Follow
Xiao Chen
Xiao Chen
Verified email at monash.edu
Title
Cited by
Cited by
Year
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
3602014
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
1912019
6 million spam tweets: A large ground truth for timely Twitter spam detection
C Chen, J Zhang, X Chen, Y Xiang, W Zhou
2015 IEEE international conference on communications (ICC), 7065-7070, 2015
1342015
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2021
172021
Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones
R Zhang, X Chen, S Wen, X Zheng, Y Ding
IEEE Access 7, 153542-153554, 2019
162019
Detecting and explaining self-admitted technical debts with attention-based neural networks
X Wang, J Liu, L Li, X Chen, X Liu, H Wu
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
142020
On addressing the imbalance problem: a correlated knn approach for network traffic classification
D Wu, X Chen, C Chen, J Zhang, Y Xiang, W Zhou
International Conference on Network and System Security, 138-151, 2015
142015
A comparative study of smartphone and smartwatch apps
X Chen, W Chen, K Liu, C Chen, L Li
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1484-1493, 2021
82021
Characterizing Sensor Leaks in Android Apps
X Sun, X Chen, K Liu, S Wen, L Li, J Grundy
2021 IEEE 32nd International Symposium on Software Reliability Engineering …, 2021
72021
Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats
L Shi, X Chen, S Wen, Y Xiang
International Symposium on Cyberspace Safety and Security, 588-597, 2019
72019
Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users’ Awareness
R Zhang, X Chen, S Wen, J Zheng
International Conference on Machine Learning for Cyber Security, 378-396, 2019
72019
Traffic identification in semi-known network environment
X Chen, J Zhang, Y Xiang, W Zhou
2013 IEEE 16th International Conference on Computational Science and …, 2013
52013
Zero-day traffic identification
J Zhang, X Chen, Y Xiang, W Zhou
International Symposium on Cyberspace Safety and Security, 213-227, 2013
42013
Cross-Language Android Permission Specification
C Li, X Chen, R Sun, J Xue, S Wen, ME Ahmed, S Camtepe, Y Xiang
ESEC/FSE 2022: Proceedings of the 30th ACM Joint Meeting on European …, 2022
2*2022
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues
X Sun, X Chen, Y Zhao, P Liu, J Grundy, L Li
2022 IEEE/ACM International Conference on Automated Software Engineering …, 2022
12022
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge
Y Li, X Xiao, X Zhu, X Chen, S Wen, B Zhang
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
12020
Demystifying Hidden Sensitive Operations in Android apps
X Sun, X Chen, L Li, H Cai, J Grundy, J Samhi, TF Bissyandé, J Klein
ACM Transactions on Software Engineering and Methodology, 2022
2022
How does Visualisation Help App Practitioners Analyse Android Apps?
L Tang, T Wu, X Chen, S Wen, L Li, X Xia, M Grobler, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2022
2022
Advances in Mobile App Analysis (A-Mobile 2020)
G Meng, X Chen, J Klein, S Malek
A Comparative Study of Smartphone and Smart TV Apps
Y LIU, X Chen, P Kong, TF BISSYANDE, J Klein, X Sun, L Li
Available at SSRN 4075414, 0
The system can't perform the operation now. Try again later.
Articles 1–20