Chenxiong Qian

Orcid: 0000-0002-6201-6011

According to our database1, Chenxiong Qian authored at least 28 papers between 2014 and 2025.

Collaborative distances:

Timeline

2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
1
3
1
1
1
1
1
1
3
1
1
1
1
3
2
1
1
3
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Bones of Contention: Exploring Query-Efficient Attacks Against Skeleton Recognition Systems.
CoRR, January, 2025

Automatic Library Fuzzing through API Relation Evolvement.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
Identify As A Human Does: A Pathfinder of Next-Generation Anti-Cheat Framework for First-Person Shooter Games.
CoRR, 2024

CONGRA: Benchmarking Automatic Conflict Resolution.
CoRR, 2024

WizardMerge - Save Us From Merging Without Any Clues.
CoRR, 2024

Invisibility Cloak: Proactive Defense Against Visual Game Cheating.
Proceedings of the 33rd USENIX Security Symposium, 2024

Revisiting Automotive Attack Surfaces: a Practitioners' Perspective.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
CydiOS: A Model-Based Testing Framework for iOS Apps.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
DeView: Confining Progressive Web Applications by Debloating Web APIs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Reducing Software's Attack surface with Code Debloating.
PhD thesis, 2021

2020
Slimium: Debloating the Chromium Browser with Feature Subsetting.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts.
IEEE Trans. Inf. Forensics Secur., 2019

RAZOR: A Framework for Post-deployment Software Debloating.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy.
IEEE Trans. Software Eng., 2018

Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Enforcing Unique Code Target Property for Control-Flow Integrity.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Efficient Protection of Path-Sensitive Control Security.
Proceedings of the 26th USENIX Security Symposium, 2017

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques.
ACM Comput. Surv., 2016

Revisiting the Description-to-Behavior Fidelity in Android Applications.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

2015
VulHunter: Toward Discovering Vulnerabilities in Android Applications.
IEEE Micro, 2015

AndroidPerf: A cross-layer profiling system for Android applications.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

2014
RootGuard: Protecting Rooted Android Phones.
Computer, 2014

On Measuring One-Way Path Metrics from a Web Server.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

On Tracking Information Flows through JNI in Android Applications.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Towards a scalable resource-driven approach for detecting repackaged Android applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014


  Loading...