Hao Chen
Hao Chen
Professor of Computer Science, UC Davis
Verified email at ucdavis.edu
TitleCited byYear
A redox-based mechanism for the neuroprotective and neurodestructive effects of nitric oxide and related nitroso-compounds
SA Lipton, YB Choi, ZH Pan, SZ Lei, HSV Chen, NJ Sucher, J Loscalzo, ...
Nature 364 (6438), 626, 1993
27761993
Hierarchical classification of web content
S Dumais, H Chen
Proceedings of the 23rd annual international ACM SIGIR conference on …, 2000
10952000
Bringing order to the web: Automatically categorizing search results
H Chen, S Dumais
Proceedings of the SIGCHI conference on Human Factors in Computing Systems …, 2000
6812000
AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale
C Gibler, J Crussell, J Erickson, H Chen
International Conference on Trust and Trustworthy Computing, 291-307, 2012
6492012
MOPS: an infrastructure for examining security properties of software
H Chen, D Wagner
Proceedings of the 9th ACM conference on Computer and communications …, 2002
5722002
Fireman: A toolkit for firewall modeling and analysis
L Yuan, H Chen, J Mai, CN Chuah, Z Su, P Mohapatra
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-213, 2006
5212006
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.
L Cai, H Chen
HotSec 11 (2011), 9, 2011
3822011
Optimizing search by showing results in context
S Dumais, E Cutrell, H Chen
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2001
3582001
Magnet: a two-pronged defense against adversarial examples
D Meng, H Chen
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2962017
Attack of the clones: Detecting cloned applications on android markets
J Crussell, C Gibler, H Chen
European Symposium on Research in Computer Security, 37-54, 2012
2872012
Efficacy comparison of 16 interventions for myopia control in children: a network meta-analysis
J Huang, D Wen, Q Wang, C McAlinden, I Flitcroft, H Chen, SM Saw, ...
Ophthalmology 123 (4), 697-708, 2016
2362016
Model Checking One Million Lines of C Code.
H Chen, D Dean, DA Wagner
NDSS 4, 171-185, 2004
2112004
Investigating user privacy in android ad libraries
R Stevens, C Gibler, J Crussell, J Erickson, H Chen
Workshop on Mobile Security Technologies (MoST) 10, 2012
2002012
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.
M Van Gundy, H Chen
NDSS, 2009
1802009
Hydroxycarboxylic acid receptor 2 mediates dimethyl fumarate’s protective effect in EAE
H Chen, JC Assmann, A Krenz, M Rahman, M Grimm, CM Karsten, J Köhl, ...
The Journal of clinical investigation 124 (5), 2188-2192, 2014
1592014
Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
R Racic, D Ma, H Chen
2006 Securecomm and Workshops, 1-10, 2006
1522006
Setuid Demystified.
H Chen, DA Wagner, D Dean
USENIX Security Symposium, 171-190, 2002
1492002
Measuring privacy risk in online social networks
JL Becker, H Chen
University of California, Davis, 2009
1342009
The β-hydroxybutyrate receptor HCA2 activates a neuroprotective subset of macrophages
M Rahman, S Muhammad, MA Khan, H Chen, DA Ridder, H Müller-Fielitz, ...
Nature communications 5, 3944, 2014
1262014
Spam double-funnel: Connecting web spammers with advertisers
YM Wang, YM Wang, M Ma, Y Niu, H Chen
Proceedings of the 16th international conference on World Wide Web, 291-300, 2007
1252007
The system can't perform the operation now. Try again later.
Articles 1–20