What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chenxiong Qian
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Automatic Library Fuzzing through API Relation Evolvement.
Jiayi Lin
Qingyu Zhang
Junzhe Li
Chenxin Sun
Hao Zhou
Changhua Luo
Chenxiong Qian
2024
conf/uss
Invisibility Cloak: Proactive Defense Against Visual Game Cheating.
Chenxin Sun
Kai Ye
Liangcai Su
Jiayi Zhang
Chenxiong Qian
2024
conf/sp
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective.
Pengfei Jing
Zhiqiang Cai
Yingjie Cao
Le Yu
Yuefeng Du
Wenkai Zhang
Chenxiong Qian
Xiapu Luo
Sen Nie
Shi Wu
2024
conf/ndss
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.
Hao Zhou
Shuohan Wu
Chenxiong Qian
Xiapu Luo
Haipeng Cai
Chao Zhang
2022
conf/acsac
DeView: Confining Progressive Web Applications by Debloating Web APIs.
ChangSeok Oh
Sangho Lee
Chenxiong Qian
Hyungjoon Koo
Wenke Lee
2020
conf/ccs
Slimium: Debloating the Chromium Browser with Feature Subsetting.
Chenxiong Qian
Hyungjoon Koo
ChangSeok Oh
Taesoo Kim
Wenke Lee
2019
journals/tifs
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts.
Lei Xue
Chenxiong Qian
Hao Zhou
Xiapu Luo
Yajin Zhou
Yuru Shao
Alvin T. S. Chan
2019
conf/uss
RAZOR: A Framework for Post-deployment Software Debloating.
Chenxiong Qian
Hong Hu
Mansour Alharthi
Simon Pak Ho Chung
Taesoo Kim
Wenke Lee
2018
conf/ccs
Enforcing Unique Code Target Property for Control-Flow Integrity.
Hong Hu
Chenxiong Qian
Carter Yagemann
Simon Pak Ho Chung
William R. Harris
Taesoo Kim
Wenke Lee
2018
conf/uss
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Wei Meng
Chenxiong Qian
Shuang Hao
Kevin Borgolte
Giovanni Vigna
Christopher Kruegel
Wenke Lee
2018
conf/sp
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
Meng Xu
Chenxiong Qian
Kangjie Lu
Michael Backes
Taesoo Kim
2017
conf/uss
Efficient Protection of Path-Sensitive Control Security.
Ren Ding
Chenxiong Qian
Chengyu Song
William Harris
Taesoo Kim
Wenke Lee
2017
conf/sp
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop.
Yanick Fratantonio
Chenxiong Qian
Simon P. Chung
Wenke Lee
2014
conf/dsn
On Tracking Information Flows through JNI in Android Applications.
Chenxiong Qian
Xiapu Luo
Yuru Shao
Alvin T. S. Chan
2014
conf/acsac
Towards a scalable resource-driven approach for detecting repackaged Android applications.
Yuru Shao
Xiapu Luo
Chenxiong Qian
Pengfei Zhu
Lei Zhang
Coauthors
Alvin T. S. Chan
(2)
Carter Yagemann
(1)
Changhua Luo
(1)
ChangSeok Oh
(2)
Chao Zhang
(1)
Chengyu Song
(1)
Chenxin Sun
(2)
Chenxiong Qian
(15)
Christopher Kruegel
(1)
Giovanni Vigna
(1)
Haipeng Cai
(1)
Hao Zhou
(2)
Hao Zhou
(1)
Hong Hu
(2)
Hyungjoon Koo
(2)
Jiayi Lin
(1)
Jiayi Zhang
(1)
Junzhe Li
(1)
Kai Ye
(1)
Kangjie Lu
(1)
Kevin Borgolte
(1)
Le Yu
(1)
Lei Xue
(1)
Lei Zhang
(1)
Liangcai Su
(1)
Mansour Alharthi
(1)
Meng Xu
(1)
Michael Backes
(1)
Pengfei Jing
(1)
Pengfei Zhu
(1)
Qingyu Zhang
(1)
Ren Ding
(1)
Sangho Lee
(1)
Sen Nie
(1)
Shi Wu
(1)
Shuang Hao
(1)
Shuohan Wu
(1)
Simon P. Chung
(1)
Simon Pak Ho Chung
(2)
Taesoo Kim
(5)
Wei Meng
(1)
Wenkai Zhang
(1)
Wenke Lee
(7)
William Harris
(1)
William R. Harris
(1)
Xiapu Luo
(5)
Yajin Zhou
(1)
Yanick Fratantonio
(1)
Yingjie Cao
(1)
Yuefeng Du
(1)
Yuru Shao
(3)
Zhiqiang Cai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to