@inproceedings{Chen:2023:Hopper, author = {Chen, Peng and Xie, Yuxuan and Lyu, Yunlong and Wang, Yuxiao and Chen, Hao}, title = {HOPPER: Interpretative Fuzzing for Libraries}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2023-11-26/2023-11-30}, address = {Copenhagen, Denmark}, OPTannote = {\%} }
@inproceedings{Li:2023:Squeeze, author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao}, title = {Squeeze Training for Adversarial Robustness}, booktitle = {International Conference on Learning Representations (ICLR)}, date = {2023-05-01/2023-05-05}, address = {Kigali, Rwanda}, OPTannote = {31.8\%} }
@inproceedings{Li:2023:Bayesian, author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao}, title = {Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples}, booktitle = {International Conference on Learning Representations (ICLR)}, date = {2023-05-01/2023-05-05}, address = {Kigali, Rwanda}, OPTannote = {31.8\%} }
@inproceedings{Rong:2022:Valkyrie, author = {Rong, Yuyang and Zhang, Chibin and Liu, Jianzhong and Chen, Hao}, title = {Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques}, booktitle = {IEEE International Conference on Software Quality, Reliability, and Security (QRS)}, date = {2022-12-05/2022-12-09}, address = {Guangzhou, China}, addendum = {Best paper award}, OPTannote = {75/273=27\%} }
@article{Du:2022:AFLIoT, title = {AflIot: Fuzzing on Linux-based IoT Device with Binary-Level Instrumentation}, author = {Du, Xuechao and Chen, Andong and He, Boyuan and Chen, Hao and Zhang, Fan and Chen, Yan}, journal = {Computers \& Security}, year = {2022}, issn = {0167-4048}, doi = {https://doi.org/10.1016/j.cose.2022.102889}, }
@inproceedings{Chen:2022:MIA, author = {Chen, Jiyu and Guo, Yiwen and Chen, Hao and Gong, Neil}, title = {Membership Inference Attack in Face of Data Transformations}, booktitle = {IEEE Conference on Communications and Network Security (CNS)}, date = {2022-10-03/2022-10-05}, address = {Austin, TX, USA}, OPTannote = {43/122=35\%} }
@article{Guo:2022:ILA, author={Guo, Yiwen and Li, Qizhang and Zuo, Wangmeng and Chen, Hao}, journal={IEEE Transactions on Pattern Analysis and Machine Intelligence}, title={An Intermediate-level Attack Framework on The Basis of Linear Regression}, year={2022}, volume={}, number={}, doi={10.1109/TPAMI.2022.3188044} }
@inproceedings{Liu:2022, author = {Liu, Bulou and Bai, Bing and Xie, Weibang and Guo, Yiwen and Chen, Hao}, title = {Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations}, booktitle = {ACM SIGKDD Conference on Knowledge Discovery and Data Mining}, date = {2022-08-14/2022-08-18}, address = {Washington DC, USA}, OPTannote = {195/753=26\%} }
@inproceedings{Jiang:2022:Feder, author = {Jiang, Yukun and Cao, Xiaoyu and Chen, Hao and Gong, Neil}, title = {Feder: communication-efficient byzantine-robust federated learning}, booktitle = {ICLR Workshop on Socially Responsible Machine Learning (SRML)}, date = {2022-04-29/2022-04-29}, OPTannote = {} }
@article{Liu:2022:ConcSpectre, author = {Liu, Yang and Xu, Zisen and Fan, Ming and Hao, Yu and Chen, Kai and Chen, Hao and Cai, Yan and Yang, Zijiang and Liu, Ting}, title = {ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs}, journal = {IEEE Transactions on Reliability}, year = {2022}, pages = {}, volume = {} }
@inproceedings{Liu:2021:ConcSpectre, author = {Liu, Yang and Fan, Ming and Liu, Ting and Hao, Yu and Xu, Zisen and Chen, Kai and Chen, Hao and Cai, Yan}, title = {ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs}, booktitle = {IEEE International Conference on Software Quality, Reliability, and Security (QRS)}, date = {2021-12-06/2021-12-10}, addendum = {Best paper award}, OPTannote = {61/243=25.10\%} }
@article{Chen:2021:Privacy, author = {Chen, Jiyu and Guo, Yiwen and Zheng, Qianjun and Chen, Hao}, title = {Protect Privacy of Deep Classification Networks by Exploiting Their Generative Power}, journal = {Machine Learning}, year = {2021}, pages = {651-–674}, volume = {110} }
@inproceedings{Liu:2021:Go, author = {Liu, Ziheng and Zhu, Shuofei and Qin, Boqin and Chen, Hao and Song Linhai}, title = {Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems}, booktitle = {International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)}, date = {2021-04-19/2021-04-23}, OPTannote = {75/398=18.9\%} }
@inproceedings{Guo:2020:Linear, author = {Guo, Yiwen and Li, Qizhang and Chen, Hao}, title = {Backpropagating Linearly Improves Transferability of Adversarial Examples}, booktitle = {Neural Information Processing Systems (NeurIPS)}, date = {2020-12-06/2020-12-12}, OPTannote = {1900/9454=20\%} }
@inproceedings{Li:2020:NoBox, author = {Li, Qizhang and Guo, Yiwen and Chen, Hao}, title = {Practical No-box Adversarial Attacks against DNNs}, booktitle = {Neural Information Processing Systems (NeurIPS)}, date = {2020-12-06/2020-12-12}, OPTannote = {1900/9454=20\%} }
@inproceedings{Chen:2020:Style, author = {Chen, Haitian and Jiang, Bai and Chen, Hao}, title = {{StyleCAPTCHA}: {CAPTCHA} Based on Style-Transferred Images to Defend against Deep Convolutional Networks}, booktitle = {ACM-IMS Foundations of Data Science Conference (FODS)}, date = {2020-10-18/2020-10-20}, OPTannote = {17/58=29\%} }
@inproceedings{Rong:2020:Integrity, author = {Rong, Yuyang and Chen, Peng and Chen, Hao}, title = {Integrity: Finding Integer Errors by Targeted Fuzzing}, booktitle = {International Conference on Security and Privacy in Communication Networks (SecureComm)}, date = {2020-10-21/2020-10-23}, OPTannote = {27/74=36\%} }
@inproceedings{Li:2020:ILA, author = {Li, Qizhang and Guo, Yiwen and Chen, Hao}, title = {Yet Another Intermediate-Level Attack}, booktitle = {European Conference on Computer Vision (ECCV)}, date = {2020-08-23/2020-08-28}, }
@article{Han:2020:senDroid, author = {Han, Weili and Cao, Chang and Chen, Hao and Li, Dong and Fang, Zheran and Xu, Wenyuan and Wang, Xiaoyang}, title = {senDroid: Auditing Sensor Access in {Android} System-Wide}, journal = {IEEE Transactions on Dependable and Secure Computing}, year = {2020}, pages = {407--421}, number = {2}, volume = {17} }
@inproceedings{Jia:2020:Tracking, author = {Jia, Yunhan and Lu, Yantao and Shen, Junjie and Chen, Qi Alfred and Chen, Hao and Zhong, Zhenyu and Wei, Tao}, title = {Fooling Detection Alone Is Not Enough: Adversarial Attack Against Multiple Object Tracking}, booktitle = {International Conference on Learning Representations (ICLR)}, date = {2020-04-26/2020-04-30}, address = {Addis Ababa, Ethiopia}, }
@inproceedings{Chen:2020:Transform, author = {Chen, Jiyu and Wang, David and Chen, Hao}, title = {Explore the Transformation Space for Adversarial Images}, booktitle = {ACM Conference on Data and Application Security and Privacy (CODASPY)}, date = {2020-03-16/2020-03-18}, address = {New Orleans, LA, USA}, OPTannote = {20\%} }
@inproceedings{Chen:2019:Matryoshka, author = {Chen, Peng and Liu, Jianzhong and Chen, Hao}, title = {{Matryoshka}: Fuzzing Deeply Nested Branches}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2019-11-11/2019-11-15}, address = {London, UK}, optannote = {149/933=16.0\%}, }
@inproceedings{Chen:2019:Informer, author = {Chen, Jiyu and Huang, Heqing and Chen, Hao}, title = {Informer: Irregular Traffic Detection for Containerized Microservices {RPC} in the Real World}, booktitle = {ACM/IEEE Workshop on Security and Privacy in Edge Computing (Edge S\&P)}, date = {2019-11-07/2019-11-09}, address = {Washington DC, USA}, OPTannote = {} }
@inproceedings{Yen:2018:Falsified, author = {Yen, Chia-Cheng and Ghosal, Dipak and Zhang, Michael and Chuah, Chen-Nee and Chen, Hao}, title = {Falsified Data Attack on Backpressure-Based Traffic Signal Control Algorithms}, booktitle = {IEEE Vehicular Networking Conference (VNC)}, date = {2018-12-05/2018-12-07}, address = {Taipei, Taiwan}, optannote = {}, }
@inproceedings{Liu:2018:Sanitization, author = {Liu, Yongshuai and Chen, Jiyu and Chen, Hao}, title = {Less Is More: Culling the Training Set to Improve Robustness of Deep Neural Networks}, booktitle = {Conference on Decision and Game Theory for Security (GameSec)}, date = {2018-10-29/2018-10-31}, address = {Seattle, WA, USA}, }
@inproceedings{Chen:2018:Angora, author = {Chen, Peng and Chen, Hao}, title = {{Angora}: Efficient Fuzzing by Principled Search}, booktitle = {IEEE Symposium on Security \& Privacy}, date = {2018-05-21/2018-05-23}, address = {San Francisco, CA, USA}, optannote = {55/549=10.0\%} }
@inproceedings{Zhang:2018:Library, author = {Zhang, Yuan and Dai, Jiarun and Zhang, Xiaohan and Huang, Sirong and Yang, Zhemin and Yang, Min and Chen, Hao}, title = {Detecting Third-Party Libraries in {Android} Applications with High Precision and Recall}, booktitle = {IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)}, date = {2018-03-20/2018-03-23}, address = {Campobasso, Italy}, optannote = {39/146=26.7\%} }
@inproceedings{Meng:2017:MagNet, author = {Meng, Dongyu and Chen, Hao}, title = {{MagNet}: a Two-Pronged Defense Against Adversarial Examples}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2017-10-30/2017-11-03}, address = {Dallas, TX}, optannote = {151/843=17.9\%}, }
@inproceedings{Wu:2017:Browser, author = {Wu, Yuanyi and Meng, Dongyu and Chen, Hao}, title = {Evaluating Private Modes in Desktop and Mobile Browsers and Their Resistance to Fingerprinting}, booktitle = {IEEE Conference on Communications and Network Security (CNS)}, date = {2017-10-09/2017-10-11}, address = {Las Vegas, NV}, optannote = {41/137=29.9\%} }
@inproceedings{Vronsky:2017:SurgeScan, author = {Vronsky, Jonathan and Stevens, Ryan and Chen, Hao}, title = {{SurgeScan}: Enforcing Security Policies on Untrusted Third-Party {Android} Libraries}, booktitle = {The 14th IEEE Conference on Advanced and Trusted Computing (ATC)}, date = {2017-08-04/2017-08-08}, address = {San Francisco, CA}, }
@article{Zhang:2016:FineDroid, author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao}, title = {Rethinking Permission Enforcement Mechanism on Mobile Systems}, journal = {IEEE Transactions on Information Forensics \& Security}, year = {2016}, pages = {2227--2240}, number = {10}, volume = {11} }
@inproceedings{Qu:2016:AppShield, author = {Qu, Zhengyang and Guo, Guanyu and Shao, Zhengyue and Rastogi, Vaibhav and Chen, Yan and Chen, Hao and Hong, Wangjun}, title = {{AppShield}: Enabling Multi-Entity Access Control Cross Platforms for Mobile App Management}, booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)}, date = {2016-10-10/2016-10-12}, address = {Guangzhou, China}, optannote = {23.4\%} }
@inproceedings{Chen:2016:UAV, author = {Chen, Peng and Chen, Hao}, title = {Security Analysis of Personal Unmanned Aerial Vehicles}, booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)}, date = {2016-10-10/2016-10-12}, address = {Guangzhou, China}, optannote = {23.4\%} }
@inproceedings{Fang:2016:revDroid, author = {Fang, Zheran and Han, Weili and Li, Dong and Guo, Zeqing and Guo, Danhao and Wang, X. Sean and Qian, Zhiyun and Chen, Hao}, title = {{RevDroid}: Code Analysis of the Side Effects After Dynamic Permission Revocation of {Android} Apps}, booktitle = {ACM Asia Conference on Computer and Communications Security (ASIACCS)}, date = {2016-05-30/2016-06-03}, address = {Xi'an, China}, optannote = {20.9\%} }
@inproceedings{Stevens:2015:MTOP, author = {Stevens, Ryan and Crussell, Jonathan and Chen, Hao}, title = {On the Origin of Mobile Apps: Network Provenance for {Android} Applications}, booktitle = {6th ACM Conference on Data and Application Security and Privacy (CODASPY)}, date = {2016-03-09/2016-03-11}, address = {New Orleans, LA}, optannote = {22\%} }
@inproceedings{Zhang:2015:FineDroid, author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao}, title = {{FineDroid}: Enforcing Permissions with System-Wide Application}, booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)}, date = {2015-10-26/2015-10-29}, address = {Dallas, TX}, optannote = {30/108} }
@inproceedings{Stevens:2015:Pred, author = {Stevens, Ryan and Chen, Hao}, title = {Predictive Eviction: a Novel Policy for Optimizing {TLS} Session Cache Performance}, booktitle = {IEEE Global Communications Conference: Communications and Information System Security (GLOBECOM)}, date = {2015-12-06/2015-12-10}, address = {San Diego, CA}, }
@article{Crussell:2015:AnDarwin, author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao}, title = {AnDarwin: Scalable Detection of {Android} Application Clones Based on Semantics}, journal = {IEEE Transactions on Mobile Computing}, year = {2015}, pages = {2007--2019}, number = {10}, volume = {14} }
@inproceedings{Cai:2015:AppCracker, author = {Cai, Fangda and Chen, Hao and Wu, Yuanyi and Zhang, Yuan}, title = {{AppCracker}: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2015-05-21}, address = {San Jose, CA}, optannote = {10/33} }
@inproceedings{Crussell:2014:MAdFraud, author = {Crussell, Jonathan and Stevens, Ryan and Chen, Hao}, title = {{MAdFraud}: Investigating Ad Fraud in {Android} Applications}, booktitle = {12th International Conference on Mobile Systems, Applications and Services (MobiSys)}, date = {2014-06-16/2014-06-19}, address = {Bretton Woods, NH, USA}, optannote = {25/185} }
@inproceedings{Defreez:2014:Firefox, author = {Defreez, Daniel and Shastry, Bhargava and Chen, Hao and Seifert, Jean-Pierre}, title = {A First Look At Firefox {OS} Security}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2014-05-17}, address = {San Jose, CA}, optannote = {11/30} }
@inbook{Goues:2013:MTD, author = {Goues, Claire Le and Nguyen-Tuong, Anh and Chen, Hao and Davidson, Jack W. and Forrest, Stephanie and Hiser, Jason D. and Knight, John C. and Gundy, Matthew Van}, title = {Moving Target Defenses in the {HELIX} Self-Regenerative Architecture}, booktitle = {Moving Target Defense II: Application of Game Theory and Adversarial Modeling}, year = {2013}, pages = {117--149}, editor = {Sushil Jajodia et al.}, optseries = {Advances in Information Security}, optvolume = {100}, publisher = {Springer-Verlag New York} }
@inproceedings{Posnett:2013:UA, author = {Posnett, Daryl and Kavaler, David and Gibler, Clint and Chen, Hao and Devanbu, Prem and Filkov, Vladimir}, title = {Using and Asking: {APIs} Used in the {Android} Market and Asked About in {stackoverflow}}, booktitle = {5th International Conference on Social Informatics (SocInfo)}, date = {2013-11-25/2013-11-27}, address = {Kyoto, Japan}, }
@inproceedings{Crussell:2013:AnDarwin, author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao}, title = {Scalable Semantics-Based Detection of Similar {Android} Applications}, booktitle = {18th European Symposium on Research in Computer Security (ESORICS)}, date = {2013-09-09/2013-09-13}, address = {Egham, U.K.}, optannote = {43/242} }
@inproceedings{Gustafson:2013:Permission, author = {Gustafson, Eric and Kennedy, Kristen and Chen, Hao}, title = {Quantifying the Effects of Removing Permissions from {Android} Applications}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2013-05-23}, address = {San Francisco, CA}, optannote = {9/22}, }
@inproceedings{Stevens:2013:Permission, author = {Stevens, Ryan and Ganz, Jonathan and Devanbu, Prem and Chen, Hao and Filkov, Vladimir}, title = {Asking for (and About) Permissions Used by {Android} Apps}, booktitle = {10th Working Conference on Mining Software Repositories (MSR)}, date = {2013-05-18/2013-05-19}, address = {San Francisco, CA}, optannote = {31/81} }
@inproceedings{Davis:2013:Retrofit, author = {Davis, Benjamin and Chen, Hao}, title = {Retrofitting {Android} Apps}, booktitle = {11th International Conference on Mobile Systems, Applications and Services (MobiSys)}, date = {2013-06-25/2013-06-28}, address = {Taipei, Taiwan}, optannote = {33/210} }
@inproceedings{Gibler:2013:UEcon, author = {Gibler, Clint and Stevens, Ryan and Crussell, Jon and Chen, Hao and Zang, Hui and Choi, Heesook}, title = {Characterizing {Android} Application Plagiarism and Its Impact on Developers}, booktitle = {11th International Conference on Mobile Systems, Applications and Services (MobiSys)}, date = {2013-06-25/2013-06-28}, address = {Taipei, Taiwan}, optannote = {33/210} }
@inproceedings{Crussell:2012:DNADroid, author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao}, title = {Attack of the Clones: Detecting Cloned Applications on {Android} Markets}, booktitle = {17th European Symposium on Research in Computer Security (ESORICS)}, date = {2012-09-10/2012-09-12}, address = {Pisa, Italy}, optannote = {50/248} }
@article{VanGundy:2012:Noncespaces, author = {Gundy, Matthew Van and Chen, Hao}, title = {{Noncespaces}: Using Randomization to Defeat Cross-Site Scripting Attacks}, journal = {Computers \& Security}, year = {2012}, pages = {612–628}, number = {4}, volume = {31} }
@inproceedings{Gibler:2012:AndroidLeaks, author = {Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao}, title = {{AndroidLeaks}: Automatically Detecting Potential Privacy Leaks in {Android} Applications on a Large Scale}, booktitle = {5th International Conference on Trust \& Trustworthy Computing (TRUST)}, date = {2012-06-13/2012-06-15}, address = {Vienna, Austria}, }
@inproceedings{Cai:2012:Motion, author = {Cai, Liang and Chen, Hao}, title = {On the Practicality of Motion Based Keystroke Infernce Attack}, booktitle = {5th International Conference on Trust \& Trustworthy Computing (TRUST)}, date = {2012-06-13/2012-06-15}, address = {Vienna, Austria}, }
@inproceedings{Stevens:2012:Ad, author = {Stevens, Ryan and Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao}, title = {Investigating User Privacy in {Android} Ad Libraries}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2012-05-24}, address = {San Francisco, CA}, optannote = {11/28}, }
@inproceedings{Davis:2012:IARMDroid, author = {Davis, Benjamin and Sanders, Ben and Khodaverdian, Armen and Chen, Hao}, title = {{I-ARM-Droid}: a Rewriting Framework for In-App Reference Monitors for {Android} Applications}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2012-05-24}, address = {San Francisco, CA}, optannote = {11/28}, }
@inproceedings{Davis:2012:Alibi, author = {Davis, Benjamin and Chen, Hao and Franklin, Matthew}, title = {Privacy-Preserving Alibi Systems}, booktitle = {7th ACM Symposium on Information, Computer and Communications Security (ASIACCS)}, date = {2012-05-01/2012-05-03}, address = {Seoul, South Korea}, optannote = {30\%}, }
@inproceedings{Maganis:2012:Opaak, author = {Maganis, Gabriel and Shi, Elaine and Chen, Hao and Song, Dawn}, title = {{Opaak}: Using Mobile Phones to Limit Anonymous Identities Online}, booktitle = {10th International Conference on Mobile Systems, Applications and Services (MobiSys)}, date = {2012-06-26/2012-06-28}, address = {Low Wood Bay, Lake District, United Kingdom}, optannote = {32/182=17.6\%} }
@inproceedings{Cai:2011:TouchLogger, author = {Cai, Liang and Chen, Hao}, title = {{TouchLogger}: Inferring Keystrokes on Touch Screen from Smartph One Motion}, booktitle = {6th USENIX Workshop on Hot Topics in Security (HotSec 11)}, date = {2011-08-09/2011-08-09}, address = {San Francisco, CA}, optannote = {20\%} }
@inproceedings{Yuan:2011:Gesture, author = {Niu, Yuan and Chen, Hao}, title = {Gesture Authentication with Touch Input for Mobile Devices}, booktitle = {3rd International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec)}, date = {2011-05-17/2011-05-19}, address = {Aalborg, Denmark}, }
@inproceedings{Cai:2011:GoodNeighbor, author = {Cai, Liang and Zeng, Kai and Chen, Hao and Mohapatra, Prasant}, title = {{Good Neighbor}: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas}, booktitle = {Annual Network and Distributed System Security Symposium (NDSS)}, date = {2011-02-06/2011-02-09}, address = {San Diego, CA}, optannote = {20\%}, }
@article{Hsu:2011:WebCallerID, author = {Hsu, Francis and Chen, Hao and Machiraju, Sridhar}, title = {{WebCallerID}: Leveraging Cellular Networks for {Web} Authentication}, journal = {Journal of Computer Security}, year = {2011}, number = {5}, volume = {19} }
@inproceedings{Davis:2010:DBTaint, author = {Davis, Benjamin and Chen, Hao}, title = {{DBTaint}: Cross-Application Information Flow Tracking Via Databases}, booktitle = {USENIX Conference on Web Application}, date = {2010-06-23/2010-06-24}, address = {Boston, MA}, optannote = {50\%} }
@article{Racic:2010:Scheduling, author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin}, title = {Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks}, journal = {IEEE Transactions on Mobile Computing}, year = {2010}, pages = {609--620}, issn = {1536-1233}, volume = {9} }
@inproceedings{Liang:2010:CapAuth, author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao}, title = {{CapAuth}: a Capability-Based Handover Scheme}, booktitle = {IEEE INFOCOM 2010: The 27th Conference on Computer Communications}, date = {2010-03-15/2010-03-19}, address = {San Diego, CA}, optannote = {(276+106)/1575=24\%} }
@inproceedings{Hsu:2009:WebFS, author = {Hsu, Francis and Chen, Hao}, title = {Secure File System Services for {Web} 2.0 Applications}, booktitle = {Proceedings of the The ACM Cloud Computing Security Workshop (CCSW 2009)}, date = {2009-11-13/2009-11-13}, address = {Chicago, IL}, optannote = {11/30=37\%} }
@inproceedings{Goldberg:2009:mpOTR, author = {Goldberg, Ian and Ustaoglu, Berkant and Gundy, Matthew Van and Chen, Hao}, title = {Multi-Party Off-the-Record Messaging}, booktitle = {Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS)}, date = {2009-11-09/2009-11-13}, address = {Chicago, IL}, optannote = {58/315=18\%}, }
@inproceedings{Liang:2009:Paging, author = {Cai, Liang and Maganis, Gabriel and Zang, Hui and Chen, Hao}, title = {Mitigating {DoS} Attacks on the Paging Channel by Efficient Encoding in Page Messages}, booktitle = {Proceedings of the 5th International Conference on Security and Privacy in Communication Networks (SecureComm)}, date = {2009-09-14/2009-09-18}, address = {Athens, Greece}, optannote = {20/76=26\%} }
@inproceedings{Ye:2009:Search, author = {Ye, Shaozhi and Wu, Felix and Pandey, Raju and Chen, Hao}, title = {Noise Injection for Search Privacy Protection}, booktitle = {Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT)}, date = {2009-08-29/2009-08-31}, address = {Vancouver, Canada}, optannote = {16/115=13\%} }
@inproceedings{Liang:2009:Sensor, author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao}, title = {Defending Against Sensor-Sniffing Attacks on Mobile Phones}, booktitle = {The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld)}, date = {2009-08-17/2009-08-17}, address = {Barcelona, Spain}, optannote = {10/21=48\%} }
@inproceedings{Becker:2009:SocialNetworks, author = {Becker, Justin and Chen, Hao}, title = {Measuring Privacy Risk in Online Social Networks}, booktitle = {Web 2.0 Security and Privacy (W2SP)}, date = {2009-05-21/2009-05-21}, address = {Oakland, CA} }
@inproceedings{VanGundy:2009:Noncespaces, author = {Gundy, Matthew Van and Chen, Hao}, title = {{Noncespaces}: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks}, booktitle = {Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS)}, date = {2009-02-08/2009-02-11}, address = {San Diego, CA}, optannote = {20/171=12\%}, }
@article{Misherghi:2008:Firewall, author = {Misherghi, G and Yuan, Lihua and Su, Zhendong and Chuah, Chen-Nee and Chen, Hao}, title = {A General Framework for Benchmarking Firewall Optimization Techniques}, journal = {IEEE Transactions on Network and Service Management}, year = {2008}, month = dec, pages = {227--238}, number = {4}, volume = {5} }
@inproceedings{Crites:2008:OMash, author = {Crites, Steven and Hsu, Francis and Chen, Hao}, title = {{OMash}: Enabling Secure Web Mashups Via Object Abstractions}, booktitle = {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS)}, date = {2008-10-27/2008-10-31}, address = {Alexandria, VA}, pages = {99--107}, optannote = {51/281=18\%} }
@inproceedings{Niu:2008:iPhish, author = {Niu, Yuan and Hsu, Francis and Chen, Hao}, title = {{iPhish}: Phishing Vulnerabilities on Consumer Electronics}, booktitle = {Proceedings of Usability, Psychology, and Security 2008}, date = {2008-04-14/2008-04-14}, address = {San Francisco, CA}, }
@inproceedings{Machiraju:2008:Authentication, author = {Machiraju, Sridhar and Chen, Hao and Bolot, Jean}, title = {Distributed Authentication for Low-Cost Wireless Networks}, booktitle = {Proceedings of the Ninth Workshop on Mobile Computing Systems and Applications (HotMobile)}, date = {2008-02-25/2008-02-26}, address = {Napa Valley, CA}, pages = {55--59}, optannote = {18/79=23\%} }
@inproceedings{Racic:2008:PF, author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin}, title = {Exploiting Opportunistic Scheduling in Cellular Data Networks}, booktitle = {Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS)}, date = {2008-02-10/2008-02-13}, address = {San Diego, CA}, pages = {333--345}, annoate = {21/118=18\%} }
@inproceedings{VanGundy:2007:FO, author = {Gundy, Matthew Van and Chen, Hao and Su, Zhendong and Vigna, Giovanni}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)}, date = {2007-12-10/2007-12-14}, address = {Miami Beach, FL}, pages = {74--83}, optannote = {42/191=22\%} }
@inproceedings{Wang:2007:WWW, author = {Wang, Yi-Min and Ma, Ming and Niu, Yuan and Chen, Hao}, title = {Spam Double-Funnel: Connecting Web Spammers with Advertisers}, booktitle = {Proceedings of the 16th International World Wide Web Conference (WWW)}, date = {2007-05-08/2007-05-12}, address = {Banff, Canada}, optannote = {111/755=15\%}, }
@inproceedings{Niu:2007:Spam, author = {Niu, Yuan and Wang, Yi-Ming and Chen, Hao and Ma, Ming and Hsu, Francis}, title = {A Quantitative Study of Forum Spamming Using Context-Based Analysis}, booktitle = {Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS)}, date = {2007-02-28/2007-03-02}, address = {San Diego, CA}, pages = {79--92}, optannote = {18/118=15\%}, }
@inproceedings{Hsu:2006:BTTF, author = {Hsu, Francis and Chen, Hao and Ristenpart, Thomas and Li, Jason and Su, Zhendong}, title = {Back to the Future: a Framework for Automatic Malware Removal and System Repair}, booktitle = {Proceedings of 22rd Annual Computer Security Applications Conference (ACSAC)}, date = {2006-12-11/2006-12-15}, address = {Miami Beach, FL}, optannote = {30\%}, }
@inproceedings{Racic:2006:MMS, author = {Racic, Radmilo and Ma, Denys and Chen, Hao}, title = {Exploiting {MMS} Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery}, booktitle = {Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Network (SecureComm)}, date = {2006-08-28/2006-09-01}, address = {Baltimore, MD}, optannote = {32/126=25\%}, }
@inproceedings{Yuan:2006:FIREMAN, author = {Yuan, Lihua and Chen, Hao and Mai, Jianning and Chuah, Chen-Nee and Su, Zhendong and Mohapatra, Prasant}, title = {{FIREMAN}: a Toolkit for {FIREwall} {Modeling} and {ANalysis}}, booktitle = {Proceedings of 2006 IEEE Symposium on Security and Privacy}, date = {2006-05-21/2006-05-24}, address = {Berkeley, CA}, pages = {199--213}, annoate = {32/251=13\%} }
@inproceedings{Schwarz:2005:Linux, author = {Schwarz, Benjamin and Chen, Hao and Morrison, David Wagner and Geoff and West, Jacob and Lin, Jeremy and Tu, Wei}, title = {Model Checking an Entire {Linux} Distribution for Security Violations}, booktitle = {Proceedings of the 2005 Annual Computer Security Applications Conference (ACSAC)}, date = {2005-12-05/2005-12-09}, address = {Tucson, Arizona}, optannote = {23\%}, }
@inproceedings{Chen:2004:EROS, author = {Chen, Hao and Shapiro, Jonathan}, title = {Using Build-Integrated Static Checking to Preserve Correctness Invariants}, booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS)}, date = {2004-11-25/2004-11-29}, address = {Washington, DC}, pages = {288--297}, optannote = {35/251=14\%} }
@inproceedings{Chen:2004:million, author = {Chen, Hao and Dean, Drew and Wagner, David}, title = {Model Checking One Million Lines of {C} Code}, booktitle = {Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS)}, date = {2004-02-04/2004-02-06}, address = {San Diego, CA}, pages = {171--185} }
@inproceedings{Chen:2002:setuid, author = {Chen, Hao and Wagner, David and Dean, Drew}, title = {Setuid Demystified}, booktitle = {Proceedings of the 11th {USENIX} Security Symposium}, date = {2002-08-05/2002-08-09}, address = {San Francisco, CA}, pages = {171--190}, optannote = {A close look at setuid and setgid implementations and interactions.} }
@inproceedings{Chen:2002:MOPS, author = {Chen, Hao and Wagner, David}, title = {{MOPS}: an Infrastructure for Examining Security Properties of Software}, booktitle = {Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS)}, date = {2002-11-18/2002-11-22}, address = {Washington, DC}, pages = {235--244} }
@inproceedings{Chen:2001:swish, author = {Dumais, Susan and Cutrell, Edward and Chen, Hao}, title = {Optimizing Search by Showing Results in Context}, booktitle = {Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI)}, year = {2001}, month = apr, address = {Seattle, WA}, pages = {277--284} }
@inproceedings{Chen:2000:swish, author = {Chen, Hao and Dumais, Susan}, title = {Bringing Order to the {Web}: Automatically Categorizing Search Results}, booktitle = {Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI)}, year = {2000}, month = apr, address = {The Hague, The Netherlands}, pages = {145--152} }
@inproceedings{Chen:2000:swishcat, author = {Dumais, Susan and Chen, Hao}, title = {Hierarchical Classification of {Web} Content}, booktitle = {Proceedings of the 23rd ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR)}, year = {2000}, month = jul, address = {Athens, Greece}, pages = {256--263} }
@inproceedings{Chen:2000:swishcat2, author = {Dumais, Susan and Cutrell, Edward and Chen, Hao}, title = {Classified Displays of {Web} Search Results}, booktitle = {Proceedings of the 11th ASIST SIG/CR Classification Research Workshop}, year = {2000}, month = nov, pages = {87--90} }
@inproceedings{Chen:2000:textcat, author = {Chen, Hao and Ho, Tin K.}, title = {Evaluation of Decision Forests on Text Categorization}, booktitle = {Proceedings of the SPIE Conference on Document Recognition and Retrieval {VII}}, year = {2000}, month = jan, address = {San Jose, CA}, pages = {191--199}, volume = {3967} }
@article{Chen:1999:emu, author = {Chen, Hao and Hu, Jianying and Sproat, Richard}, title = {Integrating Geometrical and Linguistic Analysis for E-mail Signature Block Parsing}, journal = {ACM Transactions on Information Systems}, year = {1999}, month = oct, pages = {343--366}, number = {4}, volume = {17} }
@inproceedings{Sproat:1998:emu, author = {Sproat, Richard and Hu, Jianying and Chen, Hao}, title = {{Emu}: an E-mail Preprocessor for Text-to-speech}, booktitle = {1998 Workshop on Multimedia Signal Processing}, year = {1998}, month = dec, address = {Redondo Beach, CA}, pages = {239--244}, organization = {{IEEE} Signal Processing Society} }
@inproceedings{Chen:1998:emu, author = {Chen, Hao and Hu, Jianying and Sproat, Richard}, title = {E-mail Signature Block Analysis}, booktitle = {Proceedings of the 14th International Conference on Pattern Recognition (ICPR)}, year = {1998}, month = aug, address = {Brisbane, Australia}, pages = {1153--1156} }
@inproceedings{Chen:1997:handwriting, author = {Chen, Hao and Agazzi, Oscar E. and Suen, Ching Y.}, title = {Piecewise Linear Modulation Model of Handwriting}, booktitle = {Proceedings of the 4th International Conference on Document Analysis and Recognition (ICDAR)}, year = {1997}, month = aug, address = {Ulm, Germany}, pages = {363--367} }