Name
Affiliation
Papers
KAI CHEN
Institute of Software, Chinese Academy of Sciences, Beijing, China and The State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing, China
70
Collaborators
Citations 
PageRank 
248
520
33.99
Referers 
Referees 
References 
1500
2171
948
Search Limit
1001000
Title
Citations
PageRank
Year
Intelligent Bi-directional Relaying Communication for Edge Intelligence based Industrial IoT Networks.00.342022
Towards Security Threats of Deep Learning Systems: A Survey00.342022
Hybrid butterfly optimization algorithm-based support vector machine for botnet command-and-control channel detection00.342022
Outage Probability Analysis for UAV-Aided Mobile Edge Computing Networks.00.342022
Classification of Ground-Based Cloud Images by Contrastive Self-Supervised Learning.00.342022
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems00.342022
Detecting Adversarial Samples for Deep Learning Models: A Comparative Study00.342022
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs00.342022
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam00.342022
DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks00.342021
Demystifying the Vetting Process of Voice-controlled Skills on Markets.00.342021
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis10.352021
AI-Lancet: Locating Error-inducing Neurons to Optimize Neural Networks00.342021
An Exploit Kits Detection Approach Based On Http Message Graph00.342021
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers10.362020
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside.00.342020
ConfigRand - A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.00.342020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation10.352020
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection30.372020
Attention-Based Text Recognition in Image00.342019
Zipper Stack: Shadow Stacks Without Shadow.00.342019
Devils In The Guidance: Predicting Logic Vulnerabilities In Payment Syndication Services Through Automated Documentation Analysis00.342019
A temporal correlation and traffic analysis approach for APT attacks detection00.342019
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis10.352019
RoLMA - A Practical Adversarial Attack Against Deep Learning-Based LPR Systems.00.342019
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls00.342018
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks60.422018
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.80.452018
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo00.342018
DroidEcho: an in-depth dissection of malicious behaviors in Android applications.30.382018
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.130.582018
Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks.20.372018
FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection.00.342018
A Large Scale Analysis of DNS Water Torture Attack10.412018
Detecting telecommunication fraud by understanding the contents of a call.20.392018
MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment00.342018
Privacy-preserving outsourced classification in cloud computing781.642018
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.160.732018
Characterizing Smartwatch Usage in the Wild.110.832017
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.20.362017
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.20.362017
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.100.482017
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.80.552017
Multi-key privacy-preserving deep learning in cloud computing.1182.382017
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.00.342016
A Lattice-Based Access Control Model for Social Networks00.342016
Frequent Subgraph Based Familial Classification of Android Malware70.452016
Dynamically Discovering Likely Memory Layout to Perform Accurate Fuzzing.10.352016
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale511.272015
Preface to special issue on miscellaneous emerging security problems.00.342015
  • 1
  • 2