Follow
Xiao Chen
Title
Cited by
Cited by
Year
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
4172014
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
2742019
6 million spam tweets: A large ground truth for timely Twitter spam detection
C Chen, J Zhang, X Chen, Y Xiang, W Zhou
2015 IEEE international conference on communications (ICC), 7065-7070, 2015
1632015
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (5), 3357-3370, 2021
412021
Detecting and explaining self-admitted technical debts with attention-based neural networks
X Wang, J Liu, L Li, X Chen, X Liu, H Wu
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
312020
On addressing the imbalance problem: a correlated KNN approach for network traffic classification
D Wu, X Chen, C Chen, J Zhang, Y Xiang, W Zhou
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
182014
Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones
R Zhang, X Chen, S Wen, X Zheng, Y Ding
IEEE Access 7, 153542-153554, 2019
162019
A comparative study of smartphone and smartwatch apps
X Chen, W Chen, K Liu, C Chen, L Li
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1484-1493, 2021
142021
Characterizing Sensor Leaks in Android Apps
X Sun, X Chen, K Liu, S Wen, L Li, J Grundy
2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021
112021
Time-aware user modeling with check-in time prediction for next POI recommendation
X Wang, X Liu, L Li, X Chen, J Liu, H Wu
2021 IEEE International Conference on Web Services (ICWS), 125-134, 2021
112021
Who activated my voice assistant? a stealthy attack on android phones without users’ awareness
R Zhang, X Chen, S Wen, J Zheng
Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019
112019
Zero-day traffic identification
J Zhang, X Chen, Y Xiang, W Zhou
Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013
112013
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues
X Sun, X Chen, Y Zhao, P Liu, J Grundy, L Li
2022 IEEE/ACM International Conference on Automated Software Engineering …, 2022
82022
Main enabling technologies in industry 4.0 and cybersecurity threats
L Shi, X Chen, S Wen, Y Xiang
Cyberspace Safety and Security: 11th International Symposium, CSS 2019 …, 2019
82019
Traffic identification in semi-known network environment
X Chen, J Zhang, Y Xiang, W Zhou
2013 IEEE 16th International Conference on Computational Science and …, 2013
62013
Cross-Language Android Permission Specification
C Li, X Chen, R Sun, J Xue, S Wen, ME Ahmed, S Camtepe, Y Xiang
ESEC/FSE 2022: Proceedings of the 30th ACM Joint Meeting on European …, 2022
5*2022
Demystifying Hidden Sensitive Operations in Android apps
X Sun, X Chen, L Li, H Cai, J Grundy, J Samhi, T Bissyandé, J Klein
ACM Transactions on Software Engineering and Methodology 32 (2), 1-30, 2023
42023
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-based Systems
M Zhou, X Gao, J Wu, J Grundy, X Chen, C Chen, L Li
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on …, 2023
32023
Taming Android Fragmentation through Lightweight Crowdsourced Testing
X Sun, X Chen, Y Liu, J Grundy, L Li
IEEE Transactions on Software Engineering, 2023
22023
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge
Y Li, X Xiao, X Zhu, X Chen, S Wen, B Zhang
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20