BibTeX records: Jiongyi Chen

download as .bib file

@inproceedings{DBLP:conf/ndss/LiZCLFT23,
  author       = {Runhao Li and
                  Bin Zhang and
                  Jiongyi Chen and
                  Wenfeng Lin and
                  Chao Feng and
                  Chaojing Tang},
  title        = {Towards Automatic and Precise Heap Layout Manipulation for General-Purpose
                  Programs},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/towards-automatic-and-precise-heap-layout-manipulation-for-general-purpose-programs/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiZCLFT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangCLFLT23,
  author       = {Bin Zhang and
                  Jiongyi Chen and
                  Runhao Li and
                  Chao Feng and
                  Ruilin Li and
                  Chaojing Tang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Automated Exploitable Heap Layout Generation for Heap Overflows Through
                  Manipulation Distance-Guided Fuzzing},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4499--4515},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-bin},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangCLFLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuangZZXCTZ23,
  author       = {Kong Huang and
                  Yutong Zhou and
                  Ke Zhang and
                  Jiacen Xu and
                  Jiongyi Chen and
                  Di Tang and
                  Kehuan Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{HOMESPY:} The Invisible Sniffer of Infrared Remote Control of Smart
                  TVs},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4553--4570},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/huang},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HuangZZXCTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChenXDSZ22,
  author       = {Jiongyi Chen and
                  Fenghao Xu and
                  Shuaike Dong and
                  Wei Sun and
                  Kehuan Zhang},
  title        = {Authorisation inconsistency in IoT third-party integration},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {133--143},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12043},
  doi          = {10.1049/ISE2.12043},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChenXDSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/TangHHKC22,
  author       = {Zhiquan Tang and
                  Qiao Hu and
                  Yupeng Hu and
                  Wenxin Kuang and
                  Jiongyi Chen},
  title        = {SEVulDet: {A} Semantics-Enhanced Learnable Vulnerability Detector},
  booktitle    = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022},
  pages        = {150--162},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSN53405.2022.00026},
  doi          = {10.1109/DSN53405.2022.00026},
  timestamp    = {Fri, 29 Jul 2022 16:33:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/TangHHKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhangCFLDZ0T22,
  author       = {Xing Zhang and
                  Jiongyi Chen and
                  Chao Feng and
                  Ruilin Li and
                  Wenrui Diao and
                  Kehuan Zhang and
                  Jing Lei and
                  Chaojing Tang},
  title        = {Default: Mutual Information-based Crash Triage for Massive Crashes},
  booktitle    = {44th {IEEE/ACM} 44th International Conference on Software Engineering,
                  {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022},
  pages        = {635--646},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510003.3512760},
  doi          = {10.1145/3510003.3512760},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ZhangCFLDZ0T22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/YangLCDG22,
  author       = {Shishuai Yang and
                  Rui Li and
                  Jiongyi Chen and
                  Wenrui Diao and
                  Shanqing Guo},
  title        = {Demystifying Android Non-SDK APls: Measurement and Understanding},
  booktitle    = {44th {IEEE/ACM} 44th International Conference on Software Engineering,
                  {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022},
  pages        = {647--658},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510003.3510045},
  doi          = {10.1145/3510003.3510045},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/YangLCDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qrs/TianCYYD22,
  author       = {Guangwei Tian and
                  Jiongyi Chen and
                  Kailun Yan and
                  Shishuai Yang and
                  Wenrui Diao},
  title        = {Cast Away: On the Security of {DLNA} Deployments in the SmartTV Ecosystem},
  booktitle    = {22nd {IEEE} International Conference on Software Quality, Reliability
                  and Security, {QRS} 2022, Guangzhou, China, December 5-9, 2022},
  pages        = {105--116},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/QRS57517.2022.00021},
  doi          = {10.1109/QRS57517.2022.00021},
  timestamp    = {Tue, 28 Mar 2023 19:49:47 +0200},
  biburl       = {https://dblp.org/rec/conf/qrs/TianCYYD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/XieCWFWGWL22,
  author       = {Wei Xie and
                  Jiongyi Chen and
                  Zhenhua Wang and
                  Chao Feng and
                  Enze Wang and
                  Yifei Gao and
                  Baosheng Wang and
                  Kai Lu},
  editor       = {Fr{\'{e}}d{\'{e}}rique Laforest and
                  Rapha{\"{e}}l Troncy and
                  Elena Simperl and
                  Deepak Agarwal and
                  Aristides Gionis and
                  Ivan Herman and
                  Lionel M{\'{e}}dini},
  title        = {Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web
                  Applications of IoT Devices},
  booktitle    = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France,
                  April 25 - 29, 2022},
  pages        = {524--532},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3485447.3512213},
  doi          = {10.1145/3485447.3512213},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/XieCWFWGWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/HuangZCSSTZ21,
  author       = {Kong Huang and
                  Ke Zhang and
                  Jiongyi Chen and
                  Menghan Sun and
                  Wei Sun and
                  Di Tang and
                  Kehuan Zhang},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Understanding the Brains and Brawn of Illicit Streaming App},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {194--214},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_12},
  doi          = {10.1007/978-3-031-06365-7\_12},
  timestamp    = {Fri, 19 Apr 2024 14:54:06 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/HuangZCSSTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangCFLSZLT21,
  author       = {Xing Zhang and
                  Jiongyi Chen and
                  Chao Feng and
                  Ruilin Li and
                  Yunfei Su and
                  Bin Zhang and
                  Jing Lei and
                  Chaojing Tang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Reducing Test Cases with Attention Mechanism of Neural Networks},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2075--2092},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-xing},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangCFLSZLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiWC20,
  author       = {Runzhi Li and
                  Jian Wang and
                  Jiongyi Chen},
  title        = {Movable Platform-Based Topology Detection for a Geographic Routing
                  Wireless Sensor Network},
  journal      = {Sensors},
  volume       = {20},
  number       = {13},
  pages        = {3726},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20133726},
  doi          = {10.3390/S20133726},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dong0TCSZ20,
  author       = {Shuaike Dong and
                  Zhou Li and
                  Di Tang and
                  Jiongyi Chen and
                  Menghan Sun and
                  Kehuan Zhang},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting
                  of IoT Traffic},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {47--59},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384732},
  doi          = {10.1145/3320269.3384732},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dong0TCSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19,
  author       = {Jiongyi Chen and
                  Chaoshun Zuo and
                  Wenrui Diao and
                  Shuaike Dong and
                  Qingchuan Zhao and
                  Menghan Sun and
                  Zhiqiang Lin and
                  Yinqian Zhang and
                  Kehuan Zhang},
  title        = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices
                  and Users},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {222--233},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00034},
  doi          = {10.1109/DSN.2019.00034},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/XuDLCZ19,
  author       = {Fenghao Xu and
                  Wenrui Diao and
                  Zhou Li and
                  Jiongyi Chen and
                  Kehuan Zhang},
  title        = {BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth
                  Peripherals},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/badbluetooth-breaking-android-security-mechanisms-via-malicious-bluetooth-peripherals/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/XuDLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ChenSZ19,
  author       = {Jiongyi Chen and
                  Menghan Sun and
                  Kehuan Zhang},
  title        = {Security Analysis of Device Binding for IP-based IoT Devices},
  booktitle    = {{IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, PerCom Workshops 2019, Kyoto, Japan, March 11-15, 2019},
  pages        = {900--905},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PERCOMW.2019.8730580},
  doi          = {10.1109/PERCOMW.2019.8730580},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/ChenSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangCDGWZ19,
  author       = {Li Zhang and
                  Jiongyi Chen and
                  Wenrui Diao and
                  Shanqing Guo and
                  Jian Weng and
                  Kehuan Zhang},
  title        = {CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {151--164},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/zhang-li},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangCDGWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-00104,
  author       = {Shuaike Dong and
                  Zhou Li and
                  Di Tang and
                  Jiongyi Chen and
                  Menghan Sun and
                  Kehuan Zhang},
  title        = {Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting
                  of IoT Traffic with Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1909.00104},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.00104},
  eprinttype    = {arXiv},
  eprint       = {1909.00104},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-00104.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenDZZL0LSYZ18,
  author       = {Jiongyi Chen and
                  Wenrui Diao and
                  Qingchuan Zhao and
                  Chaoshun Zuo and
                  Zhiqiang Lin and
                  XiaoFeng Wang and
                  Wing Cheong Lau and
                  Menghan Sun and
                  Ronghai Yang and
                  Kehuan Zhang},
  title        = {IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based
                  Fuzzing},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_01A-1\_Chen\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenDZZL0LSYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YangLCZ18,
  author       = {Ronghai Yang and
                  Wing Cheong Lau and
                  Jiongyi Chen and
                  Kehuan Zhang},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Vetting Single Sign-On {SDK} Implementations via Symbolic Reasoning},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1459--1474},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/yang},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/YangLCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics