Kai Chen
Cited by
Cited by
Multi-key privacy-preserving deep learning in cloud computing
P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen
Future Generation Computer Systems 74, 76-85, 2017
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
Privacy-preserving outsourced classification in cloud computing
P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen
Cluster Computing 21, 277-286, 2018
Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015
{CommanderSong}: a systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64, 2018
Understanding membership inferences on well-generalized learning models
Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ...
arXiv preprint arXiv:1802.04889, 2018
Android malware familial classification and representative sample selection via frequent subgraph analysis
M Fan, J Liu, X Luo, K Chen, Z Tian, Q Zheng, T Liu
IEEE Transactions on Information Forensics and Security 13 (8), 1890-1905, 2018
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017
Deeprefiner: Multi-layer android malware detection system applying deep neural networks
K Xu, Y Li, RH Deng, K Chen
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 473-487, 2018
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and privacy in communication networks: 14th international …, 2018
Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice …
X Yuan
27th {USENIX} Security Symposium ({USENIX} Security 18), 49-64, 2018
Droidevolver: Self-evolving android malware detection system
K Xu, Y Li, R Deng, K Chen, J Xu
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 47-62, 2019
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
{FuzzGuard}: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning
P Zong, T Lv, D Wang, Z Deng, R Liang, K Chen
29th USENIX security symposium (USENIX security 20), 2255-2269, 2020
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
Towards security threats of deep learning systems: A survey
Y He, G Meng, K Chen, X Hu, J He
IEEE Transactions on Software Engineering 48 (5), 1743-1770, 2020
A cyber security data triage operation retrieval system
C Zhong, T Lin, P Liu, J Yen, K Chen
Computers & Security 76, 12-31, 2018
Characterizing smartwatch usage in the wild
X Liu, T Chen, F Qian, Z Guo, FX Lin, X Wang, K Chen
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20