Qi Alfred Chen
Titel
Geciteerd door
Geciteerd door
Jaar
Peeking into Your App without Actually Seeing It:{UI} State Inference and Novel Android Attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
2322014
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2 (2), 2.2, 2017
2152017
A confidence-based filtering method for DDoS attack defense in cloud environment
W Dou, Q Chen, J Chen
Future Generation Computer Systems 29 (7), 1838-1850, 2013
1112013
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1042019
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
QA Chen, H Luo, S Rosen, ZM Mao, K Iyer, J Hui, K Sontineni, K Lau
Proceedings of the 2014 Conference on Internet Measurement Conference, 151-164, 2014
1002014
CBF: a packet filtering method for DDoS attack defense in cloud environment
Q Chen, W Lin, W Dou, S Yu
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
952011
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks
S Rosen, H Luo, QA Chen, ZM Mao, J Hui, A Drake, K Lau
Proceedings of the 20th annual international conference on Mobile computing …, 2014
652014
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
642016
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
QA Chen, Y Yin, Y Feng, ZM Mao, HX Liu
NDSS, 2018
592018
Android ui deception revisited: Attacks and defenses
E Fernandes, QA Chen, J Paupore, G Essl, JA Halderman, ZM Mao, ...
International Conference on Financial Cryptography and Data Security, 41-59, 2016
482016
Understanding on-device bufferbloat for cellular upload
Y Guo, F Qian, QA Chen, ZM Mao, S Sen
Proceedings of the 2016 Internet Measurement Conference, 303-317, 2016
352016
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
322018
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
322018
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
282019
Static Detection of Packet Injection Vulnerabilities–A Case for Identifying Attacker-controlled Implicit Information Leaks
QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
272015
Open doors for bob and mallory: Open port usage in android apps and security implications
YJ Jia, QA Chen, Y Lin, C Kong, ZM Mao
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 190-203, 2017
262017
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE
YJ Jia, QA Chen, ZM Mao, J Hui, K Sontinei, A Yoon, S Kwong, K Lau
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
182015
TIVOs: Trusted Visual I/O Paths for Android
E Fernandes, QA Chen, G Essl, JA Halderman, ZM Mao, A Prakash
University of Michigan CSE Technical Report CSE-TR-586-14, 2014
182014
Fooling detection alone is not enough: Adversarial attack against multiple object tracking
YJ Jia, Y Lu, J Shen, QA Chen, H Chen, Z Zhong, TW Wei
International Conference on Learning Representations (ICLR'20), 2020
172020
MitM attack by name collision: Cause analysis and vulnerability assessment in the new gTLD era
QA Chen, E Osterweil, M Thomas, ZM Mao
2016 IEEE Symposium on Security and Privacy (SP), 675-690, 2016
172016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20