Search Results for author: Fengyuan Xu

Found 6 papers, 2 papers with code

Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection

no code implementations18 Jun 2021 Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong

In our model, two pretext tasks designed from spatial and temporal perspectives help us effectively learn useful node embedding from the huge amount of unlabelled transaction data.

Graph Learning Node Classification

Stealthy Backdoors as Compression Artifacts

1 code implementation30 Apr 2021 Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans

In a backdoor attack on a machine learning model, an adversary produces a model that performs well on normal inputs but outputs targeted misclassifications on inputs containing a small trigger pattern.

Model Compression Quantization

App Developer Centric Trusted Execution Environment

no code implementations4 Feb 2021 Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong

ARM TrustZone is the de-facto hardware TEE implementation on mobile devices like smartphones.

Cryptography and Security

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

no code implementations26 Oct 2020 Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song

Log-based cyber threat hunting has emerged as an important solution to counter sophisticated attacks.

Cannot find the paper you are looking for? You can Submit a new open access paper.