default search action
Yubin Xia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Erhu Feng, Dahu Feng, Dong Du, Yubin Xia, Wenbin Zheng, Siqi Zhao, Haibo Chen:
sIOPMP: Scalable and Efficient I/O Protection for TEEs. ASPLOS (2) 2024: 1061-1076 - [c56]Yanning Yang, Dong Du, Haitao Song, Yubin Xia:
On-demand and Parallel Checkpoint/Restore for GPU Applications. SoCC 2024: 415-433 - [c55]Erhu Feng, Dahu Feng, Dong Du, Yubin Xia, Haibo Chen:
sNPU: Trusted Execution Environments on Integrated NPUs. ISCA 2024: 708-723 - [c54]Qingyuan Liu, Yanning Yang, Dong Du, Yubin Xia, Ping Zhang, Jia Feng, James R. Larus, Haibo Chen:
Harmonizing Efficiency and Practicability: Optimizing Resource Utilization in Serverless Computing with Jiagu. USENIX ATC 2024: 1-17 - [c53]Jiahao Chen, Zeyu Mi, Yubin Xia, Haibing Guan, Haibo Chen:
CPC: Flexible, Secure, and Efficient CVM Maintenance with Confidential Procedure Calls. USENIX ATC 2024: 1065-1082 - [i6]Qingyuan Liu, Yanning Yang, Dong Du, Yubin Xia, Ping Zhang, Jia Feng, James R. Larus, Haibo Chen:
Jiagu: Optimizing Serverless Computing Resource Utilization with Harmonized Efficiency and Practicability. CoRR abs/2403.00433 (2024) - [i5]Zilong Bai, Ruiji Zhang, Linqing Chen, Qijun Cai, Yuan Zhong, Cong Wang, Yan Fang, Jie Fang, Jing Sun, Weikuan Wang, Lizhi Zhou, Haoran Hua, Tian Qiu, Chaochao Wang, Cheng Sun, Jianping Lu, Yixin Wang, Yubin Xia, Meng Hu, Haowen Liu, Peng Xu, Licong Xu, Fu Bian, Xiaolong Gu, Lisha Zhang, Weilei Wang, Changyang Tu:
PatentGPT: A Large Language Model for Intellectual Property. CoRR abs/2404.18255 (2024) - [i4]Zhenliang Xue, Yixin Song, Zeyu Mi, Le Chen, Yubin Xia, Haibo Chen:
PowerInfer-2: Fast Large Language Model Inference on a Smartphone. CoRR abs/2406.06282 (2024) - [i3]Linqing Chen, Weilei Wang, Zilong Bai, Peng Xu, Yan Fang, Jie Fang, Wentao Wu, Lizhi Zhou, Ruiji Zhang, Yubin Xia, Chaobo Xu, Ran Hu, Licong Xu, Qijun Cai, Haoran Hua, Jing Sun, Jin Liu, Tian Qiu, Haowen Liu, Meng Hu, Xiuwen Li, Fei Gao, Yufu Wang, Lin Tie, Chaochao Wang, Jianping Lu, Cheng Sun, Yixin Wang, Shengjie Yang, Yuancheng Li, Lu Jin, Lisha Zhang, Fu Bian, Changyang Tu:
PharmGPT: Domain-Specific Large Language Models for Bio-Pharmaceutical and Chemistry. CoRR abs/2406.18045 (2024) - 2023
- [j13]Guoren Wang, Yue Zeng, Rong-Hua Li, Hongchao Qin, Xuanhua Shi, Yubin Xia, Xuequn Shang, Liang Hong:
Temporal Graph Cube. IEEE Trans. Knowl. Data Eng. 35(12): 13015-13030 (2023) - [c52]Dong Du, Yubin Xia, Binyu Zang, Haibo Chen:
Heterogeneous Serverless Computing. ACM TUR-C 2023: 53-54 - [c51]Qingyuan Liu, Dong Du, Yubin Xia, Ping Zhang, Haibo Chen:
The Gap Between Serverless Research and Real-world Systems. SoCC 2023: 475-485 - [c50]Erhu Feng, Dong Du, Yubin Xia, Haibo Chen:
Efficient Distributed Secure Memory with Migratable Merkle Tree. HPCA 2023: 347-360 - [c49]Shenglong Zhao, Zhichao Hua, Yubin Xia:
SecDFS: A Secure and Decentralized File System. ICPADS 2023: 623-630 - [c48]Shulin Fan, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang:
ISA-Grid: Architecture of Fine-grained Privilege Control for Instructions and Registers. ISCA 2023: 15:1-15:15 - [c47]Dong Du, Bicheng Yang, Yubin Xia, Haibo Chen:
Accelerating Extra Dimensional Page Walks for Confidential Computing. MICRO 2023: 654-669 - [c46]Mingyu Li, Xuyang Zhao, Le Chen, Cheng Tan, Huorong Li, Sheng Wang, Zeyu Mi, Yubin Xia, Feifei Li, Haibo Chen:
Encrypted Databases Made Secure Yet Maintainable. OSDI 2023: 117-133 - 2022
- [j12]Mingyu Li, Yubin Xia, Haibo Chen:
Memory Optimization System for SGXv2 Trusted Execution Environment. Int. J. Softw. Informatics 12(3): 285-307 (2022) - [j11]Jinyu Gu, Hao Li, Yubin Xia, Haibo Chen, Chenggang Qin, Zheng-Yu He:
Unified Enclave Abstraction and Secure Enclave Migration on Heterogeneous Security Architectures. J. Comput. Sci. Technol. 37(2): 468-486 (2022) - [j10]Yubin Xia, Zhichao Hua, Yang Yu, Jinyu Gu, Haibo Chen, Binyu Zang, Haibing Guan:
Colony: A Privileged Trusted Execution Environment With Extensibility. IEEE Trans. Computers 71(2): 479-492 (2022) - [c45]Dong Du, Qingyuan Liu, Xueqiang Jiang, Yubin Xia, Binyu Zang, Haibo Chen:
Serverless computing on heterogeneous computers. ASPLOS 2022: 797-813 - [c44]Jinyu Gu, Hao Li, Wentai Li, Yubin Xia, Haibo Chen:
EPK: Scalable and Efficient Memory Protection Keys. USENIX ATC 2022: 609-624 - [c43]Jinyu Gu, Bojun Zhu, Mingyu Li, Wentai Li, Yubin Xia, Haibo Chen:
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation. USENIX Security Symposium 2022: 3129-3145 - [e1]John Criswell, Dan John Williams, Yubin Xia:
VEE '22: 18th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Virtual Event, Switzerland, 1 March 2022. ACM 2022, ISBN 978-1-4503-9251-8 [contents] - 2021
- [j9]Zhichao Hua, Yang Yu, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang:
TZ-Container: protecting container from untrusted OS with ARM TrustZone. Sci. China Inf. Sci. 64(9) (2021) - [j8]Jinyu Gu, Xinyue Wu, Bojun Zhu, Yubin Xia, Binyu Zang, Haibing Guan, Haibo Chen:
Enclavisor: A Hardware-Software Co-Design for Enclaves on Untrusted Cloud. IEEE Trans. Computers 70(10): 1598-1611 (2021) - [j7]Yubin Xia, Dong Du, Zhichao Hua, Binyu Zang, Haibo Chen, Haibing Guan:
Boosting Inter-process Communication with Architectural Support. ACM Trans. Comput. Syst. 39(1-4): 6:1-6:35 (2021) - [c42]Jingqi Wu, Rong Chen, Yubin Xia:
Fast and Accurate Optimizer for Query Processing over Knowledge Graphs. SoCC 2021: 503-517 - [c41]Mingyu Li, Yubin Xia, Haibo Chen:
Confidential Serverless Made Efficient with Plug-In Enclaves. ISCA 2021: 306-318 - [c40]Erhu Feng, Xu Lu, Dong Du, Bicheng Yang, Xueqiang Jiang, Yubin Xia, Binyu Zang, Haibo Chen:
Scalable Memory Protection in the PENGLAI Enclave. OSDI 2021: 275-294 - [c39]Mingyu Li, Jinhao Zhu, Tianxu Zhang, Cheng Tan, Yubin Xia, Sebastian Angel, Haibo Chen:
Bringing Decentralized Search to Decentralized Services. OSDI 2021: 331-347 - [c38]Dingji Li, Zeyu Mi, Yubin Xia, Binyu Zang, Haibo Chen, Haibing Guan:
TwinVisor: Hardware-isolated Confidential Virtual Machines for ARM. SOSP 2021: 638-654 - 2020
- [j6]Guanyu Li, Dong Du, Yubin Xia:
Iso-UniK: lightweight multi-process unikernel through memory protection keys. Cybersecur. 3(1): 11 (2020) - [c37]Dong Du, Tianyi Yu, Yubin Xia, Binyu Zang, Guanglu Yan, Chenggang Qin, Qixuan Wu, Haibo Chen:
Catalyzer: Sub-millisecond Startup for Serverless Computing with Initialization-less Booting. ASPLOS 2020: 467-481 - [c36]Youren Shen, Hongliang Tian, Yu Chen, Kang Chen, Runji Wang, Yi Xu, Yubin Xia, Shoumeng Yan:
Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX. ASPLOS 2020: 955-970 - [c35]Tianyi Yu, Qingyuan Liu, Dong Du, Yubin Xia, Binyu Zang, Ziqian Lu, Pingchao Yang, Chenggang Qin, Haibo Chen:
Characterizing serverless platforms with serverlessbench. SoCC 2020: 30-44 - [c34]Zinan Li, Wenhao Li, Yubin Xia, Binyu Zang:
TEEp: Supporting Secure Parallel Processing in ARM TrustZone. ICPADS 2020: 544-553 - [c33]Jinyu Gu, Xinyue Wu, Wentai Li, Nian Liu, Zeyu Mi, Yubin Xia, Haibo Chen:
Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication. USENIX ATC 2020: 401-417 - [i2]Youren Shen, Hongliang Tian, Yu Chen, Kang Chen, Runji Wang, Yi Xu, Yubin Xia:
Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX. CoRR abs/2001.07450 (2020)
2010 – 2019
- 2019
- [c32]Dong Du, Zhichao Hua, Yubin Xia, Binyu Zang, Haibo Chen:
XPC: architectural support for secure and efficient cross process call. ISCA 2019: 671-684 - [c31]Zhen Hong, Zinan Li, Yubin Xia:
SDVisor: Secure Debug Enclave with Hypervisor. SOSE 2019 - [c30]Zihan Yang, Zeyu Mi, Yubin Xia:
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines. SOSE 2019 - [c29]Wenhao Li, Yubin Xia, Long Lu, Haibo Chen, Binyu Zang:
TEEv: virtualizing trusted execution environments on mobile platforms. VEE 2019: 2-16 - [c28]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - [i1]Yubin Xia, Qingyuan Liu, Cheng Tan, Jing Leng, Shangning Xu, Binyu Zang, Haibo Chen:
Taming Distrust in the Decentralized Internet with PIXIU. CoRR abs/1901.06095 (2019) - 2018
- [j5]Yutao Liu, Dong Du, Yubin Xia, Haibo Chen, Binyu Zang, Zhenkai Liang:
SplitPass: A Mutually Distrusting Two-Party Password Manager. J. Comput. Sci. Technol. 33(1): 98-115 (2018) - [j4]Rui Yuan, Yubin Xia, Haibo Chen, Binyu Zang, Jan Xie:
ShadowEth: Private Smart Contract on Public Blockchain. J. Comput. Sci. Technol. 33(3): 542-556 (2018) - [j3]Wenhao Li, Yubin Xia, Haibo Chen:
Research on ARM TrustZone. GetMobile Mob. Comput. Commun. 22(3): 17-22 (2018) - [c27]Wenhao Li, Shiyu Luo, Zhichuang Sun, Yubin Xia, Long Lu, Haibo Chen, Binyu Zang, Haibing Guan:
VButton: Practical Attestation of User-driven Operations in Mobile Apps. MobiSys 2018: 28-40 - [c26]Shiyu Luo, Zhichao Hua, Yubin Xia:
TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone. SOSE 2018: 180-185 - [c25]Zhichao Hua, Dong Du, Yubin Xia, Haibo Chen, Binyu Zang:
EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs. USENIX ATC 2018: 255-266 - 2017
- [j2]Yubin Xia, Yutao Liu, Haibing Guan, Yunji Chen, Tianshi Chen, Binyu Zang, Haibo Chen:
Secure Outsourcing of Virtual Appliance. IEEE Trans. Cloud Comput. 5(3): 390-404 (2017) - [j1]Haibo Chen, Heng Zhang, Mingkai Dong, Zhaoguo Wang, Yubin Xia, Haibing Guan, Binyu Zang:
Efficient and Available In-Memory KV-Store with Hybrid Erasure Coding and Replication. ACM Trans. Storage 13(3): 25:1-25:30 (2017) - [c24]Lei Zhou, Yubin Xia:
Generative Multi-region Segmentation by Utilizing Saliency Information. CCBR 2017: 700-707 - [c23]Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li:
Secure Live Migration of SGX Enclaves on Untrusted Cloud. DSN 2017: 225-236 - [c22]Le Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, Jinming Li:
Deconstructing Xen. NDSS 2017 - [c21]Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan:
vTZ: Virtualizing ARM TrustZone. USENIX Security Symposium 2017: 541-556 - 2016
- [c20]Liang Liang, Rong Chen, Haibo Chen, Yubin Xia, KwanJong Park, Binyu Zang, Haibing Guan:
A Case for Virtualizing Persistent Memory. SoCC 2016: 126-140 - [c19]Qingshu Chen, Liang Liang, Yubin Xia, Haibo Chen:
Mitigating Sync Amplification for Copy-on-write Virtual Disk. FAST 2016: 241-247 - 2015
- [c18]Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia:
Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation. CCS 2015: 1607-1619 - [c17]Yubin Xia, Yutao Liu, Cheng Tan, Mingyang Ma, Haibing Guan, Binyu Zang, Haibo Chen:
TinMan: eliminating confidential mobile data exposure with security oriented offloading. EuroSys 2015: 27:1-27:16 - [c16]Hao Zhang, Gang Chen, Beng Chin Ooi, Weng-Fai Wong, Shensen Wu, Yubin Xia:
"Anti-Caching"-based elastic memory management for Big Data. ICDE 2015: 1268-1279 - [c15]Wenhao Li, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan:
Reducing world switches in virtualized environment with flexible cross-world calls. ISCA 2015: 375-387 - [c14]Wenhao Li, Haibo Li, Haibo Chen, Yubin Xia:
AdAttester: Secure Online Mobile Advertisement Attestation Using TrustZone. MobiSys 2015: 75-88 - [c13]Wenhao Li, Liang Liang, Mingyang Ma, Yubin Xia, Haibo Chen:
Poster: TVisor - A Practical and Lightweight Mobile Red-Green Dual-OS Architecture. MobiSys 2015: 485 - 2014
- [c12]Cheng Tan, Haibo Li, Yubin Xia, Binyu Zang, Cheng-Kang Chu, Tieyan Li:
PreCrime to the rescue: defeating mobile malware one-step ahead. APSys 2014: 5:1-5:7 - [c11]Wenhao Li, Mingyang Ma, Jinchen Han, Yubin Xia, Binyu Zang, Cheng-Kang Chu, Tieyan Li:
Building trusted path on untrusted device drivers for mobile devices. APSys 2014: 8:1-8:7 - [c10]Yutao Liu, Yubin Xia, Haibing Guan, Binyu Zang, Haibo Chen:
Concurrent and consistent virtual machine introspection with hardware transactional memory. HPCA 2014: 416-427 - 2013
- [c9]Yubin Xia, Yutao Liu, Haibo Chen:
Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks. HPCA 2013: 246-257 - 2012
- [c8]Cheng Tan, Yubin Xia, Haibo Chen, Binyu Zang:
TinyChecker: Transparent protection of VMs against hypervisor failures with nested virtualization. DSN Workshops 2012: 1-6 - [c7]Yubin Xia, Yutao Liu, Haibo Chen, Binyu Zang:
CFIMon: Detecting violation of control flow integrity using performance counters. DSN 2012: 1-12 - [c6]Yubin Xia, Yutao Liu, Haibo Chen, Binyu Zang:
Defending against VM rollback attack. DSN Workshops 2012: 1-5
2000 – 2009
- 2009
- [c5]Yubin Xia, Chun Yang, Xu Cheng:
PaS: A Preemption-aware Scheduling Interface for Improving Interactive Performance in Consolidated Virtual Machine Environment. ICPADS 2009: 340-347 - 2008
- [c4]Yubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng:
Analysis and Enhancement for Interactive-Oriented Virtual Machine Scheduling. EUC (2) 2008: 393-398 - 2007
- [c3]Chun Yang, Yan Niu, Yubin Xia, Xu Cheng:
A Fast Lossless Codec of Continuous-Tone Images for Thin Client Computing. DCC 2007: 409 - [c2]Chun Yang, Yan Niu, Yubin Xia, Xu Cheng:
A Fast and Efficient Codec for Multimedia Applications in Wireless Thin-Client Computing. WOWMOM 2007: 1-12 - 2005
- [c1]Yubin Xia, Zhibin Yang, Li Zhang, Yinan Zhang, Liangyun Hu:
The study on Common/Unique issues in PLM/CAD integration and a design of flexible integration architecture. CIT 2005: 978-982
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint