Qi Alfred Chen
Titel
Zitiert von
Zitiert von
Jahr
Peeking into Your App without Actually Seeing It:{UI} State Inference and Novel Android Attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
2182014
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS, 2017
1872017
A confidence-based filtering method for DDoS attack defense in cloud environment
W Dou, Q Chen, J Chen
Future Generation Computer Systems 29 (7), 1838-1850, 2013
1052013
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
QA Chen, H Luo, S Rosen, ZM Mao, K Iyer, J Hui, K Sontineni, K Lau
Proceedings of the 2014 Conference on Internet Measurement Conference, 151-164, 2014
982014
CBF: a packet filtering method for DDoS attack defense in cloud environment
Q Chen, W Lin, W Dou, S Yu
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
972011
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
702019
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks
S Rosen, H Luo, QA Chen, ZM Mao, J Hui, A Drake, K Lau
Proceedings of the 20th annual international conference on Mobile computing …, 2014
622014
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
562016
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
QA Chen, Y Yin, Y Feng, ZM Mao, HX Liu
NDSS, 2018
512018
Android ui deception revisited: Attacks and defenses
E Fernandes, QA Chen, J Paupore, G Essl, JA Halderman, ZM Mao, ...
International Conference on Financial Cryptography and Data Security, 41-59, 2016
462016
Understanding on-device bufferbloat for cellular upload
Y Guo, F Qian, QA Chen, ZM Mao, S Sen
Proceedings of the 2016 Internet Measurement Conference, 303-317, 2016
312016
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
272018
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
272018
Open doors for bob and mallory: Open port usage in android apps and security implications
YJ Jia, QA Chen, Y Lin, C Kong, ZM Mao
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 190-203, 2017
252017
Static Detection of Packet Injection Vulnerabilities–A Case for Identifying Attacker-controlled Implicit Information Leaks
QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
252015
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
172019
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE
YJ Jia, QA Chen, ZM Mao, J Hui, K Sontinei, A Yoon, S Kwong, K Lau
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
172015
TIVOs: Trusted Visual I/O Paths for Android
E Fernandes, QA Chen, G Essl, JA Halderman, ZM Mao, A Prakash
University of Michigan CSE Technical Report CSE-TR-586-14, 2014
162014
QoE inference without application control
A Nikravesh, DK Hong, QA Chen, HV Madhyastha, ZM Mao
Proceedings of the 2016 workshop on QoE-based Analysis and Management of …, 2016
152016
MitM attack by name collision: Cause analysis and vulnerability assessment in the new gTLD era
QA Chen, E Osterweil, M Thomas, ZM Mao
2016 IEEE Symposium on Security and Privacy (SP), 675-690, 2016
152016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20