BibTeX records: Jiongyi Chen

download as .bib file

@article{DBLP:journals/sensors/LiWC20,
  author    = {Runzhi Li and
               Jian Wang and
               Jiongyi Chen},
  title     = {Movable Platform-Based Topology Detection for a Geographic Routing
               Wireless Sensor Network},
  journal   = {Sensors},
  volume    = {20},
  number    = {13},
  pages     = {3726},
  year      = {2020},
  url       = {https://doi.org/10.3390/s20133726},
  doi       = {10.3390/s20133726},
  timestamp = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/sensors/LiWC20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ChenZDDZSLZZ19,
  author    = {Jiongyi Chen and
               Chaoshun Zuo and
               Wenrui Diao and
               Shuaike Dong and
               Qingchuan Zhao and
               Menghan Sun and
               Zhiqiang Lin and
               Yinqian Zhang and
               Kehuan Zhang},
  title     = {Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices
               and Users},
  booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages     = {222--233},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/DSN.2019.00034},
  doi       = {10.1109/DSN.2019.00034},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/dsn/ChenZDDZSLZZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/XuDLCZ19,
  author    = {Fenghao Xu and
               Wenrui Diao and
               Zhou Li and
               Jiongyi Chen and
               Kehuan Zhang},
  title     = {BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth
               Peripherals},
  booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS}
               2019, San Diego, California, USA, February 24-27, 2019},
  publisher = {The Internet Society},
  year      = {2019},
  url       = {https://www.ndss-symposium.org/ndss-paper/badbluetooth-breaking-android-security-mechanisms-via-malicious-bluetooth-peripherals/},
  timestamp = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/XuDLCZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ChenSZ19,
  author    = {Jiongyi Chen and
               Menghan Sun and
               Kehuan Zhang},
  title     = {Security Analysis of Device Binding for IP-based IoT Devices},
  booktitle = {{IEEE} International Conference on Pervasive Computing and Communications
               Workshops, PerCom Workshops 2019, Kyoto, Japan, March 11-15, 2019},
  pages     = {900--905},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/PERCOMW.2019.8730580},
  doi       = {10.1109/PERCOMW.2019.8730580},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/percom/ChenSZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangCDGWZ19,
  author    = {Li Zhang and
               Jiongyi Chen and
               Wenrui Diao and
               Shanqing Guo and
               Jian Weng and
               Kehuan Zhang},
  title     = {CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices},
  booktitle = {22nd International Symposium on Research in Attacks, Intrusions and
               Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
               23-25, 2019},
  pages     = {151--164},
  publisher = {{USENIX} Association},
  year      = {2019},
  url       = {https://www.usenix.org/conference/raid2019/presentation/zhang-li},
  timestamp = {Tue, 12 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/raid/ZhangCDGWZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-00104,
  author    = {Shuaike Dong and
               Zhou Li and
               Di Tang and
               Jiongyi Chen and
               Menghan Sun and
               Kehuan Zhang},
  title     = {Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting
               of IoT Traffic with Neural Networks},
  journal   = {CoRR},
  volume    = {abs/1909.00104},
  year      = {2019},
  url       = {http://arxiv.org/abs/1909.00104},
  archivePrefix = {arXiv},
  eprint    = {1909.00104},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1909-00104.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenDZZL0LSYZ18,
  author    = {Jiongyi Chen and
               Wenrui Diao and
               Qingchuan Zhao and
               Chaoshun Zuo and
               Zhiqiang Lin and
               XiaoFeng Wang and
               Wing Cheong Lau and
               Menghan Sun and
               Ronghai Yang and
               Kehuan Zhang},
  title     = {IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based
               Fuzzing},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  publisher = {The Internet Society},
  year      = {2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_01A-1\_Chen\_paper.pdf},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/ChenDZZL0LSYZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YangLCZ18,
  author    = {Ronghai Yang and
               Wing Cheong Lau and
               Jiongyi Chen and
               Kehuan Zhang},
  editor    = {William Enck and
               Adrienne Porter Felt},
  title     = {Vetting Single Sign-On {SDK} Implementations via Symbolic Reasoning},
  booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018},
  pages     = {1459--1474},
  publisher = {{USENIX} Association},
  year      = {2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18/presentation/yang},
  timestamp = {Mon, 20 Aug 2018 15:16:35 +0200},
  biburl    = {https://dblp.org/rec/conf/uss/YangLCZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics