Xu, Fengyuan

Professor


Computer Science Bldg., Xianlin Campus, Nanjing Univ.
Nanjing 210023, China


fengyuan DOT xu AT nju DOT edu DOT cn

About Me

I am a Professor with the Department of Computer Science & Technology and the National Key Lab for Novel Software Technology at Nanjing University. Prior to joining NJU, I were fortunate to work with many wonderful people in NEC Labs Princeton, Microsoft Research Asia, and Samsung Research America. I earned my Ph.D. in Computer Science from the College of William and Mary and received the Distinguished Dissertation Award.


My research interests span a broad range of topics in the space of security and systems. Currently I am focusing on deep learning & data security, edge & cloud computing, system & network security, user & input privacy, and intelligent mobile systems & applications (AR, IoT, smartphone, etc.).


Looking for

招收对深度学习安全、边缘计算和云服务、数据安全和隐私保护、系统和网络安全、智能可穿戴设备、以及创新实用系统和AI应用等感兴趣的博士生、硕士生和本科生。请感兴趣的同学发信至我的邮箱 fengyuan DOT xu AT nju DOT edu DOT cn。

News

  招收2019年秋入学的推免硕士生、直博生

  One paper accepted in ACM CCS 2018

  One paper accepted in Usenix ATC 2018

  Received Microsoft Research Asia Collaborative Research Grant award for deep learning acceleration

  Received Ant Financial (支付宝) Research Grant for trustworthy GPS with TEE

  Received 中国计算机学会-绿盟 "鲲鹏" Research Grant for IoT security

Publication

Selected

Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li. NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. The 25th ACM Conference on Computer and Communications Security. (CCS 2018, 安全顶级会议之一)
Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, and Prateek Mittal. AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. 2018 USENIX Annual echnical Conference. (ATC 2018, 系统顶级会议之一)
Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, and Sheng Zhong. A Privacy- Preserving Deep Learning Approach for Face Recognition with Edge Computing. The USENIX Workshop on Hot Topics in Edge Computing (HotEdge 2018).
Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, and Guofei Jiang. High Fidelity Data Reduction for Big Data Security Dependency Analyses. The 23rd ACM Conference on Computer and Communications Security (CCS 2016, 安全顶级会议之一).
Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, Qun Li. IMDGuard: Securing Implantable Medical Devices with the External Wearable Guardian. The 30th IEEE International Conference on Computer Communications (INFOCOM 2011).
Fengyuan Xu, Yunxin Liu, Thomas Moscibroda, Ranveer Chandra, Long Jin, Yongguang Zhang, and Qun Li. Optimizing Background Email Sync on Smartphones. The 11th International Conference on Mobile Systems, Applications and Services (MobiSys 2013, 移动系统顶级会议之一).
Fengyuan Xu, Yunxin Liu, Qun Li, and Yongguang Zhang. V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics. The 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2013, 网络系统顶级会议之一).
Xiaojun Zhu, Fengyuan Xu, Chiu C. Tan, Qun Li, and Guihai Chen. Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios. IEEE Transactions on Mobile Computing (TMC).

Others

Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, and Sheng Zhong. MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. IEEE International Conference on Computer Communications (Infocom 2018).
Haitao Xu, Fengyuan Xu, and Bo Chen. Internet Protocol Cameras with No Password Protection: An Empirical Investigation. Passive and Active Measurement Conference. (PAM 2018).
Jingyu Hua, Wei Tong, Fengyuan Xu, and Sheng Zhong. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. IEEE Trans. Information Forensics and Security (TIFS).
Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, and Sheng Zhong. Location Privacy in Public Access Points Positioning: An Optimization and Geometry Approach. Computers & Security.
(Computer & Security).
Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, and Qun Li. VR-Defender: Self Defense against Vehicular Rogue APs for Drive-thru Internet. IEEE Transactions on Vehicular Technology (TVT).
Yifan Zhang, Chiu C. Tan, Fengyuan Xu, Hao Han, and Qun Li. VProof: Lightweight Privacy-Preserving Vehicle Location Proofs. IEEE Transactions on Vehicular Technology (TVT).
Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, and Jie Wu. SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Transactions on Parallel and Distributed Systems (TPDS).
Wei Wei, Fengyuan Xu, Chiu C. Tan, and Qun Li. SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks. IEEE Transactions on Parallel and Distributed Systems (TPDS).
Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C Tan, Qun Li, and Guihai Chen. Extracting Secret Key from Wireless Link Dynamics in Vehicular Environments. The 32nd IEEE International Conference on Computer Communications (INFOCOM 2013).
Wei Wei, Harry Gao, Fengyuan Xu, and Qun Li. Fast Mencius: Mencius with Low Commit Latency. The 32nd IEEE International Conference on Computer Communications (INFOCOM 2013).
Wei Wei, Fengyuan Xu, Chiu C. Tan, and Qun Li. SybilDefender: Defend Against Sybil Attacks in Large Social Networks. The 31th IEEE International Conference on Computer Communications (INFOCOM 2012).
Wei Wei, Fengyuan Xu, and Qun Li. MobiShare: Flexible Privacy-Preserving Location Sharing in Mobile Online Social Networks. The 31th IEEE International Conference on Computer Communications (INFOCOM mini-conference 2012).
Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, and Qun Li. Defending Against Vehicular Rogue AP. The 30th IEEE International Conference on Computer Communications (INFOCOM 2011).
Fengyuan Xu, Chiu C. Tan, Qun Li, Guanhua Yan, and Jie Wu. Designing a Practical Access Point Association Protocol. The 29th IEEE International Conference on Computer Communications (INFOCOM 2010).

Selected Awards

  江苏省“双创计划”创新人才.
  江苏省“六大人才高峰”入选者.
  江苏省“双创计划”创新团队核心成员.
  微软“铸星计划”学者.
  南京大学“登峰计划”入选者.
  Distinguished Dissertation Award in the Natural and Computational Sciences(最佳博士论文), William & Mary. [one recipient per year].
  Award for Excellence in Undergraduate Mentoring(最佳本科生研究指导), William & Mary. [first recipient in CS dept. of WM].
  Star of Tomorrow Award, Microsoft Research Asia.

Teaching

Undergradute-Level Courses

Cybersecurity and Privacy (English)

Graduate-Level Courses

Introduction to Distributed Systems Research

Professional Services

Conference TPC

INFOCOM '16,'17,'18,'19 ICCCN'18 (Track Chair) SecureComm'17 BigData'18 全国体系结构学术年会'18

Conference Review

MobiSys INFOCOM ICDCS MASS AsiaCCS GLOBECOM IWQoS, etc.

Journal Review

ACM Transactions on Sensor Networks ACM Transactions on Embedded Computing Systems IEEE Transactions on Mobile Computing IEEE Transactions on Information Forensics and Security IEEE Transactions on Wireless Communications IEEE Transactions on Vehicular Technology Computer Networks IEICE Transactions on Information and Systems Mobile Networks and Applications Journal of Computer Science and Technology Security and Communication Networks