The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Kai Chen 0012" ( http://dblp.L3S.de/Authors/Kai_Chen_0012 )

URL (Homepage):  http://people.ucas.ac.cn/~kaichen?language=en#361152  Author page on DBLP  Author page in RDF  Community of Kai Chen 0012 in ASPL-2

Publication years (Num. hits)
2007-2015 (21) 2016-2018 (25) 2019 (5)
Publication types (Num. hits)
article(16) inproceedings(35)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3 occurrences of 3 keywords

Results
Found 52 publication records. Showing 51 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen 0030, Shuang Wang 0002, Xiaofeng Wang 0006, Haixu Tang, Kai Chen 0012, Kristin E. Lauter, Dongdai Lin Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen 0012 Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang 0001, Kai Chen 0012, Wei Zou Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
1Baojun Liu, Zhou Liu, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang 0001, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen 0012, Zaifeng Zhang TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. Search on Bibsonomy EuroS&P The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian 0001, Kai Chen 0012, XiaoFeng Wang 0001, Wei Zou Demystifying Hidden Privacy Settings in Mobile Apps. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Yingjun Zhang, Peng Liu 0005 Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen 0012, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang 0006, Carl A. Gunter CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang 0006, Haixu Tang, Carl A. Gunter, Kai Chen 0012 Understanding Membership Inferences on Well-Generalized Learning Models. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li 0001, Fenghao Xu, Kai Chen 0012, Xiaofeng Wang 0006, Kehuan Zhang Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Yue Zhao, Hong Zhu, Qintao Shen, Ruigang Liang, Kai Chen 0012, Shengzhi Zhang Practical Adversarial Attack Against Object Detector. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Jing Chen 0003, Chiheng Wang, Ziming Zhao 0001, Kai Chen 0012, Ruiying Du, Gail-Joon Ahn Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chen Zhong, Tao Lin, Peng Liu 0005, John Yen, Kai Chen 0012 A cyber security data triage operation retrieval system. Search on Bibsonomy Computers & Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qianqian Zhao, Kai Chen 0012, Tongxin Li, Yi Yang, XiaoFeng Wang 0001 Detecting telecommunication fraud by understanding the contents of a call. Search on Bibsonomy Cybersecurity The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ping Li 0018, Jin Li 0002, Zhengan Huang, Chong-Zhi Gao, Wenbin Chen 0003, Kai Chen 0012 Privacy-preserving outsourced classification in cloud computing. Search on Bibsonomy Cluster Computing The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen 0012, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang 0006, Carl A. Gunter CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
1Xuejing Yuan, Yuxuan Chen, Aohui Wang, Kai Chen 0012, Shengzhi Zhang, Heqing Huang, Ian M. Molloy All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo. Search on Bibsonomy GLOBECOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li 0001, Fenghao Xu, Kai Chen 0012, Xiaofeng Wang 0006, Kehuan Zhang Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. Search on Bibsonomy SecureComm (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang 0001, Kai Chen 0012, Yuan Tian 0001, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Ping Li 0018, Jin Li 0002, Zhengan Huang, Tong Li 0011, Chong-Zhi Gao, Siu-Ming Yiu, Kai Chen 0012 Multi-key privacy-preserving deep learning in cloud computing. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang 0001, Kai Chen 0012, Xiao-yong Zhou, Xinhui Han, Michael Grace Ghost Installer in the Shadow: Security Analysis of App Installation on Android. Search on Bibsonomy DSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yi Chen, Wei You, Yeonjoon Lee, Kai Chen 0012, XiaoFeng Wang 0001, Wei Zou Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wei You, Peiyuan Zong, Kai Chen 0012, XiaoFeng Wang 0001, Xiaojing Liao, Pan Bian, Bin Liang 0002 SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen 0012, XiaoFeng Wang 0001, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xing Liu, Tianyu Chen, Feng Qian 0001, Zhixiu Guo, Felix Xiaozhu Lin, Xiaofeng Wang 0006, Kai Chen 0012 Characterizing Smartwatch Usage in the Wild. Search on Bibsonomy MobiSys The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lannan Luo, Qiang Zeng 0001, Chen Cao, Kai Chen 0012, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu 0005 System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation. Search on Bibsonomy MobiSys The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Tongxin Li, Bin Ma, Peng Wang, XiaoFeng Wang 0001, Peiyuan Zong Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level. Search on Bibsonomy RAID The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Yingjun Zhang, Peng Liu Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing. Search on Bibsonomy IEEE Trans. Reliability The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lannan Luo, Qiang Zeng 0001, Chen Cao, Kai Chen 0012, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu 0005 Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Kai Chen 0012, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang 0001, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yingjun Zhang, Kai Chen 0012, Yuling Liu, Yifeng Lian A Lattice-Based Access Control Model for Social Networks. Search on Bibsonomy CyberC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang 0001, Kai Chen 0012, Xiaojing Liao, Shi-Min Hu 0001, Xinhui Han Unauthorized Cross-App Resource Access on MAC OS X and iOS. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
1Heqing Huang, Kai Chen 0012, Chuangang Ren, Peng Liu 0005, Sencun Zhu, Dinghao Wu Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen 0012, XiaoFeng Wang 0001, Xiao-yong Zhou, Wenliang Du, Michael Grace Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang 0001, Kai Chen 0012, Xiaojing Liao, Shi-Min Hu 0001, Xinhui Han Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Heqing Huang, Sencun Zhu, Kai Chen 0012, Peng Liu 0005 From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yangyi Chen, Tongxin Li, XiaoFeng Wang 0001, Kai Chen 0012, Xinhui Han Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Peng Wang, Yeonjoon Lee, XiaoFeng Wang 0001, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu 0005 Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
1Yingjun Zhang, Kai Chen 0012 AppMark: A Picture-Based Watermark for Android Apps. Search on Bibsonomy SERE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen 0012, Liang Huang, Yifeng Lian Timing-Based Clone Detection on Android Markets. Search on Bibsonomy SecureComm (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Heqing Huang, Kai Chen 0012, Peng Liu 0005, Sencun Zhu, Dinghao Wu Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. Search on Bibsonomy SecureComm (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chuangang Ren, Kai Chen 0012, Peng Liu 0005 Droidmarking: resilient software watermarking for impeding android application repackaging. Search on Bibsonomy ASE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Peng Liu, Yingjun Zhang Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. Search on Bibsonomy ICSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Yingjun Zhang, Yifeng Lian Vulnerability-Based Backdoors: Threats from Two-step Trojans. Search on Bibsonomy SERE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen 0012, Yingjun Zhang Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yingjun Zhang, Kai Chen 0012, Yifeng Lian VulLocator: Automatically Locating Vulnerable Code in Binary Programs. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Dengguo Feng, Purui Su, Yingjun Zhang Black-box testing based on colorful taint analysis. Search on Bibsonomy SCIENCE CHINA Information Sciences The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yingjun Zhang, Yang Zhang, Kai Chen 0012 A Map-Layer-Based Access Control Model. Search on Bibsonomy WISA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Yifeng Lian, Yingjun Zhang AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Yifeng Lian, Yingjun Zhang Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis. Search on Bibsonomy ICICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jun Wei, Kai Chen 0012, Yifeng Lian, Ying-Xia Dai A novel vector edge sampling scheme for IP traceback against DDoS attacks. Search on Bibsonomy ICMLC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Purui Su, Yingjun Zhang, Dengguo Feng SEPCOM: customizable zero copy model. Search on Bibsonomy VALUETOOLS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SEPCOM, package management, system architecture, zero copy, fast ethernet
Displaying result #1 - #51 of 51 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license