Kai Chen
TitleCited byYear
Achieving accuracy and scalability simultaneously in detecting application clones on android markets
K Chen, P Liu, Y Zhang
Proceedings of the 36th International Conference on Software Engineering …, 2014
2032014
Multi-key privacy-preserving deep learning in cloud computing
P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen
Future Generation Computer Systems 74, 76-85, 2017
1722017
Privacy-preserving outsourced classification in cloud computing
P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen
Cluster Computing 21 (1), 277-286, 2018
1462018
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
1462015
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
612016
From system services freezing to system server shutdown in android: All you need is a loop in an app
H Huang, S Zhu, K Chen, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
462015
Hare hunting in the wild android: A study on the threat of hanging attribute references
Y Aafer, N Zhang, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
442015
Cracking app isolation on apple: Unauthorized cross-app resource access on mac os
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Cracking app isolation on apple: Unauthorized cross-app resource access on mac os
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Cracking app isolation on apple: Unauthorized cross-app resource access on mac os
L Xing, X Bai, T Li, XF Wang, K Chen, X Liao, SM Hu, X Han
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
432015
Droidmarking: resilient software watermarking for impeding android application repackaging
C Ren, K Chen, P Liu
Proceedings of the 29th ACM/IEEE international conference on Automated …, 2014
412014
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017
342017
Understanding membership inferences on well-generalized learning models
Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ...
arXiv preprint arXiv:1802.04889, 2018
312018
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
272017
Characterizing smartwatch usage in the wild
X Liu, T Chen, F Qian, Z Guo, FX Lin, X Wang, K Chen
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
262017
Android malware familial classification and representative sample selection via frequent subgraph analysis
M Fan, J Liu, X Luo, K Chen, Z Tian, Q Zheng, T Liu
IEEE Transactions on Information Forensics and Security 13 (8), 1890-1905, 2018
242018
Commandersong: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 49-64, 2018
242018
Towards discovering and understanding unexpected hazards in tailoring antivirus software for android
H Huang, K Chen, C Ren, P Liu, S Zhu, D Wu
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
202015
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
W You, P Zong, K Chen, XF Wang, X Liao, P Bian, B Liang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
192017
An exploratory study of white hat behaviors in a web vulnerability disclosure program
M Zhao, J Grossklags, K Chen
Proceedings of the 2014 ACM workshop on security information workers, 51-58, 2014
192014
The system can't perform the operation now. Try again later.
Articles 1–20