Qi Alfred Chen

Orcid: 0000-0003-0316-9285

Affiliations:
  • University of California Irvine, USA


According to our database1, Qi Alfred Chen authored at least 98 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective.
CoRR, 2024

ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving.
CoRR, 2024

Exploring Backdoor Attacks against Large Language Model-based Decision Making.
CoRR, 2024

Towards Automated Driving Violation Cause Analysis in Scenario-Based Testing for Autonomous Driving Systems.
CoRR, 2024

On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024

DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts.
Proceedings of the 33rd USENIX Security Symposium, 2024

LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

"Prompter Says": A Linguistic Approach to Understanding and Detecting Jailbreak Attacks Against Large-Language Models.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

Intriguing Properties of Diffusion Models: An Empirical Study of the Natural Attack Capability in Text-to-Image Generative Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
scenoRITA: Generating Diverse, Fully Mutable, Test Scenarios for Autonomous Vehicle Planning.
IEEE Trans. Software Eng., October, 2023

Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration.
IEEE Trans. Intell. Transp. Syst., September, 2023

Cloud and Edge Computing for Connected and Automated Vehicles.
Found. Trends Electron. Des. Autom., 2023

Intriguing Properties of Diffusion Models: A Large-Scale Dataset for Evaluating Natural Attack Capability in Text-to-Image Generative Models.
CoRR, 2023

Revisiting LiDAR Spoofing Attack Capabilities against Object Detection: Improvements, Measurement, and New Attack.
CoRR, 2023

Detecting Data Spoofing in Connected Vehicle based Intelligent Traffic Signal Control using Infrastructure-Side Sensors and Traffic Invariants.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2023

Learning Representation for Anomaly Detection of Vehicle Trajectories.
IROS, 2023

Lateral-Direction Localization Attack in High-Level Autonomous Driving: Domain-Specific Defense Opportunity via Lane Detection.
IROS, 2023

Doppelgänger Test Generation for Revealing Bugs in Autonomous Driving Software.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Semi-supervised Semantics-guided Adversarial Training for Robust Trajectory Prediction.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Invited: Waving the Double-Edged Sword: Building Resilient CAVs with Edge and Cloud Computing.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Adversarial Attacks on Adaptive Cruise Control Systems.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

2022
On the Cybersecurity of Traffic Signal Control System With Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Semi-supervised Semantics-guided Adversarial Training for Trajectory Prediction.
CoRR, 2022

SoK: On the Semantic AI Security in Autonomous Driving.
CoRR, 2022

Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022

On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Towards Driving-Oriented Metric for Lane Detection Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks, 2021

A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View.
J. Comput. Sci. Technol., 2021

Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding.
Int. J. Intell. Syst., 2021

scenoRITA: Generating Less-Redundant, Safety-Critical and Motion Sickness-Inducing Scenarios for Autonomous Vehicles.
CoRR, 2021

On Robustness of Lane Detection Models to Physical-World Adversarial Attacks in Autonomous Driving.
CoRR, 2021

Threat detection and investigation with system-level provenance graphs: A survey.
Comput. Secur., 2021

Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
Proceedings of the 30th USENIX Security Symposium, 2021

Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Demo: ROI Attacks on Traffic Light Detection in High-Level Autonomous Driving.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Demo: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Demo: Security of Camera-based Perception for Autonomous Driving under Adversarial Attack.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Demo: Attacking Multi-Sensor Fusion based Localization in High-Level Autonomous Driving.
Proceedings of the IEEE Security and Privacy Workshops, 2021

A nationwide census on wifi security threats: prevalence, riskiness, and the economics.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

End-to-end Uncertainty-based Mitigation of Adversarial Attacks to Automated Lane Centering.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021

Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection Sensor Fusion Models.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Towards Secure and Robust Autonomy Software in Autonomous Driving and Smart Transportation.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

Intrinsic Examples: Robust Fingerprinting of Deep Neural Networks.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

On Adversarial Robustness of 3D Point Cloud Classification under Adaptive Attacks.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

2020
On the Adversarial Robustness of 3D Point Cloud Classification.
CoRR, 2020

Impact Evaluation of Falsified Data Attacks on Connected Vehicle Based Traffic Signal Control.
CoRR, 2020

Hold Tight and Never Let Go: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
CoRR, 2020

Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing (Extended Version).
CoRR, 2020

Threat Detection and Investigation with System-level Provenance Graphs: A Survey.
CoRR, 2020

Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack.
CoRR, 2020

Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Proceedings of the 29th USENIX Security Symposium, 2020

Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.
Proceedings of the 29th USENIX Security Symposium, 2020

Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing.
Proceedings of the 29th USENIX Security Symposium, 2020

Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

A comprehensive study of autonomous vehicle bugs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking.
Proceedings of the 8th International Conference on Learning Representations, 2020

Experiences of landing machine learning onto market-scale mobile malware detection.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

2019
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.
CoRR, 2019

Understanding and Detecting Overlay-based Android Malware at Market Scales.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

QoE Inference and Improvement Without End-Host Control.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

No One In The Middle: Enabling Network Access Control Via Transparent Attribution.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Towards secure and safe appified automated vehicles.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

An Initial Investigation of Protocol Customization.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

QoE Inference Without Application Control.
Proceedings of the 2016 workshop on QoE-based Analysis and Management of Data Communication Networks, 2016

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Understanding On-device Bufferbloat for Cellular Upload.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Android UI Deception Revisited: Attacks and Defenses.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Efficient route guidance in vehicular wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Understanding RRC state dynamics through client measurements with mobilyzer.
Proceedings of the 6th annual workshop on Wireless of the students, 2014

Discovering fine-grained RRC state dynamics and performance impacts in cellular networks.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014


  Loading...