Kai Chen
Titel
Citeras av
Citeras av
År
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
2462014
Multi-key privacy-preserving deep learning in cloud computing
P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen
Future Generation Computer Systems 74, 76-85, 2017
2382017
Privacy-preserving outsourced classification in cloud computing
P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen
Cluster Computing 21 (1), 277-286, 2018
2022018
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
1812015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
762016
Android malware familial classification and representative sample selection via frequent subgraph analysis
M Fan, J Liu, X Luo, K Chen, Z Tian, Q Zheng, T Liu
IEEE Transactions on Information Forensics and Security 13 (8), 1890-1905, 2018
692018
Understanding membership inferences on well-generalized learning models
Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ...
arXiv preprint arXiv:1802.04889, 2018
682018
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017
662017
Commandersong: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 49-64, 2018
652018
From system services freezing to system server shutdown in android: All you need is a loop in an app
H Huang, S Zhu, K Chen, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
542015
Droidmarking: resilient software watermarking for impeding android application repackaging
C Ren, K Chen, P Liu
Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014
492014
Hare hunting in the wild android: A study on the threat of hanging attribute references
Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
482015
Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice …
X Yuan
arXiv preprint arXiv:1801.08535, 2018
442018
Characterizing smartwatch usage in the wild
X Liu, T Chen, F Qian, Z Guo, FX Lin, X Wang, K Chen
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
432017
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
372017
Deeprefiner: Multi-layer android malware detection system applying deep neural networks
K Xu, Y Li, RH Deng, K Chen
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 473-487, 2018
362018
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
352017
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~ X and iOS
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
342015
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~ X and iOS
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
342015
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~ X and iOS
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
342015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20