Qi Alfred Chen
Title
Cited by
Cited by
Year
Peeking into Your App without Actually Seeing It:{UI} State Inference and Novel Android Attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
2242014
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2 (2), 2.2, 2017
1922017
A confidence-based filtering method for DDoS attack defense in cloud environment
W Dou, Q Chen, J Chen
Future Generation Computer Systems 29 (7), 1838-1850, 2013
1072013
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
QA Chen, H Luo, S Rosen, ZM Mao, K Iyer, J Hui, K Sontineni, K Lau
Proceedings of the 2014 Conference on Internet Measurement Conference, 151-164, 2014
972014
CBF: a packet filtering method for DDoS attack defense in cloud environment
Q Chen, W Lin, W Dou, S Yu
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
952011
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
752019
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks
S Rosen, H Luo, QA Chen, ZM Mao, J Hui, A Drake, K Lau
Proceedings of the 20th annual international conference on Mobile computing …, 2014
642014
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
602016
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
QA Chen, Y Yin, Y Feng, ZM Mao, HX Liu
NDSS, 2018
512018
Android ui deception revisited: Attacks and defenses
E Fernandes, QA Chen, J Paupore, G Essl, JA Halderman, ZM Mao, ...
International Conference on Financial Cryptography and Data Security, 41-59, 2016
462016
Understanding on-device bufferbloat for cellular upload
Y Guo, F Qian, QA Chen, ZM Mao, S Sen
Proceedings of the 2016 Internet Measurement Conference, 303-317, 2016
332016
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
272018
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
272018
Static Detection of Packet Injection Vulnerabilities–A Case for Identifying Attacker-controlled Implicit Information Leaks
QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
262015
Open doors for bob and mallory: Open port usage in android apps and security implications
YJ Jia, QA Chen, Y Lin, C Kong, ZM Mao
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 190-203, 2017
252017
TIVOs: Trusted Visual I/O Paths for Android
E Fernandes, QA Chen, G Essl, JA Halderman, ZM Mao, A Prakash
University of Michigan CSE Technical Report CSE-TR-586-14, 2014
182014
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
172019
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE
YJ Jia, QA Chen, ZM Mao, J Hui, K Sontinei, A Yoon, S Kwong, K Lau
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
172015
QoE inference without application control
A Nikravesh, DK Hong, QA Chen, HV Madhyastha, ZM Mao
Proceedings of the 2016 workshop on QoE-based Analysis and Management of …, 2016
152016
MitM attack by name collision: Cause analysis and vulnerability assessment in the new gTLD era
QA Chen, E Osterweil, M Thomas, ZM Mao
2016 IEEE Symposium on Security and Privacy (SP), 675-690, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20