default search action
Kai Chen 0012
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, SKLOIS, Beijing, China
Other persons with the same name
- Kai Chen — disambiguation page
- Kai Chen 0001 — University of Science and Technology of China, Department of Electronics Science and Technology, Hefei, China (and 1 more)
- Kai Chen 0002 — University of California at Berkeley, EECS Department, CA, USA
- Kai Chen 0003 — Google, Mountain View, CA, USA (and 1 more)
- Kai Chen 0004 — Xi'an Jiaotong University, School of Electronic and Information Engineering
- Kai Chen 0005 — Hong Kong University of Science and Technology (and 1 more)
- Kai Chen 0006 — Shanghai Jiatong University, Institute of Image Communication and Network Engineering, China
- Kai Chen 0007 — Cisco Systems (and 1 more)
- Kai Chen 0008 — University of Science and Technology of China, Department of Modern Physics
- Kai Chen 0009 — University of Science and Technology of China, Department of Computer Science
- Kai Chen 0010 — Google (and 2 more)
- Kai Chen 0011 — University of Fribourg, Switzerland
- Kai Chen 0013 — Qualcomm, Wireless R&D Department, Beijing, China (and 2 more)
- Kai Chen 0014 — China University of Geosciences, School of Geophysics and Information Technology, Beijing, China
- Kai Chen 0015 — University of Southern California, Dept. of Industrial and Systems Engineering
- Kai Chen 0016 — Huazhong University of Science and Technology, School of Computer Science and Technology, Services Computing Technology and System Lab / Cluster and Grid Computing Lab, China
- Kai Chen 0017 — Zhejiang University
- Kai Chen 0018 — University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China
- Kai Chen 0019 — Xiamen University, China
- Kai Chen 0020 — National University of Defense Technology, National Laboratory for Parallel and Distributed Processing, Changsha, China
- Kai Chen 0021 — Wuhan University of Technology, Laboratory of Intelligent Manufacture and Control, China
- Kai Chen 0022 — University of Arizona, Department of Electrical and Computer Engineering, Tucson, AZ, USA
- Kai Chen 0023 — Huazhong University of Science and Technology, School of Automation, National Key Laboratory of Science and Technology on Multi-spectral Information Processing, Wuhan, China
- Kai Chen 0024 — Wuhan University, School of Remote Sensing and Information Engineering, Wuhan, China
- Kai Chen 0025 — BUPT, School of Information and Communication Engineering, Beijing, China
- Kai Chen 0026 — Shanghai AI Laboratory, Guangzhou, China (and 2 more)
- Kai Chen 0027 — Fudan University, School of Computer Science, Shanghai, China
- Kai Chen 0028 — Chinese University of Hong Kong, Department of Computer Science and Engineering, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Qintao Shen, Guozhu Meng, Kai Chen:
Revealing the exploitability of heap overflow through PoC analysis. Cybersecur. 7(1): 47 (2024) - [j37]Sungbin Park, Xueqiang Wang, Kai Chen, Yeonjoon Lee:
Station: Gesture-Based Authentication for Voice Interfaces. IEEE Internet Things J. 11(12): 22668-22683 (2024) - [j36]Dandan Xu, Kai Chen, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang:
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. IEEE Trans. Inf. Forensics Secur. 19: 293-306 (2024) - [j35]Zhankai Li, Weiping Wang, Jie Li, Kai Chen, Shigeng Zhang:
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples. IEEE Trans. Inf. Forensics Secur. 19: 3023-3037 (2024) - [j34]Hong Zhu, Yue Zhao, Shengzhi Zhang, Kai Chen:
NeuralSanitizer: Detecting Backdoors in Neural Networks. IEEE Trans. Inf. Forensics Secur. 19: 4970-4985 (2024) - [j33]Zhankai Li, Weiping Wang, Jie Li, Kai Chen, Shigeng Zhang:
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy. IEEE Trans. Inf. Forensics Secur. 19: 5286-5300 (2024) - [c84]Yue Zhao, Congyi Li, Kai Chen:
UMA: Facilitating Backdoor Scanning via Unlearning-Based Model Ablation. AAAI 2024: 21823-21831 - [c83]Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma:
DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models. AAAI 2024: 21850-21858 - [c82]Jinwen He, Yujia Gong, Zijin Lin, Cheng'an Wei, Yue Zhao, Kai Chen:
LLM Factoscope: Uncovering LLMs' Factual Discernment through Measuring Inner States. ACL (Findings) 2024: 10218-10230 - [c81]Ying Cao, Runze Zhang, Ruigang Liang, Kai Chen:
Evaluating the Effectiveness of Decompilers. ISSTA 2024: 491-502 - [c80]Peiwei Hu, Ruigang Liang, Kai Chen:
DeGPT: Optimizing Decompiler Output with LLM. NDSS 2024 - [c79]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning. NDSS 2024 - [c78]Hualong Ma, Peizhuo Lv, Kai Chen, Jiachen Zhou:
KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs. RAID 2024: 480-495 - [c77]Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. SP 2024: 2515-2533 - [c76]Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen:
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction. USENIX Security Symposium 2024 - [c75]Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li:
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples. USENIX Security Symposium 2024 - [c74]Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee:
DARKFLEECE: Probing the Dark Side of Android Subscription Apps. USENIX Security Symposium 2024 - [c73]Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, Cheng'an Wei:
AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction. USENIX Security Symposium 2024 - [i41]Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. CoRR abs/2401.15239 (2024) - [i40]Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen:
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction. CoRR abs/2402.18104 (2024) - [i39]Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu, Haoyu Wang:
Large Language Models for Cyber Security: A Systematic Literature Review. CoRR abs/2405.04760 (2024) - [i38]Yuling Cai, Fan Xiang, Guozhu Meng, Yinzhi Cao, Kai Chen:
AuthNet: Neural Network with Integrated Authentication Logic. CoRR abs/2405.15426 (2024) - [i37]Zijin Lin, Yue Zhao, Kai Chen, Jinwen He:
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors. CoRR abs/2406.10285 (2024) - [i36]Suwan Li, Lei Bu, Guangdong Bai, Fuman Xie, Kai Chen, Chang Yue:
Model-Enhanced LLM-Driven VUI Testing of VPA Apps. CoRR abs/2407.02791 (2024) - [i35]Jinghua Liu, Yi Yang, Kai Chen, Miaoqian Lin:
Generating API Parameter Security Rules with LLM for API Misuse Detection. CoRR abs/2409.09288 (2024) - [i34]Yi Yang, Jinghua Liu, Kai Chen, Miaoqian Lin:
The Midas Touch: Triggering the Capability of LLMs for RM-API Misuse Detection. CoRR abs/2409.09380 (2024) - [i33]Jiachen Zhou, Mingsi Wang, Tianlin Li, Guozhu Meng, Kai Chen:
Dormant: Defending against Pose-driven Human Image Animation. CoRR abs/2409.14424 (2024) - 2023
- [j32]Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu:
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. Comput. Secur. 125: 103048 (2023) - [j31]Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen:
SkillSim: voice apps similarity detection. Cybersecur. 6(1): 13 (2023) - [j30]Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma:
Are our clone detectors good enough? An empirical study of code effects by obfuscation. Cybersecur. 6(1): 14 (2023) - [j29]Yi Yang, Ying Li, Kai Chen, Jinghua Liu:
Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach. Cybersecur. 6(1): 17 (2023) - [j28]Zheng Lv, Kai Chen, Tai Zhang, Jun Zhao, Wei Wang:
Multi-feature generation network-based imputation method for industrial data with high missing rate. Expert Syst. Appl. 227: 120229 (2023) - [j27]Jiqiang Gao, Boyu Hou, Xiaojie Guo, Zheli Liu, Ying Zhang, Kai Chen, Jin Li:
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 147-160 (2023) - [j26]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li:
A Robustness-Assured White-Box Watermark in Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(6): 5214-5229 (2023) - [j25]Shigeng Zhang, Shuxin Chen, Chengyao Hua, Zhetao Li, Yanchun Li, Xuan Liu, Kai Chen, Zhankai Li, Weiping Wang:
LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy. IEEE Trans. Inf. Forensics Secur. 18: 5133-5147 (2023) - [j24]Zigui Jiang, Zibin Zheng, Kai Chen, Xiapu Luo, Xiuwen Tang, Yin Li:
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development. IEEE Trans. Serv. Comput. 16(3): 1822-1832 (2023) - [c72]Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. CCS 2023: 431-445 - [c71]Weihao Huang, Chaoyang Lin, Qiucun Yan, Lu Xiang, Zhiyu Zhang, Guozhu Meng, Kai Chen:
FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code Localization. CSCWD 2023: 947-952 - [c70]Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen:
Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain. ECAI 2023: 2954-2961 - [c69]Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang:
DBIA: Data-Free Backdoor Attack Against Transformer Networks. ICME 2023: 2819-2824 - [c68]Lei Bu, Qiuping Zhang, Suwan Li, Jinglin Dai, Guangdong Bai, Kai Chen, Xuandong Li:
Security Checking of Trigger-Action-Programming Smart Home Integrations. ISSTA 2023: 639-651 - [c67]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. NDSS 2023 - [c66]Hong Zhu, Shengzhi Zhang, Kai Chen:
AI-Guardian: Defeating Adversarial Attacks using Backdoors. SP 2023: 701-718 - [c65]Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang:
AURC: Detecting Errors in Program Code and Documentation. USENIX Security Symposium 2023: 1415-1432 - [c64]Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen:
CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing. USENIX Security Symposium 2023: 1919-1936 - [c63]Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen:
A Data-free Backdoor Injection Approach in Neural Networks. USENIX Security Symposium 2023: 2671-2688 - [c62]Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv:
Aliasing Backdoor Attacks on Pre-trained Models. USENIX Security Symposium 2023: 2707-2724 - [c61]Miaoqian Lin, Kai Chen, Yang Xiao:
Detecting API Post-Handling Bugs Using Code and Description in Patches. USENIX Security Symposium 2023: 3709-3726 - [c60]Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, Lu Xiang, Chunyang Chen:
Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities. USENIX Security Symposium 2023: 7393-7410 - [i32]Ying Cao, Ruigang Liang, Kai Chen, Peiwei Hu:
Boosting Neural Networks to Decompile Optimized Binaries. CoRR abs/2301.00969 (2023) - [i31]Pan Li, Peizhuo Lv, Kai Chen, Yuling Cai, Fan Xiang, Shengzhi Zhang:
Model Stealing Attack against Multi-Exit Networks. CoRR abs/2305.13584 (2023) - [i30]Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang:
ConFL: Constraint-guided Fuzzing for Machine Learning Framework. CoRR abs/2307.05642 (2023) - [i29]Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen:
Demystifying RCE Vulnerabilities in LLM-Integrated Apps. CoRR abs/2309.02926 (2023) - [i28]Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. CoRR abs/2309.05679 (2023) - [i27]Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma:
DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models. CoRR abs/2312.11057 (2023) - [i26]Jinwen He, Yujia Gong, Kai Chen, Zijin Lin, Cheng'an Wei, Yue Zhao:
LLM Factoscope: Uncovering LLMs' Factual Discernment through Inner States Analysis. CoRR abs/2312.16374 (2023) - 2022
- [j23]Zigui Jiang, Kai Chen, Hailin Wen, Zibin Zheng:
Applying blockchain-based method to smart contract classification for CPS applications. Digit. Commun. Networks 8(6): 964-975 (2022) - [j22]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. ACM Trans. Priv. Secur. 25(3): 17:1-17:31 (2022) - [j21]Shigeng Zhang, Shuxin Chen, Xuan Liu, Chengyao Hua, Weiping Wang, Kai Chen, Jian Zhang, Jianxin Wang:
Detecting Adversarial Samples for Deep Learning Models: A Comparative Study. IEEE Trans. Netw. Sci. Eng. 9(1): 231-244 (2022) - [j20]Yang Liu, Zisen Xu, Ming Fan, Yu Hao, Kai Chen, Hao Chen, Yan Cai, Zijiang Yang, Ting Liu:
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs. IEEE Trans. Reliab. 71(2): 1174-1188 (2022) - [j19]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
Towards Security Threats of Deep Learning Systems: A Survey. IEEE Trans. Software Eng. 48(5): 1743-1770 (2022) - [c59]Ying Cao, Ruigang Liang, Kai Chen, Peiwei Hu:
Boosting Neural Networks to Decompile Optimized Binaries. ACSAC 2022: 508-518 - [c58]Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng:
Understanding Real-world Threats to Deep Learning Models in Android Apps. CCS 2022: 785-799 - [c57]Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen:
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. CCS 2022: 2751-2764 - [c56]Qintao Shen, Hongyu Sun, Guozhu Meng, Kai Chen, Yuqing Zhang:
Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns. Inscrypt 2022: 391-407 - [c55]Fuman Xie, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, Guangdong Bai:
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. ASE 2022: 90:1-90:13 - [c54]Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu:
TransRepair: Context-aware Program Repair for Compilation Errors. ASE 2022: 108:1-108:13 - [c53]Suwan Li, Lei Bu, Guangdong Bai, Zhixiu Guo, Kai Chen, Hanlin Wei:
VITAS : Guided Model-based VUI Testing of VPA Apps. ASE 2022: 115:1-115:12 - [i25]Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. CoRR abs/2202.04856 (2022) - [i24]Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen:
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. CoRR abs/2204.01233 (2022) - [i23]Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen:
Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain. CoRR abs/2207.04209 (2022) - [i22]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning. CoRR abs/2209.03563 (2022) - [i21]Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng:
Understanding Real-world Threats to Deep Learning Models in Android Apps. CoRR abs/2209.09577 (2022) - [i20]Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu:
TransRepair: Context-aware Program Repair for Compilation Errors. CoRR abs/2210.03986 (2022) - [i19]Pan Li, Peizhuo Lv, Shenchen Zhu, Ruigang Liang, Kai Chen:
A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information. CoRR abs/2210.08956 (2022) - 2021
- [j18]Ruigang Liang, Ying Cao, Peiwei Hu, Kai Chen:
Neutron: an attention-based neural decompiler. Cybersecur. 4(1): 5 (2021) - [j17]Dawei Wang, Kai Chen, Wei Wang:
Demystifying the Vetting Process of Voice-controlled Skills on Markets. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 130:1-130:28 (2021) - [j16]Yan Qin, Weiping Wang, Shigeng Zhang, Kai Chen:
An Exploit Kits Detection Approach Based on HTTP Message Graph. IEEE Trans. Inf. Forensics Secur. 16: 3387-3400 (2021) - [j15]Cong Dong, Zhigang Lu, Zelin Cui, Baoxu Liu, Kai Chen:
MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree. IEEE Trans. Inf. Forensics Secur. 16: 3589-3603 (2021) - [c52]Yue Zhao, Hong Zhu, Kai Chen, Shengzhi Zhang:
AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks. CCS 2021: 141-158 - [c51]Weijie Liu, Wenhao Wang, Hongbo Chen, Xiaofeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang:
Practical and Efficient in-Enclave Verification of Privacy Compliance. DSN 2021: 413-425 - [c50]Xingbo Hu, Yibing Lan, Ruimin Gao, Guozhu Meng, Kai Chen:
Why is Your Trojan NOT Responding? A Quantitative Analysis of Failures in Backdoor Attacks of Neural Networks. ICA3PP (3) 2021: 754-771 - [c49]Yi Chen, Yepeng Yao, XiaoFeng Wang, Dandan Xu, Chang Yue, Xiaozhong Liu, Kai Chen, Haixu Tang, Baoxu Liu:
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis. SP 2021: 1197-1214 - [c48]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. USENIX Security Symposium 2021: 1901-1918 - [c47]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. WWW 2021: 2733-2744 - [i18]Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi:
SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization. CoRR abs/2102.09764 (2021) - [i17]Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. CoRR abs/2103.10651 (2021) - [i16]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li:
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. CoRR abs/2103.13628 (2021) - [i15]Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, Xingbo Hu:
DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks. CoRR abs/2105.06209 (2021) - [i14]Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang:
DBIA: Data-free Backdoor Injection Attack against Transformer Networks. CoRR abs/2111.11870 (2021) - [i13]Ruigang Liang, Ying Cao, Peiwei Hu, Jinwen He, Kai Chen:
Semantics-Recovering Decompilation through Neural Machine Translation. CoRR abs/2112.15491 (2021) - 2020
- [j14]Yeonjoon Lee, Yue Zhao, Jiutian Zeng, Kwangwuk Lee, Nan Zhang, Faysal Hossain Shezan, Yuan Tian, Kai Chen, XiaoFeng Wang:
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(1): 16:1-16:28 (2020) - [j13]Yuxuan Chen, Xuejing Yuan, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang:
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside. EAI Endorsed Trans. Security Safety 6(22): e3 (2020) - [j12]Jinfeng Li, Liwei Chen, Gang Shi, Kai Chen, Dan Meng:
ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3165-3176 (2020) - [j11]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput. 19(12): 2946-2964 (2020) - [c46]Tao Lv, Ruishi Li, Yi Yang, Kai Chen, Xiaojing Liao, XiaoFeng Wang, Peiwei Hu, Luyi Xing:
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection. CCS 2020: 1837-1852 - [c45]Guangquan Xu, Miao Li, Xiaotong Li, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Qiang Tang, Shaoying Liu:
Defending Use-After-Free via Relationship Between Memory and Pointer. CollaborateCom (1) 2020: 583-597 - [c44]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. ESORICS (1) 2020: 338-358 - [c43]Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, XiaoFeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
A Pragmatic Approach to Membership Inferences on Machine Learning Models. EuroS&P 2020: 521-534 - [c42]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. ICSME 2020: 617-628 - [c41]Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, Kai Chen:
FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning. USENIX Security Symposium 2020: 2255-2269 - [c40]Zhixiu Guo, Zijin Lin, Pan Li, Kai Chen:
SkillExplorer: Understanding the Behavior of Skills in Large Scale. USENIX Security Symposium 2020: 2649-2666 - [c39]Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang:
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. USENIX Security Symposium 2020: 2667-2684 - [i12]Weijie Liu, Wenhao Wang, XiaoFeng Wang, Xiaozhu Meng, Yaosong Lu, Hongbo Chen, Xinyu Wang, Qingtao Shen, Kai Chen, Haixu Tang, Yi Chen, Luyi Xing:
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance. CoRR abs/2007.10513 (2020) - [i11]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. CoRR abs/2008.13768 (2020)
2010 – 2019
- 2019
- [c38]Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen:
Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors. CCS 2019: 1989-2004 - [c37]Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou, Kai Chen:
RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems. Inscrypt 2019: 101-117 - [c36]Baojun Liu, Zhou Li, Peiyuan Zong, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Sumayah A. Alrwais, XiaoFeng Wang, Shuang Hao, Yaoqi Jia, Yiming Zhang, Kai Chen, Zaifeng Zhang:
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis. EuroS&P 2019: 560-575 - [c35]Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, XiaoFeng Wang, Wei Zou:
Demystifying Hidden Privacy Settings in Mobile Apps. IEEE Symposium on Security and Privacy 2019: 570-586 - [c34]Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou:
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. USENIX Security Symposium 2019: 747-764 - [i10]Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. CoRR abs/1902.00888 (2019) - [i9]Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, Xiaofeng Wang, Haixu Tang, Kai Chen, Kristin E. Lauter, Dongdai Lin:
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. CoRR abs/1905.07766 (2019) - [i8]Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He:
Towards Privacy and Security of Deep Learning Systems: A Survey. CoRR abs/1911.12562 (2019) - 2018
- [j10]Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wenbin Chen, Kai Chen:
Privacy-preserving outsourced classification in cloud computing. Clust. Comput. 21(1): 277-286 (2018) - [j9]Chen Zhong, Tao Lin, Peng Liu, John Yen, Kai Chen:
A cyber security data triage operation retrieval system. Comput. Secur. 76: 12-31 (2018) - [j8]Guozhu Meng, Ruitao Feng, Guangdong Bai, Kai Chen, Yang Liu:
DroidEcho: an in-depth dissection of malicious behaviors in Android applications. Cybersecur. 1(1): 4 (2018) - [j7]Qianqian Zhao, Kai Chen, Tongxin Li, Yi Yang, XiaoFeng Wang:
Detecting telecommunication fraud by understanding the contents of a call. Cybersecur. 1(1): 8 (2018) - [j6]Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, Gail-Joon Ahn:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. IEEE Trans. Inf. Forensics Secur. 13(5): 1286-1300 (2018) - [j5]Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu:
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 13(8): 1890-1905 (2018) - [j4]Kai Chen, Yingjun Zhang, Peng Liu:
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks. IEEE Trans. Mob. Comput. 17(8): 1879-1893 (2018) - [c33]Xuejing Yuan, Yuxuan Chen, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang, Ian M. Molloy:
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo. GLOBECOM 2018: 1-6 - [c32]Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. SecureComm (1) 2018: 172-192 - [c31]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium 2018: 49-64 - [i7]Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. CoRR abs/1801.01633 (2018) - [i6]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR abs/1801.08535 (2018) - [i5]Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
Understanding Membership Inferences on Well-Generalized Learning Models. CoRR abs/1802.04889 (2018) - [i4]Yue Zhao, Hong Zhu, Qintao Shen, Ruigang Liang, Kai Chen, Shengzhi Zhang:
Practical Adversarial Attack Against Object Detector. CoRR abs/1812.10217 (2018) - 2017
- [j3]Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming Yiu, Kai Chen:
Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74: 76-85 (2017) - [c30]Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou:
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution. CCS 2017: 815-828 - [c29]Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han:
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews. CCS 2017: 829-844 - [c28]Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang:
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. CCS 2017: 2139-2154 - [c27]Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, Michael Grace:
Ghost Installer in the Shadow: Security Analysis of App Installation on Android. DSN 2017: 403-414 - [c26]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation. MobiSys 2017: 225-238 - [c25]Xing Liu, Tianyu Chen, Feng Qian, Zhixiu Guo, Felix Xiaozhu Lin, Xiaofeng Wang, Kai Chen:
Characterizing Smartwatch Usage in the Wild. MobiSys 2017: 385-398 - [c24]Kai Chen, Tongxin Li, Bin Ma, Peng Wang, XiaoFeng Wang, Peiyuan Zong:
Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level. RAID 2017: 167-191 - [i3]Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin:
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. CoRR abs/1703.09809 (2017) - 2016
- [j2]Kai Chen, Yingjun Zhang, Peng Liu:
Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing. IEEE Trans. Reliab. 65(3): 1180-1194 (2016) - [c23]Yingjun Zhang, Kai Chen, Yuling Liu, Yifeng Lian:
A Lattice-Based Access Control Model for Social Networks. CyberC 2016: 54-61 - [c22]Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Tianyi Chen, Zhenzhou Tian, Xiaodong Zhang, Qinghua Zheng, Ting Liu:
Frequent Subgraph Based Familial Classification of Android Malware. ISSRE 2016: 24-35 - [c21]Kai Chen, Xueqiang Wang, Yi Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Bin Ma, Aohui Wang, Yingjun Zhang, Wei Zou:
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS. IEEE Symposium on Security and Privacy 2016: 357-376 - [i2]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation. CoRR abs/1611.00837 (2016) - 2015
- [c20]Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu:
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. AsiaCCS 2015: 7-18 - [c19]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS. CCS 2015: 31-43 - [c18]Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu:
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App. CCS 2015: 1236-1247 - [c17]Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace:
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. CCS 2015: 1248-1259 - [c16]Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen, Xinhui Han:
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations. CCS 2015: 1260-1272 - [c15]Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, Peng Liu:
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. USENIX Security Symposium 2015: 659-674 - [i1]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Unauthorized Cross-App Resource Access on MAC OS X and iOS. CoRR abs/1505.06836 (2015) - 2014
- [c14]Mingyi Zhao, Jens Grossklags, Kai Chen:
An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program. SIW@CCS 2014: 51-58 - [c13]Kai Chen, Peng Liu, Yingjun Zhang:
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. ICSE 2014: 175-186 - [c12]Chuangang Ren, Kai Chen, Peng Liu:
Droidmarking: resilient software watermarking for impeding android application repackaging. ASE 2014: 635-646 - [c11]Heqing Huang, Kai Chen, Peng Liu, Sencun Zhu, Dinghao Wu:
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms. SecureComm (2) 2014: 359-366 - [c10]Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang, Yifeng Lian:
Timing-Based Clone Detection on Android Markets. SecureComm (2) 2014: 375-381 - [c9]Yingjun Zhang, Kai Chen:
AppMark: A Picture-Based Watermark for Android Apps. SERE 2014: 58-67 - 2013
- [c8]Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang:
Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. ISPEC 2013: 44-59 - [c7]Yingjun Zhang, Kai Chen, Yifeng Lian:
VulLocator: Automatically Locating Vulnerable Code in Binary Programs. ISPEC 2013: 295-308 - [c6]Kai Chen, Yingjun Zhang, Yifeng Lian:
Vulnerability-Based Backdoors: Threats from Two-step Trojans. SERE 2013: 169-177 - 2012
- [j1]Kai Chen, Dengguo Feng, Purui Su, Yingjun Zhang:
Black-box testing based on colorful taint analysis. Sci. China Inf. Sci. 55(1): 171-183 (2012) - 2011
- [c5]Kai Chen, Yifeng Lian, Yingjun Zhang:
AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability. ICISC 2011: 140-154 - [c4]Yingjun Zhang, Yang Zhang, Kai Chen:
A Map-Layer-Based Access Control Model. WISA 2011: 157-170 - 2010
- [c3]Kai Chen, Yifeng Lian, Yingjun Zhang:
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis. ICICS 2010: 367-382 - [c2]Jun Wei, Kai Chen, Yifeng Lian, Ying-Xia Dai:
A novel vector edge sampling scheme for IP traceback against DDoS attacks. ICMLC 2010: 2829-2832
2000 – 2009
- 2007
- [c1]Kai Chen, Purui Su, Yingjun Zhang, Dengguo Feng:
SEPCOM: customizable zero copy model. VALUETOOLS 2007: 37
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint