Publications
Jump to journals, books, preprints
Conferences
- Evaluating Program Semantics Reasoning with Type Inference in System F
@inproceedings{he2025tfbench, author = {He, Yifeng and Yang, Luning and Gonzalo, Christopher and Chen, Hao}, title = {Evaluating Program Semantics Reasoning with Type Inference in System F}, booktitle = {Neural Information Processing Systems (NeurIPS)}, date = {2025-11-30/2025-12-07}, address = {San Diego, CA, USA}, }
Neural Information Processing Systems (NeurIPS), 2025 - FuzzAug: Data Augmentation by Coverage-guided Fuzzing for Neural Test Generation
@inproceedings{he2025fuzzaug, author = {He, Yifeng and Wang, Jicheng and Rong, Yuyang and Chen, Hao}, title = {FuzzAug: Data Augmentation by Coverage-guided Fuzzing for Neural Test Generation}, booktitle = {Conference on Empirical Methods in Natural Language Processing}, date = {2025-11-05/2025-11-09}, address = {Suzhou, China}, }
Conference on Empirical Methods in Natural Language Processing, 2025 - Active Layer-Contrastive Decoding Reduces Hallucination in Large Language Model Generation
@inproceedings{zhang2025halluciation, author = {Zhang, Hongxiang and Chen, Hao and Chen, Muhao and Zhang, Tianyi}, title = {Active Layer-Contrastive Decoding Reduces Hallucination in Large Language Model Generation}, booktitle = {Conference on Empirical Methods in Natural Language Processing}, date = {2025-11-05/2025-11-09}, address = {Suzhou, China}, }
Conference on Empirical Methods in Natural Language Processing, 2025 - Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents
@inproceedings{liu2025agent, author = {Liu, Fengyu and Zhang, Yuan and Luo, Jiaqi and Dai, Jiarun and Chen, Tian and Yuan, Letian and Yu, Zhengmin and Shi, Youkun and Li, Ke and Zhou, Chengyuan and Chen, Hao and Yang, Min}, title = {Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents}, booktitle = {USENIX Security Symposium}, date = {2025-08-13/2025-08-15}, address = {Seattle, WA, USA}, }
USENIX Security Symposium, 2025 - Security of AI Agents
@inproceedings{he2025aiagent, author = {He, Yifeng and Wang, Ethan and Rong, Yuyang and Cheng, Zifei and Chen, Hao}, title = {Security of AI Agents}, booktitle = {IEEE/ACM International Workshop on Responsible AI Engineering (RAIE)}, date = {2025-04-29}, address = {Ottawa, Ontario, Canada}, }
IEEE/ACM International Workshop on Responsible AI Engineering (RAIE), 2025 - IRFuzzer: Specialized Fuzzing for LLVM Backend Code Generation
@inproceedings{rong2025irfuzzer, author = {Rong, Yuyang and Yu, Zhanghan and Weng, Zhenkai and Neuendorffer, Stephen and Chen, Hao}, title = {IRFuzzer: Specialized Fuzzing for LLVM Backend Code Generation}, booktitle = {IEEE/ACM International Conference on Software Engineering (ICSE)}, date = {2025-04-27/2025-05-03}, address = {Ottawa, Ontario, Canada}, }
IEEE/ACM International Conference on Software Engineering (ICSE), 2025 - Code Representation Pre-training with Complements from Program Executions
@inproceedings{huang2024, author = {Huang, Jiabo and Zhao, Jianyu and Rong, Yuyang and Guo, Yiwen and He, Yifeng and Chen, Hao}, title = {Code Representation Pre-training with Complements from Program Executions}, booktitle = {Conference on Empirical Methods in Natural Language Processing (EMNLP)}, date = {2024-11-12/2024-11-16}, address = {Miami, Florida, USA}, }
Conference on Empirical Methods in Natural Language Processing (EMNLP), 2024 - The Program Testing Ability of Large Language Models for Code
@inproceedings{xiong2024, author = {Xiong, Weimin and Guo, Yiwen and Chen, Hao}, title = {The Program Testing Ability of Large Language Models for Code}, booktitle = {Conference on Empirical Methods in Natural Language Processing (EMNLP)}, date = {2024-11-12/2024-11-16}, address = {Miami, Florida, USA}, }
Conference on Empirical Methods in Natural Language Processing (EMNLP), 2024 - Improved Generation of Adversarial Examples Against Safety-aligned LLMs
@inproceedings{li2024llm, author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao}, title = {Improved Generation of Adversarial Examples Against Safety-aligned LLMs}, booktitle = {Neural Information Processing Systems (NeurIPS)}, date = {2024-12-09/2024-12-15}, address = {Vancouver, Canada}, }
Neural Information Processing Systems (NeurIPS), 2024 - UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing
@inproceedings{he2024unitsyn, author = {He, Yifeng and Huang, Jiabo and Rong, Yuyang and Guo, Yiwen and Wang, Ethan and Chen, Hao}, title = {UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing}, booktitle = {International Symposium on Software Testing and Analysis (ISSTA)}, date = {2024-09-16/2024-09-20}, address = {Vienna, Austria}, }
International Symposium on Software Testing and Analysis (ISSTA), 2024 - Prompt Fuzzing for Fuzz Driver Generation
@inproceedings{lyu2024PromptFuzz, author = {Lyu, Yunlong and Xie, Yuxuan and Chen, Peng and Chen, Hao}, title = {Prompt Fuzzing for Fuzz Driver Generation}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2024-10-14/2024-10-18}, address = {Salt Lake City, UT, USA}, }
ACM Conference on Computer and Communications Security (CCS), 2024 - Intrusion Detection at Scale with the Assistance of a Command-line Language Model
@inproceedings{lin2024IDS, author = {Lin, Jiongliang and Guo, Yiwen and Chen, Hao}, title = {Intrusion Detection at Scale with the Assistance of a Command-line Language Model}, booktitle = {Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)}, date = {2024-06-24/2024-06-27}, address = {Brisbane, Australia}, }
Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2024 - Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly
@inproceedings{li2023Attack, author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao}, title = {Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly}, booktitle = {Neural Information Processing Systems (NeurIPS)}, date = {2023-12-10/2023-12-16}, address = {New Orleans, LA, USA}, }
Neural Information Processing Systems (NeurIPS), 2023 - Improving Adversarial Transferability via Intermediate-level Perturbation Decay
@inproceedings{li2023ILPD, author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao}, title = {Improving Adversarial Transferability via Intermediate-level Perturbation Decay}, booktitle = {Neural Information Processing Systems (NeurIPS)}, date = {2023-12-10/2023-12-16}, address = {New Orleans, LA, USA}, }
Neural Information Processing Systems (NeurIPS), 2023 - HOPPER: Interpretative Fuzzing for Libraries
@inproceedings{chen2023Hopper, author = {Chen, Peng and Xie, Yuxuan and Lyu, Yunlong and Wang, Yuxiao and Chen, Hao}, title = {HOPPER: Interpretative Fuzzing for Libraries}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2023-11-26/2023-11-30}, address = {Copenhagen, Denmark}, doi = {https://doi.org/10.1145/3576915.3616610}, }
ACM Conference on Computer and Communications Security (CCS), 2023 - MHCN: a Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering
@inproceedings{lin2023MHCN, author = {Lin, Fangfei and Bai, Bing and Guo, Yiwen and Chen, Hao and Ren, Yazhou and Xu, Zenglin}, title = {MHCN: a Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering}, booktitle = {International Conference on Computer Vision (ICCV)}, date = {2023-10-04/2023-10-06}, address = {Paris, France}, }
International Conference on Computer Vision (ICCV), 2023 - Understanding Programs by Exploiting (Fuzzing) Test Cases
@inproceedings{zhao2023, author = {Zhao, Jianyu and Rong, Yuyang and Guo, Yiwen and He, Yifeng and Chen, Hao}, title = {Understanding Programs by Exploiting (Fuzzing) Test Cases}, booktitle = {Findings of the Association for Computational Linguistics (ACL)}, date = {2023-07-09/2023-07-14}, address = {Toronto, Canada}, }
Findings of the Association for Computational Linguistics (ACL), 2023 - Squeeze Training for Adversarial Robustness
@inproceedings{li2023Squeeze, author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao}, title = {Squeeze Training for Adversarial Robustness}, booktitle = {International Conference on Learning Representations (ICLR)}, date = {2023-05-01/2023-05-05}, address = {Kigali, Rwanda}, }
International Conference on Learning Representations (ICLR), 2023 - Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples
@inproceedings{li2023Bayesian, author = {Li, Qizhang and Guo, Yiwen and Zuo, Wangmeng and Chen, Hao}, title = {Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples}, booktitle = {International Conference on Learning Representations (ICLR)}, date = {2023-05-01/2023-05-05}, address = {Kigali, Rwanda}, }
International Conference on Learning Representations (ICLR), 2023 - Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques
@inproceedings{rong2022Valkyrie, author = {Rong, Yuyang and Zhang, Chibin and Liu, Jianzhong and Chen, Hao}, title = {Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques}, booktitle = {IEEE International Conference on Software Quality, Reliability, and Security (QRS)}, date = {2022-12-05/2022-12-09}, address = {Guangzhou, China}, doi = {https://doi.org/10.1109/QRS57517.2022.00069}, }
IEEE International Conference on Software Quality, Reliability, and Security (QRS), 2022 - Membership Inference Attack in Face of Data Transformations
@inproceedings{chen2022MIA, author = {Chen, Jiyu and Guo, Yiwen and Chen, Hao and Gong, Neil}, title = {Membership Inference Attack in Face of Data Transformations}, booktitle = {IEEE Conference on Communications and Network Security (CNS)}, date = {2022-10-03/2022-10-05}, address = {Austin, TX, USA}, }
IEEE Conference on Communications and Network Security (CNS), 2022 - Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations
@inproceedings{liu2022DAUC, author = {Liu, Bulou and Bai, Bing and Xie, Weibang and Guo, Yiwen and Chen, Hao}, title = {Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations}, booktitle = {ACM SIGKDD Conference on Knowledge Discovery and Data Mining}, date = {2022-08-14/2022-08-18}, address = {Washington DC, USA}, }
ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2022 - Feder: communication-efficient byzantine-robust federated learning
@inproceedings{jiang2022Feder, author = {Jiang, Yukun and Cao, Xiaoyu and Chen, Hao and Gong, Neil}, title = {Feder: communication-efficient byzantine-robust federated learning}, booktitle = {ICLR Workshop on Socially Responsible Machine Learning (SRML)}, date = {2022-04-29/2022-04-29}, }
ICLR Workshop on Socially Responsible Machine Learning (SRML), 2022 - ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs
@inproceedings{liu2021ConcSpectre, author = {Liu, Yang and Fan, Ming and Liu, Ting and Hao, Yu and Xu, Zisen and Chen, Kai and Chen, Hao and Cai, Yan}, title = {ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs}, booktitle = {IEEE International Conference on Software Quality, Reliability, and Security (QRS)}, date = {2021-12-06/2021-12-10}, }
IEEE International Conference on Software Quality, Reliability, and Security (QRS), 2021 - Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems
@inproceedings{liu2021Go, author = {Liu, Ziheng and Zhu, Shuofei and Qin, Boqin and Chen, Hao and Song, Linhai}, title = {Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems}, booktitle = {International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)}, date = {2021-04-19/2021-04-23}, }
International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2021 - Backpropagating Linearly Improves Transferability of Adversarial Examples
@inproceedings{guo2020Linear, author = {Guo, Yiwen and Li, Qizhang and Chen, Hao}, title = {Backpropagating Linearly Improves Transferability of Adversarial Examples}, booktitle = {Neural Information Processing Systems (NeurIPS)}, date = {2020-12-06/2020-12-12}, }
Neural Information Processing Systems (NeurIPS), 2020 - Practical No-box Adversarial Attacks against DNNs
@inproceedings{li2020NoBox, author = {Li, Qizhang and Guo, Yiwen and Chen, Hao}, title = {Practical No-box Adversarial Attacks against DNNs}, booktitle = {Neural Information Processing Systems (NeurIPS)}, date = {2020-12-06/2020-12-12}, }
Neural Information Processing Systems (NeurIPS), 2020 - StyleCAPTCHA: CAPTCHA Based on Style-Transferred Images to Defend against Deep Convolutional Networks
@inproceedings{chen2020Style, author = {Chen, Haitian and Jiang, Bai and Chen, Hao}, title = {{StyleCAPTCHA}: {CAPTCHA} Based on Style-Transferred Images to Defend against Deep Convolutional Networks}, booktitle = {ACM-IMS Foundations of Data Science Conference (FODS)}, date = {2020-10-18/2020-10-20}, doi = {https://doi.org/10.1145/3412815.3416895}, }
ACM-IMS Foundations of Data Science Conference (FODS), 2020 - Integrity: Finding Integer Errors by Targeted Fuzzing
@inproceedings{rong2020Integrity, author = {Rong, Yuyang and Chen, Peng and Chen, Hao}, title = {Integrity: Finding Integer Errors by Targeted Fuzzing}, booktitle = {International Conference on Security and Privacy in Communication Networks (SecureComm)}, date = {2020-10-21/2020-10-23}, }
International Conference on Security and Privacy in Communication Networks (SecureComm), 2020 - Yet Another Intermediate-Level Attack
@inproceedings{li2020ILA, author = {Li, Qizhang and Guo, Yiwen and Chen, Hao}, title = {Yet Another Intermediate-Level Attack}, booktitle = {European Conference on Computer Vision (ECCV)}, date = {2020-08-23/2020-08-28}, }
European Conference on Computer Vision (ECCV), 2020 - Fooling Detection Alone Is Not Enough: Adversarial Attack Against Multiple Object Tracking
@inproceedings{jia2020Tracking, author = {Jia, Yunhan and Lu, Yantao and Shen, Junjie and Chen, Qi Alfred and Chen, Hao and Zhong, Zhenyu and Wei, Tao}, title = {Fooling Detection Alone Is Not Enough: Adversarial Attack Against Multiple Object Tracking}, booktitle = {International Conference on Learning Representations (ICLR)}, date = {2020-04-26/2020-04-30}, address = {Addis Ababa, Ethiopia}, }
International Conference on Learning Representations (ICLR), 2020 - Explore the Transformation Space for Adversarial Images
@inproceedings{chen2020Transform, author = {Chen, Jiyu and Wang, David and Chen, Hao}, title = {Explore the Transformation Space for Adversarial Images}, booktitle = {ACM Conference on Data and Application Security and Privacy (CODASPY)}, date = {2020-03-16/2020-03-18}, address = {New Orleans, LA, USA}, }
ACM Conference on Data and Application Security and Privacy (CODASPY), 2020 - Matryoshka: Fuzzing Deeply Nested Branches
@inproceedings{chen2019Matryoshka, author = {Chen, Peng and Liu, Jianzhong and Chen, Hao}, title = {{Matryoshka}: Fuzzing Deeply Nested Branches}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2019-11-11/2019-11-15}, address = {London, UK}, doi = {https://doi.org/10.1145/3319535.3363225}, }
ACM Conference on Computer and Communications Security (CCS), 2019 - Informer: Irregular Traffic Detection for Containerized Microservices RPC in the Real World
@inproceedings{chen2019Informer, author = {Chen, Jiyu and Huang, Heqing and Chen, Hao}, title = {Informer: Irregular Traffic Detection for Containerized Microservices {RPC} in the Real World}, booktitle = {ACM/IEEE Workshop on Security and Privacy in Edge Computing (Edge S\&P)}, date = {2019-11-07/2019-11-09}, address = {Washington DC, USA}, }
ACM/IEEE Workshop on Security and Privacy in Edge Computing (Edge S&P), 2019 - Falsified Data Attack on Backpressure-Based Traffic Signal Control Algorithms
@inproceedings{yen2018Falsified, author = {Yen, Chia-Cheng and Ghosal, Dipak and Zhang, Michael and Chuah, Chen-Nee and Chen, Hao}, title = {Falsified Data Attack on Backpressure-Based Traffic Signal Control Algorithms}, booktitle = {IEEE Vehicular Networking Conference (VNC)}, date = {2018-12-05/2018-12-07}, address = {Taipei, Taiwan}, }
IEEE Vehicular Networking Conference (VNC), 2018 - Less Is More: Culling the Training Set to Improve Robustness of Deep Neural Networks
@inproceedings{liu2018Sanitization, author = {Liu, Yongshuai and Chen, Jiyu and Chen, Hao}, title = {Less Is More: Culling the Training Set to Improve Robustness of Deep Neural Networks}, booktitle = {Conference on Decision and Game Theory for Security (GameSec)}, date = {2018-10-29/2018-10-31}, address = {Seattle, WA, USA}, }
Conference on Decision and Game Theory for Security (GameSec), 2018 - Angora: Efficient Fuzzing by Principled Search
@inproceedings{chen2018Angora, author = {Chen, Peng and Chen, Hao}, title = {{Angora}: Efficient Fuzzing by Principled Search}, booktitle = {IEEE Symposium on Security \& Privacy}, date = {2018-05-21/2018-05-23}, address = {San Francisco, CA, USA}, doi = {https://doi.org/10.1109/SP.2018.00046}, }
IEEE Symposium on Security & Privacy, 2018 - Detecting Third-Party Libraries in Android Applications with High Precision and Recall
@inproceedings{zhang2018Library, author = {Zhang, Yuan and Dai, Jiarun and Zhang, Xiaohan and Huang, Sirong and Yang, Zhemin and Yang, Min and Chen, Hao}, title = {Detecting Third-Party Libraries in {Android} Applications with High Precision and Recall}, booktitle = {IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)}, date = {2018-03-20/2018-03-23}, address = {Campobasso, Italy}, }
IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2018 - MagNet: a Two-Pronged Defense Against Adversarial Examples
@inproceedings{meng2017MagNet, author = {Meng, Dongyu and Chen, Hao}, title = {{MagNet}: a Two-Pronged Defense Against Adversarial Examples}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2017-10-30/2017-11-03}, address = {Dallas, TX}, doi = {https://doi.org/10.1145/3133956.3134057}, }
ACM Conference on Computer and Communications Security (CCS), 2017 - Evaluating Private Modes in Desktop and Mobile Browsers and Their Resistance to Fingerprinting
@inproceedings{wu2017Browser, author = {Wu, Yuanyi and Meng, Dongyu and Chen, Hao}, title = {Evaluating Private Modes in Desktop and Mobile Browsers and Their Resistance to Fingerprinting}, booktitle = {IEEE Conference on Communications and Network Security (CNS)}, date = {2017-10-09/2017-10-11}, address = {Las Vegas, NV}, }
IEEE Conference on Communications and Network Security (CNS), 2017 - SurgeScan: Enforcing Security Policies on Untrusted Third-Party Android Libraries
@inproceedings{vronsky2017SurgeScan, author = {Vronsky, Jonathan and Stevens, Ryan and Chen, Hao}, title = {{SurgeScan}: Enforcing Security Policies on Untrusted Third-Party {Android} Libraries}, booktitle = {IEEE Conference on Advanced and Trusted Computing (ATC)}, date = {2017-08-04/2017-08-08}, address = {San Francisco, CA}, }
IEEE Conference on Advanced and Trusted Computing (ATC), 2017 - AppShield: Enabling Multi-Entity Access Control Cross Platforms for Mobile App Management
@inproceedings{qu2016AppShield, author = {Qu, Zhengyang and Guo, Guanyu and Shao, Zhengyue and Rastogi, Vaibhav and Chen, Yan and Chen, Hao and Hong, Wangjun}, title = {{AppShield}: Enabling Multi-Entity Access Control Cross Platforms for Mobile App Management}, booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)}, date = {2016-10-10/2016-10-12}, address = {Guangzhou, China}, }
International Conference on Security and Privacy in Communication Networks (SECURECOMM), 2016 - Security Analysis of Personal Unmanned Aerial Vehicles
@inproceedings{chen2016UAV, author = {Chen, Peng and Chen, Hao}, title = {Security Analysis of Personal Unmanned Aerial Vehicles}, booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)}, date = {2016-10-10/2016-10-12}, address = {Guangzhou, China}, }
International Conference on Security and Privacy in Communication Networks (SECURECOMM), 2016 - RevDroid: Code Analysis of the Side Effects After Dynamic Permission Revocation of Android Apps
@inproceedings{fang2016revDroid, author = {Fang, Zheran and Han, Weili and Li, Dong and Guo, Zeqing and Guo, Danhao and Wang, X. Sean and Qian, Zhiyun and Chen, Hao}, title = {{RevDroid}: Code Analysis of the Side Effects After Dynamic Permission Revocation of {Android} Apps}, booktitle = {ACM Asia Conference on Computer and Communications Security (ASIACCS)}, date = {2016-05-30/2016-06-03}, address = {Xi'an, China}, }
ACM Asia Conference on Computer and Communications Security (ASIACCS), 2016 - On the Origin of Mobile Apps: Network Provenance for Android Applications
@inproceedings{stevens2015MTOP, author = {Stevens, Ryan and Crussell, Jonathan and Chen, Hao}, title = {On the Origin of Mobile Apps: Network Provenance for {Android} Applications}, booktitle = {ACM Conference on Data and Application Security and Privacy (CODASPY)}, date = {2016-03-09/2016-03-11}, address = {New Orleans, LA}, }
ACM Conference on Data and Application Security and Privacy (CODASPY), 2016 - FineDroid: Enforcing Permissions with System-Wide Application
@inproceedings{zhang2015FineDroid, author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao}, title = {{FineDroid}: Enforcing Permissions with System-Wide Application}, booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)}, date = {2015-10-26/2015-10-29}, address = {Dallas, TX}, }
International Conference on Security and Privacy in Communication Networks (SECURECOMM), 2015 - Predictive Eviction: a Novel Policy for Optimizing TLS Session Cache Performance
@inproceedings{stevens2015Pred, author = {Stevens, Ryan and Chen, Hao}, title = {Predictive Eviction: a Novel Policy for Optimizing {TLS} Session Cache Performance}, booktitle = {IEEE Global Communications Conference: Communications and Information System Security (GLOBECOM)}, date = {2015-12-06/2015-12-10}, address = {San Diego, CA}, }
IEEE Global Communications Conference: Communications and Information System Security (GLOBECOM), 2015 - AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps
@inproceedings{cai2015AppCracker, author = {Cai, Fangda and Chen, Hao and Wu, Yuanyi and Zhang, Yuan}, title = {{AppCracker}: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2015-05-21}, address = {San Jose, CA}, }
IEEE Mobile Security Technologies (MoST), 2015 - MAdFraud: Investigating Ad Fraud in Android Applications
@inproceedings{crussell2014MAdFraud, author = {Crussell, Jonathan and Stevens, Ryan and Chen, Hao}, title = {{MAdFraud}: Investigating Ad Fraud in {Android} Applications}, booktitle = {International Conference on Mobile Systems, Applications and Services (MobiSys)}, date = {2014-06-16/2014-06-19}, address = {Bretton Woods, NH, USA}, }
International Conference on Mobile Systems, Applications and Services (MobiSys), 2014 - A First Look At Firefox OS Security
@inproceedings{defreez2014Firefox, author = {Defreez, Daniel and Shastry, Bhargava and Chen, Hao and Seifert, Jean-Pierre}, title = {A First Look At Firefox {OS} Security}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2014-05-17}, address = {San Jose, CA}, }
IEEE Mobile Security Technologies (MoST), 2014 - Using and Asking: APIs Used in the Android Market and Asked About in stackoverflow
@inproceedings{posnett2013UA, author = {Posnett, Daryl and Kavaler, David and Gibler, Clint and Chen, Hao and Devanbu, Prem and Filkov, Vladimir}, title = {Using and Asking: {APIs} Used in the {Android} Market and Asked About in {stackoverflow}}, booktitle = {International Conference on Social Informatics (SocInfo)}, date = {2013-11-25/2013-11-27}, address = {Kyoto, Japan}, }
International Conference on Social Informatics (SocInfo), 2013 - Scalable Semantics-Based Detection of Similar Android Applications
@inproceedings{crussell2013AnDarwin, author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao}, title = {Scalable Semantics-Based Detection of Similar {Android} Applications}, booktitle = {European Symposium on Research in Computer Security (ESORICS)}, date = {2013-09-09/2013-09-13}, address = {Egham, U.K.}, }
European Symposium on Research in Computer Security (ESORICS), 2013 - Quantifying the Effects of Removing Permissions from Android Applications
@inproceedings{gustafson2013Permission, author = {Gustafson, Eric and Kennedy, Kristen and Chen, Hao}, title = {Quantifying the Effects of Removing Permissions from {Android} Applications}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2013-05-23}, address = {San Francisco, CA}, }
IEEE Mobile Security Technologies (MoST), 2013 - Asking for (and About) Permissions Used by Android Apps
@inproceedings{stevens2013Permission, author = {Stevens, Ryan and Ganz, Jonathan and Devanbu, Prem and Chen, Hao and Filkov, Vladimir}, title = {Asking for (and About) Permissions Used by {Android} Apps}, booktitle = {Working Conference on Mining Software Repositories (MSR)}, date = {2013-05-18/2013-05-19}, address = {San Francisco, CA}, }
Working Conference on Mining Software Repositories (MSR), 2013 - Retrofitting Android Apps
@inproceedings{davis2013Retrofit, author = {Davis, Benjamin and Chen, Hao}, title = {Retrofitting {Android} Apps}, booktitle = {International Conference on Mobile Systems, Applications and Services (MobiSys)}, date = {2013-06-25/2013-06-28}, address = {Taipei, Taiwan}, }
International Conference on Mobile Systems, Applications and Services (MobiSys), 2013 - Characterizing Android Application Plagiarism and Its Impact on Developers
@inproceedings{gibler2013UEcon, author = {Gibler, Clint and Stevens, Ryan and Crussell, Jon and Chen, Hao and Zang, Hui and Choi, Heesook}, title = {Characterizing {Android} Application Plagiarism and Its Impact on Developers}, booktitle = {International Conference on Mobile Systems, Applications and Services (MobiSys)}, date = {2013-06-25/2013-06-28}, address = {Taipei, Taiwan}, }
International Conference on Mobile Systems, Applications and Services (MobiSys), 2013 - Attack of the Clones: Detecting Cloned Applications on Android Markets
@inproceedings{crussell2012DNADroid, author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao}, title = {Attack of the Clones: Detecting Cloned Applications on {Android} Markets}, booktitle = {European Symposium on Research in Computer Security (ESORICS)}, date = {2012-09-10/2012-09-12}, address = {Pisa, Italy}, }
European Symposium on Research in Computer Security (ESORICS), 2012 - AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale
@inproceedings{gibler2012AndroidLeaks, author = {Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao}, title = {{AndroidLeaks}: Automatically Detecting Potential Privacy Leaks in {Android} Applications on a Large Scale}, booktitle = {International Conference on Trust \& Trustworthy Computing (TRUST)}, date = {2012-06-13/2012-06-15}, address = {Vienna, Austria}, }
International Conference on Trust & Trustworthy Computing (TRUST), 2012 - On the Practicality of Motion Based Keystroke Infernce Attack
@inproceedings{cai2012Motion, author = {Cai, Liang and Chen, Hao}, title = {On the Practicality of Motion Based Keystroke Infernce Attack}, booktitle = {International Conference on Trust \& Trustworthy Computing (TRUST)}, date = {2012-06-13/2012-06-15}, address = {Vienna, Austria}, }
International Conference on Trust & Trustworthy Computing (TRUST), 2012 - Investigating User Privacy in Android Ad Libraries
@inproceedings{stevens2012Ad, author = {Stevens, Ryan and Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao}, title = {Investigating User Privacy in {Android} Ad Libraries}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2012-05-24}, address = {San Francisco, CA}, }
IEEE Mobile Security Technologies (MoST), 2012 - I-ARM-Droid: a Rewriting Framework for In-App Reference Monitors for Android Applications
@inproceedings{davis2012IARMDroid, author = {Davis, Benjamin and Sanders, Ben and Khodaverdian, Armen and Chen, Hao}, title = {{I-ARM-Droid}: a Rewriting Framework for In-App Reference Monitors for {Android} Applications}, booktitle = {IEEE Mobile Security Technologies (MoST)}, date = {2012-05-24}, address = {San Francisco, CA}, }
IEEE Mobile Security Technologies (MoST), 2012 - Privacy-Preserving Alibi Systems
@inproceedings{davis2012Alibi, author = {Davis, Benjamin and Chen, Hao and Franklin, Matthew}, title = {Privacy-Preserving Alibi Systems}, booktitle = {ACM Symposium on Information, Computer and Communications Security (ASIACCS)}, date = {2012-05-01/2012-05-03}, address = {Seoul, South Korea}, }
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012 - Opaak: Using Mobile Phones to Limit Anonymous Identities Online
@inproceedings{maganis2012Opaak, author = {Maganis, Gabriel and Shi, Elaine and Chen, Hao and Song, Dawn}, title = {{Opaak}: Using Mobile Phones to Limit Anonymous Identities Online}, booktitle = {International Conference on Mobile Systems, Applications and Services (MobiSys)}, date = {2012-06-26/2012-06-28}, address = {Low Wood Bay, Lake District, United Kingdom}, }
International Conference on Mobile Systems, Applications and Services (MobiSys), 2012 - TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion
@inproceedings{cai2011TouchLogger, author = {Cai, Liang and Chen, Hao}, title = {{TouchLogger}: Inferring Keystrokes on Touch Screen from Smartphone Motion}, booktitle = {USENIX Workshop on Hot Topics in Security (HotSec 11)}, date = {2011-08-09/2011-08-09}, address = {San Francisco, CA}, }
USENIX Workshop on Hot Topics in Security (HotSec 11), 2011 - Gesture Authentication with Touch Input for Mobile Devices
@inproceedings{yuan2011Gesture, author = {Niu, Yuan and Chen, Hao}, title = {Gesture Authentication with Touch Input for Mobile Devices}, booktitle = {International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec)}, date = {2011-05-17/2011-05-19}, address = {Aalborg, Denmark}, }
International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec), 2011 - Good Neighbor: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas
@inproceedings{cai2011GoodNeighbor, author = {Cai, Liang and Zeng, Kai and Chen, Hao and Mohapatra, Prasant}, title = {{Good Neighbor}: Ad Hoc Pairing of Nearby Wireless Devices by Multiple Antennas}, booktitle = {Annual Network and Distributed System Security Symposium (NDSS)}, date = {2011-02-06/2011-02-09}, address = {San Diego, CA}, }
Annual Network and Distributed System Security Symposium (NDSS), 2011 - DBTaint: Cross-Application Information Flow Tracking Via Databases
@inproceedings{davis2010DBTaint, author = {Davis, Benjamin and Chen, Hao}, title = {{DBTaint}: Cross-Application Information Flow Tracking Via Databases}, booktitle = {USENIX Conference on Web Application}, date = {2010-06-23/2010-06-24}, address = {Boston, MA}, }
USENIX Conference on Web Application, 2010 - CapAuth: a Capability-Based Handover Scheme
@inproceedings{liang2010CapAuth, author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao}, title = {{CapAuth}: a Capability-Based Handover Scheme}, booktitle = {IEEE Conference on Computer Communications (INFOCOM)}, date = {2010-03-15/2010-03-19}, address = {San Diego, CA}, }
IEEE Conference on Computer Communications (INFOCOM), 2010 - Secure File System Services for Web 2.0 Applications
@inproceedings{hsu2009WebFS, author = {Hsu, Francis and Chen, Hao}, title = {Secure File System Services for {Web} 2.0 Applications}, booktitle = {ACM Cloud Computing Security Workshop (CCSW 2009)}, date = {2009-11-13/2009-11-13}, address = {Chicago, IL}, }
ACM Cloud Computing Security Workshop (CCSW 2009), 2009 - Multi-Party Off-the-Record Messaging
@inproceedings{goldberg2009mpOTR, author = {Goldberg, Ian and Ustaoglu, Berkant and Van Gundy, Matthew and Chen, Hao}, title = {Multi-Party Off-the-Record Messaging}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2009-11-09/2009-11-13}, address = {Chicago, IL}, }
ACM Conference on Computer and Communications Security (CCS), 2009 - Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages
@inproceedings{liang2009Paging, author = {Cai, Liang and Maganis, Gabriel and Zang, Hui and Chen, Hao}, title = {Mitigating {DoS} Attacks on the Paging Channel by Efficient Encoding in Page Messages}, booktitle = {International Conference on Security and Privacy in Communication Networks (SecureComm)}, date = {2009-09-14/2009-09-18}, address = {Athens, Greece}, }
International Conference on Security and Privacy in Communication Networks (SecureComm), 2009 - Noise Injection for Search Privacy Protection
@inproceedings{ye2009Search, author = {Ye, Shaozhi and Wu, Felix and Pandey, Raju and Chen, Hao}, title = {Noise Injection for Search Privacy Protection}, booktitle = {IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT)}, date = {2009-08-29/2009-08-31}, address = {Vancouver, Canada}, }
IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), 2009 - Defending Against Sensor-Sniffing Attacks on Mobile Phones
@inproceedings{liang2009Sensor, author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao}, title = {Defending Against Sensor-Sniffing Attacks on Mobile Phones}, booktitle = {The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld)}, date = {2009-08-17/2009-08-17}, address = {Barcelona, Spain}, }
The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld), 2009 - Measuring Privacy Risk in Online Social Networks
@inproceedings{becker2009SocialNetworks, author = {Becker, Justin and Chen, Hao}, title = {Measuring Privacy Risk in Online Social Networks}, booktitle = {Web 2.0 Security and Privacy (W2SP)}, date = {2009-05-21/2009-05-21}, address = {Oakland, CA}, }
Web 2.0 Security and Privacy (W2SP), 2009 - Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks
@inproceedings{vanGundy2009Noncespaces, author = {Van Gundy, Matthew and Chen, Hao}, title = {{Noncespaces}: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks}, booktitle = {Annual Network and Distributed System Security Symposium (NDSS)}, date = {2009-02-08/2009-02-11}, address = {San Diego, CA}, }
Annual Network and Distributed System Security Symposium (NDSS), 2009 - OMash: Enabling Secure Web Mashups Via Object Abstractions
@inproceedings{crites2008OMash, author = {Crites, Steven and Hsu, Francis and Chen, Hao}, title = {{OMash}: Enabling Secure Web Mashups Via Object Abstractions}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2008-10-27/2008-10-31}, address = {Alexandria, VA}, }
ACM Conference on Computer and Communications Security (CCS), 2008 - iPhish: Phishing Vulnerabilities on Consumer Electronics
@inproceedings{niu2008iPhish, author = {Niu, Yuan and Hsu, Francis and Chen, Hao}, title = {{iPhish}: Phishing Vulnerabilities on Consumer Electronics}, booktitle = {Usability, Psychology, and Security 2008}, date = {2008-04-14/2008-04-14}, address = {San Francisco, CA}, }
Usability, Psychology, and Security 2008, 2008 - Distributed Authentication for Low-Cost Wireless Networks
@inproceedings{machiraju2008Authentication, author = {Machiraju, Sridhar and Chen, Hao and Bolot, Jean}, title = {Distributed Authentication for Low-Cost Wireless Networks}, booktitle = {Workshop on Mobile Computing Systems and Applications (HotMobile)}, date = {2008-02-25/2008-02-26}, address = {Napa Valley, CA}, }
Workshop on Mobile Computing Systems and Applications (HotMobile), 2008 - Exploiting Opportunistic Scheduling in Cellular Data Networks
@inproceedings{racic2008PF, author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin}, title = {Exploiting Opportunistic Scheduling in Cellular Data Networks}, booktitle = {Annual Network and Distributed System Security Symposium (NDSS)}, date = {2008-02-10/2008-02-13}, address = {San Diego, CA}, }
Annual Network and Distributed System Security Symposium (NDSS), 2008 - Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms
@inproceedings{vanGundy2007FO, author = {Van Gundy, Matthew and Chen, Hao and Su, Zhendong and Vigna, Giovanni}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {Annual Computer Security Applications Conference (ACSAC)}, date = {2007-12-10/2007-12-14}, address = {Miami Beach, FL}, }
Annual Computer Security Applications Conference (ACSAC), 2007 - Spam Double-Funnel: Connecting Web Spammers with Advertisers
@inproceedings{wang2007WWW, author = {Wang, Yi-Min and Ma, Ming and Niu, Yuan and Chen, Hao}, title = {Spam Double-Funnel: Connecting Web Spammers with Advertisers}, booktitle = {International World Wide Web Conference (WWW)}, date = {2007-05-08/2007-05-12}, address = {Banff, Canada}, }
International World Wide Web Conference (WWW), 2007 - A Quantitative Study of Forum Spamming Using Context-Based Analysis
@inproceedings{niu2007Spam, author = {Niu, Yuan and Wang, Yi-Ming and Chen, Hao and Ma, Ming and Hsu, Francis}, title = {A Quantitative Study of Forum Spamming Using Context-Based Analysis}, booktitle = {Annual Network and Distributed System Security Symposium (NDSS)}, date = {2007-02-28/2007-03-02}, address = {San Diego, CA}, }
Annual Network and Distributed System Security Symposium (NDSS), 2007 - Back to the Future: a Framework for Automatic Malware Removal and System Repair
@inproceedings{hsu2006BTTF, author = {Hsu, Francis and Chen, Hao and Ristenpart, Thomas and Li, Jason and Su, Zhendong}, title = {Back to the Future: a Framework for Automatic Malware Removal and System Repair}, booktitle = {Annual Computer Security Applications Conference (ACSAC)}, date = {2006-12-11/2006-12-15}, address = {Miami Beach, FL}, }
Annual Computer Security Applications Conference (ACSAC), 2006 - Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery
@inproceedings{racic2006MMS, author = {Racic, Radmilo and Ma, Denys and Chen, Hao}, title = {Exploiting {MMS} Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery}, booktitle = {nternational Conference on Security and Privacy in Communication Network (SecureComm)}, date = {2006-08-28/2006-09-01}, address = {Baltimore, MD}, }
nternational Conference on Security and Privacy in Communication Network (SecureComm), 2006 - FIREMAN: a Toolkit for FIREwall Modeling and ANalysis
@inproceedings{yuan2006FIREMAN, author = {Yuan, Lihua and Chen, Hao and Mai, Jianning and Chuah, Chen-Nee and Su, Zhendong and Mohapatra, Prasant}, title = {{FIREMAN}: a Toolkit for {FIREwall} {Modeling} and {ANalysis}}, booktitle = {IEEE Symposium on Security and Privacy}, date = {2006-05-21/2006-05-24}, address = {Berkeley, CA}, }
IEEE Symposium on Security and Privacy, 2006 - Model Checking an Entire Linux Distribution for Security Violations
@inproceedings{schwarz2005Linux, author = {Schwarz, Benjamin and Chen, Hao and Wagner, David and Morrison, Geoff and West, Jacob and Lin, Jeremy and Tu, Wei}, title = {Model Checking an Entire {Linux} Distribution for Security Violations}, booktitle = {Annual Computer Security Applications Conference (ACSAC)}, date = {2005-12-05/2005-12-09}, address = {Tucson, Arizona}, }
Annual Computer Security Applications Conference (ACSAC), 2005 - Using Build-Integrated Static Checking to Preserve Correctness Invariants
@inproceedings{chen2004EROS, author = {Chen, Hao and Shapiro, Jonathan}, title = {Using Build-Integrated Static Checking to Preserve Correctness Invariants}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2004-11-25/2004-11-29}, address = {Washington, DC}, }
ACM Conference on Computer and Communications Security (CCS), 2004 - Model Checking One Million Lines of C Code
@inproceedings{chen2004million, author = {Chen, Hao and Dean, Drew and Wagner, David}, title = {Model Checking One Million Lines of {C} Code}, booktitle = {Annual Network and Distributed System Security Symposium (NDSS)}, date = {2004-02-04/2004-02-06}, address = {San Diego, CA}, }
Annual Network and Distributed System Security Symposium (NDSS), 2004 - Setuid Demystified
@inproceedings{chen2002setuid, author = {Chen, Hao and Wagner, David and Dean, Drew}, title = {Setuid Demystified}, booktitle = {USENIX Security Symposium}, date = {2002-08-05/2002-08-09}, address = {San Francisco, CA}, }
USENIX Security Symposium, 2002 - MOPS: an Infrastructure for Examining Security Properties of Software
@inproceedings{chen2002MOPS, author = {Chen, Hao and Wagner, David}, title = {{MOPS}: an Infrastructure for Examining Security Properties of Software}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, date = {2002-11-18/2002-11-22}, address = {Washington, DC}, }
ACM Conference on Computer and Communications Security (CCS), 2002 - Optimizing Search by Showing Results in Context
@inproceedings{dumais2001swish, author = {Dumais, Susan and Cutrell, Edward and Chen, Hao}, title = {Optimizing Search by Showing Results in Context}, booktitle = {ACM SIGCHI Conference on Human Factors in Computing Systems (CHI)}, date = {2001-03-31/2001-04-05}, address = {Seattle, WA}, }
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), 2001 - Bringing Order to the Web: Automatically Categorizing Search Results
@inproceedings{chen2000swish, author = {Chen, Hao and Dumais, Susan}, title = {Bringing Order to the {Web}: Automatically Categorizing Search Results}, booktitle = {ACM SIGCHI Conference on Human Factors in Computing Systems (CHI)}, date = {2000-04-01/2000-04-06}, address = {The Hague, The Netherlands}, }
ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), 2000 - Hierarchical Classification of Web Content
@inproceedings{chen2000cat, author = {Dumais, Susan and Chen, Hao}, title = {Hierarchical Classification of {Web} Content}, booktitle = {ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR)}, date = {2000-07-24/2000-07-28}, address = {Athens, Greece}, }
ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), 2000 - Classified Displays of Web Search Results
@inproceedings{chen2000cat2, author = {Dumais, Susan and Cutrell, Edward and Chen, Hao}, title = {Classified Displays of {Web} Search Results}, booktitle = {ASIST SIG/CR Classification Research Workshop}, date = {2000-11-12}, }
ASIST SIG/CR Classification Research Workshop, 2000 - Evaluation of Decision Forests on Text Categorization
@inproceedings{chen2000textcat, author = {Chen, Hao and Ho, Tin K.}, title = {Evaluation of Decision Forests on Text Categorization}, booktitle = {SPIE Conference on Document Recognition and Retrieval VII}, date = {2000-01-26/2000-01-27}, address = {San Jose, CA}, }
SPIE Conference on Document Recognition and Retrieval VII, 2000 - Emu: an E-mail Preprocessor for Text-to-speech
@inproceedings{sproat1998emu, author = {Sproat, Richard and Hu, Jianying and Chen, Hao}, title = {{Emu}: an E-mail Preprocessor for Text-to-speech}, booktitle = {Workshop on Multimedia Signal Processing}, date = {1998-12-07/1998-12-09}, address = {Redondo Beach, CA}, }
Workshop on Multimedia Signal Processing, 1998 - E-mail Signature Block Analysis
@inproceedings{chen1998emu, author = {Chen, Hao and Hu, Jianying and Sproat, Richard}, title = {E-mail Signature Block Analysis}, booktitle = {International Conference on Pattern Recognition (ICPR)}, date = {1998-08-16/1998-08-20}, address = {Brisbane, Australia}, }
International Conference on Pattern Recognition (ICPR), 1998 - Piecewise Linear Modulation Model of Handwriting
@inproceedings{chen1997handwriting, author = {Chen, Hao and Agazzi, Oscar E. and Suen, Ching Y.}, title = {Piecewise Linear Modulation Model of Handwriting}, booktitle = {International Conference on Document Analysis and Recognition (ICDAR)}, date = {1997-08-18/1997-08-20}, address = {Ulm, Germany}, }
International Conference on Document Analysis and Recognition (ICDAR), 1997
Journals
- Improving Transferability of Adversarial Examples via Bayesian Attacks
@article{li2025bayesian, author = {Li, Qizhang and Guo, Yiwen and Yang, Xiaochen and Zuo, Wangmeng and Chen, Hao}, title = {Improving Transferability of Adversarial Examples via Bayesian Attacks}, journal = {IEEE Transactions on Circuits and Systems for Video Technology}, year = {2025}, volume = {}, doi = {https://doi.org/10.1109/TCSVT.2025.3609284}, }
IEEE Transactions on Circuits and Systems for Video Technology, (2025) - Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques
@article{rong2024Valkyrie, author = {Rong, Yuyang and Zhang, Chibin and Liu, Jianzhong and Chen, Hao}, title = {Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques}, journal = {Journal of Systems and Software}, year = {2024}, volume = {209}, doi = {https://doi.org/10.1016/j.jss.2023.111886}, }
Journal of Systems and Software, 209(2024) - AflIot: Fuzzing on Linux-based IoT Device with Binary-Level Instrumentation
@article{du2022AFLIoT, author = {Du, Xuechao and Chen, Andong and He, Boyuan and Chen, Hao and Zhang, Fan and Chen, Yan}, title = {AflIot: Fuzzing on Linux-based IoT Device with Binary-Level Instrumentation}, journal = {Computers \& Security}, year = {2022}, volume = {122}, doi = {https://doi.org/10.1016/j.cose.2022.102889}, }
Computers & Security, 122(2022) - An Intermediate-level Attack Framework on The Basis of Linear Regression
@article{guo2022ILA, author = {Guo, Yiwen and Li, Qizhang and Zuo, Wangmeng and Chen, Hao}, title = {An Intermediate-level Attack Framework on The Basis of Linear Regression}, journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, year = {2022}, volume = {45}, number = {3}, doi = {https://doi.org/10.1109/TPAMI.2022.3188044}, }
IEEE Transactions on Pattern Analysis and Machine Intelligence, 45.3(2022), pp. 2726–2735 - ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs
@article{liu2022ConcSpectre, author = {Liu, Yang and Xu, Zisen and Fan, Ming and Hao, Yu and Chen, Kai and Chen, Hao and Cai, Yan and Yang, Zijiang and Liu, Ting}, title = {ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs}, journal = {IEEE Transactions on Reliability}, year = {2022}, volume = {71}, number = {2}, doi = {https://doi.org/10.1109/TR.2022.3162694}, }
IEEE Transactions on Reliability, 71.2(2022), pp. 1174–1188 - Protect Privacy of Deep Classification Networks by Exploiting Their Generative Power
@article{chen2021Privacy, author = {Chen, Jiyu and Guo, Yiwen and Zheng, Qianjun and Chen, Hao}, title = {Protect Privacy of Deep Classification Networks by Exploiting Their Generative Power}, journal = {Machine Learning}, year = {2021}, volume = {110}, doi = {https://doi.org/10.1007/s10994-021-05951-6}, }
Machine Learning, 110(2021), pp. 651-–674 - senDroid: Auditing Sensor Access in Android System-Wide
@article{han2017senDroid, author = {Han, Weili and Cao, Chang and Chen, Hao and Li, Dong and Fang, Zheran and Xu, Wenyuan and Wang, Xiaoyang}, title = {senDroid: Auditing Sensor Access in {Android} System-Wide}, journal = {IEEE Transactions on Dependable and Secure Computing}, year = {2017}, volume = {17}, number = {2}, doi = {https://doi.org/10.1109/TDSC.2017.2768536}, }
IEEE Transactions on Dependable and Secure Computing, 17.2(2017), pp. 407–421 - Rethinking Permission Enforcement Mechanism on Mobile Systems
@article{zhang2016FineDroid, author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao}, title = {Rethinking Permission Enforcement Mechanism on Mobile Systems}, journal = {IEEE Transactions on Information Forensics \& Security}, year = {2016}, volume = {11}, number = {10}, doi = {https://doi.org/10.1109/TIFS.2016.2581304}, }
IEEE Transactions on Information Forensics & Security, 11.10(2016), pp. 2227–2240 - AnDarwin: Scalable Detection of Android Application Clones Based on Semantics
@article{crussell2015AnDarwin, author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao}, title = {AnDarwin: Scalable Detection of {Android} Application Clones Based on Semantics}, journal = {IEEE Transactions on Mobile Computing}, year = {2015}, volume = {14}, number = {10}, doi = {https://doi.org/10.1109/TMC.2014.2381212}, }
IEEE Transactions on Mobile Computing, 14.10(2015), pp. 2007–2019 - Noncespaces: Using Randomization to Defeat Cross-Site Scripting Attacks
@article{vanGundy2012Noncespaces, author = {Van Gundy, Matthew and Chen, Hao}, title = {{Noncespaces}: Using Randomization to Defeat Cross-Site Scripting Attacks}, journal = {Computers \& Security}, year = {2012}, volume = {31}, number = {4}, doi = {https://doi.org/10.1016/j.cose.2011.12.004}, }
Computers & Security, 31.4(2012), pp. 612–628 - WebCallerID: Leveraging Cellular Networks for Web Authentication
@article{hsu2011WebCallerID, author = {Hsu, Francis and Chen, Hao and Machiraju, Sridhar}, title = {{WebCallerID}: Leveraging Cellular Networks for {Web} Authentication}, journal = {Journal of Computer Security}, year = {2011}, volume = {19}, number = {5}, doi = {https://doi.org/10.3233/JCS-2011-0424}, }
Journal of Computer Security, 19.5(2011), pp. 869–893 - Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks
@article{racic2010Scheduling, author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin}, title = {Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks}, journal = {IEEE Transactions on Mobile Computing}, year = {2009}, volume = {9}, doi = {https://doi.org/10.1109/TMC.2009.146}, }
IEEE Transactions on Mobile Computing, 9(2009), pp. 609–620 - A General Framework for Benchmarking Firewall Optimization Techniques
@article{misherghi2008Firewall, author = {Misherghi, G and Yuan, Lihua and Su, Zhendong and Chuah, Chen-Nee and Chen, Hao}, title = {A General Framework for Benchmarking Firewall Optimization Techniques}, journal = {IEEE Transactions on Network and Service Management}, year = {2008}, volume = {5}, number = {4}, doi = {https://doi.org/10.1109/TNSM.2009.041104}, }
IEEE Transactions on Network and Service Management, 5.4(2008), pp. 227–238 - Integrating Geometrical and Linguistic Analysis for E-mail Signature Block Parsing
@article{chen1999emu, author = {Chen, Hao and Hu, Jianying and Sproat, Richard}, title = {Integrating Geometrical and Linguistic Analysis for E-mail Signature Block Parsing}, journal = {ACM Transactions on Information Systems}, year = {1999}, volume = {17}, number = {4}, doi = {https://doi.org/10.1145/326440.326442}, }
ACM Transactions on Information Systems, 17.4(1999), pp. 343–366
Book chapters
- Moving Target Defenses in the HELIX Self-Regenerative Architecture
@inbook{goues2012MTD, author = {Goues, Claire Le and Nguyen-Tuong, Anh and Chen, Hao and Davidson, Jack W. and Forrest, Stephanie and Hiser, Jason D. and Knight, John C. and Van Gundy, Matthew}, title = {Moving Target Defenses in the {HELIX} Self-Regenerative Architecture}, booktitle = {Moving Target Defense II: Application of Game Theory and Adversarial Modeling}, year = {2012}, pages = {117--149}, editor = {Sushil Jajodia et al.}, publisher = {Springer-Verlag New York}, doi = {https://doi.org/10.1007/978-1-4614-5416-8_7}, }
In Moving Target Defense II: Application of Game Theory and Adversarial Modeling, pp. 117–149. Springer-Verlag New York, 2012