Follow
Xiali (Sharon) Hei
Xiali (Sharon) Hei
The Center for Advanced Computer Studies, University of Louisiana at Lafayette
Verified email at louisiana.edu - Homepage
Title
Cited by
Cited by
Year
Defending resource depletion attacks on implantable medical devices
X Hei, X Du, J Wu, F Hu
2010 IEEE global telecommunications conference GLOBECOM 2010, 1-5, 2010
1392010
Biometric-based two-level secure access control for implantable medical devices during emergencies
X Hei, X Du
2011 Proceedings IEEE INFOCOM, 346-350, 2011
1162011
PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system
X Hei, X Du, S Lin, I Lee
2013 Proceedings IEEE INFOCOM, 3030-3038, 2013
932013
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
Y Tu, Z Lin, I Lee, X Hei
USENIX SECURIYT Symp., 2018
612018
Patient infusion pattern based access control schemes for wireless insulin pump system
X Hei, X Du, S Lin, I Lee, O Sokolsky
IEEE Transactions on Parallel and Distributed Systems 26 (11), 3108-3121, 2014
422014
Trick or heat? Manipulating critical temperature-based control systems using rectification attacks
Y Tu, S Rampazzi, B Hao, A Rodriguez, K Fu, X Hei
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
282019
Stacked LSTM based deep recurrent neural network with kalman smoothing for blood glucose prediction
MF Rabby, Y Tu, MI Hossen, I Lee, AS Maida, X Hei
BMC Medical Informatics and Decision Making 21 (1), 1-15, 2021
172021
Two vulnerabilities in Android OS kernel
X Hei, X Du, S Lin
2013 IEEE International Conference on Communications (ICC), 6123-6127, 2013
152013
Security for wireless implantable medical devices
X Hei, X Du
Springer, 2013
152013
木马的植入与隐藏技术分析
蔺聪, 黑霞丽
信息安全与通信保密, 53-55, 2008
152008
Energy-aware real-time scheduling on Heterogeneous Multi-Processor
G Wang, W Li, X Hei
2015 49th Annual Conference on Information Sciences and Systems (CISS), 1-7, 2015
142015
Poster: Near field communication based access control for wireless medical devices
X Hei, X Du, S Lin
Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014
132014
Two matrices for Blakley's secret sharing scheme
X Hei, X Du, B Song
2012 IEEE International Conference on Communications (ICC), 810-814, 2012
132012
Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors
Y Tu, VS Tida, Z Pan, X Hei
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
92021
An Object Detection based Solver for {Google’s} Image {reCAPTCHA} v2
MI Hossen, Y Tu, MF Rabby, MN Islam, H Cao, X Hei
23rd international symposium on research in attacks, intrusions and defenses …, 2020
92020
Voice liveness detection for medical devices
B Hao, X Hei
Design and Implementation of Healthcare Biometric Systems, 109-136, 2019
52019
Sequential outlier criterion for sparsification of online adaptive filtering
S Zhang, H Cao, S Yang, Y Zhang, X Hei
IEEE Transactions on Neural Networks and Learning Systems 29 (11), 5277-5291, 2018
52018
移动电子商务安全问题研究
倪永健, 黑霞丽
科技情报开发与经济 17 (14), 228-229, 2007
52007
Maximized privacy-preserving outsourcing on support vector clustering
Y Ping, B Hao, X Hei, J Wu, B Wang
Electronics 9 (1), 178, 2020
42020
Trick or heat? attack on amplification circuits to abuse critical temperature control systems
Y Tu, S Rampazzi, B Hao, A Rodriguez, K Fu, X Hei
arXiv preprint arXiv:1904.07110, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20