@inproceedings{Li:2023:Attack,
  author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao},
  title = {Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly},
  booktitle = {Neural Information Processing Systems (NeurIPS)},
  date = {2023-12-10/2023-12-16},
  address = {New Orleans, LA, USA},
  OPTannote = {26.1\%}
}
@inproceedings{Li:2023:ILPD,
  author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao},
  title = {Improving Adversarial Transferability via Intermediate-level Perturbation Decay},
  booktitle = {Neural Information Processing Systems (NeurIPS)},
  date = {2023-12-10/2023-12-16},
  address = {New Orleans, LA, USA},
  OPTannote = {26.1\%}
}
@inproceedings{Chen:2023:Hopper,
  author = {Chen, Peng and Xie, Yuxuan and Lyu, Yunlong and Wang, Yuxiao and Chen, Hao},
  title = {HOPPER: Interpretative Fuzzing for Libraries},
  booktitle = {ACM Conference on Computer and Communications Security (CCS)},
  date = {2023-11-26/2023-11-30},
  address = {Copenhagen, Denmark},
  OPTannote = {\%}
}
@inproceedings{Lin:2023:MHCN,
  author = {Lin, Fangfei and Bai, Bing and Guo, Yiwen and Chen, Hao and Ren, Yazhou and Xu, Zenglin},
  title = {MHCN: a Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering},
  booktitle = {International Conference on Computer Vision (ICCV)},
  date = {2023-10-04/2023-10-06},
  address = {Paris, France},
  OPTannote = {\%}
}
@inproceedings{Zhao:2023,
  author = {Zhao, Jianyu and Rong, Yuyang and Guo, Yiwen and He, Yifeng and Chen, Hao},
  title = {Understanding Programs by Exploiting (Fuzzing) Test Cases},
  booktitle = {Findings of the Association for Computational Linguistics (ACL)},
  date = {2023-07-09/2023-07-14},
  address = {Toronto, Canada},
  OPTannote = {\%}
}
@inproceedings{Li:2023:Squeeze,
  author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao},
  title = {Squeeze Training for Adversarial Robustness},
  booktitle = {International Conference on Learning Representations (ICLR)},
  date = {2023-05-01/2023-05-05},
  address = {Kigali, Rwanda},
  OPTannote = {31.8\%}
}
@inproceedings{Li:2023:Bayesian,
  author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao},
  title = {Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples},
  booktitle = {International Conference on Learning Representations (ICLR)},
  date = {2023-05-01/2023-05-05},
  address = {Kigali, Rwanda},
  OPTannote = {31.8\%}
}
@inproceedings{Rong:2022:Valkyrie,
  author = {Rong, Yuyang and Zhang, Chibin and Liu, Jianzhong and Chen, Hao},
  title = {Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques},
  booktitle = {IEEE International Conference on Software Quality, Reliability, and Security (QRS)},
  date = {2022-12-05/2022-12-09},
  address = {Guangzhou, China},
  addendum = {Best paper award},
  OPTannote = {75/273=27\%}
}
@article{Du:2022:AFLIoT,
  title = {AflIot: Fuzzing on Linux-based IoT Device with Binary-Level Instrumentation},
  author = {Du, Xuechao and Chen, Andong and He, Boyuan and Chen, Hao and Zhang, Fan and Chen, Yan},
  journal = {Computers \& Security},
  year = {2022},
  issn = {0167-4048},
  doi = {https://doi.org/10.1016/j.cose.2022.102889},
}
@inproceedings{Chen:2022:MIA,
  author = {Chen, Jiyu and Guo, Yiwen and Chen, Hao and Gong, Neil},
  title = {Membership Inference Attack in Face of Data Transformations},
  booktitle = {IEEE Conference on Communications and Network Security (CNS)},
  date = {2022-10-03/2022-10-05},
  address = {Austin, TX, USA},
  OPTannote = {43/122=35\%}
}
@article{Guo:2022:ILA,
  author={Guo, Yiwen and Li, Qizhang and Zuo, Wangmeng and Chen, Hao},
  journal={IEEE Transactions on Pattern Analysis and Machine Intelligence}, 
  title={An Intermediate-level Attack Framework on The Basis of Linear Regression}, 
  year={2022},
  volume={},
  number={},
  doi={10.1109/TPAMI.2022.3188044}
}
@inproceedings{Liu:2022,
  author = {Liu, Bulou and Bai, Bing and Xie, Weibang and Guo, Yiwen and Chen, Hao},
  title = {Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations},
  booktitle = {ACM SIGKDD Conference on Knowledge Discovery and Data Mining},
  date = {2022-08-14/2022-08-18},
  address = {Washington DC, USA},
  OPTannote = {195/753=26\%}
}
@inproceedings{Jiang:2022:Feder,
  author = {Jiang, Yukun and Cao, Xiaoyu and Chen, Hao and Gong, Neil},
  title = {Feder: communication-efficient byzantine-robust federated learning},
  booktitle = {ICLR Workshop on Socially Responsible Machine Learning (SRML)},
  date = {2022-04-29/2022-04-29},
  OPTannote = {}
}
@article{Liu:2022:ConcSpectre,
  author = {Liu, Yang and Xu, Zisen and Fan, Ming and Hao, Yu and Chen, Kai and Chen, Hao and Cai, Yan and Yang, Zijiang and Liu, Ting},
  title = {ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs},
  journal = {IEEE Transactions on Reliability},
  year = {2022},
  pages = {},
  volume = {}
}
@inproceedings{Liu:2021:ConcSpectre,
  author = {Liu, Yang and Fan, Ming and Liu, Ting and Hao, Yu and Xu, Zisen and Chen, Kai and Chen, Hao and Cai, Yan},
  title = {ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs},
  booktitle = {IEEE International Conference on Software Quality, Reliability, and Security (QRS)},
  date = {2021-12-06/2021-12-10},
  addendum = {Best paper award},
  OPTannote = {61/243=25.10\%}
}
@article{Chen:2021:Privacy,
  author = {Chen, Jiyu and Guo, Yiwen and Zheng, Qianjun and Chen, Hao},
  title = {Protect Privacy of Deep Classification Networks by Exploiting Their Generative Power},
  journal = {Machine Learning},
  year = {2021},
  pages = {651-–674},
  volume = {110}
}
@inproceedings{Liu:2021:Go,
  author = {Liu, Ziheng and Zhu, Shuofei and Qin, Boqin and Chen, Hao and Song Linhai},
  title = {Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems},
  booktitle = {International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)},
  date = {2021-04-19/2021-04-23},
  OPTannote = {75/398=18.9\%}
}
@inproceedings{Guo:2020:Linear,
  author = {Guo, Yiwen and Li, Qizhang and Chen, Hao},
  title = {Backpropagating Linearly Improves Transferability of Adversarial Examples},
  booktitle = {Neural Information Processing Systems (NeurIPS)},
  date = {2020-12-06/2020-12-12},
  OPTannote = {1900/9454=20\%}
}
@inproceedings{Li:2020:NoBox,
  author = {Li, Qizhang and Guo, Yiwen and Chen, Hao},
  title = {Practical No-box Adversarial Attacks against DNNs},
  booktitle = {Neural Information Processing Systems (NeurIPS)},
  date = {2020-12-06/2020-12-12},
  OPTannote = {1900/9454=20\%}
}
@inproceedings{Chen:2020:Style,
  author = {Chen, Haitian and Jiang, Bai and Chen, Hao},
  title = {{StyleCAPTCHA}: {CAPTCHA} Based on Style-Transferred Images to Defend against Deep Convolutional Networks},
  booktitle = {ACM-IMS Foundations of Data Science Conference (FODS)},
  date = {2020-10-18/2020-10-20},
  OPTannote = {17/58=29\%}
}
@inproceedings{Rong:2020:Integrity,
  author = {Rong, Yuyang and Chen, Peng and Chen, Hao},
  title = {Integrity: Finding Integer Errors by Targeted Fuzzing},
  booktitle = {International Conference on Security and Privacy in Communication Networks (SecureComm)},
  date = {2020-10-21/2020-10-23},
  OPTannote = {27/74=36\%}
}
@inproceedings{Li:2020:ILA,
  author = {Li, Qizhang and Guo, Yiwen and Chen, Hao},
  title = {Yet Another Intermediate-Level Attack},
  booktitle = {European Conference on Computer Vision (ECCV)},
  date = {2020-08-23/2020-08-28},
}
@article{Han:2020:senDroid,
  author = {Han, Weili and Cao, Chang and Chen, Hao and Li, Dong and Fang, Zheran and Xu, Wenyuan and Wang, Xiaoyang},
  title = {senDroid: Auditing Sensor Access in {Android} System-Wide},
  journal = {IEEE Transactions on Dependable and Secure Computing},
  year = {2020},
  pages = {407--421},
  number = {2},
  volume = {17}
}
@inproceedings{Jia:2020:Tracking,
  author = 	 {Jia, Yunhan and Lu, Yantao and Shen, Junjie and Chen, Qi Alfred and Chen, Hao and Zhong, Zhenyu and Wei, Tao},
  title = 	 {Fooling Detection Alone Is Not Enough: Adversarial Attack Against Multiple Object Tracking},
  booktitle = {International Conference on Learning Representations (ICLR)},
  date = 	 {2020-04-26/2020-04-30},
  address = 	 {Addis Ababa, Ethiopia},
}
@inproceedings{Chen:2020:Transform,
  author = {Chen, Jiyu and Wang, David and Chen, Hao},
  title = {Explore the Transformation Space for Adversarial Images},
  booktitle = {ACM Conference on Data and Application Security and Privacy (CODASPY)},
  date = {2020-03-16/2020-03-18},
  address = {New Orleans, LA, USA},
  OPTannote = {20\%}
}
@inproceedings{Chen:2019:Matryoshka,
  author = {Chen, Peng and Liu, Jianzhong and Chen, Hao},
  title = {{Matryoshka}: Fuzzing Deeply Nested Branches},
  booktitle = {ACM Conference on Computer and Communications Security (CCS)},
  date = {2019-11-11/2019-11-15},
  address = {London, UK},
  optannote = {149/933=16.0\%},
}
@inproceedings{Chen:2019:Informer,
  author = {Chen, Jiyu and Huang, Heqing and Chen, Hao},
  title = {Informer: Irregular Traffic Detection for Containerized Microservices {RPC} in the Real World},
  booktitle = {ACM/IEEE Workshop on Security and Privacy in Edge Computing (Edge S\&P)},
  date = {2019-11-07/2019-11-09},
  address = {Washington DC, USA},
  OPTannote = {}
}
@inproceedings{Yen:2018:Falsified,
  author = {Yen, Chia-Cheng and Ghosal, Dipak and Zhang, Michael and Chuah, Chen-Nee and Chen, Hao},
  title = {Falsified Data Attack on Backpressure-Based Traffic Signal Control Algorithms},
  booktitle = {IEEE Vehicular Networking Conference (VNC)},
  date = {2018-12-05/2018-12-07},
  address = {Taipei, Taiwan},
  optannote = {},
}
@inproceedings{Liu:2018:Sanitization,
  author = 	 {Liu, Yongshuai and Chen, Jiyu and Chen, Hao},
  title = 	 {Less Is More: Culling the Training Set to Improve Robustness of Deep Neural Networks},
  booktitle = {Conference on Decision and Game Theory for Security (GameSec)},
  date = {2018-10-29/2018-10-31},
  address = 	 {Seattle, WA, USA},
}
@inproceedings{Chen:2018:Angora,
  author = {Chen, Peng and Chen, Hao},
  title = {{Angora}: Efficient Fuzzing by Principled Search},
  booktitle = {IEEE Symposium on Security \& Privacy},
  date = {2018-05-21/2018-05-23},
  address = {San Francisco, CA, USA},
  optannote = {55/549=10.0\%}
}
@inproceedings{Zhang:2018:Library,
  author = {Zhang, Yuan and Dai, Jiarun and Zhang, Xiaohan and Huang, Sirong and Yang, Zhemin and Yang, Min and Chen, Hao},
  title = {Detecting Third-Party Libraries in {Android} Applications with High Precision and Recall},
  booktitle = {IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)},
  date = {2018-03-20/2018-03-23},
  address = {Campobasso, Italy},
  optannote = {39/146=26.7\%}
}
@inproceedings{Meng:2017:MagNet,
  author = {Meng, Dongyu and Chen, Hao},
  title = {{MagNet}: a Two-Pronged Defense Against Adversarial Examples},
  booktitle = {ACM Conference on Computer and Communications Security (CCS)},
  date = {2017-10-30/2017-11-03},
  address = {Dallas, TX},
  optannote = {151/843=17.9\%},
}
@inproceedings{Wu:2017:Browser,
  author = {Wu, Yuanyi and Meng, Dongyu and Chen, Hao},
  title = {Evaluating Private Modes in Desktop and Mobile Browsers and Their Resistance to Fingerprinting},
  booktitle = {IEEE Conference on Communications and Network Security (CNS)},
  date = {2017-10-09/2017-10-11},
  address = {Las Vegas, NV},
  optannote = {41/137=29.9\%}
}
@inproceedings{Vronsky:2017:SurgeScan,
  author = {Vronsky, Jonathan and Stevens, Ryan and Chen, Hao},
  title = {{SurgeScan}: Enforcing Security Policies on Untrusted Third-Party {Android} Libraries},
  booktitle = {The 14th IEEE Conference on Advanced and Trusted Computing (ATC)},
  date = {2017-08-04/2017-08-08},
  address = {San Francisco, CA},
}
@article{Zhang:2016:FineDroid,
  author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao},
  title = {Rethinking Permission Enforcement Mechanism on Mobile Systems},
  journal = {IEEE Transactions on Information Forensics \& Security},
  year = {2016},
  pages = {2227--2240},
  number = {10},
  volume = {11}
}
@inproceedings{Qu:2016:AppShield,
  author = {Qu, Zhengyang and Guo, Guanyu and Shao, Zhengyue and Rastogi, Vaibhav and Chen, Yan and Chen, Hao and Hong, Wangjun},
  title = {{AppShield}: Enabling Multi-Entity Access Control Cross Platforms for Mobile App Management},
  booktitle = {International Conference on Security and
Privacy in Communication Networks (SECURECOMM)},
  date = {2016-10-10/2016-10-12},
  address = {Guangzhou, China},
  optannote = {23.4\%}
}
@inproceedings{Chen:2016:UAV,
  author = {Chen, Peng and Chen, Hao},
  title = {Security Analysis of Personal Unmanned Aerial Vehicles},
  booktitle = {International Conference on Security and
Privacy in Communication Networks (SECURECOMM)},
  date = {2016-10-10/2016-10-12},
  address = {Guangzhou, China},
  optannote = {23.4\%}
}
@inproceedings{Fang:2016:revDroid,
  author = {Fang, Zheran and Han, Weili and Li, Dong and Guo, Zeqing and Guo, Danhao and Wang, X. Sean and Qian, Zhiyun and Chen, Hao},
  title = {{RevDroid}: Code Analysis of the Side Effects After Dynamic Permission Revocation of {Android} Apps},
  booktitle = {ACM Asia Conference on Computer and Communications Security  (ASIACCS)},
  date = {2016-05-30/2016-06-03},
  address = {Xi'an, China},
  optannote = {20.9\%}
}
@inproceedings{Stevens:2015:MTOP,
  author = {Stevens, Ryan and Crussell, Jonathan and Chen, Hao},
  title = {On the Origin of Mobile Apps: Network Provenance for {Android} Applications},
  booktitle = {6th ACM Conference on Data and Application Security and Privacy (CODASPY)},
  date = {2016-03-09/2016-03-11},
  address = {New Orleans, LA},
  optannote = {22\%}
}
@inproceedings{Zhang:2015:FineDroid,
  author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao},
  title = {{FineDroid}: Enforcing Permissions with System-Wide Application},
  booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)},
  date = {2015-10-26/2015-10-29},
  address = {Dallas, TX},
  optannote = {30/108}
}
@inproceedings{Stevens:2015:Pred,
  author = {Stevens, Ryan and Chen, Hao},
  title = {Predictive Eviction: a Novel Policy for Optimizing {TLS} Session Cache Performance},
  booktitle = {IEEE Global Communications Conference: Communications and Information System Security (GLOBECOM)},
  date = {2015-12-06/2015-12-10},
  address = {San Diego, CA},
}
@article{Crussell:2015:AnDarwin,
  author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
  title = {AnDarwin: Scalable Detection of {Android} Application Clones Based on Semantics},
  journal = {IEEE Transactions on Mobile Computing},
  year = {2015},
  pages = {2007--2019},
  number = {10},
  volume = {14}
}
@inproceedings{Cai:2015:AppCracker,
  author = {Cai, Fangda and Chen, Hao and Wu, Yuanyi and Zhang, Yuan},
  title = {{AppCracker}: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2015-05-21},
  address = {San Jose, CA},
  optannote = {10/33}
}
@inproceedings{Crussell:2014:MAdFraud,
  author = {Crussell, Jonathan and Stevens, Ryan and Chen, Hao},
  title = {{MAdFraud}: Investigating Ad Fraud in {Android} Applications},
  booktitle = {12th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
  date = {2014-06-16/2014-06-19},
  address = {Bretton Woods, NH, USA},
  optannote = {25/185}
}
@inproceedings{Defreez:2014:Firefox,
  author = {Defreez, Daniel and Shastry, Bhargava and Chen, Hao and Seifert, Jean-Pierre},
  title = {A First Look At Firefox {OS} Security},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2014-05-17},
  address = {San Jose, CA},
  optannote = {11/30}
}
@inbook{Goues:2013:MTD,
  author = {Goues, Claire Le and Nguyen-Tuong, Anh and Chen, Hao and Davidson, Jack W. and Forrest, Stephanie and Hiser, Jason D. and Knight, John C. and Gundy, Matthew Van},
  title = {Moving Target Defenses in the {HELIX} Self-Regenerative Architecture},
  booktitle = {Moving Target Defense II: Application of Game Theory and Adversarial Modeling},
  year = {2013},
  pages = {117--149},
  editor = {Sushil Jajodia et al.},
  optseries = {Advances in Information Security},
  optvolume = {100},
  publisher = {Springer-Verlag New York}
}
@inproceedings{Posnett:2013:UA,
  author = {Posnett, Daryl and Kavaler, David and Gibler, Clint and Chen, Hao and Devanbu, Prem and Filkov, Vladimir},
  title = {Using and Asking: {APIs} Used in the {Android} Market and Asked About in {stackoverflow}},
  booktitle = {5th International Conference on Social Informatics (SocInfo)},
  date = {2013-11-25/2013-11-27},
  address = {Kyoto, Japan},
}
@inproceedings{Crussell:2013:AnDarwin,
  author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
  title = {Scalable Semantics-Based Detection of Similar {Android} Applications},
  booktitle = {18th European Symposium on Research in Computer Security (ESORICS)},
  date = {2013-09-09/2013-09-13},
  address = {Egham, U.K.},
  optannote = {43/242}
}
@inproceedings{Gustafson:2013:Permission,
  author = {Gustafson, Eric and Kennedy, Kristen and Chen, Hao},
  title = {Quantifying the Effects of Removing Permissions from {Android} Applications},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2013-05-23},
  address = {San Francisco, CA},
  optannote = {9/22},
}
@inproceedings{Stevens:2013:Permission,
  author = {Stevens, Ryan and Ganz, Jonathan and Devanbu, Prem and Chen, Hao and Filkov, Vladimir},
  title = {Asking for (and About) Permissions Used by {Android} Apps},
  booktitle = {10th Working Conference on Mining Software Repositories (MSR)},
  date = {2013-05-18/2013-05-19},
  address = {San Francisco, CA},
  optannote = {31/81}
}
@inproceedings{Davis:2013:Retrofit,
  author = {Davis, Benjamin and Chen, Hao},
  title = {Retrofitting {Android} Apps},
  booktitle = {11th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
  date = {2013-06-25/2013-06-28},
  address = {Taipei, Taiwan},
  optannote = {33/210}
}
@inproceedings{Gibler:2013:UEcon,
  author = {Gibler, Clint and Stevens, Ryan and Crussell, Jon and Chen, Hao and Zang, Hui and Choi, Heesook},
  title = {Characterizing {Android} Application Plagiarism and Its Impact on Developers},
  booktitle = {11th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
  date = {2013-06-25/2013-06-28},
  address = {Taipei, Taiwan},
  optannote = {33/210}
}
@inproceedings{Crussell:2012:DNADroid,
  author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
  title = {Attack of the Clones: Detecting Cloned Applications on {Android} Markets},
  booktitle = {17th European Symposium on Research in Computer Security (ESORICS)},
  date = {2012-09-10/2012-09-12},
  address = {Pisa, Italy},
  optannote = {50/248}
}
@article{VanGundy:2012:Noncespaces,
  author = {Gundy, Matthew Van and Chen, Hao},
  title = {{Noncespaces}: Using Randomization to Defeat Cross-Site Scripting Attacks},
  journal = {Computers \& Security},
  year = {2012},
  pages = {612–628},
  number = {4},
  volume = {31}
}
@inproceedings{Gibler:2012:AndroidLeaks,
  author = {Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao},
  title = {{AndroidLeaks}: Automatically Detecting Potential Privacy Leaks in {Android} Applications on a Large Scale},
  booktitle = {5th International Conference on Trust \& Trustworthy Computing (TRUST)},
  date = {2012-06-13/2012-06-15},
  address = {Vienna, Austria},
}
@inproceedings{Cai:2012:Motion,
  author = {Cai, Liang and Chen, Hao},
  title = {On the Practicality of Motion Based Keystroke Infernce Attack},
  booktitle = {5th International Conference on Trust \& Trustworthy Computing (TRUST)},
  date = {2012-06-13/2012-06-15},
  address = {Vienna, Austria},
}
@inproceedings{Stevens:2012:Ad,
  author = {Stevens, Ryan and Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao},
  title = {Investigating User Privacy in {Android} Ad Libraries},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2012-05-24},
  address = {San Francisco, CA},
  optannote = {11/28},
}
@inproceedings{Davis:2012:IARMDroid,
  author = {Davis, Benjamin and Sanders, Ben and Khodaverdian, Armen and Chen, Hao},
  title = {{I-ARM-Droid}: a Rewriting Framework for In-App Reference Monitors for {Android} Applications},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2012-05-24},
  address = {San Francisco, CA},
  optannote = {11/28},
}
@inproceedings{Davis:2012:Alibi,
  author = {Davis, Benjamin and Chen, Hao and Franklin, Matthew},
  title = {Privacy-Preserving Alibi Systems},
  booktitle = {7th ACM Symposium on Information, Computer and Communications Security (ASIACCS)},
  date = {2012-05-01/2012-05-03},
  address = {Seoul, South Korea},
  optannote = {30\%},
}
@inproceedings{Maganis:2012:Opaak,
  author = {Maganis, Gabriel and Shi, Elaine and Chen, Hao and Song, Dawn},
  title = {{Opaak}: Using Mobile Phones to Limit Anonymous Identities Online},
  booktitle = {10th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
  date = {2012-06-26/2012-06-28},
  address = {Low Wood Bay, Lake District, United Kingdom},
  optannote = {32/182=17.6\%}
}
@inproceedings{Cai:2011:TouchLogger,
  author = {Cai, Liang and Chen, Hao},
  title = {{TouchLogger}: Inferring Keystrokes on Touch Screen from Smartph One Motion},
  booktitle = {6th USENIX Workshop on Hot Topics in Security (HotSec 11)},
  date = {2011-08-09/2011-08-09},
  address = {San Francisco, CA},
  optannote = {20\%}
}
@inproceedings{Yuan:2011:Gesture,
  author = {Niu, Yuan and Chen, Hao},
  title = {Gesture Authentication with Touch Input for Mobile Devices},
  booktitle = {3rd International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec)},
  date = {2011-05-17/2011-05-19},
  address = {Aalborg, Denmark},
}
@inproceedings{Cai:2011:GoodNeighbor,
  author = {Cai, Liang and Zeng, Kai and Chen, Hao and Mohapatra, Prasant},
  title = {{Good Neighbor}: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas},
  booktitle = {Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2011-02-06/2011-02-09},
  address = {San Diego, CA},
  optannote = {20\%},
}
@article{Hsu:2011:WebCallerID,
  author = {Hsu, Francis and Chen, Hao and Machiraju, Sridhar},
  title = {{WebCallerID}: Leveraging Cellular Networks for {Web} Authentication},
  journal = {Journal of Computer Security},
  year = {2011},
  number = {5},
  volume = {19}
}
@inproceedings{Davis:2010:DBTaint,
  author = {Davis, Benjamin and Chen, Hao},
  title = {{DBTaint}: Cross-Application Information Flow Tracking Via Databases},
  booktitle = {USENIX Conference on Web Application},
  date = {2010-06-23/2010-06-24},
  address = {Boston, MA},
  optannote = {50\%}
}
@article{Racic:2010:Scheduling,
  author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin},
  title = {Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks},
  journal = {IEEE Transactions on Mobile Computing},
  year = {2010},
  pages = {609--620},
  issn = {1536-1233},
  volume = {9}
}
@inproceedings{Liang:2010:CapAuth,
  author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao},
  title = {{CapAuth}: a Capability-Based Handover Scheme},
  booktitle = {IEEE INFOCOM 2010: The 27th Conference on Computer Communications},
  date = {2010-03-15/2010-03-19},
  address = {San Diego, CA},
  optannote = {(276+106)/1575=24\%}
}
@inproceedings{Hsu:2009:WebFS,
  author = {Hsu, Francis and Chen, Hao},
  title = {Secure File System Services for {Web} 2.0 Applications},
  booktitle = {Proceedings of the The ACM Cloud Computing Security Workshop (CCSW 2009)},
  date = {2009-11-13/2009-11-13},
  address = {Chicago, IL},
  optannote = {11/30=37\%}
}
@inproceedings{Goldberg:2009:mpOTR,
  author = {Goldberg, Ian and Ustaoglu, Berkant and Gundy, Matthew Van and Chen, Hao},
  title = {Multi-Party Off-the-Record Messaging},
  booktitle = {Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS)},
  date = {2009-11-09/2009-11-13},
  address = {Chicago, IL},
  optannote = {58/315=18\%},
}
@inproceedings{Liang:2009:Paging,
  author = {Cai, Liang and Maganis, Gabriel and Zang, Hui and Chen, Hao},
  title = {Mitigating {DoS} Attacks on the Paging Channel by Efficient Encoding in Page Messages},
  booktitle = {Proceedings of the 5th International Conference on
Security and Privacy in Communication Networks (SecureComm)},
  date = {2009-09-14/2009-09-18},
  address = {Athens, Greece},
  optannote = {20/76=26\%}
}
@inproceedings{Ye:2009:Search,
  author = {Ye, Shaozhi and Wu, Felix and Pandey, Raju and Chen, Hao},
  title = {Noise Injection for Search Privacy Protection},
  booktitle = {Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT)},
  date = {2009-08-29/2009-08-31},
  address = {Vancouver, Canada},
  optannote = {16/115=13\%}
}
@inproceedings{Liang:2009:Sensor,
  author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao},
  title = {Defending Against Sensor-Sniffing Attacks on Mobile Phones},
  booktitle = {The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld)},
  date = {2009-08-17/2009-08-17},
  address = {Barcelona, Spain},
  optannote = {10/21=48\%}
}
@inproceedings{Becker:2009:SocialNetworks,
  author = {Becker, Justin and Chen, Hao},
  title = {Measuring Privacy Risk in Online Social Networks},
  booktitle = {Web 2.0 Security and Privacy (W2SP)},
  date = {2009-05-21/2009-05-21},
  address = {Oakland, CA}
}
@inproceedings{VanGundy:2009:Noncespaces,
  author = {Gundy, Matthew Van and Chen, Hao},
  title = {{Noncespaces}: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks},
  booktitle = {Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2009-02-08/2009-02-11},
  address = {San Diego, CA},
  optannote = {20/171=12\%},
}
@article{Misherghi:2008:Firewall,
  author = {Misherghi, G and Yuan, Lihua and Su, Zhendong and Chuah, Chen-Nee and Chen, Hao},
  title = {A General Framework for Benchmarking Firewall Optimization Techniques},
  journal = {IEEE Transactions on Network and Service Management},
  year = {2008},
  month = dec,
  pages = {227--238},
  number = {4},
  volume = {5}
}
@inproceedings{Crites:2008:OMash,
  author = {Crites, Steven and Hsu, Francis and Chen, Hao},
  title = {{OMash}: Enabling Secure Web Mashups Via Object Abstractions},
  booktitle = {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS)},
  date = {2008-10-27/2008-10-31},
  address = {Alexandria, VA},
  pages = {99--107},
  optannote = {51/281=18\%}
}
@inproceedings{Niu:2008:iPhish,
  author = {Niu, Yuan and Hsu, Francis and Chen, Hao},
  title = {{iPhish}: Phishing Vulnerabilities on Consumer Electronics},
  booktitle = {Proceedings of Usability, Psychology, and Security 2008},
  date = {2008-04-14/2008-04-14},
  address = {San Francisco, CA},
}
@inproceedings{Machiraju:2008:Authentication,
  author = {Machiraju, Sridhar and Chen, Hao and Bolot, Jean},
  title = {Distributed Authentication for Low-Cost Wireless Networks},
  booktitle = {Proceedings of the Ninth Workshop on Mobile Computing Systems and Applications (HotMobile)},
  date = {2008-02-25/2008-02-26},
  address = {Napa Valley, CA},
  pages = {55--59},
  optannote = {18/79=23\%}
}
@inproceedings{Racic:2008:PF,
  author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin},
  title = {Exploiting Opportunistic Scheduling in Cellular Data Networks},
  booktitle = {Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2008-02-10/2008-02-13},
  address = {San Diego, CA},
  pages = {333--345},
  annoate = {21/118=18\%}
}
@inproceedings{VanGundy:2007:FO,
  author = {Gundy, Matthew Van and Chen, Hao and Su, Zhendong and Vigna, Giovanni},
  title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms},
  booktitle = {Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)},
  date = {2007-12-10/2007-12-14},
  address = {Miami Beach, FL},
  pages = {74--83},
  optannote = {42/191=22\%}
}
@inproceedings{Wang:2007:WWW,
  author = {Wang, Yi-Min and Ma, Ming and Niu, Yuan and Chen, Hao},
  title = {Spam Double-Funnel: Connecting Web Spammers with Advertisers},
  booktitle = {Proceedings of the 16th International World Wide Web Conference (WWW)},
  date = {2007-05-08/2007-05-12},
  address = {Banff, Canada},
  optannote = {111/755=15\%},
}
@inproceedings{Niu:2007:Spam,
  author = {Niu, Yuan and Wang, Yi-Ming and Chen, Hao and Ma, Ming and Hsu, Francis},
  title = {A Quantitative Study of Forum Spamming Using Context-Based Analysis},
  booktitle = {Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2007-02-28/2007-03-02},
  address = {San Diego, CA},
  pages = {79--92},
  optannote = {18/118=15\%},
}
@inproceedings{Hsu:2006:BTTF,
  author = {Hsu, Francis and Chen, Hao and Ristenpart, Thomas and Li, Jason and Su, Zhendong},
  title = {Back to the Future: a Framework for Automatic Malware Removal and System Repair},
  booktitle = {Proceedings of 22rd Annual
Computer Security Applications Conference (ACSAC)},
  date = {2006-12-11/2006-12-15},
  address = {Miami Beach, FL},
  optannote = {30\%},
}
@inproceedings{Racic:2006:MMS,
  author = {Racic, Radmilo and Ma, Denys and Chen, Hao},
  title = {Exploiting {MMS} Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery},
  booktitle = {Proceedings of the Second IEEE Communications Society / 
CreateNet International Conference on Security and Privacy 
in Communication Network (SecureComm)},
  date = {2006-08-28/2006-09-01},
  address = {Baltimore, MD},
  optannote = {32/126=25\%},
}
@inproceedings{Yuan:2006:FIREMAN,
  author = {Yuan, Lihua and Chen, Hao and Mai, Jianning and Chuah, Chen-Nee  and Su, Zhendong and Mohapatra, Prasant},
  title = {{FIREMAN}: a Toolkit for {FIREwall} {Modeling} and {ANalysis}},
  booktitle = {Proceedings of 2006 IEEE Symposium on Security and Privacy},
  date = {2006-05-21/2006-05-24},
  address = {Berkeley, CA},
  pages = {199--213},
  annoate = {32/251=13\%}
}
@inproceedings{Schwarz:2005:Linux,
  author = {Schwarz, Benjamin and Chen, Hao and Morrison, David Wagner and Geoff and West, Jacob and Lin, Jeremy and Tu, Wei},
  title = {Model Checking an Entire {Linux} Distribution for Security Violations},
  booktitle = {Proceedings of the 2005 Annual Computer Security Applications Conference (ACSAC)},
  date = {2005-12-05/2005-12-09},
  address = {Tucson, Arizona},
  optannote = {23\%},
}
@inproceedings{Chen:2004:EROS,
  author = {Chen, Hao and Shapiro, Jonathan},
  title = {Using Build-Integrated Static Checking to Preserve Correctness Invariants},
  booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS)},
  date = {2004-11-25/2004-11-29},
  address = {Washington, DC},
  pages = {288--297},
  optannote = {35/251=14\%}
}
@inproceedings{Chen:2004:million,
  author = {Chen, Hao and Dean, Drew and Wagner, David},
  title = {Model Checking One Million Lines of {C} Code},
  booktitle = {Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2004-02-04/2004-02-06},
  address = {San Diego, CA},
  pages = {171--185}
}
@inproceedings{Chen:2002:setuid,
  author = {Chen, Hao and Wagner, David and Dean, Drew},
  title = {Setuid Demystified},
  booktitle = {Proceedings of the 11th {USENIX} Security Symposium},
  date = {2002-08-05/2002-08-09},
  address = {San Francisco, CA},
  pages = {171--190},
  optannote = {A close look at setuid and setgid implementations and interactions.}
}
@inproceedings{Chen:2002:MOPS,
  author = {Chen, Hao and Wagner, David},
  title = {{MOPS}: an Infrastructure for Examining Security Properties of Software},
  booktitle = {Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS)},
  date = {2002-11-18/2002-11-22},
  address = {Washington, DC},
  pages = {235--244}
}
@inproceedings{Chen:2001:swish,
  author = {Dumais, Susan and Cutrell, Edward and Chen, Hao},
  title = {Optimizing Search by Showing Results in Context},
  booktitle = {Proceedings of the ACM SIGCHI Conference on Human Factors 
in Computing Systems (CHI)},
  year = {2001},
  month = apr,
  address = {Seattle, WA},
  pages = {277--284}
}
@inproceedings{Chen:2000:swish,
  author = {Chen, Hao and Dumais, Susan},
  title = {Bringing Order to the {Web}: Automatically Categorizing Search Results},
  booktitle = {Proceedings of the ACM SIGCHI Conference on Human Factors 
in Computing Systems (CHI)},
  year = {2000},
  month = apr,
  address = {The Hague, The Netherlands},
  pages = {145--152}
}
@inproceedings{Chen:2000:swishcat,
  author = {Dumais, Susan and Chen, Hao},
  title = {Hierarchical Classification of {Web} Content},
  booktitle = {Proceedings of the 23rd ACM SIGIR Conference on 
Research and Development in Information Retrieval (SIGIR)},
  year = {2000},
  month = jul,
  address = {Athens, Greece},
  pages = {256--263}
}
@inproceedings{Chen:2000:swishcat2,
  author = {Dumais, Susan and Cutrell, Edward and Chen, Hao},
  title = {Classified Displays of {Web} Search Results},
  booktitle = {Proceedings of the 11th ASIST SIG/CR Classification 
Research Workshop},
  year = {2000},
  month = nov,
  pages = {87--90}
}
@inproceedings{Chen:2000:textcat,
  author = {Chen, Hao and Ho, Tin K.},
  title = {Evaluation of Decision Forests on Text Categorization},
  booktitle = {Proceedings of the SPIE Conference on Document Recognition
and Retrieval {VII}},
  year = {2000},
  month = jan,
  address = {San Jose, CA},
  pages = {191--199},
  volume = {3967}
}
@article{Chen:1999:emu,
  author = {Chen, Hao and Hu, Jianying and Sproat, Richard},
  title = {Integrating Geometrical and Linguistic Analysis for E-mail Signature Block Parsing},
  journal = {ACM Transactions on Information Systems},
  year = {1999},
  month = oct,
  pages = {343--366},
  number = {4},
  volume = {17}
}
@inproceedings{Sproat:1998:emu,
  author = {Sproat, Richard and Hu, Jianying and Chen, Hao},
  title = {{Emu}: an E-mail Preprocessor for Text-to-speech},
  booktitle = {1998 Workshop on Multimedia Signal Processing},
  year = {1998},
  month = dec,
  address = {Redondo Beach, CA},
  pages = {239--244},
  organization = {{IEEE} Signal Processing Society}
}
@inproceedings{Chen:1998:emu,
  author = {Chen, Hao and Hu, Jianying and Sproat, Richard},
  title = {E-mail Signature Block Analysis},
  booktitle = {Proceedings of the 14th International Conference on 
Pattern Recognition (ICPR)},
  year = {1998},
  month = aug,
  address = {Brisbane, Australia},
  pages = {1153--1156}
}
@inproceedings{Chen:1997:handwriting,
  author = {Chen, Hao and Agazzi, Oscar E. and Suen, Ching Y.},
  title = {Piecewise Linear Modulation Model of Handwriting},
  booktitle = {Proceedings of the 4th International Conference on 
Document Analysis and Recognition (ICDAR)},
  year = {1997},
  month = aug,
  address = {Ulm, Germany},
  pages = {363--367}
}