Kai Chen
제목
인용
인용
연도
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
3272014
Multi-key privacy-preserving deep learning in cloud computing
P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen
Future Generation Computer Systems 74, 76-85, 2017
3132017
Privacy-preserving outsourced classification in cloud computing
P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen
Cluster Computing 21 (1), 277-286, 2018
2622018
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
2312015
Android malware familial classification and representative sample selection via frequent subgraph analysis
M Fan, J Liu, X Luo, K Chen, Z Tian, Q Zheng, T Liu
IEEE Transactions on Information Forensics and Security 13 (8), 1890-1905, 2018
1282018
Understanding membership inferences on well-generalized learning models
Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ...
arXiv preprint arXiv:1802.04889, 2018
1272018
Commandersong: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 49-64, 2018
1272018
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017
1062017
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
962016
Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice …
X Yuan
arXiv preprint arXiv:1801.08535, 2018
832018
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
International conference on security and privacy in communication systems …, 2018
782018
Deeprefiner: Multi-layer android malware detection system applying deep neural networks
K Xu, Y Li, RH Deng, K Chen
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 473-487, 2018
762018
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
682017
From system services freezing to system server shutdown in android: All you need is a loop in an app
H Huang, S Zhu, K Chen, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
662015
Characterizing smartwatch usage in the wild
X Liu, T Chen, F Qian, Z Guo, FX Lin, X Wang, K Chen
Proceedings of the 15th annual international conference on mobile systems …, 2017
652017
Hare hunting in the wild android: A study on the threat of hanging attribute references
Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
582015
Droidmarking: resilient software watermarking for impeding android application repackaging
C Ren, K Chen, P Liu
Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014
572014
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
542019
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
522017
Frequent subgraph based familial classification of android malware
M Fan, J Liu, X Luo, K Chen, T Chen, Z Tian, X Zhang, Q Zheng, T Liu
2016 IEEE 27th International Symposium on Software Reliability Engineering …, 2016
522016
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20