Hao Chen
Orcid: 0000-0002-4072-0710Affiliations:
- University of California, Davis, CA, USA
- University of California, Berkeley, CA, USA (PhD 2004)
According to our database1,
Hao Chen
authored at least 105 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
An Interferometric Synthetic Aperture Radar Tropospheric Delay Correction Method Based on a Global Navigation Satellite System and a Backpropagation Neural Network: More Suitable for Areas with Obvious Terrain Changes.
Sensors, December, 2023
IEEE Trans. Pattern Anal. Mach. Intell., March, 2023
CoRR, 2023
CoRR, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
IEEE Trans. Reliab., 2022
Comput. Secur., 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Protect privacy of deep classification networks by exploiting their generative power.
Mach. Learn., 2021
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the FODS '20: ACM-IMS Foundations of Data Science Conference, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Informer: irregular traffic detection for containerized microservices RPC in the real world.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Detecting third-party libraries in Android applications with high precision and recall.
Proceedings of the 25th International Conference on Software Analysis, 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
2017
Secur. Commun. Networks, 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management.
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Mob. Comput., 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
CoRR, 2014
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014
2013
Proceedings of the Moving Target Defense II, 2013
Proceedings of the Social Informatics - 5th International Conference, 2013
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
2012
Comput. Secur., 2012
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the 10th International Conference on Mobile Systems, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
J. Comput. Secur., 2011
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011
2010
IEEE Trans. Mob. Comput., 2010
Proceedings of the USENIX Conference on Web Application Development, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
Proceedings of the 1st ACM SIGCOMM Workshop on Networking, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IEEE Trans. Netw. Serv. Manag., 2008
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001
2000
Proceedings of the SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2000
Proceedings of the Document Recognition and Retrieval VII, 2000
Proceedings of the CHI 2000 Conference on Human factors in computing systems, 2000
1999
ACM Trans. Inf. Syst., 1999
1998
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998
1997
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997