


default search action
Pulei Xiong
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j8]Sonal Allana
, Rozita Dara
, Xiaodong Lin
, Pulei Xiong
:
Towards integration of privacy enhancing technologies in explainable artificial intelligence. Knowl. Based Syst. 335: 115235 (2026)
[i7]Ee Wei Seah, Yongsen Zheng, Naga Nikshith, Mahran Morsidi, Gabriel Waikin Loh Matienzo, Nigel Gay, Akriti Vij, Benjamin Chua, En Qi Ng, Sharmini Johnson, Vanessa Wilfred, Wan Sie Lee, Anna Davidson, Catherine Devine, Erin Zorer, Gareth Holvey, Harry Coppock, James Walpole, Jerome Wynee, Magda Dubois, Michael Schmatz, Patrick Keane, Sam Deverett, Bill Black, Bo Yan, Bushra Sabir, Frank Sun, Hao Zhang, Harriet Farlow, Helen Zhou, Lingming Dong, Qinghua Lu, Seung Jang, Sharif Abuadbba, Simon O'Callaghan, Suyu Ma, Tom Howroyd, Cyrus Fung, Fatemeh Azadi, Isar Nejadgholi, Krishnapriya Vishnubhotla, Pulei Xiong, Saeedeh Lohrasbi, Scott Buffett, Shahrear Iqbal, Sowmya Vajjala, Anna Safont-Andreu, Luca Massarelli, Oskar van der Wal, Simon Möller, Agnès Delaborde, Joris Duguépéroux, Nicolas Rolin, Romane Gallienne, Sarah Behanzin, Tom Seimandi, Akiko Murakami, Takayuki Semitsu, Teresa Tsukiji, Angela Kinuthia, Michael Michie, Stephanie Kasaon, Jean Wangari, Hankyul Baek, Jaewon Noh, Kihyuk Nam, Sang Seo, Sungpil Shin, Taewhi Lee, Yongsu Kim:
Improving Methodologies for Agentic Evaluations Across Domains: Leakage of Sensitive Information, Fraud and Cybersecurity Threats. CoRR abs/2601.15679 (2026)- 2025
[c24]Saeedeh Lohrasbi, Ladan Khoshnevisan, Apurva Narayan, Nasser Lashgarian Azad, Pulei Xiong:
Optimism Induction Attack on Deep Reinforcement Learning with Control Barrier Function Safety Filter for Autonomous Driving. ACC 2025: 5202-5209
[c23]Zhuoxin Zhan, Ke Wang, Pulei Xiong:
Accelerating Adversarial Training on Under-Utilized GPU. IJCAI 2025: 6958-6966
[c22]Le Wang, Sonal Allana, Xiaowei Sun, Liang Xue, Xiaodong Lin, Rozita Dara, Pulei Xiong:
A Generic Framework for Privacy Risk Assessment of Machine Learning Models. PST 2025: 1-11
[c21]Pulei Xiong, Saeedeh Lohrasbi, Prini Kotian, Scott Buffett:
G-STAR: A Threat Modeling Framework for General-Purpose AI Systems. PST 2025: 1-12
[c20]Dilli Prasad Sharma, Liang Xue, Xiaowei Sun, Xiaodong Lin, Pulei Xiong:
Enhancing Adversarial Robustness of IoT Intrusion Detection via SHAP-Based Attribution Fingerprinting. TrustCom 2025: 1080-1091
[c19]Zhuliang Jia, Mohammadmasoud Shabanijou, Suprio Ray, Rongxing Lu, Pulei Xiong:
Privacy-Preserving Spatial Range Query for Encrypted 3D Object Data. WiSEE 2025: 1-6
[i6]Sonal Allana, Rozita Dara, Xiaodong Lin, Pulei Xiong:
Towards integration of Privacy Enhancing Technologies in Explainable Artificial Intelligence. CoRR abs/2507.04528 (2025)
[i5]Amirhossein Ansari, Ke Wang, Pulei Xiong:
NegRefine: Refining Negative Label-Based Zero-Shot OOD Detection. CoRR abs/2507.09795 (2025)
[i4]Dilli Prasad Sharma, Liang Xue, Xiaowei Sun, Xiaodong Lin, Pulei Xiong:
Enhancing Adversarial Robustness of IoT Intrusion Detection via SHAP-Based Attribution Fingerprinting. CoRR abs/2511.06197 (2025)
[i3]Dilli Prasad Sharma, Xiaowei Sun, Liang Xue, Xiaodong Lin, Pulei Xiong:
Privacy-Preserving Explainable AIoT Application via SHAP Entropy Regularization. CoRR abs/2511.09775 (2025)
[i2]Miles Q. Li, Benjamin C. M. Fung, Martin Weiss, Pulei Xiong, Khalil Al-Hussaeni, Claude Fachkha:
A Benchmark for Evaluating Outcome-Driven Constraint Violations in Autonomous AI Agents. CoRR abs/2512.20798 (2025)- 2024
[j7]Euclides Carlos Pinto Neto
, Hamideh Taslimasa
, Sajjad Dadkhah
, Shahrear Iqbal
, Pulei Xiong
, Taufiq Rahman, Ali A. Ghorbani:
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus. Internet Things 26: 101209 (2024)
[j6]Jwen Fai Low
, Benjamin C. M. Fung
, Pulei Xiong
:
Better entity matching with transformers through ensembles. Knowl. Based Syst. 293: 111678 (2024)
[c18]Mohammadmasoud Shabanijou, Vidit Sharma, Suprio Ray, Rongxing Lu, Pulei Xiong:
Large Language Model Empowered Spatio-Visual Queries for Extended Reality Environments. IEEE Big Data 2024: 5843-5846
[c17]Amirhossein Ansari
, Ke Wang
, Pulei Xiong
:
Out-of-Distribution Aware Classification for Tabular Data. CIKM 2024: 65-75- 2023
[j5]Barjinder Kaur, Sajjad Dadkhah
, Farzaneh Shoeleh, Euclides Carlos Pinto Neto
, Pulei Xiong, Shahrear Iqbal
, Philippe Lamontagne, Suprio Ray, Ali A. Ghorbani:
Internet of Things (IoT) security dataset evolution: Challenges and future directions. Internet Things 22: 100780 (2023)
[j4]Hamideh Taslimasa
, Sajjad Dadkhah
, Euclides Carlos Pinto Neto, Pulei Xiong, Suprio Ray, Ali A. Ghorbani:
Security issues in Internet of Vehicles (IoV): A comprehensive survey. Internet Things 22: 100809 (2023)
[j3]Princy Victor, Arash Habibi Lashkari
, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal
:
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. Peer Peer Netw. Appl. 16(3): 1380-1431 (2023)
[c16]Le Wang
, Haonan Yan
, Xiaodong Lin
, Pulei Xiong
:
Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense. AIS&P (1) 2023: 237-252
[c15]Liang Xue
, Xiaodong Lin
, Pulei Xiong
:
Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication. AIS&P (1) 2023: 400-414
[c14]Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal
, Suprio Ray, Ali A. Ghorbani:
ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol. BigDataSecurity/HPSC/IDS 2023: 122-129
[c13]Yunguo Guan, Ellen Z. Zhang, Pulei Xiong, Rongxing Lu:
Achieve Edge-Based Privacy-Preserving Dynamic Aggregation Query in Smart Transportation Systems. GLOBECOM 2023: 880-885- 2022
[j2]Pulei Xiong
, Scott Buffett, Shahrear Iqbal
, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a robust and trustworthy machine learning system development: An engineering perspective. J. Inf. Secur. Appl. 65: 103121 (2022)
[c12]Mahdi Abrishami, Sajjad Dadkhah
, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal
, Suprio Ray, Ali A. Ghorbani:
Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study. FRUCT 2022: 3-14
[c11]Yunguo Guan, Pulei Xiong, Songnian Zhang, Rongxing Lu:
Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing. GLOBECOM 2022: 4854-4859
[c10]Yunguo Guan, Pulei Xiong, Rongxing Lu:
EVRQ: Achieving Efficient and Verifiable Range Query over Encrypted Traffic Data. ICC 2022: 553-558- 2021
[c9]Barjinder Kaur, Sajjad Dadkhah
, Pulei Xiong, Shahrear Iqbal
, Suprio Ray, Ali A. Ghorbani:
Verification Based Scheme to Restrict IoT Attacks. BDCAT 2021: 63-68
[c8]Masoud Erfani, Farzaneh Shoeleh, Sajjad Dadkhah
, Barjinder Kaur, Pulei Xiong, Shahrear Iqbal
, Suprio Ray, Ali A. Ghorbani:
A feature exploration approach for IoT attack type classification. DASC/PiCom/CBDCom/CyberSciTech 2021: 582-588
[c7]Yunguo Guan, Pulei Xiong, Rongxing Lu:
Privacy-Preserving Fog-Based Multi-Location Task Allocation in Mobile Crowdsourcing. GLOBECOM 2021: 1-6
[c6]Jiacheng Jin, Yandong Zheng, Pulei Xiong:
EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences. PST 2021: 1-10
[c5]Fuyuan Song, Zheng Qin, Jinwen Liang
, Pulei Xiong, Xiaodong Lin:
Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing. PST 2021: 1-9
[i1]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a Robust and Trustworthy Machine Learning System Development. CoRR abs/2101.03042 (2021)
2010 – 2019
- 2011
[c4]Bernard Stepien, Pulei Xiong, Liam Peyton:
A Systematic Approach to Web Application Penetration Testing Using TTCN-3. MCETECH 2011: 1-16- 2010
[c3]Pulei Xiong, Liam Peyton:
A model-driven penetration test framework for Web applications. PST 2010: 173-180
2000 – 2009
- 2009
[c2]Pulei Xiong, Bernard Stepien, Liam Peyton:
Model-Based Penetration Test Framework for Web Applications Using TTCN-3. MCETECH 2009: 141-154- 2008
[j1]Bernard Stepien, Liam Peyton, Pulei Xiong:
Framework testing of web applications using TTCN-3. Int. J. Softw. Tools Technol. Transf. 10(4): 371-381 (2008)- 2004
[c1]Robert L. Probert, Pulei Xiong, Bernard Stepien:
Life-Cycle E-commerce Testing with OO-TTCN-3. FORTE Workshops 2004: 16-29
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-31 00:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







