Kai Chen

Orcid: 0000-0002-5624-2987

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, SKLOIS, Beijing, China


According to our database1, Kai Chen authored at least 121 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions.
IEEE Trans. Inf. Forensics Secur., 2024

UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples.
IEEE Trans. Inf. Forensics Secur., 2024

DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

UMA: Facilitating Backdoor Scanning via Unlearning-Based Model Ablation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach.
Cybersecur., December, 2023

Are our clone detectors good enough? An empirical study of code effects by obfuscation.
Cybersecur., December, 2023

SkillSim: voice apps similarity detection.
Cybersecur., December, 2023

Multi-feature generation network-based imputation method for industrial data with high missing rate.
Expert Syst. Appl., October, 2023

Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development.
IEEE Trans. Serv. Comput., 2023

LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy.
IEEE Trans. Inf. Forensics Secur., 2023

A Robustness-Assured White-Box Watermark in Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Secure Aggregation is Insecure: Category Inference Attack on Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Model Stealing Attack against Multi-Exit Networks.
CoRR, 2023

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023

Aliasing Backdoor Attacks on Pre-trained Models.
Proceedings of the 32nd USENIX Security Symposium, 2023

CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Data-free Backdoor Injection Approach in Neural Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Detecting API Post-Handling Bugs Using Code and Description in Patches.
Proceedings of the 32nd USENIX Security Symposium, 2023

AURC: Detecting Errors in Program Code and Documentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities.
Proceedings of the 32nd USENIX Security Symposium, 2023

AI-Guardian: Defeating Adversarial Attacks using Backdoors.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Security Checking of Trigger-Action-Programming Smart Home Integrations.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

DBIA: Data-Free Backdoor Attack Against Transformer Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code Localization.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Towards Security Threats of Deep Learning Systems: A Survey.
IEEE Trans. Software Eng., 2022

ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs.
IEEE Trans. Reliab., 2022

Detecting Adversarial Samples for Deep Learning Models: A Comparative Study.
IEEE Trans. Netw. Sci. Eng., 2022

SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems.
ACM Trans. Priv. Secur., 2022

A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information.
CoRR, 2022

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning.
CoRR, 2022

Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

TransRepair: Context-aware Program Repair for Compilation Errors.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

VITAS : Guided Model-based VUI Testing of VPA Apps.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Understanding Real-world Threats to Deep Learning Models in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Boosting Neural Networks to Decompile Optimized Binaries.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
An Exploit Kits Detection Approach Based on HTTP Message Graph.
IEEE Trans. Inf. Forensics Secur., 2021

MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree.
IEEE Trans. Inf. Forensics Secur., 2021

Demystifying the Vetting Process of Voice-controlled Skills on Markets.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Neutron: an attention-based neural decompiler.
Cybersecur., 2021

Semantics-Recovering Decompilation through Neural Machine Translation.
CoRR, 2021

DBIA: Data-free Backdoor Injection Attack against Transformer Networks.
CoRR, 2021

DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks.
CoRR, 2021

HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks.
CoRR, 2021

SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization.
Proceedings of the WWW '21: The Web Conference 2021, 2021

DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Why is Your Trojan NOT Responding? A Quantitative Analysis of Failures in Backdoor Attacks of Neural Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Practical and Efficient in-Enclave Verification of Privacy Compliance.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside.
EAI Endorsed Trans. Security Safety, 2020

Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
CoRR, 2020

Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
CoRR, 2020

FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning.
Proceedings of the 29th USENIX Security Symposium, 2020

SkillExplorer: Understanding the Behavior of Skills in Large Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.
Proceedings of the 29th USENIX Security Symposium, 2020

A<sup>3</sup>Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

A Pragmatic Approach to Membership Inferences on Machine Learning Models.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Zipper Stack: Shadow Stacks Without Shadow.
Proceedings of the Computer Security - ESORICS 2020, 2020

RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Towards Privacy and Security of Deep Learning Systems: A Survey.
CoRR, 2019

Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019

Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Demystifying Hidden Privacy Settings in Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks.
IEEE Trans. Mob. Comput., 2018

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
IEEE Trans. Inf. Forensics Secur., 2018

Detecting telecommunication fraud by understanding the contents of a call.
Cybersecur., 2018

DroidEcho: an in-depth dissection of malicious behaviors in Android applications.
Cybersecur., 2018

Practical Adversarial Attack Against Object Detector.
CoRR, 2018

Understanding Membership Inferences on Well-Generalized Learning Models.
CoRR, 2018

A cyber security data triage operation retrieval system.
Comput. Secur., 2018

Privacy-preserving outsourced classification in cloud computing.
Clust. Comput., 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Proceedings of the Security and Privacy in Communication Networks, 2018

All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Multi-key privacy-preserving deep learning in cloud computing.
Future Gener. Comput. Syst., 2017

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Characterizing Smartwatch Usage in the Wild.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing.
IEEE Trans. Reliab., 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Frequent Subgraph Based Familial Classification of Android Malware.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

A Lattice-Based Access Control Model for Social Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR, 2015

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
AppMark: A Picture-Based Watermark for Android Apps.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Timing-Based Clone Detection on Android Markets.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Droidmarking: resilient software watermarking for impeding android application repackaging.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Achieving accuracy and scalability simultaneously in detecting application clones on Android markets.
Proceedings of the 36th International Conference on Software Engineering, 2014

An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

2013
Vulnerability-Based Backdoors: Threats from Two-step Trojans.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

VulLocator: Automatically Locating Vulnerable Code in Binary Programs.
Proceedings of the Information Security Practice and Experience, 2013

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Proceedings of the Information Security Practice and Experience, 2013

2012
Black-box testing based on colorful taint analysis.
Sci. China Inf. Sci., 2012

2011
A Map-Layer-Based Access Control Model.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
A novel vector edge sampling scheme for IP traceback against DDoS attacks.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2007
SEPCOM: customizable zero copy model.
Proceedings of the 2nd International Conference on Performance Evaluation Methodolgies and Tools, 2007


  Loading...