To prospective students
面向Web3应用生态的基础设施创新,招收智能合约安全分析、可信隐私计算架构、移动3D重建与增强、AI数据收集评估4个研究方向的本硕博学生。欢迎志同道合的同学发信至我的邮箱 fengyuan DOT xu AT nju DOT edu DOT cn。除了基本信息和经验背景,请在邮件中表明你感兴趣的方向及原因,并从下列selected publication中挑选一篇总结其中内容和阐述你的见解(长短不限)。谢谢。
I am a Professor with the Department of Computer Science & Technology at Nanjing University. Prior to joining NJU, I worked at NEC Labs Princeton as a full-time Researcher. I was also a Visiting Researcher at Microsoft Research Asia. I earned my Ph.D. in Computer Science from the College of William and Mary, and received the Distinguished Dissertation Award in Natural and Computational Sciences.
My research interests lie at the intersection of Mobile Systems, Intelligent Security, and Autonomous Software. I seek to explore (computationally) scientific discoveries with real-world impact and create disruptive innovations reshaping how people live. Currently I am working on the decentralized autonomous synergy of cyber and physical realities, which is my research vision towards the Web3 version of Mixed Reality, with a focus on the Cyber-Physical Continuum, Trust & Privacy Autonomy, and AI Empowered Automation.
I lead the MObile Systems & Security ( MOSS ) research group, which is affiliated with the COSEC Research Center of NJU and the National Key Lab for Novel Software Technology. I am so grateful to work with Dr. Hao Wu and a group of amazing students in MOSS. We enjoy working on projects to create an immersive, trustworthy, compassionate, and sustainable computing environment for individual, society, and ecology. Part of on-going MOSS projects:
Mobile Intelligence / 移动智能. 1) efficient computing for mobile DL Apps [MobiSys'20] [MobiCom'21b]; 2) privacy enhancement for real-time DL inference [MobiCom'21a] [WWW'21] [MobiCom'19]; 3) secure framework for mobile DL services [TMC] [IWQoS'22].
No. 120 NJUverse / 南雍宇宙 (Upcoming Research Project Release). Real-Time Cyber-Physical Fused Metaverse of NJU Campus, which is MOSS vision and innovation of future metaverse technologies.
Data Trusts / 数据信托 Sustainable collaborative data value creation and decentralized data application ecosystem with autonomous trust & privacy, which unlease the power of large scale edge devices [国家重点研发课题] [国家自然基金项目] [CCS'22 最佳论文提名][CVPR'23][SIGIR'23].
面向Web3应用生态的基础设施创新,招收智能合约安全分析、可信隐私计算架构、移动3D重建与增强、AI数据收集评估4个研究方向的本硕博学生。欢迎志同道合的同学发信至我的邮箱 fengyuan DOT xu AT nju DOT edu DOT cn。除了基本信息和经验背景,请在邮件中表明你感兴趣的方向及原因,并从下列selected publication中挑选一篇总结其中内容和阐述你的见解(长短不限)。谢谢。
One paper accepted to SIGIR'23.
One paper accepted to CVPR'23.
CCS'22 论文荣获最佳论文提名奖.
祝贺吴昊博士荣获江苏省计算机学会优秀博士论文奖.
Serve on TPC of ACM MobiSys'23.
One paper accepted to TMC.
主持国家重点研发计划项目课题 - 多源异构数据安全可信智能计算关键技术及标准研究
主持国家自然科学基金面上项目 - 面向智能边缘协同的数据信托安全与隐私
Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English Shucheng Li, Boyu Chang, Bo Yang, Hao Wu, Sheng Zhong, and Fengyuan Xu. The 46th International ACM SIGIR Conference on Research and Development in Information Retrieval. (SIGIR 2023) Manipulating Transfer Learning for Property Inference Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, and David Evans. The IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023. (CVPR 2023) LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, and Sheng Zhong. IEEE Transactions on Mobile Computing. (TMC) Privacy-Preserving and Robust Federated Deep Metric Learning Yulong Tian, Xiaopeng Ke, Zeyi Tao, Shaohua Ding, Fengyuan Xu, Qun Li, Hao Han, Sheng Zhong, and Xinyi Fu. 2022 IEEE/ACM International Symposium on Quality of Service. (IWQoS 2022) Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, and Mu Zhang. 2022 ACM Conference on Computer and Communications Security. (CCS 2022) Best Paper Honorable Mention DAPter: Preventing User Data Abuse in Deep Learning Inference Services Hao Wu, Xuejin Tian, Yuhang Gong, Xing Su, Minghao Li, and Fengyuan Xu. The 30th Web Conference. (WWW 2021) PECAM: Privacy-Enhanced Video Streaming & Analytics via Securely-Recoverable Transformation Hao Wu, Xuejin Tian, Minghao Li, Yunxin Liu, Ganesh Ananthanarayanan, Fengyuan Xu, and Sheng Zhong. The 27th Annual International Conference On Mobile Computing And Networking. (MobiCom 2021a) AsyMo: Scalable and Efficient Deep-Learning Inference on Asymmetric Mobile CPUs Manni Wang*, Shaohua Ding*, Ting Cao, Yunxin Liu, and Fengyuan Xu. The 27th Annual International Conference On Mobile Computing And Networking. (MobiCom 2021b) *co-first authors EMO: Real-Time Emotion Recognition from Single-Eye Images for Resource-Constrained Eyewear Devices Hao Wu, Jinghao Feng, Xuejin Tian, Edward Sun, Yunxin Liu, Bo Dong, Fengyuan Xu, and Sheng Zhong. 18th ACM International Conference on Mobile Systems, Applications, and Services. (MobiSys 2020) Occlumency: Privacy-preserving Remote Deep-learning Inference Using SGX Taegyeong Lee, Zhiqi Lin, Saumay Pushp, Caihua Li, Yunxin Liu, Youngki Lee, Fengyuan Xu, Chenren Xu, Junehwa Song, and Lintao Zhang. 25th ACM International Conference on Mobile Computing and Networking. (MobiCom 2019) V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics Fengyuan Xu, Yunxin Liu, Qun Li, and Yongguang Zhang. The 10th USENIX Symposium on Networked Systems Design and Implementation. (NSDI 2013). IMDGuard: Securing Implantable Medical Devices with the External Wearable Guardian Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, and Qun Li. The 30th IEEE International Conference on Computer Communications. (INFOCOM 2011)
Stealthy Backdoors as Compression Artifacts. Yulong Tian, Fnu Suya, Fengyuan Xu, and David Evans. IEEE Transactions on Information Forensics and Security. (TIFS) Towards Practical and Efficient Long Video Summary. Xiaopeng Ke, Boyu Chang, Hao Wu, Fengyuan Xu, and Sheng Zhong. 2022 IEEE International Conference on Acoustics, Speech and Signal Processing. (ICASSP 2022) 自动驾驶系统中视觉感知模块的安全测试. 吴昊, 王浩, 苏醒, 李明昊, 许封元, 仲盛. 计算机研究与发展, 2022. vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. Yutao Tang, Zhengrui Qin, Yue Li, Zhiqiang Lin, Shanhe Yi, Fengyuan Xu, and Qun Li. IEEE Transactions on Computers. (TC) RF-Badge: Vital Sign-based Authentication via RFID Tag Array on Badges. Jingyi Ning, Lei Xie, Chuyu Wang, Yanlin Bu, Fengyuan Xu, Da-Wei Zhou, Sanglu Lu, and Baoliu Ye. IEEE Transaction on Mobile Computing. (TMC) DIComP: Lightweight Data-Driven Inference of Binary Compuler Provenance with High Accuracy. Ligeng Chen, Zhongling He, Hao Wu, Fengyuan Xu, Yi Qian, and Bing Mao. 2022 International Conference on Software Analysis, Evolution, and Reengineering. (SANER 2022) Enabling Efficient Cyber Threat Hunting with Cyber Threat Intelligence. Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, and Dawn Song. 37th IEEE International Conference on Data Engineering. (ICDE 2021) Efficient Architecture Paradigm for Deep Learning Inference as a Service. Jin Yu, Xiaopeng Ke, Fengyuan Xu, and Hao Huang. 39th IEEE International Performance Computing and Communications Conference. (IPCCC 2020) 深度学习模型压缩与加速综述. 高晗, 田育龙, 许封元, 仲盛. 软件学报, 2020. DBox:宏内核下各种设备驱动程序的高性能安全盒. 余劲, 黄皓, 诸渝, 许封元. 计算机学报, 2020. Detecting GAN-based Privacy Attack in Distributed Learning. Yayuan Xiong, Fengyuan Xu, and Sheng Zhong. 2020 IEEE International Conference on Communications. (ICC 2020) Escaping Backdoor Attack Detection of Deep Learning. Yayuan Xiong, Fengyuan Xu, Sheng Zhong, and Qin Li. 35th International Conference on ICT Systems Security and Privacy Protection. (IFIP SEC 2020) Trojan Attack on Deep Generative Models in Autonomous Driving. Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li and Sheng Zhong. 15th EAI International Conference on Security and Privacy in Communication Networks. (SecureComm 2019) secGAN: Secure Recoverable GAN-based Video Transformation. Hao Wu, Jinghao Feng, Xuejin Tian, Fengyuan Xu, Sheng Zhong, Yunxin Liu, and Xiaofeng Wang. MobiCom Workshop on Hot Topics in Video Analytics and Intelligent Edges. (HotEdgeVideo 2019) DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu. 26th ACM Conference on Computer and Communications Security. (CCS 2019) An Empirical Study of Graph Neural Networks Based Semantic Parsing. Shucheng Li, Lingfei Wu, Fengyuan Xu, Fangli Xu and Sheng Zhong. 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (Poster). (KDD 2019, DGL Workshop) Best Student Paper Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources. Hao Wu, Zheng Qin, Xuejin Tian, Edward Sun, Fengyuan Xu, and Sheng Zhong. 2019 IEEE Conference on Dependable and Secure Computing. (DSC 2019, Invited Paper) Automated Finite State Machine Extraction. Yongheng Chen, Linhai Song, Xinyu Xing, Fengyuan Xu, Wenfei Wu. 2019 Workshop on Forming an Ecosystem Around Software Transformation. (FEAST 2019) Toward Automated Queries Generation from Natural Language Description Using Graph Neural Networks. Shucheng Li, Lingfei Wu, Shiwei Feng, Yulong Tian, Fengyuan Xu, Fangli Xu and Sheng Zhong. IEEE International Conference on AI + Adaptive Education. (AIAED 2019) Best Student Paper A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security. Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal. 45th International Conference on Very Large Data Bases (Demo). (VLDB 2019, Demo Track) Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications. Yuan Zhang, Yunlong Mao, Minze Xu, Fengyuan Xu, and Sheng Zhong. IEEE Transactions on Dependable and Secure Computing. (TDSC) Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li, and Sheng Zhong. IEEE International Conference on Distributed Computing. (ICDCS 2019) NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li. The 25th ACM Conference on Computer and Communications Security. (CCS 2018) AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, and Prateek Mittal. 2018 USENIX Annual echnical Conference. (ATC 2018) A Privacy- Preserving Deep Learning Approach for Face Recognition with Edge Computing. Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, and Sheng Zhong. The USENIX Workshop on Hot Topics in Edge Computing. (HotEdge 2018) MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, and Sheng Zhong. IEEE International Conference on Computer Communications. (Infocom 2018) Internet Protocol Cameras with No Password Protection: An Empirical Investigation. Haitao Xu, Fengyuan Xu, and Bo Chen. Passive and Active Measurement Conference. (PAM 2018) Learning from Differentially Private Neural Activations with Edge Computing. Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, and Sheng Zhong. 2018 IEEE/ACM Symposium on Edge Computing. (SEC 2018) A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. Jingyu Hua, Wei Tong, Fengyuan Xu, and Sheng Zhong. IEEE Trans. Information Forensics and Security. (TIFS) Location Privacy in Public Access Points Positioning: An Optimization and Geometry Approach. Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, and Sheng Zhong. Computers & Security. (Computer & Security) Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios. Xiaojun Zhu, Fengyuan Xu, Chiu C. Tan, Qun Li, and Guihai Chen. IEEE Transactions on Mobile Computing. (TMC) High Fidelity Data Reduction for Big Data Security Dependency Analyses. Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, and Guofei Jiang. The 23rd ACM Conference on Computer and Communications Security. (CCS 2016) VR-Defender: Self Defense against Vehicular Rogue APs for Drive-thru Internet. Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, and Qun Li. IEEE Transactions on Vehicular Technology. (TVT) VProof: Lightweight Privacy-Preserving Vehicle Location Proofs. Yifan Zhang, Chiu C. Tan, Fengyuan Xu, Hao Han, and Qun Li. IEEE Transactions on Vehicular Technology. (TVT) SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, and Jie Wu. IEEE Transactions on Parallel and Distributed Systems. (TPDS) SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks. Wei Wei, Fengyuan Xu, Chiu C. Tan, and Qun Li. IEEE Transactions on Parallel and Distributed Systems. (TPDS) Optimizing Background Email Sync on Smartphones. Fengyuan Xu, Yunxin Liu, Thomas Moscibroda, Ranveer Chandra, Long Jin, Yongguang Zhang, and Qun Li. The 11th International Conference on Mobile Systems, Applications and Services. (MobiSys 2013) Extracting Secret Key from Wireless Link Dynamics in Vehicular Environments. Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C Tan, Qun Li, and Guihai Chen. The 32nd IEEE International Conference on Computer Communications. (INFOCOM 2013) Fast Mencius: Mencius with Low Commit Latency. Wei Wei, Harry Gao, Fengyuan Xu, and Qun Li. The 32nd IEEE International Conference on Computer Communications. (INFOCOM 2013) SybilDefender: Defend Against Sybil Attacks in Large Social Networks. Wei Wei, Fengyuan Xu, Chiu C. Tan, and Qun Li. The 31th IEEE International Conference on Computer Communications. (INFOCOM 2012) Wei Wei, Fengyuan Xu, and Qun Li. MobiShare: Flexible Privacy-Preserving Location Sharing in Mobile Online Social Networks. The 31th IEEE International Conference on Computer Communications. (INFOCOM mini-conference 2012) Defending Against Vehicular Rogue AP. Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, and Qun Li. The 30th IEEE International Conference on Computer Communications. (INFOCOM 2011) Designing a Practical Access Point Association Protocol. Fengyuan Xu, Chiu C. Tan, Qun Li, Guanhua Yan, and Jie Wu. The 29th IEEE International Conference on Computer Communications. (INFOCOM 2010)
Cybersecurity and Privacy (English)
Introduction to Distributed Systems Research
ACM CCS 2022 Best Paper Honorable Mention (CCS'22最佳论文提名奖).
Distinguished TPC of IEEE INFOCOM 2022. 江苏省“双创计划”创新人才. 江苏省“六大人才高峰”入选者. 微软“铸星计划”学者. 中国中文信息学会优秀博士论文奖指导老师. 江苏省计算机学会优秀博士论文奖指导老师. Award for Excellence in Undergraduate Mentoring(最佳本科生研究指导), William & Mary.
中国中文信息学会优秀博士论文奖
江苏省计算机学会优秀博士论文奖
ACM中国嵌入式系统专委会优博奖
南大计算机系优秀博士论文 AIAED'19 Best Student Paper (本科生) KDD'19 DLG-Workshop Best Student Paper (本科生) 南大优秀毕业论文 (本科生) 南大校长奖学金 (研究生) 南大优秀毕业生 (研究生) 南大人工智能奖学金 (研究生) 南大优秀研究生 南大博士英才奖学金 南京大学优秀研究生标兵 “赢在南京”青年大学生创业大赛第一名 “创栖霞”创新创业大赛筑梦新星组三等奖南京大学 字节跳动 腾讯优图 微软亚研院 蚂蚁金服 微软工程院 旷视科技 地平线AI 米哈游科技 腾讯微信 华为南研所 华为智能驾驶 飞维美地信息技术 深圳能源财务
Gaorgia Tech Rice Univ. Indiana Univ. Bloomington UC Irvine Purdue Univ. Univ. of Virginia Ohio State Univ.
中国中文信息学会大数据安全与隐私计算专委会常委 ACM中国SIGBED专委会常委 《通信学报》隐私计算专栏专题主编
INFOCOM '16-'22 ACM MobiSys '23 ACM/IEEE SEC'22 Publicity Chair ICCCN'18 (Track Chair) AsiaCCS'21 SecureComm'17,'19,'20 BigData'18 全国体系结构学术年会'18
ACM Transactions on Sensor Networks ACM Transactions on Embedded Computing Systems IEEE Transactions on Mobile Computing IEEE Transactions on Information Forensics and Security IEEE Transactions on Wireless Communications IEEE Transactions on Vehicular Technology IEEE Transactions on Computational Social Systems Computer Networks IEICE Transactions on Information and Systems Mobile Networks and Applications Journal of Computer Science and Technology Security and Communication Networks