What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Qi Alfred Chen
Google Scholar
37
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
On the Realism of LiDAR Spoofing Attacks against Autonomous Driving Vehicle at High Speed and Long Distance.
Takami Sato
Ryo Suzuki
Yuki Hayakawa
Kazuma Ikeda
Ozora Sako
Rokuto Nagata
Ryo Yoshida
Qi Alfred Chen
Kentaro Yoshioka
2025
conf/ndss
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective.
Ningfei Wang
Shaoyuan Xie
Takami Sato
Yunpeng Luo
Kaidi Xu
Qi Alfred Chen
2024
conf/uss
On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures.
Qingzhao Zhang
Shuowei Jin
Ruiyang Zhu
Jiachen Sun
Xumiao Zhang
Qi Alfred Chen
Z. Morley Mao
2024
conf/uss
DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts.
Shuo Wang
Hongsheng Hu
Jiamin Chang
Benjamin Zi Hao Zhao
Qi Alfred Chen
Minhui Xue
2024
conf/ndss
LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies.
Takami Sato
Yuki Hayakawa
Ryo Suzuki
Yohsuke Shiiki
Kentaro Yoshioka
Qi Alfred Chen
2024
conf/ndss
Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception.
Takami Sato
Sri Hrushikesh Varma Bhupathiraju
Michael Clifford
Takeshi Sugawara
Qi Alfred Chen
Sara Rampazzi
2022
conf/ccs
Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS Applications.
Yunpeng Luo
Ziwen Wan
Qi Alfred Chen
2022
conf/ccs
Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection.
Takami Sato
Yuki Hayakawa
Ryo Suzuki
Yohsuke Shiiki
Kentaro Yoshioka
Qi Alfred Chen
2022
conf/ccs
Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving.
Ningfei Wang
Yunpeng Luo
Takami Sato
Kaidi Xu
Qi Alfred Chen
2022
conf/ndss
Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks.
Ziwen Wan
Junjie Shen
Jalen Chuang
Xin Xia
Joshua Garcia
Jiaqi Ma
Qi Alfred Chen
2022
conf/acsac
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
Qifan Zhang
Junjie Shen
Mingtian Tan
Zhe Zhou
Zhou Li
Qi Alfred Chen
Haipeng Zhang
2021
journals/compsec
Threat detection and investigation with system-level provenance graphs: A survey.
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
Wei Ruan
2021
conf/uss
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols.
Shengtuo Hu
Qi Alfred Chen
Jiachen Sun
Yiheng Feng
Z. Morley Mao
Henry X. Liu
2021
conf/uss
Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
Takami Sato
Junjie Shen
Ningfei Wang
Yunhan Jia
Xue Lin
Qi Alfred Chen
2021
conf/sp
Demo: ROI Attacks on Traffic Light Detection in High-Level Autonomous Driving.
Kanglan Tang
Junjie Shen
Qi Alfred Chen
2021
conf/sp
Demo: Attacking Multi-Sensor Fusion based Localization in High-Level Autonomous Driving.
Junjie Shen
Jun Yeon Won
Zeyuan Chen
Qi Alfred Chen
2021
conf/sp
Demo: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
Takami Sato
Junjie Shen
Ningfei Wang
Yunhan Jack Jia
Xue Lin
Qi Alfred Chen
2021
conf/sp
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.
Yulong Cao
Ningfei Wang
Chaowei Xiao
Dawei Yang
Jin Fang
Ruigang Yang
Qi Alfred Chen
Mingyan Liu
Bo Li
2021
conf/sp
Demo: Security of Camera-based Perception for Autonomous Driving under Adversarial Attack.
Christopher DiPalma
Ningfei Wang
Takami Sato
Qi Alfred Chen
2020
conf/uss
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
Haohuang Wen
Qi Alfred Chen
Zhiqiang Lin
2020
conf/uss
Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.
Jiachen Sun
Yulong Cao
Qi Alfred Chen
Z. Morley Mao
2020
conf/uss
Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing.
Junjie Shen
Jun Yeon Won
Zeyuan Chen
Qi Alfred Chen
2020
conf/eurosp
AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems.
David Ke Hong
John Kloosterman
Yuqi Jin
Yulong Cao
Qi Alfred Chen
Scott A. Mahlke
Z. Morley Mao
2020
conf/ndss
Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
Haohuang Wen
Qingchuan Zhao
Qi Alfred Chen
Zhiqiang Lin
2019
conf/ccs
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Zhenyuan Li
Qi Alfred Chen
Chunlin Xiong
Yan Chen
Tiantian Zhu
Hai Yang
2019
conf/ccs
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.
Yulong Cao
Chaowei Xiao
Benjamin Cyr
Yimeng Zhou
Won Park
Sara Rampazzi
Qi Alfred Chen
Kevin Fu
Z. Morley Mao
2018
conf/ccs
No One In The Middle: Enabling Network Access Control Via Transparent Attribution.
Jeremy Erickson
Qi Alfred Chen
Xiaochen Yu
Erinjen Lin
Robert Levy
Zhuoqing Morley Mao
2018
conf/ndss
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
Qi Alfred Chen
Yucheng Yin
Yiheng Feng
Z. Morley Mao
Henry X. Liu
2017
conf/ccs
Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study.
Qi Alfred Chen
Matthew Thomas
Eric Osterweil
Yulong Cao
Jie You
Zhuoqing Morley Mao
2017
conf/ccs
An Initial Investigation of Protocol Customization.
David Ke Hong
Qi Alfred Chen
Zhuoqing Morley Mao
2017
conf/eurosp
Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Yunhan Jack Jia
Qi Alfred Chen
Yikai Lin
Chao Kong
Zhuoqing Morley Mao
2017
conf/ndss
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Yunhan Jack Jia
Qi Alfred Chen
Shiqi Wang
Amir Rahmati
Earlence Fernandes
Zhuoqing Morley Mao
Atul Prakash
2016
conf/fc
Android UI Deception Revisited: Attacks and Defenses.
Earlence Fernandes
Qi Alfred Chen
Justin Paupore
Georg Essl
J. Alex Halderman
Zhuoqing Morley Mao
Atul Prakash
2016
conf/sp
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
Qi Alfred Chen
Eric Osterweil
Matthew Thomas
Zhuoqing Morley Mao
2016
conf/ndss
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Yuru Shao
Qi Alfred Chen
Zhuoqing Morley Mao
Jason Ott
Zhiyun Qian
2015
conf/ccs
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Qi Alfred Chen
Zhiyun Qian
Yunhan Jack Jia
Yuru Shao
Zhuoqing Morley Mao
2014
conf/uss
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Qi Alfred Chen
Zhiyun Qian
Zhuoqing Morley Mao
Coauthors
Amir Rahmati
(1)
Atul Prakash
(2)
Benjamin Cyr
(1)
Benjamin Zi Hao Zhao
(1)
Bo Li
(1)
Chao Kong
(1)
Chaowei Xiao
(2)
Christopher DiPalma
(1)
Chunlin Xiong
(1)
David Ke Hong
(2)
Dawei Yang
(1)
Earlence Fernandes
(2)
Eric Osterweil
(2)
Erinjen Lin
(1)
Georg Essl
(1)
Hai Yang
(1)
Haipeng Zhang
(1)
Haohuang Wen
(2)
Henry X. Liu
(2)
Hongsheng Hu
(1)
J. Alex Halderman
(1)
Jalen Chuang
(1)
Jason Ott
(1)
Jeremy Erickson
(1)
Jiachen Sun
(3)
Jiamin Chang
(1)
Jiaqi Ma
(1)
Jie You
(1)
Jin Fang
(1)
John Kloosterman
(1)
Joshua Garcia
(1)
Jun Yeon Won
(2)
Junjie Shen
(7)
Justin Paupore
(1)
Kaidi Xu
(2)
Kanglan Tang
(1)
Kazuma Ikeda
(1)
Kentaro Yoshioka
(3)
Kevin Fu
(1)
Matthew Thomas
(2)
Michael Clifford
(1)
Mingtian Tan
(1)
Mingyan Liu
(1)
Minhui Xue
(1)
Ningfei Wang
(6)
Ozora Sako
(1)
Qi Alfred Chen
(37)
Qifan Zhang
(1)
Qingchuan Zhao
(1)
Qingzhao Zhang
(1)
Robert Levy
(1)
Rokuto Nagata
(1)
Ruigang Yang
(1)
Ruiyang Zhu
(1)
Runqing Yang
(1)
Ryo Suzuki
(3)
Ryo Yoshida
(1)
Sara Rampazzi
(2)
Scott A. Mahlke
(1)
Shaoyuan Xie
(1)
Shengtuo Hu
(1)
Shiqi Wang
(1)
Shuo Wang
(1)
Shuowei Jin
(1)
Sri Hrushikesh Varma Bhupathiraju
(1)
Takami Sato
(9)
Takeshi Sugawara
(1)
Tiantian Zhu
(1)
Wei Ruan
(1)
Won Park
(1)
Xiaochen Yu
(1)
Xin Xia
(1)
Xue Lin
(2)
Xumiao Zhang
(1)
Yan Chen
(2)
Yiheng Feng
(2)
Yikai Lin
(1)
Yimeng Zhou
(1)
Yohsuke Shiiki
(2)
Yucheng Yin
(1)
Yuki Hayakawa
(3)
Yulong Cao
(5)
Yunhan Jack Jia
(4)
Yunhan Jia
(1)
Yunpeng Luo
(3)
Yuqi Jin
(1)
Yuru Shao
(2)
Z. Morley Mao
(6)
Zeyuan Chen
(2)
Zhe Zhou
(1)
Zhenyuan Li
(2)
Zhiqiang Lin
(2)
Zhiyun Qian
(3)
Zhou Li
(1)
Zhuoqing Morley Mao
(10)
Ziwen Wan
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to