Xu, Fengyuan

Professor


Computer Science Bldg., Xianlin Campus, Nanjing Univ.
Nanjing 210023, China


fengyuan DOT xu AT nju DOT edu DOT cn

About Me

I am a Professor with the Department of Computer Science & Technology at Nanjing University. Prior to joining NJU, I worked at NEC Labs Princeton as a full-time Researcher. I was also a Visiting Researcher at Microsoft Research Asia. I earned my Ph.D. in Computer Science from the College of William and Mary, and received the Distinguished Dissertation Award in Natural and Computational Sciences.


My research interests span a broad range of topics in the space of Mobile Systems & Security. I seek to explore (computationally) scientific discoveries with real-world impact and create disruptive innovations reshaping how people live. Currently, driven by the synergy between cyber and physical realities, I am focusing on the Internet of Video Things (IoVT), Privacy & Trust Mechanisms, and Edge Computing Systems.


I lead the MObile Systems & Security (MOSS) research group, which is affiliated with the COSEC Research Center of NJU and the National Key Lab for Novel Software Technology. We enjoy working on projects to create an immsersive, trustworthy, compassionate, and sustainable computing environment for individual, society, and ecology. Part of on-going MOSS projects:


  Mobie Intelligence in the Wild. 1) system and algorithm co-design for enhancing real-time mobile intelligence [MobiSys'20] [MobiCom'21b]; 2) trusted mobile intelligence environment balancing strong protection and high usability; 3) infrastructure and framework for emering mobile intelligence services at the edge.

  Security by/for Deep Learning. 1) privacy mechanisms for deep learning inference/perception [MobiCom'21a] [WWW'21] [MobiCom'19]; 2) assessing technologies for deep learning based systems; 3) geometric deep learning tools for security analysis automation.


To prospective students

  招收移动系统软件、智能边缘计算、安全智能分析、深度学习安防等方向的同学。欢迎志同道合的同学发信至我的邮箱 fengyuan DOT xu AT nju DOT edu DOT cn。除了基本信息和经验背景,请在邮件中表明你感兴趣的方向及原因,并从下列selected publication中挑选一篇总结其中内容和阐述你的见解(长短不限)。谢谢。

News

  One paper accepted to ICDE 2021.

  Two papers accepted to Mobicom 2021.

  One paper accepted to WWW 2021.

Publication

Selected

DAPter: Preventing User Data Abuse in Deep Learning Inference Services
Hao Wu, Xuejin Tian, Yuhang Gong, Xing Su, Minghao Li, and Fengyuan Xu.
The 30th Web Conference. (WWW 2021)

PECAM: Privacy-Enhanced Video Streaming & Analytics via Securely-Recoverable Transformation
Hao Wu, Xuejin Tian, Minghao Li, Yunxin Liu, Ganesh Ananthanarayanan, Fengyuan Xu, and Sheng Zhong.
The 27th Annual International Conference On Mobile Computing And Networking. (MobiCom 2021a)

AsyMo: Scalable and Efficient Deep-Learning Inference on Asymmetric Mobile CPUs
Manni Wang, Shaohua Ding, Ting Cao, Yunxin Liu, and Fengyuan Xu.
The 27th Annual International Conference On Mobile Computing And Networking. (MobiCom 2021b)

EMO: Real-Time Emotion Recognition from Single-Eye Images for Resource-Constrained Eyewear Devices
Hao Wu, Jinghao Feng, Xuejin Tian, Edward Sun, Yunxin Liu, Bo Dong, Fengyuan Xu, and Sheng Zhong.
18th ACM International Conference on Mobile Systems, Applications, and Services. (MobiSys 2020)

Occlumency: Privacy-preserving Remote Deep-learning Inference Using SGX
Taegyeong Lee, Zhiqi Lin, Saumay Pushp, Caihua Li, Yunxin Liu, Youngki Lee, Fengyuan Xu, Chenren Xu, Junehwa Song, and Lintao Zhang.
25th ACM International Conference on Mobile Computing and Networking. (MobiCom 2019)

V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics
Fengyuan Xu, Yunxin Liu, Qun Li, and Yongguang Zhang.
The 10th USENIX Symposium on Networked Systems Design and Implementation. (NSDI 2013).

IMDGuard: Securing Implantable Medical Devices with the External Wearable Guardian
Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, and Qun Li.
The 30th IEEE International Conference on Computer Communications. (INFOCOM 2011)

Others (Chronological Order)

Enabling Efficient Cyber Threat Hunting with Cyber Threat Intelligence. Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, and Dawn Song. 37th IEEE International Conference on Data Engineering. (ICDE 2021)

Efficient Architecture Paradigm for Deep Learning Inference as a Service. Jin Yu, Xiaopeng Ke, Fengyuan Xu, and Hao Huang. 39th IEEE International Performance Computing and Communications Conference. (IPCCC 2020)

深度学习模型压缩与加速综述. 高晗、田育龙、许封元、仲盛. 软件学报,2020.

DBox:宏内核下各种设备驱动程序的高性能安全盒. 余劲、黄皓、诸渝、许封元. 计算机学报,2020.

Detecting GAN-based Privacy Attack in Distributed Learning. Yayuan Xiong, Fengyuan Xu, and Sheng Zhong. 2020 IEEE International Conference on Communications. (ICC 2020)

Escaping Backdoor Attack Detection of Deep Learning. Yayuan Xiong, Fengyuan Xu, Sheng Zhong, and Qin Li. 35th International Conference on ICT Systems Security and Privacy Protection. (IFIP SEC 2020)

Trojan Attack on Deep Generative Models in Autonomous Driving. Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li and Sheng Zhong. 15th EAI International Conference on Security and Privacy in Communication Networks. (SecureComm 2019)

secGAN: Secure Recoverable GAN-based Video Transformation. Hao Wu, Jinghao Feng, Xuejin Tian, Fengyuan Xu, Sheng Zhong, Yunxin Liu, and Xiaofeng Wang. MobiCom Workshop on Hot Topics in Video Analytics and Intelligent Edges. (HotEdgeVideo 2019)

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu. 26th ACM Conference on Computer and Communications Security. (CCS 2019)

An Empirical Study of Graph Neural Networks Based Semantic Parsing. Shucheng Li, Lingfei Wu, Fengyuan Xu, Fangli Xu and Sheng Zhong. 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (Poster). (KDD 2019, DGL Workshop) Best Student Paper

Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources. Hao Wu, Zheng Qin, Xuejin Tian, Edward Sun, Fengyuan Xu, and Sheng Zhong. 2019 IEEE Conference on Dependable and Secure Computing. (DSC 2019, Invited Paper)

Automated Finite State Machine Extraction. Yongheng Chen, Linhai Song, Xinyu Xing, Fengyuan Xu, Wenfei Wu. 2019 Workshop on Forming an Ecosystem Around Software Transformation. (FEAST 2019)

Toward Automated Queries Generation from Natural Language Description Using Graph Neural Networks. Shucheng Li, Lingfei Wu, Shiwei Feng, Yulong Tian, Fengyuan Xu, Fangli Xu and Sheng Zhong. IEEE International Conference on AI + Adaptive Education. (AIAED 2019) Best Student Paper

A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security. Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal. 45th International Conference on Very Large Data Bases (Demo). (VLDB 2019, Demo Track)

Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications. Yuan Zhang, Yunlong Mao, Minze Xu, Fengyuan Xu, and Sheng Zhong. IEEE Transactions on Dependable and Secure Computing. (TDSC)

Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li, and Sheng Zhong. IEEE International Conference on Distributed Computing. (ICDCS 2019)

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li. The 25th ACM Conference on Computer and Communications Security. (CCS 2018)

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, and Prateek Mittal. 2018 USENIX Annual echnical Conference. (ATC 2018)

A Privacy- Preserving Deep Learning Approach for Face Recognition with Edge Computing. Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, and Sheng Zhong. The USENIX Workshop on Hot Topics in Edge Computing. (HotEdge 2018)

MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, and Sheng Zhong. IEEE International Conference on Computer Communications. (Infocom 2018)

Internet Protocol Cameras with No Password Protection: An Empirical Investigation. Haitao Xu, Fengyuan Xu, and Bo Chen. Passive and Active Measurement Conference. (PAM 2018)

Learning from Differentially Private Neural Activations with Edge Computing. Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, and Sheng Zhong. 2018 IEEE/ACM Symposium on Edge Computing. (SEC 2018)

A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries. Jingyu Hua, Wei Tong, Fengyuan Xu, and Sheng Zhong. IEEE Trans. Information Forensics and Security. (TIFS)

Location Privacy in Public Access Points Positioning: An Optimization and Geometry Approach. Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, and Sheng Zhong. Computers & Security.
(Computer & Security)

Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios. Xiaojun Zhu, Fengyuan Xu, Chiu C. Tan, Qun Li, and Guihai Chen. IEEE Transactions on Mobile Computing. (TMC)

High Fidelity Data Reduction for Big Data Security Dependency Analyses. Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, and Guofei Jiang. The 23rd ACM Conference on Computer and Communications Security. (CCS 2016)

VR-Defender: Self Defense against Vehicular Rogue APs for Drive-thru Internet. Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, and Qun Li. IEEE Transactions on Vehicular Technology. (TVT)

VProof: Lightweight Privacy-Preserving Vehicle Location Proofs. Yifan Zhang, Chiu C. Tan, Fengyuan Xu, Hao Han, and Qun Li. IEEE Transactions on Vehicular Technology. (TVT)

SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, and Jie Wu. IEEE Transactions on Parallel and Distributed Systems. (TPDS)

SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks. Wei Wei, Fengyuan Xu, Chiu C. Tan, and Qun Li. IEEE Transactions on Parallel and Distributed Systems. (TPDS)

Optimizing Background Email Sync on Smartphones. Fengyuan Xu, Yunxin Liu, Thomas Moscibroda, Ranveer Chandra, Long Jin, Yongguang Zhang, and Qun Li. The 11th International Conference on Mobile Systems, Applications and Services. (MobiSys 2013)

Extracting Secret Key from Wireless Link Dynamics in Vehicular Environments. Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C Tan, Qun Li, and Guihai Chen. The 32nd IEEE International Conference on Computer Communications. (INFOCOM 2013)

Fast Mencius: Mencius with Low Commit Latency. Wei Wei, Harry Gao, Fengyuan Xu, and Qun Li. The 32nd IEEE International Conference on Computer Communications. (INFOCOM 2013)

SybilDefender: Defend Against Sybil Attacks in Large Social Networks. Wei Wei, Fengyuan Xu, Chiu C. Tan, and Qun Li. The 31th IEEE International Conference on Computer Communications. (INFOCOM 2012)

Wei Wei, Fengyuan Xu, and Qun Li. MobiShare: Flexible Privacy-Preserving Location Sharing in Mobile Online Social Networks. The 31th IEEE International Conference on Computer Communications. (INFOCOM mini-conference 2012)

Defending Against Vehicular Rogue AP. Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, and Qun Li. The 30th IEEE International Conference on Computer Communications. (INFOCOM 2011)

Designing a Practical Access Point Association Protocol. Fengyuan Xu, Chiu C. Tan, Qun Li, Guanhua Yan, and Jie Wu. The 29th IEEE International Conference on Computer Communications. (INFOCOM 2010)

Teaching

Undergradute-Level Courses

Cybersecurity and Privacy (English)

Graduate-Level Courses

Introduction to Distributed Systems Research

Selected Awards

  江苏省“双创计划”创新人才.
  江苏省“六大人才高峰”入选者.
  微软“铸星计划”学者.
  南京大学“登峰计划”入选者.
  Award for Excellence in Undergraduate Mentoring(最佳本科生研究指导), William & Mary.

学生培养

学生获奖

AIAED'19 Best Student Paper (本科生) KDD'19 DLG-Workshop Best Student Paper (本科生) 南大优秀毕业论文 (本科生) 南大校长奖学金 (研究生) 南大优秀毕业生 (研究生) 南大人工智能奖学金 (研究生)

首份工作与实习

腾讯优图 微软亚研院 蚂蚁金服 微软工程院 旷视科技 地平线AI 米哈游科技

全奖博士录取

Gaorgia Tech Rice Univ. Indiana Univ. Bloomington UC Irvine Purdue Univ. Ohio State Univ.

Professional Services

Conference TPC

INFOCOM '16-'21 ICCCN'18 (Track Chair) AsiaCCS'21 SecureComm'17,'19,'20 BigData'18 全国体系结构学术年会'18

Conference Review

MobiSys ICDCS MASS GLOBECOM IWQoS, etc.

Journal Review

ACM Transactions on Sensor Networks ACM Transactions on Embedded Computing Systems IEEE Transactions on Mobile Computing IEEE Transactions on Information Forensics and Security IEEE Transactions on Wireless Communications IEEE Transactions on Vehicular Technology IEEE Transactions on Computational Social Systems Computer Networks IEICE Transactions on Information and Systems Mobile Networks and Applications Journal of Computer Science and Technology Security and Communication Networks