What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yan Chen
Google Scholar
ORCID:
0000-0003-4103-1498
46
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity.
Wenrui Cheng
Qixuan Yuan
Tiantian Zhu
Tieming Chen
Jie Ying
Aohan Zheng
Mingjun Ma
Chunlin Xiong
Mingqi Lv
Yan Chen
2025
conf/ndss
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
Lingzhi Wang
Xiangmin Shen
Weijian Li
Zhenyuan Li
R. Sekar
Han Liu
Yan Chen
2025
journals/compsec
AutoSeg: Automatic micro-segmentation policy generation via configuration analysis.
Andong Chen
Zhaoxuan Jin
Zhenyuan Li
Yan Chen
Yu Ning
Ying Wang
2025
conf/asiaccs
PentestAgent: Incorporating LLM Agents to Automated Penetration Testing.
Xiangmin Shen
Lingzhi Wang
Zhenyuan Li
Yan Chen
Wencheng Zhao
Dawei Sun
Jiashui Wang
Wei Ruan
2025
conf/uss
PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise.
Zheng Yu
Ziyi Guo
Yuhang Wu
Jiahao Yu
Meng Xu
Dongliang Mu
Yan Chen
Xinyu Xing
2025
conf/uss
Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMs' Refusal Boundaries.
Jiahao Yu
Haozheng Luo
Jerry Yao-Chieh Hu
Yan Chen
Wenbo Guo
Han Liu
Xinyu Xing
2024
conf/asiaccs
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
Xiangmin Shen
Zhenyuan Li
Graham Burleigh
Lingzhi Wang
Yan Chen
2023
journals/compsec
Full-stack vulnerability analysis of the cloud-native platform.
Qingyang Zeng
Mohammad Kavousi
Yinhong Luo
Ling Jin
Yan Chen
2022
journals/compsec
AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation.
Xuechao Du
Andong Chen
Boyuan He
Hao Chen
Fan Zhang
Yan Chen
2022
conf/esorics
AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
Zhenyuan Li
Jun Zeng
Yan Chen
Zhenkai Liang
2021
journals/compsec
Threat detection and investigation with system-level provenance graphs: A survey.
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
Wei Ruan
2021
journals/tifs
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis.
Tiantian Zhu
Jiayu Wang
Linqi Ruan
Chunlin Xiong
Jinkai Yu
Yaosheng Li
Yan Chen
Mingqi Lv
Tieming Chen
2021
journals/tifs
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering.
Tiantian Zhu
Lei Fu
Qiang Liu
Zi Lin
Yan Chen
Tieming Chen
2021
conf/uss
CLARION: Sound and Clear Provenance Tracking for Microservice Deployments.
Xutong Chen
Hassaan Irshad
Yan Chen
Ashish Gehani
Vinod Yegneswaran
2020
conf/ndss
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
Runqing Yang
Shiqing Ma
Haitao Xu
Xiangyu Zhang
Yan Chen
2019
conf/ccs
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
Zhenyuan Li
Qi Alfred Chen
Chunlin Xiong
Yan Chen
Tiantian Zhu
Hai Yang
2018
conf/uss
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.
Xiang Pan
Yinzhi Cao
Xuechao Du
Boyuan He
Gan Fang
Rui Shao
Yan Chen
2017
journals/compsec
DroidNative: Automating and optimizing detection of Android native code malware variants.
Shahid Alam
Zhengyang Qu
Ryan D. Riley
Yan Chen
Vaibhav Rastogi
2017
conf/dsn
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications.
Zhengyang Qu
Shahid Alam
Yan Chen
Xiaoyong Zhou
Wangjun Hong
Ryan D. Riley
2016
conf/ccs
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites.
Xiang Pan
Yinzhi Cao
Shuangping Liu
Yu Zhou
Yan Chen
Tingzhe Zhou
2016
conf/ndss
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
Vaibhav Rastogi
Rui Shao
Yan Chen
Xiang Pan
Shihong Zou
Ryan D. Riley
2016
conf/dsn
SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets.
Xitao Wen
Bo Yang
Yan Chen
Chengchen Hu
Yi Wang
Bin Liu
Xiaolin Chen
2015
conf/sp
Vetting SSL Usage in Applications with SSLINT.
Boyuan He
Vaibhav Rastogi
Yinzhi Cao
Yan Chen
V. N. Venkatakrishnan
Runqing Yang
Zhenrui Zhang
2015
conf/cns
SafePay: Protecting against credit card forgery with existing magnetic card readers.
Yinzhi Cao
Xiang Pan
Yan Chen
2015
conf/ndss
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Yinzhi Cao
Yanick Fratantonio
Antonio Bianchi
Manuel Egele
Christopher Kruegel
Giovanni Vigna
Yan Chen
2015
conf/ndss
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
Xiang Pan
Yinzhi Cao
Yan Chen
2014
journals/tifs
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks.
Vaibhav Rastogi
Yan Chen
Xuxian Jiang
2014
conf/ccs
AutoCog: Measuring the Description-to-permission Fidelity in Android Applications.
Zhengyang Qu
Vaibhav Rastogi
Xinyi Zhang
Yan Chen
Tiantian Zhu
Zhong Chen
2014
conf/acsac
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Hongyu Gao
Yi Yang
Kai Bu
Yan Chen
Doug Downey
Kathy Lee
Alok N. Choudhary
2014
conf/acsac
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.
Yinzhi Cao
Xiang Pan
Yan Chen
Jianwei Zhuge
2013
conf/ccs
DroidChameleon: evaluating Android anti-malware against transformation attacks.
Vaibhav Rastogi
Yan Chen
Xuxian Jiang
2013
conf/dsn
Redefining web browser principals with a Configurable Origin Policy.
Yinzhi Cao
Vaibhav Rastogi
Zhichun Li
Yan Chen
Alexander Moshchuk
2012
conf/ccs
Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Yinzhi Cao
Zhichun Li
Vaibhav Rastogi
Yan Chen
Xitao Wen
2012
conf/ndss
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Yinzhi Cao
Vinod Yegneswaran
Phillip A. Porras
Yan Chen
2012
conf/ndss
Towards Online Spam Filtering in Social Networks.
Hongyu Gao
Yan Chen
Kathy Lee
Diana Palsetia
Alok N. Choudhary
2011
journals/tifs
Towards Situational Awareness of Large-Scale Botnet Probing Events.
Zhichun Li
Anup Goyal
Yan Chen
Vern Paxson
2011
conf/ccs
Poster: CUD: crowdsourcing for URL spam detection.
Jun Hu
Hongyu Gao
Zhichun Li
Yan Chen
2011
conf/ccs
Poster: a path-cutting approach to blocking XSS worms in social web networks.
Yinzhi Cao
Vinod Yegneswaran
Phillip A. Porras
Yan Chen
2011
conf/ccs
Poster: online spam filtering in social networks.
Hongyu Gao
Yan Chen
Kathy Lee
Diana Palsetia
Alok N. Choudhary
2011
conf/ndss
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Zhichun Li
Yi Tang
Yinzhi Cao
Vaibhav Rastogi
Yan Chen
Bin Liu
Clint Sbisa
2010
conf/ccs
Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Yinzhi Cao
Zhichun Li
Vaibhav Rastogi
Yan Chen
2010
conf/ccs
Detecting and characterizing social spam campaigns.
Hongyu Gao
Jun Hu
Christo Wilson
Zhichun Li
Yan Chen
Ben Y. Zhao
2009
conf/ccs
Automating analysis of large-scale botnet probing events.
Zhichun Li
Anup Goyal
Yan Chen
Vern Paxson
2009
conf/dsn
Exception triggered DoS attacks on wireless networks.
Yao Zhao
Sagar Vemuri
Jiazhen Chen
Yan Chen
Hai Zhou
Zhi Fu
2006
conf/sp
Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.
Zhichun Li
Manan Sanghi
Yan Chen
Ming-Yang Kao
Brian Chavez
2001
conf/icics
Quantifying Network Denial of Service: A Location Service Case Study.
Yan Chen
Adam W. Bargteil
David Bindel
Randy H. Katz
John Kubiatowicz
Coauthors
Adam W. Bargteil
(1)
Alexander Moshchuk
(1)
Alok N. Choudhary
(3)
Andong Chen
(2)
Antonio Bianchi
(1)
Anup Goyal
(2)
Aohan Zheng
(1)
Ashish Gehani
(1)
Ben Y. Zhao
(1)
Bin Liu
(2)
Bo Yang
(1)
Boyuan He
(3)
Brian Chavez
(1)
Chengchen Hu
(1)
Christo Wilson
(1)
Christopher Kruegel
(1)
Chunlin Xiong
(3)
Clint Sbisa
(1)
David Bindel
(1)
Dawei Sun
(1)
Diana Palsetia
(2)
Dongliang Mu
(1)
Doug Downey
(1)
Fan Zhang
(1)
Gan Fang
(1)
Giovanni Vigna
(1)
Graham Burleigh
(1)
Hai Yang
(1)
Hai Zhou
(1)
Haitao Xu
(1)
Han Liu
(2)
Hao Chen
(1)
Haozheng Luo
(1)
Hassaan Irshad
(1)
Hongyu Gao
(5)
Jerry Yao-Chieh Hu
(1)
Jiahao Yu
(2)
Jianwei Zhuge
(1)
Jiashui Wang
(1)
Jiayu Wang
(1)
Jiazhen Chen
(1)
Jie Ying
(1)
Jinkai Yu
(1)
John Kubiatowicz
(1)
Jun Hu
(2)
Jun Zeng
(1)
Kai Bu
(1)
Kathy Lee
(3)
Lei Fu
(1)
Ling Jin
(1)
Lingzhi Wang
(3)
Linqi Ruan
(1)
Manan Sanghi
(1)
Manuel Egele
(1)
Meng Xu
(1)
Ming-Yang Kao
(1)
Mingjun Ma
(1)
Mingqi Lv
(2)
Mohammad Kavousi
(1)
Phillip A. Porras
(2)
Qi Alfred Chen
(2)
Qiang Liu
(1)
Qingyang Zeng
(1)
Qixuan Yuan
(1)
R. Sekar
(1)
Randy H. Katz
(1)
Rui Shao
(2)
Runqing Yang
(3)
Ryan D. Riley
(3)
Sagar Vemuri
(1)
Shahid Alam
(2)
Shihong Zou
(1)
Shiqing Ma
(1)
Shuangping Liu
(1)
Tiantian Zhu
(5)
Tieming Chen
(3)
Tingzhe Zhou
(1)
V. N. Venkatakrishnan
(1)
Vaibhav Rastogi
(10)
Vern Paxson
(2)
Vinod Yegneswaran
(3)
Wangjun Hong
(1)
Wei Ruan
(2)
Weijian Li
(1)
Wenbo Guo
(1)
Wencheng Zhao
(1)
Wenrui Cheng
(1)
Xiang Pan
(6)
Xiangmin Shen
(3)
Xiangyu Zhang
(1)
Xiaolin Chen
(1)
Xiaoyong Zhou
(1)
Xinyi Zhang
(1)
Xinyu Xing
(2)
Xitao Wen
(2)
Xuechao Du
(2)
Xutong Chen
(1)
Xuxian Jiang
(2)
Yan Chen
(46)
Yanick Fratantonio
(1)
Yao Zhao
(1)
Yaosheng Li
(1)
Yi Tang
(1)
Yi Wang
(1)
Yi Yang
(1)
Ying Wang
(1)
Yinhong Luo
(1)
Yinzhi Cao
(13)
Yu Ning
(1)
Yu Zhou
(1)
Yuhang Wu
(1)
Zhaoxuan Jin
(1)
Zheng Yu
(1)
Zhengyang Qu
(3)
Zhenkai Liang
(1)
Zhenrui Zhang
(1)
Zhenyuan Li
(7)
Zhi Fu
(1)
Zhichun Li
(9)
Zhong Chen
(1)
Zi Lin
(1)
Ziyi Guo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to