Chao Chen

Orcid: 0000-0003-1355-3870

Affiliations:
  • RMIT University, Melbourne, VIC, Australia
  • James Cook University, Townsville, QLD, Australia (former)
  • Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia (former)
  • Deakin University, Geelong, Australia (former)


According to our database1, Chao Chen authored at least 72 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
IoTFuzz: Automated Discovery of Violations in Smart Homes With Real Environment.
IEEE Internet Things J., March, 2024

Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models.
IEEE Trans. Dependable Secur. Comput., 2024

LocGuard: A Location Privacy Defender for Image Sharing.
IEEE Trans. Dependable Secur. Comput., 2024

MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback.
Inf. Process. Manag., 2024

Memorization in deep learning: A survey.
CoRR, 2024

Large Language Model Watermark Stealing With Mixed Integer Programming.
CoRR, 2024

Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness.
CoRR, 2024

Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

Clustering-based Evaluation Framework of Feature Extraction Approaches for ECG Biometric Authentication.
Proceedings of the International Joint Conference on Neural Networks, 2024

Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

2023
A Survey of PPG's Application in Authentication.
Comput. Secur., December, 2023

Security and privacy problems in voice assistant applications: A survey.
Comput. Secur., November, 2023

Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method.
IEEE Trans. Comput. Soc. Syst., April, 2023

Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023

Editorial for special issue on security and trust on networked systems.
Int. J. Netw. Manag., 2023

Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023

A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023

Client-side Gradient Inversion Against Federated Learning from Poisoning.
CoRR, 2023

model-based script synthesis for fuzzing.
CoRR, 2023

SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs.
CoRR, 2023

VulMatch: Binary-level Vulnerability Detection Through Signature.
CoRR, 2023

SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups.
Proceedings of the International Joint Conference on Neural Networks, 2023

Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication.
Proceedings of the Computer Security - ESORICS 2023, 2023

WinkFuzz: Model-based Script Synthesis for Fuzzing.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

2022
Social Media Event Prediction using DNN with Feedback Mechanism.
ACM Trans. Manag. Inf. Syst., 2022

Improving Network-Based Anomaly Detection in Smart Home Environment.
Sensors, 2022

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022

Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey.
ACM Comput. Surv., 2022

Event detection in online social network: Methodologies, state-of-art, and evolution.
Comput. Sci. Rev., 2022

FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation.
CoRR, 2022

SoK: An Overview of PPG's Application in Authentication.
CoRR, 2022

A Survey on IoT Vulnerability Discovery.
Proceedings of the Network and System Security - 16th International Conference, 2022

Automated Binary Analysis: A Survey.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

No-Label User-Level Membership Inference for ASR Model Auditing.
Proceedings of the Computer Security - ESORICS 2022, 2022

Working Mechanism of Eternalblue and Its Application in Ransomworm.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

Video is All You Need: Attacking PPG-based Biometric Authentication.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021

Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey.
CoRR, 2021

TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

A Practical Botnet Traffic Detection System Using GNN.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
Cyber Vulnerability Intelligence for Internet of Things Binary.
IEEE Trans. Ind. Informatics, 2020

Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT.
CoRR, 2019

A performance evaluation of deep-learnt features for software vulnerability detection.
Concurr. Comput. Pract. Exp., 2019

Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs.
IEEE Access, 2019

Exploit in Smart Devices: A Case Study.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
Deep-learnt features for Twitter spam detection.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

Anomaly-Based Insider Threat Detection Using Deep Autoencoders.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

2017
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Inf. Forensics Secur., 2017

Energy-aware scheduling of virtual machines in heterogeneous cloud computing systems.
Future Gener. Comput. Syst., 2017

Investigating the deceptive information in Twitter spam.
Future Gener. Comput. Syst., 2017

Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Comput. Secur., 2017

2016
Comments and Corrections.
IEEE Trans. Comput. Soc. Syst., 2016

Spammers Are Becoming "Smarter" on Twitter.
IT Prof., 2016

Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo.
Proceedings of the Network and System Security - 10th International Conference, 2016

An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Soc. Syst., 2015

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

Unknown pattern extraction for statistical network protocol identification.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Asymmetric self-learning for tackling Twitter Spam Drift.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
An Effective Network Traffic Classification Method with Unknown Flow Detection.
IEEE Trans. Netw. Serv. Manag., 2013

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IEEE Trans. Inf. Forensics Secur., 2013

Robust network traffic identification with unknown applications.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Semi-supervised and compound classification of network traffic.
Int. J. Secur. Networks, 2012

Classification of Correlated Internet Traffic Flows.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...