Hao Chen 0003
Person information
- affiliation: University of California, Davis, USA
- affiliation: University of California, Berkeley, USA
Other persons with the same name
- Hao Chen
- Hao Chen 0001 — Boise State University, ID, USA (and 1 more)
- Hao Chen 0002
— Hunan University, Changsha, China (and 1 more)
- Hao Chen 0004
— Pacific Forestry Centre, Victoria, BC, Canada (and 1 more)
- Hao Chen 0005 — Wuhan University, China
- Hao Chen 0006 — State University of New York, Binghamton, NY, USA
- Hao Chen 0007 — University of Tennessee Health Science Center, Memphis, TN, USA
- Hao Chen 0008 — University of Sydney
- Hao Chen 0009 — DePaul University, Chicago, USA
- Hao Chen 0010 — Samsung Research America, Inc., Richardson, TX, USA (and 1 more)
- Hao Chen 0011
— Imsight Medical Technology, Co., Ltd., Shenzhen, China (and 1 more)
- Hao Chen 0012 — Tongji University, Department of Mathematics, Shanghai, China
- Hao Chen 0013 — Beijing University of Posts and Telecommunications, Beijing, China
- Hao Chen 0014 — Harbin Institute of Technology, Department of Information Engineering, China
- Hao Chen 0015
— Chongqing Normal University, School of Mathematics, China (and 1 more)
- Hao Chen 0016
— University of Luxembourg, Luxembourg (and 3 more)
- Hao Chen 0017
— University of Michigan, Ann Arbor, MI, USA (and 1 more)
- Hao Chen 0018
— Shanghai University of Engineering Science, China
- Hao Chen 0019
— Xi'an University of Technology, School of Mechanical & Instrumental Engineering, China
- Hao Chen 0020
— Shanghai Maritime University, China (and 1 more)
- Hao Chen 0021
— University of Waterloo, ON, Canada (and 4 more)
- Hao Chen 0022
— Nanjing University, School of Electronic Science and Engineering, China
- Hao Chen 0023
— University of Electronic Science and Technology of China, Chengdu, China (and 1 more)
- Hao Chen 0024 — Boston University, Department of Electrical and Computer Engineering, MA, USA
- Hao Chen 0025
— China University of Mining and Technology, School of Electrical and Power Engineering, Xuzhou, China (and 1 more)
- Hao Chen 0026 — Southeast University, National ASIC System Engineering Research Center, Nanjing, China
- Hao Chen 0027 — Zhejiang University, College of Control Science and Engineering, State Key Laboratory of Industrial Control Technology, Hangzhou, China
- Hao Chen 0028
— University of Melbourne, Department of Infrastructure Engineering, Parkville, VIC, Canada
- Hao Chen 0029
— Hangzhou Dianzi University, School of Sciences, China (and 1 more)
- Hao Chen 0030
— Microsoft Research, Redmond, WA, USA
- Hao Chen 0031 — Chinese Academy of Sciences, Quanzhou Institute of Equipment Manufacturing, Jinjiang, China (and 1 more)
- Hao Chen 0032 — University of York, UK
- Hao Chen 0033
— Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Key Laboratory of Digital Earth Science, Beijing, China
- Hao Chen 0034
— City University of Hong Kong, Department of Mechanical Engineering, Hong Kong
- Hao Chen 0035
— University of Chinese Academy of Sciences, College of Materials Science and Opto-Electronic Technology, Beijing, China
- Hao Chen 0036
— Shanghai Jiao Tong University, Cooperative Medianet Innovation Center, China
- Hao Chen 0037
— University of Twente, Department of Biomechanical Engineering, The Netherlands
- Hao Chen 0038
— Zhejiang University of Technology, College of Information Engineering, Hangzhou, China
- Hao Chen 0039
— Beijing Institute of Technology, School of Automation, China (and 1 more)
- Hao Chen 0040 — Hunan Normal University, Key Laboratory of Low-dimensional Quantum Structures and Quantum Control of Ministry of Education, Changsha, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2018
- [c52]Chia-Cheng Yen, Dipak Ghosal, H. Michael Zhang, Chen-Nee Chuah, Hao Chen:
Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms. VNC 2018: 1-8 - [c51]Yuan Zhang, Jiarun Dai, Xiaohan Zhang, Sirong Huang, Zhemin Yang, Min Yang, Hao Chen:
Detecting third-party libraries in Android applications with high precision and recall. SANER 2018: 141-152 - 2017
- [c50]Jonathan Vronsky, Ryan Stevens, Hao Chen:
SurgeScan: Enforcing security policies on untrusted third-party Android libraries. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - 2016
- [j7]Yuan Zhang, Min Yang
, Guofei Gu, Hao Chen:
Rethinking Permission Enforcement Mechanism on Mobile Systems. IEEE Trans. Information Forensics and Security 11(10): 2227-2240 (2016) - [c49]Ryan Stevens, Jonathan Crussell, Hao Chen:
On the Origin of Mobile Apps: Network Provenance for Android Applications. CODASPY 2016: 160-171 - 2015
- [j6]Jonathan Crussell, Clint Gibler, Hao Chen:
AnDarwin: Scalable Detection of Android Application Clones Based on Semantics. IEEE Trans. Mob. Comput. 14(10): 2007-2019 (2015) - [c48]Ryan Stevens, Hao Chen:
Predictive Eviction: A Novel Policy for Optimizing TLS Session Cache Performance. GLOBECOM 2015: 1-7 - [c47]Yuan Zhang, Min Yang, Guofei Gu, Hao Chen:
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. SecureComm 2015: 3-22 - 2014
- [c46]Jonathan Crussell, Ryan Stevens, Hao Chen:
MAdFraud: investigating ad fraud in android applications. MobiSys 2014: 123-134 - 2013
- [c45]Hao Chen:
Underground economy of android application plagiarism. SESP@CCS Asia 2013: 1-2 - [c44]Jonathan Crussell, Clint Gibler, Hao Chen:
AnDarwin: Scalable Detection of Semantically Similar Android Applications. ESORICS 2013: 182-199 - [c43]Benjamin Davis, Hao Chen:
RetroSkeleton: retrofitting android apps. MobiSys 2013: 181-192 - [c42]Clint Gibler, Ryan Stevens, Jonathan Crussell, Hao Chen, Hui Zang, Heesook Choi:
AdRob: examining the landscape and impact of android application plagiarism. MobiSys 2013: 431-444 - [c41]Clint Gibler, Ryan Stevens, Jonathan Crussell, Hao Chen, Hui Zang, Heesook Choi:
AdRob: examining the landscape and impact of android application plagiarism. MobiSys 2013: 459-460 - [c40]Patrick John Sheehan, Benjamin Davis, Hao Chen:
Rewriting an Android app using RetroSkeleton. MobiSys 2013: 483-484 - [c39]Ryan Stevens, Jonathan Ganz, Vladimir Filkov, Premkumar T. Devanbu
, Hao Chen:
Asking for (and about) permissions used by Android apps. MSR 2013: 31-40 - [c38]David Kavaler, Daryl Posnett, Clint Gibler, Hao Chen, Premkumar T. Devanbu
, Vladimir Filkov:
Using and Asking: APIs Used in the Android Market and Asked about in StackOverflow. SocInfo 2013: 405-418 - [p1]Claire Le Goues, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason Hiser, John C. Knight, Matthew Van Gundy:
Moving Target Defenses in the Helix Self-Regenerative Architecture. Moving Target Defense 2013: 117-149 - 2012
- [j5]Matthew Van Gundy, Hao Chen:
Noncespaces: Using randomization to defeat cross-site scripting attacks. Computers & Security 31(4): 612-628 (2012) - [c37]Benjamin Davis, Hao Chen, Matthew K. Franklin:
Privacy-preserving alibi systems. AsiaCCS 2012: 34-35 - [c36]Jonathan Crussell, Clint Gibler, Hao Chen:
Attack of the Clones: Detecting Cloned Applications on Android Markets. ESORICS 2012: 37-54 - [c35]Gabriel Maganis, Elaine Shi, Hao Chen, Dawn Song:
Opaak: using mobile phones to limit anonymous identities online. MobiSys 2012: 295-308 - [c34]Liang Cai, Hao Chen:
On the Practicality of Motion Based Keystroke Inference Attack. TRUST 2012: 273-290 - [c33]Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen:
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale. TRUST 2012: 291-307 - 2011
- [j4]Francis Hsu, Hao Chen, Sridhar Machiraju:
WebCallerID: Leveraging cellular networks for Web authentication. Journal of Computer Security 19(5): 869-893 (2011) - [c32]Yuan Niu, Hao Chen:
Gesture Authentication with Touch Input for Mobile Devices. MobiSec 2011: 13-24 - [c31]Liang Cai, Kai Zeng, Hao Chen, Prasant Mohapatra:
Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas. NDSS 2011 - [c30]Liang Cai, Hao Chen:
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. HotSec 2011 - 2010
- [j3]Radmilo Racic, Denys Ma, Hao Chen, Xin Liu:
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks. IEEE Trans. Mob. Comput. 9(5): 609-620 (2010) - [c29]Liang Cai, Sridhar Machiraju, Hao Chen:
CapAuth: A Capability-based Handover Scheme. INFOCOM 2010: 386-390 - [c28]Benjamin Davis, Hao Chen:
DBTaint: Cross-Application Information Flow Tracking via Databases. WebApps 2010
2000 – 2009
- 2009
- [c27]Francis Hsu, Hao Chen:
Secure file system services for web 2.0 applications. CCSW 2009: 11-18 - [c26]Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen:
Multi-party off-the-record messaging. ACM Conference on Computer and Communications Security 2009: 358-368 - [c25]Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Chen:
Noise Injection for Search Privacy Protection. CSE (3) 2009: 1-8 - [c24]Matthew Van Gundy, Hao Chen:
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. NDSS 2009 - [c23]Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen:
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages. SecureComm 2009: 1-20 - [c22]Liang Cai, Sridhar Machiraju, Hao Chen:
Defending against sensor-sniffing attacks on mobile phones. MobiHeld 2009: 31-36 - 2008
- [j2]Ghassan Misherghi, Lihua Yuan, Zhendong Su, Chen-Nee Chuah
, Hao Chen:
A general framework for benchmarking firewall optimization techniques. IEEE Trans. Network and Service Management 5(4): 227-238 (2008) - [c21]Steven Crites, Francis Hsu, Hao Chen:
OMash: enabling secure web mashups via object abstractions. ACM Conference on Computer and Communications Security 2008: 99-108 - [c20]Radmilo Racic, Denys Ma, Hao Chen, Xin Liu:
Exploiting Opportunistic Scheduling in Cellular Data Networks. NDSS 2008 - [c19]Yuan Niu, Francis Hsu, Hao Chen:
iPhish: Phishing Vulnerabilities on Consumer Electronics. UPSEC 2008 - [c18]Sridhar Machiraju, Hao Chen, Jean Bolot:
Distributed authentication for low-cost wireless networks. HotMobile 2008: 55-59 - 2007
- [c17]Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni Vigna:
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. ACSAC 2007: 74-85 - [c16]Yuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming Ma:
A Quantitative Study of Forum Spamming Using Context-based Analysis. NDSS 2007 - [c15]Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen:
Spam double-funnel: connecting web spammers with advertisers. WWW 2007: 291-300 - 2006
- [c14]Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su:
Back to the Future: A Framework for Automatic Malware Removal and System Repair. ACSAC 2006: 257-268 - [c13]Radmilo Racic, Denys Ma, Hao Chen:
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. SecureComm 2006: 1-10 - [c12]Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah
, Prasant Mohapatra:
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. IEEE Symposium on Security and Privacy 2006: 199-213 - 2005
- [c11]Benjamin Schwarz, Hao Chen, David A. Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West:
Model Checking An Entire Linux Distribution for Security Violations. ACSAC 2005: 13-22 - 2004
- [c10]Hao Chen, Jonathan S. Shapiro:
Using build-integrated static checking to preserve correctness invariants. ACM Conference on Computer and Communications Security 2004: 288-297 - [c9]Hao Chen, Drew Dean, David A. Wagner:
Model Checking One Million Lines of C Code. NDSS 2004 - 2002
- [c8]Hao Chen, David A. Wagner:
MOPS: an infrastructure for examining security properties of software. ACM Conference on Computer and Communications Security 2002: 235-244 - [c7]Hao Chen, David A. Wagner, Drew Dean:
Setuid Demystified. USENIX Security Symposium 2002: 171-190 - 2001
- [c6]Susan T. Dumais, Edward Cutrell, Hao Chen:
Optimizing search by showing results in context. CHI 2001: 277-284 - 2000
- [c5]Hao Chen, Susan T. Dumais:
Bringing order to the Web: automatically categorizing search results. CHI 2000: 145-152 - [c4]Susan T. Dumais, Hao Chen:
Hierarchical classification of Web content. SIGIR 2000: 256-263
1990 – 1999
- 1999
- [j1]Hao Chen, Jianying Hu, Richard Sproat:
Integrating geometrical and linguistic analysis for email signature block parsing. ACM Trans. Inf. Syst. 17(4): 343-366 (1999) - 1998
- [c3]Hao Chen, Jianying Hu, Richard Sproat:
E-mail signature block analysis. ICPR 1998: 1153-1156 - [c2]Richard Sproat, Jianying Hu, Hao Chen:
Emu: an e-mail preprocessor for text-to-speech. MMSP 1998: 239-244 - 1997
- [c1]Hao Chen, Oscar E. Agazzi, Ching Y. Suen:
Piecewise Linear Modulation Model of Handwriting. ICDAR 1997: 363-368
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-12-06 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint