default search action
Kehuan Zhang
Person information
- unicode name: 张克环
- affiliation: The Chinese University of Hong Kong, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Zirui Song, Jiongyi Chen, Kehuan Zhang:
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-Specific Code Embeddings. Proc. ACM Softw. Eng. 1(FSE): 47-69 (2024) - [j11]Hui Liu, Bo Zhao, Jiabao Guo, Kehuan Zhang, Peng Liu:
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest. Pattern Recognit. 147: 110127 (2024) - 2023
- [c45]Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang:
PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding. USENIX Security Symposium 2023: 4355-4372 - [c44]Kong Huang, Yutong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang:
HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs. USENIX Security Symposium 2023: 4553-4570 - [c43]Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang:
Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems. USENIX Security Symposium 2023: 5503-5520 - 2022
- [j10]Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang:
Authorisation inconsistency in IoT third-party integration. IET Inf. Secur. 16(2): 133-143 (2022) - [j9]Linjun Wu, Yupeng Hu, Kehuan Zhang, Wenjia Li, Xiaolin Xu, Wanli Chang:
FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4433-4444 (2022) - [c42]Xing Zhang, Jiongyi Chen, Chao Feng, Ruilin Li, Wenrui Diao, Kehuan Zhang, Jing Lei, Chaojing Tang:
Default: Mutual Information-based Crash Triage for Massive Crashes. ICSE 2022: 635-646 - [c41]Menghan Sun, Zirui Song, Xiaoxi Ren, Daoyuan Wu, Kehuan Zhang:
LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework. RAID 2022: 364-379 - [c40]Jianqi Du, Fenghao Xu, Chennan Zhang, Zidong Zhang, Xiaoyin Liu, Pengcheng Ren, Wenrui Diao, Shanqing Guo, Kehuan Zhang:
Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps. SECON 2022: 343-351 - [c39]Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, Wei Zhang:
An empirical study of blockchain system vulnerabilities: modules, types, and patterns. ESEC/SIGSOFT FSE 2022: 709-721 - [i14]Hui Liu, Bo Zhao, Kehuan Zhang, Peng Liu:
Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples. CoRR abs/2210.08579 (2022) - 2021
- [c38]Fenghao Xu, Siyu Shen, Wenrui Diao, Zhou Li, Yi Chen, Rui Li, Kehuan Zhang:
Android on PC: On the Security of End-user Android Emulators. CCS 2021: 1566-1580 - [c37]Zhaoyang Lyu, Minghao Guo, Tong Wu, Guodong Xu, Kehuan Zhang, Dahua Lin:
Towards Evaluating and Training Verifiably Robust Neural Networks. CVPR 2021: 4308-4317 - [c36]Kong Huang, Ke Zhang, Jiongyi Chen, Menghan Sun, Wei Sun, Di Tang, Kehuan Zhang:
Understanding the Brains and Brawn of Illicit Streaming App. ICDF2C 2021: 194-214 - [c35]Di Tang, XiaoFeng Wang, Haixu Tang, Kehuan Zhang:
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. USENIX Security Symposium 2021: 1541-1558 - [i13]Zhaoyang Lyu, Minghao Guo, Tong Wu, Guodong Xu, Kehuan Zhang, Dahua Lin:
Towards Evaluating and Training Verifiably Robust Neural Networks. CoRR abs/2104.00447 (2021) - [i12]Xiao Yi, Daoyuan Wu, Lingxiao Jiang, Kehuan Zhang, Wei Zhang:
Diving Into Blockchain's Weaknesses: An Empirical Study of Blockchain System Vulnerabilities. CoRR abs/2110.12162 (2021) - 2020
- [j8]Yang Liu, Ting Liu, Hong Sun, Kehuan Zhang, Pengfei Liu:
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids. IEEE Trans. Inf. Forensics Secur. 15: 2453-2468 (2020) - [c34]Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang:
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic. AsiaCCS 2020: 47-59 - [e2]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents]
2010 – 2019
- 2019
- [j7]Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Kehuan Zhang:
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. Comput. Secur. 84: 376-392 (2019) - [j6]Rui Liu, Junbin Liang, Jiannong Cao, Kehuan Zhang, Wenyu Gao, Lei Yang, Ruiyun Yu:
Understanding Mobile Users' Privacy Expectations: A Recommendation-Based Method Through Crowdsourcing. IEEE Trans. Serv. Comput. 12(2): 304-318 (2019) - [c33]Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. DSN 2019: 222-233 - [c32]Fenghao Xu, Wenrui Diao, Zhou Li, Jiongyi Chen, Kehuan Zhang:
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals. NDSS 2019 - [c31]Jiongyi Chen, Menghan Sun, Kehuan Zhang:
Security Analysis of Device Binding for IP-based IoT Devices. PerCom Workshops 2019: 900-905 - [c30]Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang:
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. RAID 2019: 151-164 - [c29]Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang:
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. RAID 2019: 261-275 - [c28]Kan Yuan, Di Tang, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang:
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion. IEEE Symposium on Security and Privacy 2019: 952-966 - [e1]Jianying Zhou, Robert H. Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11605, Springer 2019, ISBN 978-3-030-29728-2 [contents] - [i11]Di Tang, Xiaofeng Wang, Haixu Tang, Kehuan Zhang:
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. CoRR abs/1908.00686 (2019) - [i10]Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang:
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks. CoRR abs/1909.00104 (2019) - 2018
- [j5]Jixin Zhang, Zheng Qin, Kehuan Zhang, Hui Yin, Jingfu Zou:
Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features. IEEE Access 6: 51964-51974 (2018) - [j4]Jixin Zhang, Kehuan Zhang, Zheng Qin, Hui Yin, Qixin Wu:
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks. Cybersecur. 1(1): 10 (2018) - [j3]Wenrui Diao, Rui Liu, Xiangyu Liu, Zhe Zhou, Zhou Li, Kehuan Zhang:
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks. J. Comput. Secur. 26(3): 283-309 (2018) - [j2]Rui Liu, Jiannong Cao, Kehuan Zhang, Wenyu Gao, Junbin Liang, Lei Yang:
When Privacy Meets Usability: Unobtrusive Privacy Permission Recommendation System for Mobile Apps Based on Crowdsourcing. IEEE Trans. Serv. Comput. 11(5): 864-878 (2018) - [c27]Zhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li, Kehuan Zhang:
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. ACSAC 2018: 77-88 - [c26]Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang:
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS 2018 - [c25]Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. NDSS 2018 - [c24]Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. SecureComm (1) 2018: 172-192 - [c23]Ronghai Yang, Wing Cheong Lau, Jiongyi Chen, Kehuan Zhang:
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning. USENIX Security Symposium 2018: 1459-1474 - [i9]Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. CoRR abs/1801.01633 (2018) - [i8]Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. CoRR abs/1801.01949 (2018) - [i7]Di Tang, XiaoFeng Wang, Kehuan Zhang:
Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints. CoRR abs/1802.09900 (2018) - [i6]Zhe Zhou, Di Tang, Xiaofeng Wang, Weili Han, Xiangyu Liu, Kehuan Zhang:
Invisible Mask: Practical Attacks on Face Recognition with Infrared. CoRR abs/1803.04683 (2018) - 2017
- [j1]Zhe Zhou, Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang, Rui Liu:
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. Proc. Priv. Enhancing Technol. 2017(2): 57-73 (2017) - [c22]Zhe Zhou, Zhou Li, Kehuan Zhang:
All Your VMs are Disconnected: Attacking Hardware Virtualized Network. CODASPY 2017: 249-260 - [c21]Xiaolong Bai, Zhe Zhou, XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, Kehuan Zhang:
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment. USENIX Security Symposium 2017: 593-608 - [i5]Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin:
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. CoRR abs/1703.09809 (2017) - 2016
- [c20]Zhe Zhou, Tao Zhang, Sherman S. M. Chow, Yupeng Zhang, Kehuan Zhang:
Efficient Authenticated Multi-Pattern Matching. AsiaCCS 2016: 593-604 - [c19]Ronghai Yang, Guanchen Li, Wing Cheong Lau, Kehuan Zhang, Pili Hu:
Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations. AsiaCCS 2016: 651-662 - [c18]Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu:
On Code Execution Tracking via Power Side-Channel. CCS 2016: 1019-1031 - [c17]Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang:
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis. IEEE Symposium on Security and Privacy 2016: 414-432 - [c16]Kun Du, Hao Yang, Zhou Li, Hai-Xin Duan, Kehuan Zhang:
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO. USENIX Security Symposium 2016: 245-262 - [c15]Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang:
Evading Android Runtime Analysis Through Detecting Programmed Interactions. WISEC 2016: 159-164 - [i4]Zhe Zhou, Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang, Rui Liu:
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. CoRR abs/1605.06610 (2016) - 2015
- [c14]Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang:
When Good Becomes Evil: Keystroke Inference with Smartwatch. CCS 2015: 1273-1285 - [c13]Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, Zhou Li:
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections. ESORICS (2) 2015: 20-39 - [c12]Rui Liu, Jiannong Cao, Lei Yang, Kehuan Zhang:
PriWe: Recommendation for Privacy Settings of Mobile Apps Based on Crowdsourced Users' Expectations. IEEE MS 2015: 150-157 - [c11]Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang:
An Empirical Study on Android for Saving Non-shared Data on Public Storage. SEC 2015: 542-556 - 2014
- [c10]Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang:
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. SPSM@CCS 2014: 63-74 - [c9]Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang:
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound. CCS 2014: 429-440 - [i3]Zhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang:
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound. CoRR abs/1407.0803 (2014) - [i2]Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang:
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. CoRR abs/1407.4923 (2014) - [i1]Xiangyu Liu, Wenrui Diao, Zhe Zhou, Zhou Li, Kehuan Zhang:
Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones. CoRR abs/1407.5410 (2014) - 2012
- [c8]Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang:
Knowing your enemy: understanding and detecting malicious web advertising. CCS 2012: 674-686 - 2011
- [c7]Kehuan Zhang, Xiao-yong Zhou, Yangyi Chen, XiaoFeng Wang, Yaoping Ruan:
Sedic: privacy-aware data intensive computing on hybrid clouds. CCS 2011: 515-526 - [c6]Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, XiaoFeng Wang:
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. NDSS 2011 - 2010
- [c5]Kehuan Zhang, Zhou Li, Rui Wang, XiaoFeng Wang, Shuo Chen:
Sidebuster: automated detection and quantification of side-channel leaks in web application development. CCS 2010: 595-606 - [c4]Zhou Li, Kehuan Zhang, XiaoFeng Wang:
Mash-IF: Practical information-flow control within client-side mashups. DSN 2010: 251-260 - [c3]Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang:
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. IEEE Symposium on Security and Privacy 2010: 191-206
2000 – 2009
- 2009
- [c2]Kehuan Zhang, XiaoFeng Wang:
Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. USENIX Security Symposium 2009: 17-32 - 2008
- [c1]Rui Wang, XiaoFeng Wang, Kehuan Zhang, Zhuowei Li:
Towards automatic reverse engineering of software security configurations. CCS 2008: 245-256
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint