Qi Alfred Chen
Orcid: 0000-0003-0316-9285Affiliations:
- University of California Irvine, USA
According to our database1,
Qi Alfred Chen
authored at least 98 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective.
CoRR, 2024
ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving.
CoRR, 2024
CoRR, 2024
Towards Automated Driving Violation Cause Analysis in Scenario-Based Testing for Autonomous Driving Systems.
CoRR, 2024
On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
"Prompter Says": A Linguistic Approach to Understanding and Detecting Jailbreak Attacks Against Large-Language Models.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Intriguing Properties of Diffusion Models: An Empirical Study of the Natural Attack Capability in Text-to-Image Generative Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
scenoRITA: Generating Diverse, Fully Mutable, Test Scenarios for Autonomous Vehicle Planning.
IEEE Trans. Software Eng., October, 2023
Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration.
IEEE Trans. Intell. Transp. Syst., September, 2023
Found. Trends Electron. Des. Autom., 2023
Intriguing Properties of Diffusion Models: A Large-Scale Dataset for Evaluating Natural Attack Capability in Text-to-Image Generative Models.
CoRR, 2023
Revisiting LiDAR Spoofing Attack Capabilities against Object Detection: Improvements, Measurement, and New Attack.
CoRR, 2023
Detecting Data Spoofing in Connected Vehicle based Intelligent Traffic Signal Control using Infrastructure-Side Sensors and Traffic Invariants.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2023
Lateral-Direction Localization Attack in High-Level Autonomous Driving: Domain-Specific Defense Opportunity via Lane Detection.
IROS, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Semi-supervised Semantics-guided Adversarial Training for Robust Trajectory Prediction.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Invited: Waving the Double-Edged Sword: Building Resilient CAVs with Edge and Cloud Computing.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
CoRR, 2022
Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks, 2021
A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software.
Proc. ACM Meas. Anal. Comput. Syst., 2021
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View.
J. Comput. Sci. Technol., 2021
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding.
Int. J. Intell. Syst., 2021
scenoRITA: Generating Less-Redundant, Safety-Critical and Motion Sickness-Inducing Scenarios for Autonomous Vehicles.
CoRR, 2021
On Robustness of Lane Detection Models to Physical-World Adversarial Attacks in Autonomous Driving.
CoRR, 2021
Comput. Secur., 2021
Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
Proceedings of the 30th USENIX Security Symposium, 2021
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Demo: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
Proceedings of the IEEE Security and Privacy Workshops, 2021
Demo: Security of Camera-based Perception for Autonomous Driving under Adversarial Attack.
Proceedings of the IEEE Security and Privacy Workshops, 2021
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Demo: Attacking Multi-Sensor Fusion based Localization in High-Level Autonomous Driving.
Proceedings of the IEEE Security and Privacy Workshops, 2021
A nationwide census on wifi security threats: prevalence, riskiness, and the economics.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
End-to-end Uncertainty-based Mitigation of Adversarial Attacks to Automated Lane Centering.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021
Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection Sensor Fusion Models.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Towards Secure and Robust Autonomy Software in Autonomous Driving and Smart Transportation.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
Proceedings of the 32nd British Machine Vision Conference 2021, 2021
Proceedings of the 32nd British Machine Vision Conference 2021, 2021
2020
Impact Evaluation of Falsified Data Attacks on Connected Vehicle Based Traffic Signal Control.
CoRR, 2020
Hold Tight and Never Let Go: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
CoRR, 2020
Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing (Extended Version).
CoRR, 2020
CoRR, 2020
Security of Deep Learning based Lane Keeping System under Physical-World Adversarial Attack.
CoRR, 2020
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Proceedings of the 29th USENIX Security Symposium, 2020
Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.
Proceedings of the 29th USENIX Security Symposium, 2020
Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking.
Proceedings of the 8th International Conference on Learning Representations, 2020
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020
2019
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.
CoRR, 2019
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017
Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 2016 workshop on QoE-based Analysis and Management of Data Communication Networks, 2016
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
2015
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 6th annual workshop on Wireless of the students, 2014
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014