Παρακολούθηση
Xiao Chen
Xiao Chen
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα newcastle.edu.au - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
4522014
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
3282019
6 million spam tweets: A large ground truth for timely Twitter spam detection
C Chen, J Zhang, X Chen, Y Xiang, W Zhou
2015 IEEE international conference on communications (ICC), 7065-7070, 2015
1712015
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (5), 3357-3370, 2021
642021
Detecting and explaining self-admitted technical debts with attention-based neural networks
X Wang, J Liu, L Li, X Chen, X Liu, H Wu
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
442020
Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones
R Zhang, X Chen, S Wen, X Zheng, Y Ding
IEEE Access 7, 153542-153554, 2019
222019
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues
X Sun, X Chen, Y Zhao, P Liu, J Grundy, L Li
2022 IEEE/ACM International Conference on Automated Software Engineering …, 2022
202022
A comparative study of smartphone and smartwatch apps
X Chen, W Chen, K Liu, C Chen, L Li
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1484-1493, 2021
202021
Time-aware user modeling with check-in time prediction for next POI recommendation
X Wang, X Liu, L Li, X Chen, J Liu, H Wu
2021 IEEE International Conference on Web Services (ICWS), 125-134, 2021
192021
On addressing the imbalance problem: a correlated KNN approach for network traffic classification
D Wu, X Chen, C Chen, J Zhang, Y Xiang, W Zhou
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
192014
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-based Systems
M Zhou, X Gao, J Wu, J Grundy, X Chen, C Chen, L Li
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on …, 2023
162023
Who activated my voice assistant? a stealthy attack on android phones without users’ awareness
R Zhang, X Chen, S Wen, J Zheng
Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019
152019
Demystifying Hidden Sensitive Operations in Android apps
X Sun, X Chen, L Li, H Cai, J Grundy, J Samhi, T Bissyandé, J Klein
ACM Transactions on Software Engineering and Methodology 32 (2), 1-30, 2023
122023
Main enabling technologies in industry 4.0 and cybersecurity threats
L Shi, X Chen, S Wen, Y Xiang
Cyberspace Safety and Security: 11th International Symposium, CSS 2019 …, 2019
122019
Cross-Language Android Permission Specification
C Li, X Chen, R Sun, J Xue, S Wen, ME Ahmed, S Camtepe, Y Xiang
ESEC/FSE 2022: Proceedings of the 30th ACM Joint Meeting on European …, 2022
11*2022
Characterizing Sensor Leaks in Android Apps
X Sun, X Chen, K Liu, S Wen, L Li, J Grundy
2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021
112021
Zero-day traffic identification
J Zhang, X Chen, Y Xiang, W Zhou
Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013
112013
Taming android fragmentation through lightweight crowdsourced testing
X Sun, X Chen, Y Liu, J Grundy, L Li
IEEE Transactions on Software Engineering 49 (6), 3599-3615, 2023
102023
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse
L Tang, T Wu, X Chen, S Wen, W Zhou, X Zhu, Y Xiang
Connection Science 36 (1), 2282942, 2024
62024
Traffic identification in semi-known network environment
X Chen, J Zhang, Y Xiang, W Zhou
2013 IEEE 16th International Conference on Computational Science and …, 2013
62013
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20