Kehuan Zhang

Affiliations:
  • The Chinese University of Hong Kong, China


According to our database1, Kehuan Zhang authored at least 64 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest.
Pattern Recognit., March, 2024

2023
PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding.
Proceedings of the 32nd USENIX Security Symposium, 2023

Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Authorisation inconsistency in IoT third-party integration.
IET Inf. Secur., 2022

Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples.
CoRR, 2022

An empirical study of blockchain system vulnerabilities: modules, types, and patterns.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Default: Mutual Information-based Crash Triage for Massive Crashes.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities.
CoRR, 2021

Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
Proceedings of the 30th USENIX Security Symposium, 2021

Understanding the Brains and Brawn of Illicit Streaming App.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

Towards Evaluating and Training Verifiably Robust Neural Networks.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Android on PC: On the Security of End-user Android Emulators.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2020

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Understanding Mobile Users' Privacy Expectations: A Recommendation-Based Method Through Crowdsourcing.
IEEE Trans. Serv. Comput., 2019

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.
CoRR, 2019

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding.
Comput. Secur., 2019

Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Security Analysis of Device Binding for IP-based IoT Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
When Privacy Meets Usability: Unobtrusive Privacy Permission Recommendation System for Mobile Apps Based on Crowdsourcing.
IEEE Trans. Serv. Comput., 2018

Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur., 2018

Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks.
Cybersecur., 2018

Invisible Mask: Practical Attacks on Face Recognition with Infrared.
CoRR, 2018

Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints.
CoRR, 2018

Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features.
IEEE Access, 2018

Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.
Proceedings of the 27th USENIX Security Symposium, 2018

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Proceedings of the Security and Privacy in Communication Networks, 2018

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU.
Proc. Priv. Enhancing Technol., 2017

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017

All Your VMs are Disconnected: Attacking Hardware Virtualized Network.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Evading Android Runtime Analysis Through Detecting Programmed Interactions.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO.
Proceedings of the 25th USENIX Security Symposium, 2016

No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Efficient Authenticated Multi-Pattern Matching.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

On Code Execution Tracking via Power Side-Channel.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
An Empirical Study on Android for Saving Non-shared Data on Public Storage.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

PriWe: Recommendation for Privacy Settings of Mobile Apps Based on Crowdsourced Users' Expectations.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections.
Proceedings of the Computer Security - ESORICS 2015, 2015

When Good Becomes Evil: Keystroke Inference with Smartwatch.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound.
CoRR, 2014

Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR, 2014

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2012
Knowing your enemy: understanding and detecting malicious web advertising.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
Proceedings of the Network and Distributed System Security Symposium, 2011

Sedic: privacy-aware data intensive computing on hybrid clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Mash-IF: Practical information-flow control within client-side mashups.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Sidebuster: automated detection and quantification of side-channel leaks in web application development.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems.
Proceedings of the 18th USENIX Security Symposium, 2009

2008
Towards automatic reverse engineering of software security configurations.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008


  Loading...