Hao Chen

According to our database1, Hao Chen authored at least 59 papers between 1997 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Detecting third-party libraries in Android applications with high precision and recall.
Proceedings of the 25th International Conference on Software Analysis, 2018

2017
SurgeScan: Enforcing security policies on untrusted third-party Android libraries.
Proceedings of the 2017 IEEE SmartWorld, 2017

2016
Rethinking Permission Enforcement Mechanism on Mobile Systems.
IEEE Trans. Information Forensics and Security, 2016

On the Origin of Mobile Apps: Network Provenance for Android Applications.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
AnDarwin: Scalable Detection of Android Application Clones Based on Semantics.
IEEE Trans. Mob. Comput., 2015

FineDroid: Enforcing Permissions with System-Wide Application Execution Context.
Proceedings of the Security and Privacy in Communication Networks, 2015

Predictive Eviction: A Novel Policy for Optimizing TLS Session Cache Performance.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
MAdFraud: investigating ad fraud in android applications.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

2013
Moving Target Defenses in the Helix Self-Regenerative Architecture.
Proceedings of the Moving Target Defense II, 2013

Using and Asking: APIs Used in the Android Market and Asked about in StackOverflow.
Proceedings of the Social Informatics - 5th International Conference, 2013

Asking for (and about) permissions used by Android apps.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

Rewriting an Android app using RetroSkeleton.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

AdRob: examining the landscape and impact of android application plagiarism.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

AdRob: examining the landscape and impact of android application plagiarism.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

RetroSkeleton: retrofitting android apps.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

AnDarwin: Scalable Detection of Semantically Similar Android Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

Underground economy of android application plagiarism.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
Noncespaces: Using randomization to defeat cross-site scripting attacks.
Computers & Security, 2012

AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

On the Practicality of Motion Based Keystroke Inference Attack.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Opaak: using mobile phones to limit anonymous identities online.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Attack of the Clones: Detecting Cloned Applications on Android Markets.
Proceedings of the Computer Security - ESORICS 2012, 2012

Privacy-preserving alibi systems.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
WebCallerID: Leveraging cellular networks for Web authentication.
Journal of Computer Security, 2011

TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Proceedings of the Network and Distributed System Security Symposium, 2011

Gesture Authentication with Touch Input for Mobile Devices.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

2010
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks.
IEEE Trans. Mob. Comput., 2010

DBTaint: Cross-Application Information Flow Tracking via Databases.
Proceedings of the USENIX Conference on Web Application Development, 2010

CapAuth: A Capability-based Handover Scheme.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Defending against sensor-sniffing attacks on mobile phones.
Proceedings of the 1st ACM SIGCOMM Workshop on Networking, 2009

Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages.
Proceedings of the Security and Privacy in Communication Networks, 2009

Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2009

Noise Injection for Search Privacy Protection.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Secure file system services for web 2.0 applications.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Multi-party off-the-record messaging.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
A general framework for benchmarking firewall optimization techniques.
IEEE Trans. Network and Service Management, 2008

Distributed authentication for low-cost wireless networks.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008

iPhish: Phishing Vulnerabilities on Consumer Electronics.
Proceedings of the Usability, Psychology, and Security, 2008

Exploiting Opportunistic Scheduling in Cellular Data Networks.
Proceedings of the Network and Distributed System Security Symposium, 2008

OMash: enabling secure web mashups via object abstractions.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Spam double-funnel: connecting web spammers with advertisers.
Proceedings of the 16th International Conference on World Wide Web, 2007

A Quantitative Study of Forum Spamming Using Context-based Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2007

Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Back to the Future: A Framework for Automatic Malware Removal and System Repair.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Model Checking An Entire Linux Distribution for Security Violations.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Model Checking One Million Lines of C Code.
Proceedings of the Network and Distributed System Security Symposium, 2004

Using build-integrated static checking to preserve correctness invariants.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2002
Setuid Demystified.
Proceedings of the 11th USENIX Security Symposium, 2002

MOPS: an infrastructure for examining security properties of software.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Optimizing search by showing results in context.
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001

2000
Hierarchical classification of Web content.
Proceedings of the SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2000

Bringing order to the Web: automatically categorizing search results.
Proceedings of the CHI 2000 Conference on Human factors in computing systems, 2000

1999
Integrating geometrical and linguistic analysis for email signature block parsing.
ACM Trans. Inf. Syst., 1999

1998
Emu: an e-mail preprocessor for text-to-speech.
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998

E-mail signature block analysis.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

1997
Piecewise Linear Modulation Model of Handwriting.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997


  Loading...