@inproceedings{Li:2023:Attack,
author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao},
title = {Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly},
booktitle = {Neural Information Processing Systems (NeurIPS)},
date = {2023-12-10/2023-12-16},
address = {New Orleans, LA, USA},
OPTannote = {26.1\%}
}
@inproceedings{Li:2023:ILPD,
author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao},
title = {Improving Adversarial Transferability via Intermediate-level Perturbation Decay},
booktitle = {Neural Information Processing Systems (NeurIPS)},
date = {2023-12-10/2023-12-16},
address = {New Orleans, LA, USA},
OPTannote = {26.1\%}
}
@inproceedings{Chen:2023:Hopper,
author = {Chen, Peng and Xie, Yuxuan and Lyu, Yunlong and Wang, Yuxiao and Chen, Hao},
title = {HOPPER: Interpretative Fuzzing for Libraries},
booktitle = {ACM Conference on Computer and Communications Security (CCS)},
date = {2023-11-26/2023-11-30},
address = {Copenhagen, Denmark},
OPTannote = {\%}
}
@inproceedings{Lin:2023:MHCN,
author = {Lin, Fangfei and Bai, Bing and Guo, Yiwen and Chen, Hao and Ren, Yazhou and Xu, Zenglin},
title = {MHCN: a Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering},
booktitle = {International Conference on Computer Vision (ICCV)},
date = {2023-10-04/2023-10-06},
address = {Paris, France},
OPTannote = {\%}
}
@inproceedings{Zhao:2023,
author = {Zhao, Jianyu and Rong, Yuyang and Guo, Yiwen and He, Yifeng and Chen, Hao},
title = {Understanding Programs by Exploiting (Fuzzing) Test Cases},
booktitle = {Findings of the Association for Computational Linguistics (ACL)},
date = {2023-07-09/2023-07-14},
address = {Toronto, Canada},
OPTannote = {\%}
}
@inproceedings{Li:2023:Squeeze,
author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao},
title = {Squeeze Training for Adversarial Robustness},
booktitle = {International Conference on Learning Representations (ICLR)},
date = {2023-05-01/2023-05-05},
address = {Kigali, Rwanda},
OPTannote = {31.8\%}
}
@inproceedings{Li:2023:Bayesian,
author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao},
title = {Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples},
booktitle = {International Conference on Learning Representations (ICLR)},
date = {2023-05-01/2023-05-05},
address = {Kigali, Rwanda},
OPTannote = {31.8\%}
}
@inproceedings{Rong:2022:Valkyrie,
author = {Rong, Yuyang and Zhang, Chibin and Liu, Jianzhong and Chen, Hao},
title = {Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques},
booktitle = {IEEE International Conference on Software Quality, Reliability, and Security (QRS)},
date = {2022-12-05/2022-12-09},
address = {Guangzhou, China},
addendum = {Best paper award},
OPTannote = {75/273=27\%}
}
@article{Du:2022:AFLIoT,
title = {AflIot: Fuzzing on Linux-based IoT Device with Binary-Level Instrumentation},
author = {Du, Xuechao and Chen, Andong and He, Boyuan and Chen, Hao and Zhang, Fan and Chen, Yan},
journal = {Computers \& Security},
year = {2022},
issn = {0167-4048},
doi = {https://doi.org/10.1016/j.cose.2022.102889},
}
@inproceedings{Chen:2022:MIA,
author = {Chen, Jiyu and Guo, Yiwen and Chen, Hao and Gong, Neil},
title = {Membership Inference Attack in Face of Data Transformations},
booktitle = {IEEE Conference on Communications and Network Security (CNS)},
date = {2022-10-03/2022-10-05},
address = {Austin, TX, USA},
OPTannote = {43/122=35\%}
}
@article{Guo:2022:ILA,
author={Guo, Yiwen and Li, Qizhang and Zuo, Wangmeng and Chen, Hao},
journal={IEEE Transactions on Pattern Analysis and Machine Intelligence},
title={An Intermediate-level Attack Framework on The Basis of Linear Regression},
year={2022},
volume={},
number={},
doi={10.1109/TPAMI.2022.3188044}
}
@inproceedings{Liu:2022,
author = {Liu, Bulou and Bai, Bing and Xie, Weibang and Guo, Yiwen and Chen, Hao},
title = {Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations},
booktitle = {ACM SIGKDD Conference on Knowledge Discovery and Data Mining},
date = {2022-08-14/2022-08-18},
address = {Washington DC, USA},
OPTannote = {195/753=26\%}
}
@inproceedings{Jiang:2022:Feder,
author = {Jiang, Yukun and Cao, Xiaoyu and Chen, Hao and Gong, Neil},
title = {Feder: communication-efficient byzantine-robust federated learning},
booktitle = {ICLR Workshop on Socially Responsible Machine Learning (SRML)},
date = {2022-04-29/2022-04-29},
OPTannote = {}
}
@article{Liu:2022:ConcSpectre,
author = {Liu, Yang and Xu, Zisen and Fan, Ming and Hao, Yu and Chen, Kai and Chen, Hao and Cai, Yan and Yang, Zijiang and Liu, Ting},
title = {ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs},
journal = {IEEE Transactions on Reliability},
year = {2022},
pages = {},
volume = {}
}
@inproceedings{Liu:2021:ConcSpectre,
author = {Liu, Yang and Fan, Ming and Liu, Ting and Hao, Yu and Xu, Zisen and Chen, Kai and Chen, Hao and Cai, Yan},
title = {ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs},
booktitle = {IEEE International Conference on Software Quality, Reliability, and Security (QRS)},
date = {2021-12-06/2021-12-10},
addendum = {Best paper award},
OPTannote = {61/243=25.10\%}
}
@article{Chen:2021:Privacy,
author = {Chen, Jiyu and Guo, Yiwen and Zheng, Qianjun and Chen, Hao},
title = {Protect Privacy of Deep Classification Networks by Exploiting Their Generative Power},
journal = {Machine Learning},
year = {2021},
pages = {651-–674},
volume = {110}
}
@inproceedings{Liu:2021:Go,
author = {Liu, Ziheng and Zhu, Shuofei and Qin, Boqin and Chen, Hao and Song Linhai},
title = {Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems},
booktitle = {International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)},
date = {2021-04-19/2021-04-23},
OPTannote = {75/398=18.9\%}
}
@inproceedings{Guo:2020:Linear,
author = {Guo, Yiwen and Li, Qizhang and Chen, Hao},
title = {Backpropagating Linearly Improves Transferability of Adversarial Examples},
booktitle = {Neural Information Processing Systems (NeurIPS)},
date = {2020-12-06/2020-12-12},
OPTannote = {1900/9454=20\%}
}
@inproceedings{Li:2020:NoBox,
author = {Li, Qizhang and Guo, Yiwen and Chen, Hao},
title = {Practical No-box Adversarial Attacks against DNNs},
booktitle = {Neural Information Processing Systems (NeurIPS)},
date = {2020-12-06/2020-12-12},
OPTannote = {1900/9454=20\%}
}
@inproceedings{Chen:2020:Style,
author = {Chen, Haitian and Jiang, Bai and Chen, Hao},
title = {{StyleCAPTCHA}: {CAPTCHA} Based on Style-Transferred Images to Defend against Deep Convolutional Networks},
booktitle = {ACM-IMS Foundations of Data Science Conference (FODS)},
date = {2020-10-18/2020-10-20},
OPTannote = {17/58=29\%}
}
@inproceedings{Rong:2020:Integrity,
author = {Rong, Yuyang and Chen, Peng and Chen, Hao},
title = {Integrity: Finding Integer Errors by Targeted Fuzzing},
booktitle = {International Conference on Security and Privacy in Communication Networks (SecureComm)},
date = {2020-10-21/2020-10-23},
OPTannote = {27/74=36\%}
}
@inproceedings{Li:2020:ILA,
author = {Li, Qizhang and Guo, Yiwen and Chen, Hao},
title = {Yet Another Intermediate-Level Attack},
booktitle = {European Conference on Computer Vision (ECCV)},
date = {2020-08-23/2020-08-28},
}
@article{Han:2020:senDroid,
author = {Han, Weili and Cao, Chang and Chen, Hao and Li, Dong and Fang, Zheran and Xu, Wenyuan and Wang, Xiaoyang},
title = {senDroid: Auditing Sensor Access in {Android} System-Wide},
journal = {IEEE Transactions on Dependable and Secure Computing},
year = {2020},
pages = {407--421},
number = {2},
volume = {17}
}
@inproceedings{Jia:2020:Tracking,
author = {Jia, Yunhan and Lu, Yantao and Shen, Junjie and Chen, Qi Alfred and Chen, Hao and Zhong, Zhenyu and Wei, Tao},
title = {Fooling Detection Alone Is Not Enough: Adversarial Attack Against Multiple Object Tracking},
booktitle = {International Conference on Learning Representations (ICLR)},
date = {2020-04-26/2020-04-30},
address = {Addis Ababa, Ethiopia},
}
@inproceedings{Chen:2020:Transform,
author = {Chen, Jiyu and Wang, David and Chen, Hao},
title = {Explore the Transformation Space for Adversarial Images},
booktitle = {ACM Conference on Data and Application Security and Privacy (CODASPY)},
date = {2020-03-16/2020-03-18},
address = {New Orleans, LA, USA},
OPTannote = {20\%}
}
@inproceedings{Chen:2019:Matryoshka,
author = {Chen, Peng and Liu, Jianzhong and Chen, Hao},
title = {{Matryoshka}: Fuzzing Deeply Nested Branches},
booktitle = {ACM Conference on Computer and Communications Security (CCS)},
date = {2019-11-11/2019-11-15},
address = {London, UK},
optannote = {149/933=16.0\%},
}
@inproceedings{Chen:2019:Informer,
author = {Chen, Jiyu and Huang, Heqing and Chen, Hao},
title = {Informer: Irregular Traffic Detection for Containerized Microservices {RPC} in the Real World},
booktitle = {ACM/IEEE Workshop on Security and Privacy in Edge Computing (Edge S\&P)},
date = {2019-11-07/2019-11-09},
address = {Washington DC, USA},
OPTannote = {}
}
@inproceedings{Yen:2018:Falsified,
author = {Yen, Chia-Cheng and Ghosal, Dipak and Zhang, Michael and Chuah, Chen-Nee and Chen, Hao},
title = {Falsified Data Attack on Backpressure-Based Traffic Signal Control Algorithms},
booktitle = {IEEE Vehicular Networking Conference (VNC)},
date = {2018-12-05/2018-12-07},
address = {Taipei, Taiwan},
optannote = {},
}
@inproceedings{Liu:2018:Sanitization,
author = {Liu, Yongshuai and Chen, Jiyu and Chen, Hao},
title = {Less Is More: Culling the Training Set to Improve Robustness of Deep Neural Networks},
booktitle = {Conference on Decision and Game Theory for Security (GameSec)},
date = {2018-10-29/2018-10-31},
address = {Seattle, WA, USA},
}
@inproceedings{Chen:2018:Angora,
author = {Chen, Peng and Chen, Hao},
title = {{Angora}: Efficient Fuzzing by Principled Search},
booktitle = {IEEE Symposium on Security \& Privacy},
date = {2018-05-21/2018-05-23},
address = {San Francisco, CA, USA},
optannote = {55/549=10.0\%}
}
@inproceedings{Zhang:2018:Library,
author = {Zhang, Yuan and Dai, Jiarun and Zhang, Xiaohan and Huang, Sirong and Yang, Zhemin and Yang, Min and Chen, Hao},
title = {Detecting Third-Party Libraries in {Android} Applications with High Precision and Recall},
booktitle = {IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)},
date = {2018-03-20/2018-03-23},
address = {Campobasso, Italy},
optannote = {39/146=26.7\%}
}
@inproceedings{Meng:2017:MagNet,
author = {Meng, Dongyu and Chen, Hao},
title = {{MagNet}: a Two-Pronged Defense Against Adversarial Examples},
booktitle = {ACM Conference on Computer and Communications Security (CCS)},
date = {2017-10-30/2017-11-03},
address = {Dallas, TX},
optannote = {151/843=17.9\%},
}
@inproceedings{Wu:2017:Browser,
author = {Wu, Yuanyi and Meng, Dongyu and Chen, Hao},
title = {Evaluating Private Modes in Desktop and Mobile Browsers and Their Resistance to Fingerprinting},
booktitle = {IEEE Conference on Communications and Network Security (CNS)},
date = {2017-10-09/2017-10-11},
address = {Las Vegas, NV},
optannote = {41/137=29.9\%}
}
@inproceedings{Vronsky:2017:SurgeScan,
author = {Vronsky, Jonathan and Stevens, Ryan and Chen, Hao},
title = {{SurgeScan}: Enforcing Security Policies on Untrusted Third-Party {Android} Libraries},
booktitle = {The 14th IEEE Conference on Advanced and Trusted Computing (ATC)},
date = {2017-08-04/2017-08-08},
address = {San Francisco, CA},
}
@article{Zhang:2016:FineDroid,
author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao},
title = {Rethinking Permission Enforcement Mechanism on Mobile Systems},
journal = {IEEE Transactions on Information Forensics \& Security},
year = {2016},
pages = {2227--2240},
number = {10},
volume = {11}
}
@inproceedings{Qu:2016:AppShield,
author = {Qu, Zhengyang and Guo, Guanyu and Shao, Zhengyue and Rastogi, Vaibhav and Chen, Yan and Chen, Hao and Hong, Wangjun},
title = {{AppShield}: Enabling Multi-Entity Access Control Cross Platforms for Mobile App Management},
booktitle = {International Conference on Security and
Privacy in Communication Networks (SECURECOMM)},
date = {2016-10-10/2016-10-12},
address = {Guangzhou, China},
optannote = {23.4\%}
}
@inproceedings{Chen:2016:UAV,
author = {Chen, Peng and Chen, Hao},
title = {Security Analysis of Personal Unmanned Aerial Vehicles},
booktitle = {International Conference on Security and
Privacy in Communication Networks (SECURECOMM)},
date = {2016-10-10/2016-10-12},
address = {Guangzhou, China},
optannote = {23.4\%}
}
@inproceedings{Fang:2016:revDroid,
author = {Fang, Zheran and Han, Weili and Li, Dong and Guo, Zeqing and Guo, Danhao and Wang, X. Sean and Qian, Zhiyun and Chen, Hao},
title = {{RevDroid}: Code Analysis of the Side Effects After Dynamic Permission Revocation of {Android} Apps},
booktitle = {ACM Asia Conference on Computer and Communications Security (ASIACCS)},
date = {2016-05-30/2016-06-03},
address = {Xi'an, China},
optannote = {20.9\%}
}
@inproceedings{Stevens:2015:MTOP,
author = {Stevens, Ryan and Crussell, Jonathan and Chen, Hao},
title = {On the Origin of Mobile Apps: Network Provenance for {Android} Applications},
booktitle = {6th ACM Conference on Data and Application Security and Privacy (CODASPY)},
date = {2016-03-09/2016-03-11},
address = {New Orleans, LA},
optannote = {22\%}
}
@inproceedings{Zhang:2015:FineDroid,
author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao},
title = {{FineDroid}: Enforcing Permissions with System-Wide Application},
booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)},
date = {2015-10-26/2015-10-29},
address = {Dallas, TX},
optannote = {30/108}
}
@inproceedings{Stevens:2015:Pred,
author = {Stevens, Ryan and Chen, Hao},
title = {Predictive Eviction: a Novel Policy for Optimizing {TLS} Session Cache Performance},
booktitle = {IEEE Global Communications Conference: Communications and Information System Security (GLOBECOM)},
date = {2015-12-06/2015-12-10},
address = {San Diego, CA},
}
@article{Crussell:2015:AnDarwin,
author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
title = {AnDarwin: Scalable Detection of {Android} Application Clones Based on Semantics},
journal = {IEEE Transactions on Mobile Computing},
year = {2015},
pages = {2007--2019},
number = {10},
volume = {14}
}
@inproceedings{Cai:2015:AppCracker,
author = {Cai, Fangda and Chen, Hao and Wu, Yuanyi and Zhang, Yuan},
title = {{AppCracker}: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps},
booktitle = {IEEE Mobile Security Technologies (MoST)},
date = {2015-05-21},
address = {San Jose, CA},
optannote = {10/33}
}
@inproceedings{Crussell:2014:MAdFraud,
author = {Crussell, Jonathan and Stevens, Ryan and Chen, Hao},
title = {{MAdFraud}: Investigating Ad Fraud in {Android} Applications},
booktitle = {12th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
date = {2014-06-16/2014-06-19},
address = {Bretton Woods, NH, USA},
optannote = {25/185}
}
@inproceedings{Defreez:2014:Firefox,
author = {Defreez, Daniel and Shastry, Bhargava and Chen, Hao and Seifert, Jean-Pierre},
title = {A First Look At Firefox {OS} Security},
booktitle = {IEEE Mobile Security Technologies (MoST)},
date = {2014-05-17},
address = {San Jose, CA},
optannote = {11/30}
}
@inbook{Goues:2013:MTD,
author = {Goues, Claire Le and Nguyen-Tuong, Anh and Chen, Hao and Davidson, Jack W. and Forrest, Stephanie and Hiser, Jason D. and Knight, John C. and Gundy, Matthew Van},
title = {Moving Target Defenses in the {HELIX} Self-Regenerative Architecture},
booktitle = {Moving Target Defense II: Application of Game Theory and Adversarial Modeling},
year = {2013},
pages = {117--149},
editor = {Sushil Jajodia et al.},
optseries = {Advances in Information Security},
optvolume = {100},
publisher = {Springer-Verlag New York}
}
@inproceedings{Posnett:2013:UA,
author = {Posnett, Daryl and Kavaler, David and Gibler, Clint and Chen, Hao and Devanbu, Prem and Filkov, Vladimir},
title = {Using and Asking: {APIs} Used in the {Android} Market and Asked About in {stackoverflow}},
booktitle = {5th International Conference on Social Informatics (SocInfo)},
date = {2013-11-25/2013-11-27},
address = {Kyoto, Japan},
}
@inproceedings{Crussell:2013:AnDarwin,
author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
title = {Scalable Semantics-Based Detection of Similar {Android} Applications},
booktitle = {18th European Symposium on Research in Computer Security (ESORICS)},
date = {2013-09-09/2013-09-13},
address = {Egham, U.K.},
optannote = {43/242}
}
@inproceedings{Gustafson:2013:Permission,
author = {Gustafson, Eric and Kennedy, Kristen and Chen, Hao},
title = {Quantifying the Effects of Removing Permissions from {Android} Applications},
booktitle = {IEEE Mobile Security Technologies (MoST)},
date = {2013-05-23},
address = {San Francisco, CA},
optannote = {9/22},
}
@inproceedings{Stevens:2013:Permission,
author = {Stevens, Ryan and Ganz, Jonathan and Devanbu, Prem and Chen, Hao and Filkov, Vladimir},
title = {Asking for (and About) Permissions Used by {Android} Apps},
booktitle = {10th Working Conference on Mining Software Repositories (MSR)},
date = {2013-05-18/2013-05-19},
address = {San Francisco, CA},
optannote = {31/81}
}
@inproceedings{Davis:2013:Retrofit,
author = {Davis, Benjamin and Chen, Hao},
title = {Retrofitting {Android} Apps},
booktitle = {11th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
date = {2013-06-25/2013-06-28},
address = {Taipei, Taiwan},
optannote = {33/210}
}
@inproceedings{Gibler:2013:UEcon,
author = {Gibler, Clint and Stevens, Ryan and Crussell, Jon and Chen, Hao and Zang, Hui and Choi, Heesook},
title = {Characterizing {Android} Application Plagiarism and Its Impact on Developers},
booktitle = {11th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
date = {2013-06-25/2013-06-28},
address = {Taipei, Taiwan},
optannote = {33/210}
}
@inproceedings{Crussell:2012:DNADroid,
author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
title = {Attack of the Clones: Detecting Cloned Applications on {Android} Markets},
booktitle = {17th European Symposium on Research in Computer Security (ESORICS)},
date = {2012-09-10/2012-09-12},
address = {Pisa, Italy},
optannote = {50/248}
}
@article{VanGundy:2012:Noncespaces,
author = {Gundy, Matthew Van and Chen, Hao},
title = {{Noncespaces}: Using Randomization to Defeat Cross-Site Scripting Attacks},
journal = {Computers \& Security},
year = {2012},
pages = {612–628},
number = {4},
volume = {31}
}
@inproceedings{Gibler:2012:AndroidLeaks,
author = {Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao},
title = {{AndroidLeaks}: Automatically Detecting Potential Privacy Leaks in {Android} Applications on a Large Scale},
booktitle = {5th International Conference on Trust \& Trustworthy Computing (TRUST)},
date = {2012-06-13/2012-06-15},
address = {Vienna, Austria},
}
@inproceedings{Cai:2012:Motion,
author = {Cai, Liang and Chen, Hao},
title = {On the Practicality of Motion Based Keystroke Infernce Attack},
booktitle = {5th International Conference on Trust \& Trustworthy Computing (TRUST)},
date = {2012-06-13/2012-06-15},
address = {Vienna, Austria},
}
@inproceedings{Stevens:2012:Ad,
author = {Stevens, Ryan and Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao},
title = {Investigating User Privacy in {Android} Ad Libraries},
booktitle = {IEEE Mobile Security Technologies (MoST)},
date = {2012-05-24},
address = {San Francisco, CA},
optannote = {11/28},
}
@inproceedings{Davis:2012:IARMDroid,
author = {Davis, Benjamin and Sanders, Ben and Khodaverdian, Armen and Chen, Hao},
title = {{I-ARM-Droid}: a Rewriting Framework for In-App Reference Monitors for {Android} Applications},
booktitle = {IEEE Mobile Security Technologies (MoST)},
date = {2012-05-24},
address = {San Francisco, CA},
optannote = {11/28},
}
@inproceedings{Davis:2012:Alibi,
author = {Davis, Benjamin and Chen, Hao and Franklin, Matthew},
title = {Privacy-Preserving Alibi Systems},
booktitle = {7th ACM Symposium on Information, Computer and Communications Security (ASIACCS)},
date = {2012-05-01/2012-05-03},
address = {Seoul, South Korea},
optannote = {30\%},
}
@inproceedings{Maganis:2012:Opaak,
author = {Maganis, Gabriel and Shi, Elaine and Chen, Hao and Song, Dawn},
title = {{Opaak}: Using Mobile Phones to Limit Anonymous Identities Online},
booktitle = {10th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
date = {2012-06-26/2012-06-28},
address = {Low Wood Bay, Lake District, United Kingdom},
optannote = {32/182=17.6\%}
}
@inproceedings{Cai:2011:TouchLogger,
author = {Cai, Liang and Chen, Hao},
title = {{TouchLogger}: Inferring Keystrokes on Touch Screen from Smartph One Motion},
booktitle = {6th USENIX Workshop on Hot Topics in Security (HotSec 11)},
date = {2011-08-09/2011-08-09},
address = {San Francisco, CA},
optannote = {20\%}
}
@inproceedings{Yuan:2011:Gesture,
author = {Niu, Yuan and Chen, Hao},
title = {Gesture Authentication with Touch Input for Mobile Devices},
booktitle = {3rd International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec)},
date = {2011-05-17/2011-05-19},
address = {Aalborg, Denmark},
}
@inproceedings{Cai:2011:GoodNeighbor,
author = {Cai, Liang and Zeng, Kai and Chen, Hao and Mohapatra, Prasant},
title = {{Good Neighbor}: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas},
booktitle = {Annual Network and Distributed System Security Symposium (NDSS)},
date = {2011-02-06/2011-02-09},
address = {San Diego, CA},
optannote = {20\%},
}
@article{Hsu:2011:WebCallerID,
author = {Hsu, Francis and Chen, Hao and Machiraju, Sridhar},
title = {{WebCallerID}: Leveraging Cellular Networks for {Web} Authentication},
journal = {Journal of Computer Security},
year = {2011},
number = {5},
volume = {19}
}
@inproceedings{Davis:2010:DBTaint,
author = {Davis, Benjamin and Chen, Hao},
title = {{DBTaint}: Cross-Application Information Flow Tracking Via Databases},
booktitle = {USENIX Conference on Web Application},
date = {2010-06-23/2010-06-24},
address = {Boston, MA},
optannote = {50\%}
}
@article{Racic:2010:Scheduling,
author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin},
title = {Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks},
journal = {IEEE Transactions on Mobile Computing},
year = {2010},
pages = {609--620},
issn = {1536-1233},
volume = {9}
}
@inproceedings{Liang:2010:CapAuth,
author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao},
title = {{CapAuth}: a Capability-Based Handover Scheme},
booktitle = {IEEE INFOCOM 2010: The 27th Conference on Computer Communications},
date = {2010-03-15/2010-03-19},
address = {San Diego, CA},
optannote = {(276+106)/1575=24\%}
}
@inproceedings{Hsu:2009:WebFS,
author = {Hsu, Francis and Chen, Hao},
title = {Secure File System Services for {Web} 2.0 Applications},
booktitle = {Proceedings of the The ACM Cloud Computing Security Workshop (CCSW 2009)},
date = {2009-11-13/2009-11-13},
address = {Chicago, IL},
optannote = {11/30=37\%}
}
@inproceedings{Goldberg:2009:mpOTR,
author = {Goldberg, Ian and Ustaoglu, Berkant and Gundy, Matthew Van and Chen, Hao},
title = {Multi-Party Off-the-Record Messaging},
booktitle = {Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS)},
date = {2009-11-09/2009-11-13},
address = {Chicago, IL},
optannote = {58/315=18\%},
}
@inproceedings{Liang:2009:Paging,
author = {Cai, Liang and Maganis, Gabriel and Zang, Hui and Chen, Hao},
title = {Mitigating {DoS} Attacks on the Paging Channel by Efficient Encoding in Page Messages},
booktitle = {Proceedings of the 5th International Conference on
Security and Privacy in Communication Networks (SecureComm)},
date = {2009-09-14/2009-09-18},
address = {Athens, Greece},
optannote = {20/76=26\%}
}
@inproceedings{Ye:2009:Search,
author = {Ye, Shaozhi and Wu, Felix and Pandey, Raju and Chen, Hao},
title = {Noise Injection for Search Privacy Protection},
booktitle = {Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT)},
date = {2009-08-29/2009-08-31},
address = {Vancouver, Canada},
optannote = {16/115=13\%}
}
@inproceedings{Liang:2009:Sensor,
author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao},
title = {Defending Against Sensor-Sniffing Attacks on Mobile Phones},
booktitle = {The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld)},
date = {2009-08-17/2009-08-17},
address = {Barcelona, Spain},
optannote = {10/21=48\%}
}
@inproceedings{Becker:2009:SocialNetworks,
author = {Becker, Justin and Chen, Hao},
title = {Measuring Privacy Risk in Online Social Networks},
booktitle = {Web 2.0 Security and Privacy (W2SP)},
date = {2009-05-21/2009-05-21},
address = {Oakland, CA}
}
@inproceedings{VanGundy:2009:Noncespaces,
author = {Gundy, Matthew Van and Chen, Hao},
title = {{Noncespaces}: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks},
booktitle = {Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS)},
date = {2009-02-08/2009-02-11},
address = {San Diego, CA},
optannote = {20/171=12\%},
}
@article{Misherghi:2008:Firewall,
author = {Misherghi, G and Yuan, Lihua and Su, Zhendong and Chuah, Chen-Nee and Chen, Hao},
title = {A General Framework for Benchmarking Firewall Optimization Techniques},
journal = {IEEE Transactions on Network and Service Management},
year = {2008},
month = dec,
pages = {227--238},
number = {4},
volume = {5}
}
@inproceedings{Crites:2008:OMash,
author = {Crites, Steven and Hsu, Francis and Chen, Hao},
title = {{OMash}: Enabling Secure Web Mashups Via Object Abstractions},
booktitle = {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS)},
date = {2008-10-27/2008-10-31},
address = {Alexandria, VA},
pages = {99--107},
optannote = {51/281=18\%}
}
@inproceedings{Niu:2008:iPhish,
author = {Niu, Yuan and Hsu, Francis and Chen, Hao},
title = {{iPhish}: Phishing Vulnerabilities on Consumer Electronics},
booktitle = {Proceedings of Usability, Psychology, and Security 2008},
date = {2008-04-14/2008-04-14},
address = {San Francisco, CA},
}
@inproceedings{Machiraju:2008:Authentication,
author = {Machiraju, Sridhar and Chen, Hao and Bolot, Jean},
title = {Distributed Authentication for Low-Cost Wireless Networks},
booktitle = {Proceedings of the Ninth Workshop on Mobile Computing Systems and Applications (HotMobile)},
date = {2008-02-25/2008-02-26},
address = {Napa Valley, CA},
pages = {55--59},
optannote = {18/79=23\%}
}
@inproceedings{Racic:2008:PF,
author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin},
title = {Exploiting Opportunistic Scheduling in Cellular Data Networks},
booktitle = {Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS)},
date = {2008-02-10/2008-02-13},
address = {San Diego, CA},
pages = {333--345},
annoate = {21/118=18\%}
}
@inproceedings{VanGundy:2007:FO,
author = {Gundy, Matthew Van and Chen, Hao and Su, Zhendong and Vigna, Giovanni},
title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms},
booktitle = {Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)},
date = {2007-12-10/2007-12-14},
address = {Miami Beach, FL},
pages = {74--83},
optannote = {42/191=22\%}
}
@inproceedings{Wang:2007:WWW,
author = {Wang, Yi-Min and Ma, Ming and Niu, Yuan and Chen, Hao},
title = {Spam Double-Funnel: Connecting Web Spammers with Advertisers},
booktitle = {Proceedings of the 16th International World Wide Web Conference (WWW)},
date = {2007-05-08/2007-05-12},
address = {Banff, Canada},
optannote = {111/755=15\%},
}
@inproceedings{Niu:2007:Spam,
author = {Niu, Yuan and Wang, Yi-Ming and Chen, Hao and Ma, Ming and Hsu, Francis},
title = {A Quantitative Study of Forum Spamming Using Context-Based Analysis},
booktitle = {Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS)},
date = {2007-02-28/2007-03-02},
address = {San Diego, CA},
pages = {79--92},
optannote = {18/118=15\%},
}
@inproceedings{Hsu:2006:BTTF,
author = {Hsu, Francis and Chen, Hao and Ristenpart, Thomas and Li, Jason and Su, Zhendong},
title = {Back to the Future: a Framework for Automatic Malware Removal and System Repair},
booktitle = {Proceedings of 22rd Annual
Computer Security Applications Conference (ACSAC)},
date = {2006-12-11/2006-12-15},
address = {Miami Beach, FL},
optannote = {30\%},
}
@inproceedings{Racic:2006:MMS,
author = {Racic, Radmilo and Ma, Denys and Chen, Hao},
title = {Exploiting {MMS} Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery},
booktitle = {Proceedings of the Second IEEE Communications Society /
CreateNet International Conference on Security and Privacy
in Communication Network (SecureComm)},
date = {2006-08-28/2006-09-01},
address = {Baltimore, MD},
optannote = {32/126=25\%},
}
@inproceedings{Yuan:2006:FIREMAN,
author = {Yuan, Lihua and Chen, Hao and Mai, Jianning and Chuah, Chen-Nee and Su, Zhendong and Mohapatra, Prasant},
title = {{FIREMAN}: a Toolkit for {FIREwall} {Modeling} and {ANalysis}},
booktitle = {Proceedings of 2006 IEEE Symposium on Security and Privacy},
date = {2006-05-21/2006-05-24},
address = {Berkeley, CA},
pages = {199--213},
annoate = {32/251=13\%}
}
@inproceedings{Schwarz:2005:Linux,
author = {Schwarz, Benjamin and Chen, Hao and Morrison, David Wagner and Geoff and West, Jacob and Lin, Jeremy and Tu, Wei},
title = {Model Checking an Entire {Linux} Distribution for Security Violations},
booktitle = {Proceedings of the 2005 Annual Computer Security Applications Conference (ACSAC)},
date = {2005-12-05/2005-12-09},
address = {Tucson, Arizona},
optannote = {23\%},
}
@inproceedings{Chen:2004:EROS,
author = {Chen, Hao and Shapiro, Jonathan},
title = {Using Build-Integrated Static Checking to Preserve Correctness Invariants},
booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS)},
date = {2004-11-25/2004-11-29},
address = {Washington, DC},
pages = {288--297},
optannote = {35/251=14\%}
}
@inproceedings{Chen:2004:million,
author = {Chen, Hao and Dean, Drew and Wagner, David},
title = {Model Checking One Million Lines of {C} Code},
booktitle = {Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS)},
date = {2004-02-04/2004-02-06},
address = {San Diego, CA},
pages = {171--185}
}
@inproceedings{Chen:2002:setuid,
author = {Chen, Hao and Wagner, David and Dean, Drew},
title = {Setuid Demystified},
booktitle = {Proceedings of the 11th {USENIX} Security Symposium},
date = {2002-08-05/2002-08-09},
address = {San Francisco, CA},
pages = {171--190},
optannote = {A close look at setuid and setgid implementations and interactions.}
}
@inproceedings{Chen:2002:MOPS,
author = {Chen, Hao and Wagner, David},
title = {{MOPS}: an Infrastructure for Examining Security Properties of Software},
booktitle = {Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS)},
date = {2002-11-18/2002-11-22},
address = {Washington, DC},
pages = {235--244}
}
@inproceedings{Chen:2001:swish,
author = {Dumais, Susan and Cutrell, Edward and Chen, Hao},
title = {Optimizing Search by Showing Results in Context},
booktitle = {Proceedings of the ACM SIGCHI Conference on Human Factors
in Computing Systems (CHI)},
year = {2001},
month = apr,
address = {Seattle, WA},
pages = {277--284}
}
@inproceedings{Chen:2000:swish,
author = {Chen, Hao and Dumais, Susan},
title = {Bringing Order to the {Web}: Automatically Categorizing Search Results},
booktitle = {Proceedings of the ACM SIGCHI Conference on Human Factors
in Computing Systems (CHI)},
year = {2000},
month = apr,
address = {The Hague, The Netherlands},
pages = {145--152}
}
@inproceedings{Chen:2000:swishcat,
author = {Dumais, Susan and Chen, Hao},
title = {Hierarchical Classification of {Web} Content},
booktitle = {Proceedings of the 23rd ACM SIGIR Conference on
Research and Development in Information Retrieval (SIGIR)},
year = {2000},
month = jul,
address = {Athens, Greece},
pages = {256--263}
}
@inproceedings{Chen:2000:swishcat2,
author = {Dumais, Susan and Cutrell, Edward and Chen, Hao},
title = {Classified Displays of {Web} Search Results},
booktitle = {Proceedings of the 11th ASIST SIG/CR Classification
Research Workshop},
year = {2000},
month = nov,
pages = {87--90}
}
@inproceedings{Chen:2000:textcat,
author = {Chen, Hao and Ho, Tin K.},
title = {Evaluation of Decision Forests on Text Categorization},
booktitle = {Proceedings of the SPIE Conference on Document Recognition
and Retrieval {VII}},
year = {2000},
month = jan,
address = {San Jose, CA},
pages = {191--199},
volume = {3967}
}
@article{Chen:1999:emu,
author = {Chen, Hao and Hu, Jianying and Sproat, Richard},
title = {Integrating Geometrical and Linguistic Analysis for E-mail Signature Block Parsing},
journal = {ACM Transactions on Information Systems},
year = {1999},
month = oct,
pages = {343--366},
number = {4},
volume = {17}
}
@inproceedings{Sproat:1998:emu,
author = {Sproat, Richard and Hu, Jianying and Chen, Hao},
title = {{Emu}: an E-mail Preprocessor for Text-to-speech},
booktitle = {1998 Workshop on Multimedia Signal Processing},
year = {1998},
month = dec,
address = {Redondo Beach, CA},
pages = {239--244},
organization = {{IEEE} Signal Processing Society}
}
@inproceedings{Chen:1998:emu,
author = {Chen, Hao and Hu, Jianying and Sproat, Richard},
title = {E-mail Signature Block Analysis},
booktitle = {Proceedings of the 14th International Conference on
Pattern Recognition (ICPR)},
year = {1998},
month = aug,
address = {Brisbane, Australia},
pages = {1153--1156}
}
@inproceedings{Chen:1997:handwriting,
author = {Chen, Hao and Agazzi, Oscar E. and Suen, Ching Y.},
title = {Piecewise Linear Modulation Model of Handwriting},
booktitle = {Proceedings of the 4th International Conference on
Document Analysis and Recognition (ICDAR)},
year = {1997},
month = aug,
address = {Ulm, Germany},
pages = {363--367}
}