Seguir
Kai Chen
Título
Citado por
Citado por
Año
Multi-key privacy-preserving deep learning in cloud computing
P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen
Future Generation Computer Systems 74, 76-85, 2017
4882017
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
3782014
Privacy-preserving outsourced classification in cloud computing
P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen
Cluster Computing 21, 277-286, 2018
3612018
Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
2792015
{CommanderSong}: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64, 2018
2732018
Understanding membership inferences on well-generalized learning models
Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ...
arXiv preprint arXiv:1802.04889, 2018
2632018
Android malware familial classification and representative sample selection via frequent subgraph analysis
M Fan, J Liu, X Luo, K Chen, Z Tian, Q Zheng, T Liu
IEEE Transactions on Information Forensics and Security 13 (8), 1890-1905, 2018
2362018
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1732019
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017
1692017
Deeprefiner: Multi-layer android malware detection system applying deep neural networks
K Xu, Y Li, RH Deng, K Chen
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 473-487, 2018
1672018
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
1502018
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
1422020
Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice …
X Yuan
27th {USENIX} Security Symposium ({USENIX} Security 18), 49-64, 2018
1402018
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1362017
Droidevolver: Self-evolving android malware detection system
K Xu, Y Li, R Deng, K Chen, J Xu
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 47-62, 2019
1342019
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1342016
{FuzzGuard}: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning
P Zong, T Lv, D Wang, Z Deng, R Liang, K Chen
29th USENIX security symposium (USENIX security 20), 2255-2269, 2020
1242020
Towards security threats of deep learning systems: A survey
Y He, G Meng, K Chen, X Hu, J He
IEEE Transactions on Software Engineering 48 (5), 1743-1770, 2020
112*2020
A cyber security data triage operation retrieval system
C Zhong, T Lin, P Liu, J Yen, K Chen
Computers & Security 76, 12-31, 2018
822018
Characterizing smartwatch usage in the wild
X Liu, T Chen, F Qian, Z Guo, FX Lin, X Wang, K Chen
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
802017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20