Hao Chen

Orcid: 0000-0002-4072-0710

Affiliations:
  • University of California, Davis, CA, USA
  • University of California, Berkeley, CA, USA (PhD 2004)


According to our database1, Hao Chen authored at least 105 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improved Generation of Adversarial Examples Against Safety-aligned LLMs.
CoRR, 2024

UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Self-Supervised Video Desmoking for Laparoscopic Surgery.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
An Interferometric Synthetic Aperture Radar Tropospheric Delay Correction Method Based on a Global Navigation Satellite System and a Backpropagation Neural Network: More Suitable for Areas with Obvious Terrain Changes.
Sensors, December, 2023

An Intermediate-Level Attack Framework on the Basis of Linear Regression.
IEEE Trans. Pattern Anal. Mach. Intell., March, 2023

Prompt Fuzzing for Fuzz Driver Generation.
CoRR, 2023

The Program Testing Ability of Large Language Models for Code.
CoRR, 2023

Code Representation Pre-training with Complements from Program Executions.
CoRR, 2023

Improving Transferability of Adversarial Examples via Bayesian Attacks.
CoRR, 2023

Improving Adversarial Transferability by Intermediate-level Perturbation Decay.
CoRR, 2023

Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Improving Adversarial Transferability via Intermediate-level Perturbation Decay.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Squeeze Training for Adversarial Robustness.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

MHCN: A Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Hopper: Interpretative Fuzzing for Libraries.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Understanding Programs by Exploiting (Fuzzing) Test Cases.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs.
IEEE Trans. Reliab., 2022

Collaborative Adversarial Training.
CoRR, 2022

AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation.
Comput. Secur., 2022

Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Membership Inference Attack in Face of Data Transformations.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
Protect privacy of deep classification networks by exploiting their generative power.
Mach. Learn., 2021

Automatically detecting and fixing concurrency bugs in go software systems.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
senDroid: Auditing Sensor Access in Android System-Wide.
IEEE Trans. Dependable Secur. Comput., 2020

Integrity: Finding Integer Errors by Targeted Fuzzing.
Proceedings of the Security and Privacy in Communication Networks, 2020

Practical No-box Adversarial Attacks against DNNs.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Backpropagating Linearly Improves Transferability of Adversarial Examples.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

StyleCAPTCHA: CAPTCHA Based on Stylized Images to Defend against Deep Networks.
Proceedings of the FODS '20: ACM-IMS Foundations of Data Science Conference, 2020

Yet Another Intermediate-Level Attack.
Proceedings of the Computer Vision - ECCV 2020, 2020

Explore the Transformation Space for Adversarial Images.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Informer: irregular traffic detection for containerized microservices RPC in the real world.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Matryoshka: Fuzzing Deeply Nested Branches.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Detecting third-party libraries in Android applications with high precision and recall.
Proceedings of the 25th International Conference on Software Analysis, 2018

Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Angora: Efficient Fuzzing by Principled Search.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

2017
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher.
Secur. Commun. Networks, 2017

Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

SurgeScan: Enforcing security policies on untrusted third-party Android libraries.
Proceedings of the 2017 IEEE SmartWorld, 2017

Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

MagNet: A Two-Pronged Defense against Adversarial Examples.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Rethinking Permission Enforcement Mechanism on Mobile Systems.
IEEE Trans. Inf. Forensics Secur., 2016

AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management.
Proceedings of the Security and Privacy in Communication Networks, 2016

POSTER: Security Analysis of Personal Unmanned Aerial Vehicles.
Proceedings of the Security and Privacy in Communication Networks, 2016

Camera-Recognizable and Human-Invisible Labelling for Privacy Protection.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

On the Origin of Mobile Apps: Network Provenance for Android Applications.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
AnDarwin: Scalable Detection of Android Application Clones Based on Semantics.
IEEE Trans. Mob. Comput., 2015

FineDroid: Enforcing Permissions with System-Wide Application Execution Context.
Proceedings of the Security and Privacy in Communication Networks, 2015

Predictive Eviction: A Novel Policy for Optimizing TLS Session Cache Performance.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014.
CoRR, 2014

MAdFraud: investigating ad fraud in android applications.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

2013
Moving Target Defenses in the Helix Self-Regenerative Architecture.
Proceedings of the Moving Target Defense II, 2013

Using and Asking: APIs Used in the Android Market and Asked about in StackOverflow.
Proceedings of the Social Informatics - 5th International Conference, 2013

Asking for (and about) permissions used by Android apps.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

Rewriting an Android app using RetroSkeleton.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

AdRob: examining the landscape and impact of android application plagiarism.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

RetroSkeleton: retrofitting android apps.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

AnDarwin: Scalable Detection of Semantically Similar Android Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

Underground economy of android application plagiarism.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
Noncespaces: Using randomization to defeat cross-site scripting attacks.
Comput. Secur., 2012

AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

On the Practicality of Motion Based Keystroke Inference Attack.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Opaak: using mobile phones to limit anonymous identities online.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Attack of the Clones: Detecting Cloned Applications on Android Markets.
Proceedings of the Computer Security - ESORICS 2012, 2012

Privacy-preserving alibi systems.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
WebCallerID: Leveraging cellular networks for Web authentication.
J. Comput. Secur., 2011

TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Proceedings of the Network and Distributed System Security Symposium, 2011

Gesture Authentication with Touch Input for Mobile Devices.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

2010
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks.
IEEE Trans. Mob. Comput., 2010

DBTaint: Cross-Application Information Flow Tracking via Databases.
Proceedings of the USENIX Conference on Web Application Development, 2010

CapAuth: A Capability-based Handover Scheme.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Defending against sensor-sniffing attacks on mobile phones.
Proceedings of the 1st ACM SIGCOMM Workshop on Networking, 2009

Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages.
Proceedings of the Security and Privacy in Communication Networks, 2009

Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2009

Noise Injection for Search Privacy Protection.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Secure file system services for web 2.0 applications.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Multi-party off-the-record messaging.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
A general framework for benchmarking firewall optimization techniques.
IEEE Trans. Netw. Serv. Manag., 2008

Distributed authentication for low-cost wireless networks.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008

iPhish: Phishing Vulnerabilities on Consumer Electronics.
Proceedings of the Usability, Psychology, and Security, 2008

Exploiting Opportunistic Scheduling in Cellular Data Networks.
Proceedings of the Network and Distributed System Security Symposium, 2008

OMash: enabling secure web mashups via object abstractions.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Spam double-funnel: connecting web spammers with advertisers.
Proceedings of the 16th International Conference on World Wide Web, 2007

A Quantitative Study of Forum Spamming Using Context-based Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2007

Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Back to the Future: A Framework for Automatic Malware Removal and System Repair.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Model Checking An Entire Linux Distribution for Security Violations.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Model Checking One Million Lines of C Code.
Proceedings of the Network and Distributed System Security Symposium, 2004

Using build-integrated static checking to preserve correctness invariants.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2002
Setuid Demystified.
Proceedings of the 11th USENIX Security Symposium, 2002

MOPS: an infrastructure for examining security properties of software.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Optimizing search by showing results in context.
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001

2000
Hierarchical classification of Web content.
Proceedings of the SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2000

Evaluation of decision forests on text categorization.
Proceedings of the Document Recognition and Retrieval VII, 2000

Bringing order to the Web: automatically categorizing search results.
Proceedings of the CHI 2000 Conference on Human factors in computing systems, 2000

1999
Integrating geometrical and linguistic analysis for email signature block parsing.
ACM Trans. Inf. Syst., 1999

1998
Emu: an e-mail preprocessor for text-to-speech.
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998

E-mail signature block analysis.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

1997
Piecewise Linear Modulation Model of Handwriting.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997


  Loading...