Follow
Lili Xu
Lili Xu
Institute of Information Engineering, Chinese Academy of Sciences and Ecole Polytechnique
Verified email at lix.polytechnique.fr
Title
Cited by
Cited by
Year
Generalized bisimulation metrics
K Chatzikokolakis, D Gebler, C Palamidessi, L Xu
International Conference on Concurrency Theory, 32-46, 2014
682014
A Survey on Adversarial Attacks in Computer Vision: Taxonomy, Visualization and Future Directions
T Long, Q Gao, L Xu, Z Zhou
Computers & Security, 102847, 2022
372022
1dVul: Discovering 1-Day Vulnerabilities through Binary Patches
J Peng, F Li, B Liu, L Xu, B Liu, K Chen, W Huo
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
332019
Metrics for differential privacy in concurrent systems
L Xu, K Chatzikokolakis, H Lin
International Conference on Formal Techniques for Distributed Objects …, 2014
232014
B2SMatcher: fine-Grained version identification of open-Source software in binary files
G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo
Cybersecurity 4 (1), 1-21, 2021
92021
Modular reasoning about differential privacy in a probabilistic process calculus
L Xu
International Symposium on Trustworthy Global Computing, 198-212, 2012
82012
A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection
M Xu, S Li, L Xu, F Li, W Huo, J Ma, X Li, Q Huang
International Conference on Information Security and Cryptology, 404-423, 2018
62018
A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs
H Su, L Xu, H Chao, F Li, Z Yuan, J Zhou, W Huo
2022 IEEE 33rd International Symposium on Software Reliability Engineering …, 2022
52022
Formal verification of differential privacy in concurrent systems
L Xu
Ecole Polytechnique (Palaiseau, France), 2015
42015
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
L Xu, M Xu, F Li, W Huo
Cybersecurity 3 (1), 1-19, 2020
32020
Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines Algorithm
K Zhan, L Xu, Z Yuan, W Zhang
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
32018
Splendor: Static Detection of Stored XSS in Modern Web Applications
H Su, F Li, L Xu, W Hu, Y Sun, Q Sun, H Chao, W Huo
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
12023
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis
Q Sun, L Xu, Y Xiao, F Li, H Su, Y Liu, H Huang, W Huo
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
12022
Complete proof systems for amortised probabilistic bisimulations
LL Xu, HM Lin
Journal of Computer Science and Technology 31 (2), 300-316, 2016
12016
分摊概率互模拟的完备证明系统
LL Xu, HM Lin
计算机科学技术学报 31 (2), 300-316, 2016
2016
A Multiplicative Variant of the Kantorovich distance for Differential Privacy
L Xu, K Chatzikokolakis, C Palamidessi
The system can't perform the operation now. Try again later.
Articles 1–16