关注
Kehuan Zhang
Kehuan Zhang
在 ie.cuhk.edu.hk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang
Proceedings of the 18th Annual Network & Distributed System Security …, 2011
6022011
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
2010 IEEE Symposium on Security and Privacy, 191-206, 2010
5492010
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
KZ Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin ...
The 25th Annual Network and Distributed System Security Symposium, 2018
405*2018
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3222012
Sedic: privacy-aware data intensive computing on hybrid clouds
K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2852011
When good becomes evil: Keystroke inference with smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2402015
Your voice assistant is mine: how to abuse speakers to steal information and control your phone
W Diao, X Liu, Z Zhou, K Zhang
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
2082014
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
D Tang, XF Wang, H Tang, K Zhang
USENIX Security Symposium, 1541-1558, 2021
1892021
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
1552018
Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems
K Zhang, XF Wang
Proceedings of the 18th conference on USENIX security symposium, Pages 17-32, 2009
1492009
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound
Z Zhou, W Diao, X Liu, K Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1272014
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding
J Zhang, Z Qin, H Yin, L Ou, K Zhang
Computers & Security 84, 376-392, 2019
1062019
On Code Execution Tracking via Power Side-Channel
Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
982016
Invisible mask: Practical attacks on face recognition with infrared
Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang
CoRR abs/1803.04683 (2018), 2018
932018
Sidebuster: automated detection and quantification of side-channel leaks in web application development
K Zhang, Z Li, R Wang, XF Wang, S Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
852010
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
822017
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
W Diao, X Liu, Z Li, K Zhang
Proceeding of the 37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
732016
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
D Tang, Z Zhou, Y Zhang, K Zhang
Network and Distributed Systems Security (NDSS) Symposium 2018, 2018
712018
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
652019
Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations
R Yang, G Li, WC Lau, K Zhang, P Hu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
632016
系统目前无法执行此操作,请稍后再试。
文章 1–20