Follow
Hao Chen
Hao Chen
Professor of Computer Science. IEEE Fellow
No verified email
Title
Cited by
Cited by
Year
Magnet: a two-pronged defense against adversarial examples
D Meng, H Chen
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
14992017
Hierarchical classification of web content
S Dumais, H Chen
Proceedings of the 23rd annual international ACM SIGIR conference on …, 2000
13102000
Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
C Gibler, J Crussell, J Erickson, H Chen
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
8812012
Bringing order to the web: Automatically categorizing search results
H Chen, S Dumais
Proceedings of the SIGCHI conference on Human Factors in Computing Systems …, 2000
7392000
Angora: Efficient fuzzing by principled search
P Chen, H Chen
2018 IEEE Symposium on Security and Privacy (SP), 711-725, 2018
6942018
Fireman: A toolkit for firewall modeling and analysis
L Yuan, H Chen, J Mai, CN Chuah, Z Su, P Mohapatra
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-213, 2006
6572006
MOPS: an infrastructure for examining security properties of software
H Chen, D Wagner
Proceedings of the 9th ACM conference on Computer and communications …, 2002
6552002
{TouchLogger}: Inferring Keystrokes on Touch Screen from Smartphone Motion
L Cai, H Chen
6th USENIX Workshop on Hot Topics in Security (HotSec 11), 2011
5962011
Attack of the clones: Detecting cloned applications on android markets
J Crussell, C Gibler, H Chen
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
4182012
Optimizing search by showing results in context
S Dumais, E Cutrell, H Chen
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2001
3922001
Investigating user privacy in android ad libraries
R Stevens, C Gibler, J Crussell, J Erickson, H Chen
Workshop on Mobile Security Technologies (MoST) 10, 2012
2962012
Model Checking One Million Lines of C Code.
H Chen, D Dean, DA Wagner
NDSS 4, 171-185, 2004
2572004
Madfraud: Investigating ad fraud in android applications
J Crussell, R Stevens, H Chen
Proceedings of the 12th annual international conference on Mobile systems …, 2014
2252014
PromptBench: Towards Evaluating the Robustness of Large Language Models on Adversarial Prompts
K Zhu, J Wang, J Zhou, Z Wang, H Chen, Y Wang, L Yang, W Ye, ...
arXiv preprint arXiv:2306.04528, 2023
2232023
Andarwin: Scalable detection of semantically similar android applications
J Crussell, C Gibler, H Chen
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
2002013
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.
M Van Gundy, H Chen
NDSS, 2009
1972009
Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
R Racic, D Ma, H Chen
2006 Securecomm and Workshops, 1-10, 2006
1732006
Setuid demystified
H Chen, D Wagner, D Dean
11th USENIX Security Symposium (USENIX Security 02), 2002
1672002
I-arm-droid: A rewriting framework for in-app reference monitors for android applications
B Davis, B Sanders, A Khodaverdian, H Chen
Mobile Security Technologies 2012 (2), 1-7, 2012
1612012
Software fault isolation with API integrity and multi-principal modules
Y Mao, H Chen, D Zhou, X Wang, N Zeldovich, MF Kaashoek
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
1572011
The system can't perform the operation now. Try again later.
Articles 1–20