Seguir
Alfred Chen
Título
Citado por
Citado por
Año
Adversarial sensor attack on lidar-based perception in autonomous driving
Y Cao, C Xiao, B Cyr, Y Zhou, W Park, S Rampazzi, QA Chen, K Fu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
5942019
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2 (2), 2.2, 2017
4212017
Peeking into Your App without Actually Seeing It:{UI} State Inference and Novel Android Attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
2742014
Towards robust {LiDAR-based} perception in autonomous driving: General black-box adversarial sensor attack and countermeasures
J Sun, Y Cao, QA Chen, ZM Mao
29th USENIX Security Symposium (USENIX Security 20), 877-894, 2020
2512020
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
Y Cao, N Wang, C Xiao, D Yang, J Fang, R Yang, QA Chen, M Liu, B Li
2021 IEEE Symposium on Security and Privacy (SP), 176-194, 2021
2282021
Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing
J Shen, JY Won, Z Chen, QA Chen
29th USENIX Security Symposium (USENIX Security 20), 931-948, 2020
1542020
A confidence-based filtering method for DDoS attack defense in cloud environment
W Dou, Q Chen, J Chen
Future Generation Computer Systems 29 (7), 1838-1850, 2013
1422013
On adversarial robustness of trajectory prediction for autonomous vehicles
Q Zhang, S Hu, J Sun, QA Chen, ZM Mao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
1372022
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
QA Chen, Y Yin, Y Feng, ZM Mao, HX Liu
NDSS, 2018
1352018
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis
QA Chen, H Luo, S Rosen, ZM Mao, K Iyer, J Hui, K Sontineni, K Lau
Proceedings of the 2014 Conference on Internet Measurement Conference, 151-164, 2014
1332014
A comprehensive study of autonomous vehicle bugs
J Garcia, Y Feng, J Shen, S Almanee, Y Xia, QA Chen
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1322020
Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack
T Sato, J Shen, N Wang, Y Jia, X Lin, QA Chen
30th USENIX Security Symposium (USENIX Security 21), 3309-3326, 2021
1302021
CBF: a packet filtering method for DDoS attack defense in cloud environment
Q Chen, W Lin, W Dou, S Yu
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
1122011
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking
Y Jia, Y Lu, J Shen, QA Chen, Z Zhong, T Wei
International Conference on Learning Representations (ICLR), 2020
1082020
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
1032016
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
F Dang, Z Li, Y Liu, E Zhai, QA Chen, T Xu, Y Chen, J Yang
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
942019
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
842018
Vulnerability of traffic control system under cyberattacks with falsified data
Y Feng, S Huang, QA Chen, HX Liu, ZM Mao
Transportation research record 2672 (1), 1-11, 2018
842018
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks
S Rosen, H Luo, QA Chen, ZM Mao, J Hui, A Drake, K Lau
Proceedings of the 20th annual international conference on Mobile computing …, 2014
732014
{Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT}
H Wen, QA Chen, Z Lin
29th USENIX Security Symposium (USENIX Security 20), 949-965, 2020
702020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20