Hao Chen

My papers are also available on Google Scholar.

Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly BibLaTeX Qizhang Li, Yiwen Guo, Wangmeng Zuo, and Hao Chen Neural Information Processing Systems (NeurIPS), New Orleans, LA, USA, December 10–16, 2023

Improving Adversarial Transferability via Intermediate-level Perturbation Decay BibLaTeX Qizhang Li, Yiwen Guo, Wangmeng Zuo, and Hao Chen Neural Information Processing Systems (NeurIPS), New Orleans, LA, USA, December 10–16, 2023

HOPPER: Interpretative Fuzzing for Libraries PDF BibLaTeX Peng Chen, Yuxuan Xie, Yunlong Lyu, Yuxiao Wang, and Hao Chen ACM Conference on Computer and Communications Security (CCS), Copenhagen, Denmark, November 26–30, 2023

MHCN: a Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering BibLaTeX Fangfei Lin, Bing Bai, Yiwen Guo, Hao Chen, Yazhou Ren, and Zenglin Xu International Conference on Computer Vision (ICCV), Paris, France, October 4–6, 2023

Understanding Programs by Exploiting (Fuzzing) Test Cases PDF BibLaTeX Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, and Hao Chen Findings of the Association for Computational Linguistics (ACL), Toronto, Canada, July 9–14, 2023

Squeeze Training for Adversarial Robustness PDF BibLaTeX Qizhang Li, Yiwen Guo, Wangmeng Zuo, and Hao Chen International Conference on Learning Representations (ICLR), Kigali, Rwanda, May 1–5, 2023 (32%)

Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples PDF BibLaTeX Qizhang Li, Yiwen Guo, Wangmeng Zuo, and Hao Chen International Conference on Learning Representations (ICLR), Kigali, Rwanda, May 1–5, 2023 (32%)

Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques PDF BibLaTeX Yuyang Rong, Chibin Zhang, Jianzhong Liu, and Hao Chen IEEE International Conference on Software Quality, Reliability, and Security, Guangzhou, China, December 5–9, 2022. Best paper award (27%)

AflIot: Fuzzing on Linux-based IoT Device with Binary-Level Instrumentation PDF BibLaTeX Xuechao Du, Andong Chen, Boyuan He, Hao Chen, Fan Zhang, and Yan Chen Computers & Security, 2022.

Membership Inference Attack in Face of Data Transformations PDF BibLaTeX Jiyu Chen, Yiwen Guo, Hao Chen, and Neil Gong IEEE Conference on Communications and Network Security (CNS), Austin, TX, USA, October 3–5, 2022. (35%)

An Intermediate-level Attack Framework on The Basis of Linear Regression PDF BibLaTeX Yiwen Guo, Qizhang Li, Wangmeng Zuo, and Hao Chen IEEE Transactions on Pattern Analysis and Machine Intelligence, 2022.

Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations PDF BibLaTeX Bulou Liu, Bing Bai, Weibang Xie, Yiwen Guo, and Hao Chen ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14–18, 2022. (26%)

Feder: communication-efficient byzantine-robust federated learning PDF BibLaTeX Yukun Jiang, Xiaoyu Cao, Hao Chen, and Neil Gong ICLR Workshop on Socially Responsible Machine Learning (SRML), April 29, 2022.

ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs PDF BibLaTeX Yang Liu, Zisen Xu, Ming Fan, Yu Hao, Kai Chen, Hao Chen, Yan Cai, Zijiang Yang, and Ting Liu IEEE Transactions on Reliability, 2022.

ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs BibLaTeX Yang Liu, Ming Fan, Ting Liu, Yu Hao, Zisen Xu, Kai Chen, Hao Chen and Yan Cai IEEE International Conference on Software Quality, Reliability, and Security (QRS), December 6–10, 2021. Best paper award (25%)

Protect Privacy of Deep Classification Networks by Exploiting Their Generative Power PDF BibLaTeX Jiyu Chen, Yiwen Guo, Qianjun Zheng, and Hao Chen Machine Learning. 110, 651–674 (2021).

Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems PDF BibLaTeX Ziheng Liu, Shuofei Zhu, Boqin Qin, Hao Chen, and Linhai Song International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), April 19–23, 2021.

Backpropagating Linearly Improves Transferability of Adversarial Examples PDF BibLaTeX Yiwen Guo, Qizhang Li, and Hao Chen Neural Information Processing Systems (NeurIPS), December 6–12, 2020.

Practical No-box Adversarial Attacks against DNNs PDF BibLaTeX Qizhang Li, Yiwen Guo, and Hao Chen Neural Information Processing Systems (NeurIPS), December 6–12, 2020.

Integrity: Finding Integer Errors by Targeted Fuzzing PDF BibLaTeX Yuyang Rong, Peng Chen, and Hao Chen International Conference on Security and Privacy in Communication Networks (SecureComm), October 21–23, 2020.

StyleCAPTCHA: CAPTCHA Based on Style-Transferred Images to Defend against Deep Convolutional Networks PDF BibLaTeX Haitian Chen, Bai Jiang and Hao Chen ACM-IMS Foundations of Data Science Conference (FODS), October 18–20, 2020.

Yet Another Intermediate-Level Attack PDF BibLaTeX Qizhang Li, Yiwen Guo, and Hao Chen European Conference on Computer Vision (ECCV), August 23–28, 2020.

senDroid: Auditing Sensor Access in Android System-Wide PDF BibLaTeX Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, and Xiaoyang Wang IEEE Transactions on Dependable and Secure Computing. 17(2):407–421, 2020.

Fooling Detection Alone Is Not Enough: Adversarial Attack Against Multiple Object Tracking PDF BibLaTeX Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Hao Chen, Zhenyu Zhong, and Tao Wei International Conference on Learning Representations (ICLR), Addis Ababa, Ethiopia, April 26–30, 2020.

Explore the Transformation Space for Adversarial Images PDF BibLaTeX Jiyu Chen, David Wang, and Hao Chen ACM Conference on Data and Application Security and Privacy (CODASPY), New Orleans, LA, USA, March 16–18, 2020. (20%)

Matryoshka: Fuzzing Deeply Nested Branches PDF BibLaTeX Peng Chen, Jianzhong Liu, and Hao Chen ACM Conference on Computer and Communications Security (CCS), London, UK, November 11–15, 2019. (16.0%)

Informer: Irregular Traffic Detection for Containerized Microservices RPC in the Real World PDF Abstract BibLaTeX Jiyu Chen, Heqing Huang, and Hao Chen ACM/IEEE Workshop on Security and Privacy in Edge Computing (Edge S&P), Washington DC, November 7–9, 2019.

Falsified Data Attack on Backpressure-Based Traffic Signal Control Algorithms PDF BibLaTeX Chia-Cheng Yen, Dipak Ghosal, Michael Zhang, Chen-Nee Chuah, and Hao Chen IEEE Vehicular Networking Conference (VNC), Taipei, Taiwan, December 5–7, 2018.

Less Is More: Culling the Training Set to Improve Robustness of Deep Neural Networks PDF Abstract BibLaTeX Yongshuai Liu, Jiyu Chen, and Hao Chen Conference on Decision and Game Theory for Security (GameSec), Seattle, WA, October 29–31, 2018.

Angora: Efficient Fuzzing by Principled Search PDF Abstract BibLaTeX Code Peng Chen and Hao Chen IEEE Symposium on Security & Privacy (S&P), San Francisco, CA, May 21–23, 2018. (10.0%)

Detecting Third-Party Libraries in Android Applications with High Precision and Recall PDF Abstract BibLaTeX Yuan Zhang, Jiarun Dai, Xiaohan Zhang, Sirong Huang, Zhemin Yang, Min Yang, and Hao Chen IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), Campobasso, Italy, March 20–23, 2018.

Magnet: a Two-Pronged Defense Against Adversarial Examples PDF Abstract Presentation BibLaTeX Dongyu Meng and Hao Chen ACM Conference on Computer and Communications Security (CCS), Dallas, TX. October 30 – November 3, 2017. (17.9%)

Evaluating Private Modes in Desktop and Mobile Browsers and Their Resistance to Fingerprinting PDF Abstract BibLaTeX Yuanyi Wu, Dongyu Meng, and Hao Chen IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, October 9–11, 2017. (29.9%)

Surgescan: Enforcing Security Policies on Untrusted Third-Party Android Libraries PDF Abstract BibLaTeX Jonathan Vronsky, Ryan Stevens, and Hao Chen The 14th IEEE Conference on Advanced and Trusted Computing (ATC), San Francisco, CA. August 4–8, 2017.

Rethinking Permission Enforcement Mechanism on Mobile Systems PDF BibLaTeX Yuan Zhang, Min Yang, Guofei Gu, and Hao Chen IEEE Transactions on Information Forensics & Security. 11(10):2227–2240, 2016.

AppShield: Enabling Multi-Entity Access Control Cross Platforms for Mobile App Management PDF BibLaTeX Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen and Wangjun Hong International Conference on Security and Privacy in Communication Networks (SECURECOMM), Guangzhou, China. October 10–12, 2016. (23.4%)

Security Analysis of Personal Unmanned Aerial Vehicles BibLaTeX Peng Chen and Hao Chen International Conference on Security and Privacy in Communication Networks (SECURECOMM), Guangzhou, China. October 10–12, 2016. (23.4%)

RevDroid: Code Analysis of the Side Effects After Dynamic Permission Revocation of Android Apps PDF BibLaTeX Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, X. Sean Wang, Zhiyun Qian and Hao Chen ACM Asia Conference on Computer and Communications Security (ASIACCS), Xi'an, China. May 30 – June 3, 2016.(20.9%)

On the Origin of Mobile Apps: Network Provenance for Android Applications PDF Abstract BibLaTeX Ryan Stevens and Jonathan Crussell and Hao Chen 6th ACM Conference on Data and Application Security and Privacy (CODASPY), New Orleans, LA, March 9–11, 2016. (22%)

FineDroid: Enforcing Permissions with System-Wide Application PDF Abstract BibLaTeX Yuan Zhang, Min Yang, Guofei Gu, and Hao Chen International Conference on Security and Privacy in Communication Networks (SECURECOMM), Dallas, TX, October 26–29, 2015.

Predictive Eviction: a Novel Policy for Optimizing TLS Session Cache Performance PDF Abstract BibLaTeX Ryan Stevens and Hao Chen IEEE Global Communications Conference: Communications and Information System Security (GLOBECOM), San Diego, CA, December 6–10, 2015.

AnDarwin: Scalable Detection of Android Application Clones Based on Semantics PDF Abstract BibLaTeX Jonathan Crussell, Clint Gibler, and Hao Chen IEEE Transactions on Mobile Computing, 14(10):2007–2019, 2015.

AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps PDF Abstract BibLaTeX Fangda Cai and Hao Chen and Yuanyi Wu and Yuan Zhang IEEE Mobile Security Technologies (MoST), San Jose, CA, May 21, 2015. (30%)

MAdFraud: Investigating Ad Fraud in Android Application PDF Abstract Data Set Presentation BibLaTeX Jon Crussell, Ryan Stevens, and Hao Chen 12th International Conference on Mobile Systems, Applications and Services (MobiSys), Bretton Woods, NH, USA, June 16-19, 2014. (13.5%)

A First Look At Firefox OS Security PDF Abstract BibLaTeX Daniel Defreez and Bhargava Shastry and Hao Chen and Jean-Pierre Seifert IEEE Mobile Security Technologies (MoST), San Jose, CA, May 17, 2014. (37%)

Moving Target Defenses in the HELIX Self-Regenerative Architecture PDF Abstract BibLaTeX Claire Le Goues, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason D. Hiser, John C. Knight, and Matthew Van Gundy In Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Ed. by Sushil Jajodia et al., Springer-Verlag New York, 2013, pages 117–149.

Using and Asking: APIs Used in the Android Market and Asked About in Stackoverflow PDF Abstract BibLaTeX Daryl Posnett, David Kavaler, Clint Gibler, Hao Chen, Prem Devanbu, and Vladimir Filkov 5th International Conference on Social Informatics (SocInfo), Kyoto, Japan, November 25–27, 2013.

Andarwin: Scalable Semantics-Based Detection of Similar Android Applications PDF Abstract Dataset BibLaTeX Jonathan Crussell, Clint Gibler, and Hao Chen 18th European Symposium on Research in Computer Security (ESORICS), Egham, U.K., September 9–13, 2013. (18%)

Retroskeleton: Retrofitting Android Apps PDF Abstract Presentation Video YouTube BibLaTeX Benjamin Davis and Hao Chen 11th International Conference on Mobile Systems, Applications and Services (MobiSys), Taipei, Taiwan, June 25–28, 2013. (15.7%)

Adrob: Examining the Landscape and Impact of Android Application Plagiarism PDF Abstract Presentation VideoYouTube BibLaTeX Clint Gibler, Ryan Stevens, Jon Crussell, Hao Chen, Hui Zang, and Heesook Choi 11th International Conference on Mobile Systems, Applications and Services (MobiSys), Taipei, Taiwan, June 25–28, 2013. (15.7%)

Quantifying the Effects of Removing Permissions from Android Applications PDF Abstract BibLaTeX Eric Gustafson, Kristen Kennedy, and Hao Chen IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 23, 2013. (40%)

Asking for (and About) Permissions Used by Android Apps PDF Abstract Presentation BibLaTeX Ryan Stevens, Jonathan Ganz, Prem Devanbu, Hao Chen and Vladimir Filkov 10th Working Conference on Mining Software Repositories (MSR), San Francisco, CA, May 18–19, 2013. (38.2%)

Attack of the Clones: Detecting Cloned Applications on Android Markets PDF Abstract BibLaTeX Jonathan Crussell, Clint Gibler, and Hao Chen 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10–12, 2012. (20%)

AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale PDF Abstract BibLaTeX Clint Gibler, Jon Crussell, Jeremy Erickson, and Hao Chen 5th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, June 13–15, 2012.

On the Practicality of Motion Based Keystroke Inference Attack PDF Abstract BibLaTeX Liang Cai and Hao Chen 5th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, June 13–15, 2012.

Investigating User Privacy in Android Ad Libraries. PDF Abstract BibLaTeX Ryan Stevens, Clint Gibler, Jon Crussell, and Jeremy Erickson and Hao Chen IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 24, 2012. (39%)

I-ARM-Droid: a Rewriting Framework for In-App Reference Monitors for Android Applications PDF Abstract BibLaTeX Benjamin Davis, Ben Sanders, Armen Khodaverdian, and Hao Chen IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 24, 2012. (39%)

Opaak: Using Mobile Phones to Limit Anonymous Identities Online PDF Abstract BibLaTeX Gabriel Maganis, Elaine Shi, Hao Chen, and Dawn Song 10th International Conference on Mobile Systems, Applications and Services (MobiSys), Low Wood Bay, Lake District, United Kingdom, June 26–28, 2012. (18%)

Privacy-Preserving Alibi Systems PDF Abstract BibLaTeX Benjamin Davis, Hao Chen, and Matthew Franklin 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Seoul, South Korea, May 1–3, 2012. (30%)

Noncespaces: Using Randomization to Defeat Cross-Site Scripting Attacks PDF Abstract BibLaTeX Matthew Van Gundy and Hao Chen Computer & Security, 31:612–628, 2012.

TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion PDF Abstract Slides (PPT PDF) BibLaTeX Liang Cai and Hao Chen 6th USENIX Workshop on Hot Topics in Security (HotSec '11), San Francisco, CA, August 9, 2011. (20%).

Gesture Authentication with Touch Input for Mobile Devices PDF Abstract BibLaTeX Yuan Niu and Hao Chen 3rd International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec), Aalborg, Denmark, May 17–19, 2011.

Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas PDF Abstract Slides BibLaTeX Liang Cai, Kai Zeng, Hao Chen, and Prasant Mohapatra 18th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 6–9, 2011. (20%)

DBTaint: Cross-Application Information Flow Tracking Via Databases PDF Abstract Slides BibLaTeX Benjamin Davis and Hao Chen USENIX Conference on Web Application, Boston, MA, June 23-24, 2010.

WebCallerID: Leveraging Cellular Networks for Web Authentication PDF Abstract BibLaTeX Francis Hsu, Hao Chen, and Sridhar Machiraju Journal of Computer Security, 19(5):869–893, 2011.

CapAuth: a Capability-Based Handover Scheme PDF Abstract BibLaTeX Liang Cai, Sridhar Machiraju, and Hao Chen IEEE INFOCOM 2010: The 27th Conference on Computer Communications, San Diego, CA, March 15–19, 2010.

Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks PDF Abstract BibLaTeX Radmilo Racic, Denys Ma, Hao Chen, and Xin Liu IEEE Transactions on Mobile Computing, 9:609-620, 2010.

Secure File System Services for Web 2.0 Applications PDF Abstract BibLaTeX Francis Hsu and Hao Chen Proceedings of the The ACM Cloud Computing Security Workshop (CCSW), Chicago, IL, November 13, 2009. (37%)

Multi-Party Off-the-Record Messaging PDF Abstract BibLaTeX Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, and Hao Chen Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, November 9–13, 2009. (18%)

Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages PDF Abstract BibLaTeX Liang Cai, Gabriel Maganis, Hui Zang, and Hao Chen Proceedings of the 5th International Conference on Security and Privacy in Communication Networks (SecureComm), Athens, Greece, September 14–18, 2009. (26%)

Noise Injection for Search Privacy Protection PDF Abstract BibLaTeX Shaozhi Ye, Felix Wu, Raju Pandey, and Hao Chen Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), Vancouver, Canada, August 29–31, 2009. (13%)

Defending Against Sensor-Sniffing Attacks on Mobile Phones PDF Abstract BibLaTeX Liang Cai, Sridhar Machiraju, and Hao Chen The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld), Barcelona, Spain, August 17, 2009.

Measuring Privacy Risk in Online Social Networks PDF Abstract BibLaTeX Justin Becker and Hao Chen Web 2.0 Security and Privacy (W2SP), Oakland, CA, May 21, 2009. (36%)

Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks PDF Abstract Slide BibLaTeX Matthew Van Gundy and Hao Chen Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2009. (12%)

A General Framework for Benchmarking Firewall Optimization Techniques PDF Abstract BibLaTeX G Misherghi, Lihua Yuan, Zhendong Su, Chen-Nee Chuah, Hao Chen IEEE Transactions on Network and Service Management, 5(4):227-238, December 2008.

OMash: Enabling Secure Web Mashups Via Object Abstraction PDF Abstract Slides (PPTX PDF) BibLaTeX Steven Crites, Francis Hsu, and Hao Chen Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 27–31, 2008. (18%)

iPhish: Phishing Vulnerabilities on Consumer Electronics PDF Abstract BibLaTeX Yuan Niu, Francis Hsu and Hao Chen Proceedings of Usability, Psychology, and Security 2008, San Francisco, CA, April, 2008.

Distributed Authentication for Low-Cost Wireless Networks PDF Abstract BibLaTeX Sridhar Machiraju, Hao Chen, and Jean Bolot Proceedings of the Ninth Workshop on Mobile Computing Systems and Applications (ACM HotMobile), Napa Valley, CA, February 25–26, 2008. (23%)

Exploiting Opportunistic Scheduling in Cellular Data Networks PDF Abstract Slides BibLaTeX Radmilo Racic, Denys Ma, Hao Chen, and Xin Liu Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), San Diego, CA, February 10–13, 2008. (18%)

Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms PDF Abstract BibLaTeX Matthew Van Gundy, Hao Chen, Zhendong Su, and Giovanni Vigna Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, December 10–14, 2007. (22%)

Spam Double-Funnel: Connecting Web Spammers with Advertisers PDF Abstract BibLaTeX Yi-Min Wang, Ming Ma, Yuan Niu, and Hao Chen Proceedings of the 16th International World Wide Web Conference (WWW2007), Banff, Canada, May 8–12, 2007. (15%)

A Quantitative Study of Forum Spamming Using Context-Based Analysis PDF Abstract Slides BibLaTeX Yuan Niu, Yi-Min Wang, Hao Chen, Ming Ma, and Francis Hsu Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS), pages 79–92, San Diego, CA, February, 2007. (15%)

Back to the future: a framework for automatic malware removal and system repair PDF PS Abstract BibLaTeX Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, and Zhendong Su Proceedings of 2006 Annual Computer Security Applications Conference (ACSAC 22), Miami Beach, FL, December, 2006 (30%)

Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery PDF PS Abstract Slides BibLaTeX Radmilo Racic, Denys Ma, and Hao Chen Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, August, 2006. (25%)

FIREMAN: a Toolkit for FIREwall Modeling and ANalysis PDF Abstract BibLaTeX Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, and Prasant Mohapatra Proceedings of 2006 IEEE Symposium on Security and Privacy, Oakland, CA, May, 2006. (13%)

Model Checking an Entire Linux Distribution for Security Violations PDF PS Abstract Slides BibLaTeX Benjamin Schwarz, Hao Chen, David Wagner, Geoff Morrison, Jacob West, Jeremy Lin, and Wei Tu Proceedings of 21st Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, December, 2005. (23%)

Using Build-Integrated Static Checking to Preserve Correctness Invariants PDF PS Abstract Slides(OpenOfficePDF) BibLaTeX Hao Chen and Jonathan Shapiro Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), pages 288–297, Washington, DC, October 2004. (14%)

Model checking one million lines of C code PDF PS Abstract Slides(PPT) BibLaTeX Hao Chen, Drew Dean, and David Wagner Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS), pages 171–185, San Diego, CA, February 2004.

Setuid Demystified PDF PS Abstract Slides(PPT) BibLaTeX Hao Chen, David Wagner, and Drew Dean Proceedings of the 11th USENIX Security Symposium, pages 171–190, San Francisco, CA, August 2002.

MOPS: an Infrastructure for Examining Security Properties of Software PDF PS Abstract BibLaTeX Hao Chen and David Wagner Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), pages 235–244, Washington, DC, November 2002.

Optimizing Search by Showing Results in Context PDF PS Abstract BibLaTeX Susan Dumais, Edward Cutrell, and Hao Chen Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 277–284, Seattle, WA, April 2001.

Bringing Order to the Web: Automatically Categorizing Search Results PDF PS Word Abstract Slides(PPT) BibLaTeX Hao Chen and Susan Dumais Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 145–152, The Hague, The Netherlands, April 2000.

Hierarchical Classification of Web Content PDF PS Abstract BibLaTeX Susan Dumais and Hao Chen Proceedings of the 23rd ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 256–263, Athens, Greece, July 2000.

Classified Displays of Web Search Results BibLaTeX Susan Dumais, Edward Cutrell, and Hao Chen 11th ASIS&T SIG/CR Classification Research Workshop, pages 87–90, November 2000.

Evaluation of Decision Forests on Text Categorization PDF PS Abstract Slides(PPT) BibLaTeX Hao Chen and Tin K. Ho Proceedings of the SPIE Conference on Document Recognition and Retrieval VII, volume 3967, pages 191–199, San Jose, CA, January 2000.

Integrating Geometrical and Linguistic Analysis for E-mail Signature Block Parsing PDF PS Abstract BibLaTeX Hao Chen, Jianying Hu, and Richard Sproat ACM Transactions on Information Systems, 17(4):343–366, October 1999.

Emu: an E-mail Preprocessor for Text-to-speech PDF PS Abstract BibLaTeX Richard Sproat, Jianying Hu, and Hao Chen 1998 Workshop on Multimedia Signal Processing, pages 239–244, Redondo Beach, CA, December 1998. IEEE Signal Processing Society.

E-mail Signature Block Analysis PDF PS Abstract BibLaTeX Hao Chen, Jianying Hu, and Richard Sproat Proceedings of the 14th International Conference on Pattern Recognition (ICPR), pages 1153–1156, Brisbane, Australia, August 1998.

Piecewise Linear Modulation Model of Handwriting PDF PS Abstract BibLaTeX Hao Chen, Oscar E. Agazzi, and Ching Y. Suen Proceedings of the 4th International Conference on Document Analysis and Recognition (ICDAR), pages 363–367, Ulm, Germany, August 1997.