Kehuan Zhang
Orcid: 0000-0003-1519-0057Affiliations:
- The Chinese University of Hong Kong, China
According to our database1,
Kehuan Zhang
authored at least 66 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest.
Pattern Recognit., March, 2024
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-Specific Code Embeddings.
Proc. ACM Softw. Eng., 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
CoRR, 2022
An empirical study of blockchain system vulnerabilities: modules, types, and patterns.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
2021
Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities.
CoRR, 2021
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Understanding Mobile Users' Privacy Expectations: A Recommendation-Based Method Through Crowdsourcing.
IEEE Trans. Serv. Comput., 2019
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.
CoRR, 2019
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding.
Comput. Secur., 2019
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
When Privacy Meets Usability: Unobtrusive Privacy Permission Recommendation System for Mobile Apps Based on Crowdsourcing.
IEEE Trans. Serv. Comput., 2018
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur., 2018
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks.
Cybersecur., 2018
Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints.
CoRR, 2018
Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features.
IEEE Access, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO.
Proceedings of the 25th USENIX Security Symposium, 2016
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
PriWe: Recommendation for Privacy Settings of Mobile Apps Based on Crowdsourced Users' Expectations.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound.
CoRR, 2014
Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR, 2014
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Sidebuster: automated detection and quantification of side-channel leaks in web application development.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the 18th USENIX Security Symposium, 2009
2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008