Volgen
Alfred Chen
Titel
Geciteerd door
Geciteerd door
Jaar
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
5072019
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2 (2), 2.2, 2017
3992017
Peeking into Your App without Actually Seeing It:{UI} State Inference and Novel Android Attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
2692014
Towards robust {LiDAR-based} perception in autonomous driving: General black-box adversarial sensor attack and countermeasures
J Sun, Y Cao, QA Chen, ZM Mao
29th USENIX Security Symposium (USENIX Security 20), 877-894, 2020
2082020
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
Y Cao, N Wang, C Xiao, D Yang, J Fang, R Yang, QA Chen, M Liu, B Li
2021 IEEE Symposium on Security and Privacy (SP), 176-194, 2021
1642021
A confidence-based filtering method for DDoS attack defense in cloud environment
W Dou, Q Chen, J Chen
Future Generation Computer Systems 29 (7), 1838-1850, 2013
1422013
Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing
J Shen, JY Won, Z Chen, QA Chen
29th USENIX Security Symposium (USENIX Security 20), 931-948, 2020
1362020
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
QA Chen, H Luo, S Rosen, ZM Mao, K Iyer, J Hui, K Sontineni, K Lau
Proceedings of the 2014 Conference on Internet Measurement Conference, 151-164, 2014
1312014
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
QA Chen, Y Yin, Y Feng, ZM Mao, HX Liu
NDSS, 2018
1292018
CBF: a packet filtering method for DDoS attack defense in cloud environment
Q Chen, W Lin, W Dou, S Yu
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
1082011
Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack
T Sato, J Shen, N Wang, Y Jia, X Lin, QA Chen
30th USENIX Security Symposium (USENIX Security 21), 3309-3326, 2021
1032021
A comprehensive study of autonomous vehicle bugs
J Garcia, Y Feng, J Shen, S Almanee, Y Xia, QA Chen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1032020
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
992016
On adversarial robustness of trajectory prediction for autonomous vehicles
Q Zhang, S Hu, J Sun, QA Chen, ZM Mao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
982022
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking
Y Jia, Y Lu, J Shen, QA Chen, Z Zhong, T Wei
International Conference on Learning Representations (ICLR), 2020
902020
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
862019
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
752018
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
752018
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks
S Rosen, H Luo, QA Chen, ZM Mao, J Hui, A Drake, K Lau
Proceedings of the 20th annual international conference on Mobile computing …, 2014
722014
Android ui deception revisited: Attacks and defenses
E Fernandes, QA Chen, J Paupore, G Essl, JA Halderman, ZM Mao, ...
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
662017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20