Sen Chen

According to our database1, Sen Chen authored at least 55 papers between 2016 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation.
ACM Trans. Softw. Eng. Methodol., 2021

A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2021

On Active Disturbance Rejection Control for a Class of Uncertain Systems With Measurement Uncertainty.
IEEE Trans. Ind. Electron., 2021

Generalized observability analysis and observer design for a class of systems with multiple uncertain dynamics and measurement biases.
Syst. Control. Lett., 2021

Quality Prediction of Strip in Finishing Rolling Process Based on GBDBN-ELM.
J. Sensors, 2021

ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications.
CoRR, 2021

Research on four-wheel independent steering intelligent control strategy based on minimum load.
Concurr. Comput. Pract. Exp., 2021

PolarDB Serverless: A Cloud Native Database for Disaggregated Data Centers.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
The selection criterion of nominal model in active disturbance rejection control for non-affine uncertain systems.
J. Frankl. Inst., 2020

SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices.
CoRR, 2020

The necessary and sufficient condition for the uncertain control gain in active disturbance rejection control.
CoRR, 2020

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation.
CoRR, 2020

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers.
CoRR, 2020

On the conceptualization of total disturbance and its profound implications.
Sci. China Inf. Sci., 2020

Fault Location of Strip Steel Surface Quality Defects on Hot-Rolling Production Line Based on Information Fusion of Historical Cases and Process Data.
IEEE Access, 2020

Top-Down Human-Cyber-Physical Data Fusion Based on Reinforcement Learning.
IEEE Access, 2020

CORE: Automating Review Recommendation for Code Changes.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

Automated Third-Party Library Detection for Android Applications: Are We There Yet?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

On Dynamic Hypervisor Placement in Virtualized Software Defined Networks (vSDNs).
Proceedings of the 22nd International Conference on Transparent Optical Networks, 2020

An empirical assessment of security risks of global Android banking apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

SeqMobile: An Efficient Sequence-Based Malware Detection System Using RNN on Mobile Devices.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Global Output-Feedback Finite-Time Stabilization Using a Switching Technique.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Universal Value Iteration Networks: When Spatially-Invariant Is Not Universal.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A Robust Pedestrian Dead Reckoning System Using Low-Cost Magnetic and Inertial Sensors.
IEEE Trans. Instrum. Meas., 2019

基于NAWL-ILSTM的网络安全态势预测方法 (Network Security Situation Prediction Method Based on NAWL-ILSTM).
计算机科学, 2019

ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking.
CoRR, 2019

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.
CoRR, 2019

Linear Active Disturbance Rejection Control for Nonaffine Strict-Feedback Nonlinear Systems.
IEEE Access, 2019

An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

A large-scale empirical study on industrial fake apps.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

StoryDroid: automated generation of storyboard for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019

MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

On Active Disturbance Rejection Based Path Following Control for Unmanned Roller.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

On Active Disturbance Rejection Control for Path Following of Automated Guided Vehicle with Uncertain Velocities.
Proceedings of the 2019 American Control Conference, 2019

2018
PolarFS: An Ultra-low Latency and Failure Resilient Distributed File System for Shared Storage Cloud Database.
Proc. VLDB Endow., 2018

Secure Deep Learning Engineering: A Software Quality Assurance Perspective.
CoRR, 2018

AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps.
CoRR, 2018

Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Comput. Secur., 2018

On comparison of modified ADRCs for nonlinear uncertain systems with time delay.
Sci. China Inf. Sci., 2018

Maintenance decision methodology of petrochemical plant based on fuzzy curvelet neural network.
Appl. Soft Comput., 2018

Hierarchical calibration architecture based on Inertial/magnetic sensors for indoor positioning.
Proceedings of the 2018 Ubiquitous Positioning, 2018

Are mobile banking apps secure? what can be improved?
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Efficiently manifesting asynchronous programming errors in Android apps.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Large-scale analysis of framework-specific exceptions in Android apps.
Proceedings of the 40th International Conference on Software Engineering, 2018

Longitudinal Sparse Regression for Neuroimage Based Consciousness Assessing and Tracking of Hydrocephalus Patients.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

2017
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.
CoRR, 2017

On comparison between Smith Predictor and Predictor Observer based ADRCs for nonlinear uncertain systems with output delay.
Proceedings of the 2017 American Control Conference, 2017

2016
Output Voltage Sampling Circuit for Discontinuous Conduction Mode Flyback Pulse-Width Modulation Controller.
J. Circuits Syst. Comput., 2016

Towards adversarial detection of mobile malware: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Model-Based Continuous Verification.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016


  Loading...