Qi Alfred Chen
Title
Cited by
Cited by
Year
Peeking into Your App without Actually Seeing It:{UI} State Inference and Novel Android Attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
1982014
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS, 2017
1462017
CBF: a packet filtering method for DDoS attack defense in cloud environment
Q Chen, W Lin, W Dou, S Yu
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
952011
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
QA Chen, H Luo, S Rosen, ZM Mao, K Iyer, J Hui, K Sontineni, K Lau
Proceedings of the 2014 Conference on Internet Measurement Conference, 151-164, 2014
922014
A confidence-based filtering method for DDoS attack defense in cloud environment
W Dou, Q Chen, J Chen
Future Generation Computer Systems 29 (7), 1838-1850, 2013
872013
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks
S Rosen, H Luo, QA Chen, ZM Mao, J Hui, A Drake, K Lau
Proceedings of the 20th annual international conference on Mobile computing …, 2014
612014
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
522016
Android ui deception revisited: Attacks and defenses
E Fernandes, QA Chen, J Paupore, G Essl, JA Halderman, ZM Mao, ...
International Conference on Financial Cryptography and Data Security, 41-59, 2016
402016
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
QA Chen, Y Yin, Y Feng, ZM Mao, HX Liu
NDSS, 2018
292018
Understanding on-device bufferbloat for cellular upload
Y Guo, F Qian, QA Chen, ZM Mao, S Sen
Proceedings of the 2016 Internet Measurement Conference, 303-317, 2016
252016
Static Detection of Packet Injection Vulnerabilities–A Case for Identifying Attacker-controlled Implicit Information Leaks
QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
232015
Open doors for bob and mallory: Open port usage in android apps and security implications
YJ Jia, QA Chen, Y Lin, C Kong, ZM Mao
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 190-203, 2017
222017
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
192019
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE
YJ Jia, QA Chen, ZM Mao, J Hui, K Sontinei, A Yoon, S Kwong, K Lau
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
172015
TIVOs: Trusted Visual I/O Paths for Android
E Fernandes, QA Chen, G Essl, JA Halderman, ZM Mao, A Prakash
University of Michigan CSE Technical Report CSE-TR-586-14, 2014
162014
QoE inference without application control
A Nikravesh, DK Hong, QA Chen, HV Madhyastha, ZM Mao
Proceedings of the 2016 workshop on QoE-based Analysis and Management of …, 2016
132016
MitM attack by name collision: Cause analysis and vulnerability assessment in the new gTLD era
QA Chen, E Osterweil, M Thomas, ZM Mao
2016 IEEE Symposium on Security and Privacy (SP), 675-690, 2016
132016
Understanding and Detecting Overlay-based Android Malware at Market Scales
Y Yan, Z Li, QA Chen, C Wilson, T Xu, E Zhai, Y Li, Y Liu
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
102019
Vulnerability of traffic control system under cyber-attacks using falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation Research Board 2018 Annual Meeting (TRB), 2018
102018
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20