Nucleic Acids Res. 34(Database-Issue): 745-748 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint