Xiao Chen

Orcid: 0000-0002-4508-5971

Affiliations:
  • University of Newcastle, College of Engineering, Science and Environment, Callaghan, NSW, Australia
  • Monash University, Faculty of Information Technology, Clayton, VIC, Australia (former)
  • Swinburne University of Technology, Faculty of Science, Engineering and Technology, Hawthorn, VIC, Australia (PhD 2019)
  • Deakin University, School of Information Technology, Melbourne, Australia (former)


According to our database1, Xiao Chen authored at least 38 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing GUI Exploration Coverage of Android Apps with Deep Link-Integrated Monkey.
ACM Trans. Softw. Eng. Methodol., July, 2024

CustomDLCoder: Generating Pure Code Implementations to Replace On-Device DL Models.
Dataset, March, 2024

BOOM: Bottleneck-Aware Opportunistic Multicast Strategy for Cooperative Maritime Sensing.
IEEE Internet Things J., February, 2024

Demystifying the Evolution of Android Malware Variants.
IEEE Trans. Dependable Secur. Comput., 2024

DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators.
CoRR, 2024

LLM for Mobile: An Initial Roadmap.
CoRR, 2024

How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse.
Connect. Sci., 2024

Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

2023
Taming Android Fragmentation Through Lightweight Crowdsourced Testing.
IEEE Trans. Software Eng., June, 2023

Demystifying Hidden Sensitive Operations in Android Apps.
ACM Trans. Softw. Eng. Methodol., April, 2023

How Does Visualisation Help App Practitioners Analyse Android Apps?
IEEE Trans. Dependable Secur. Comput., 2023

Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention.
Proceedings of the ACM Web Conference 2023, 2023

LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android Fragmentation.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

FloodSFCP: Quality and Latency Balanced Service Function Chain Placement for Remote Sensing in LEO Satellite Network.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Backdoor Attack on Machine Learning Based Android Malware Detectors.
IEEE Trans. Dependable Secur. Comput., 2022

A Comparative Study of Smartphone and Smart TV Apps.
CoRR, 2022

Cross-language Android permission specification.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
NatiDroid: Cross-Language Android Permission Specification.
CoRR, 2021

A comparative study of smartphone and smartwatch apps.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Characterizing Sensor Leaks in Android Apps.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Time-aware User Modeling with Check-in Time Prediction for Next POI Recommendation.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

2020
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur., 2020

SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

2019
Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones.
IEEE Access, 2019

A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users' Awareness.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018

2015
Robust Network Traffic Classification.
IEEE/ACM Trans. Netw., 2015

6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Zero-Day Traffic Identification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Traffic Identification in Semi-known Network Environment.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2005
A robust Cluster-based Multi-Hop Routing Algorithm in Wireless Sensor Networks.
Proceedings of the New Trends in Computer Networks, 2005


  Loading...