Подписаться
Alfred Chen
Alfred Chen
Подтвержден адрес электронной почты в домене uci.edu - Главная страница
Название
Процитировано
Процитировано
Год
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
6252019
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2 (2), 2.2, 2017
4322017
Towards robust {LiDAR-based} perception in autonomous driving: General black-box adversarial sensor attack and countermeasures
J Sun, Y Cao, QA Chen, ZM Mao
29th USENIX Security Symposium (USENIX Security 20), 877-894, 2020
2812020
Peeking into Your App without Actually Seeing It:{UI} State Inference and Novel Android Attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
2782014
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
Y Cao, N Wang, C Xiao, D Yang, J Fang, R Yang, QA Chen, M Liu, B Li
2021 IEEE Symposium on Security and Privacy (SP), 176-194, 2021
2562021
Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing
J Shen, JY Won, Z Chen, QA Chen
29th USENIX Security Symposium (USENIX Security 20), 931-948, 2020
1672020
On adversarial robustness of trajectory prediction for autonomous vehicles
Q Zhang, S Hu, J Sun, QA Chen, ZM Mao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
1482022
A confidence-based filtering method for DDoS attack defense in cloud environment
W Dou, Q Chen, J Chen
Future Generation Computer Systems 29 (7), 1838-1850, 2013
1442013
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
QA Chen, Y Yin, Y Feng, ZM Mao, HX Liu
NDSS, 2018
1392018
Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack
T Sato, J Shen, N Wang, Y Jia, X Lin, QA Chen
30th USENIX Security Symposium (USENIX Security 21), 3309-3326, 2021
1382021
A comprehensive study of autonomous vehicle bugs
J Garcia, Y Feng, J Shen, S Almanee, Y Xia, QA Chen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1382020
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
QA Chen, H Luo, S Rosen, ZM Mao, K Iyer, J Hui, K Sontineni, K Lau
Proceedings of the 2014 Conference on Internet Measurement Conference, 151-164, 2014
1342014
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking
Y Jia, Y Lu, J Shen, QA Chen, Z Zhong, T Wei
International Conference on Learning Representations (ICLR), 2020
1132020
CBF: a packet filtering method for DDoS attack defense in cloud environment
Q Chen, W Lin, W Dou, S Yu
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
1122011
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
1052016
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
972019
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
842018
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
842018
{Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT}
H Wen, QA Chen, Z Lin
29th USENIX Security Symposium (USENIX Security 20), 949-965, 2020
772020
Threat detection and investigation with system-level provenance graphs: a survey
Z Li, QA Chen, R Yang, Y Chen, W Ruan
Computers & Security 106, 102282, 2021
762021
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20