Chen Qi

Results: 41



#Item
1

Static Detection of Packet Injection Vulnerabilities – A Case for Identifying Attacker-controlled Implicit Information Leaks Qi Alfred Chen, Zhiyun Qian† , Yunhan Jack Jia, Yuru Shao, Z. Morley Mao University of Mich

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2015-10-13 17:35:43
    2

    Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu University of Michigan Background: Connected Vehicle techno

    Add to Reading List

    Source URL: wp.internetsociety.org

    - Date: 2018-03-01 13:32:31
      3Wireless networking / Wireless / Technology / Computing / Wireless ad hoc network / Wi-Fi / Signal-to-interference-plus-noise ratio / Wireless LAN / IEEE 802.11 / Wireless sensor network / WiMAX / Computer network

      Joint Power Control and Scheduling Algorithm for Wi-Fi Ad-hoc Networks Sangho Oh∗ , Marco Gruteser∗ , Daniel Jiang† , Qi Chen† ∗ WINLAB, Rutgers University, NJ, USA

      Add to Reading List

      Source URL: www.winlab.rutgers.edu

      Language: English - Date: 2011-08-05 21:34:24
      4Domain name system / Web Proxy Autodiscovery Protocol / Generic top-level domain / .local / Root name server / Domain name / Proxy auto-config / Name server / Top-level domain / OpenDNS / .global / DNS zone

      MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era Qi Alfred Chen, Eric Osterweil† , Matthew Thomas†, Z. Morley Mao University of Michigan, † Verisign Labs alfchen@umich.

      Add to Reading List

      Source URL: www.verisign.com

      Language: English - Date: 2016-05-23 09:25:07
      5

      Cross-lingual Slot Filling from Comparable Corpora Matthew Snover, Xiang Li, Wen-Pin Lin, Zheng Chen, Suzanne Tamang, Mingmin Ge, Adam Lee, Qi Li, Hao Li, Sam Anzaroot, Heng Ji Computer Science Department Queens College

      Add to Reading List

      Source URL: aclweb.org

      Language: English - Date: 2011-05-19 10:17:08
        6

        Android UI Deception Revisited: Attacks and Defenses Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Z. Morley Mao, Atul Prakash {earlence,alfchen,jpaupore,gessl,jhalderm,zmao,aprakash}

        Add to Reading List

        Source URL: fc16.ifca.ai

        Language: English - Date: 2016-02-08 20:23:33
          7

          Machine Learning in Automatic Music Chords Generation Ziheng Chen Jie Qi

          Add to Reading List

          Source URL: cs229.stanford.edu

          Language: English - Date: 2015-12-14 19:08:01
            8

            Transactions on Design Automation of Electronic Systems A Robust Design Space Modeling Qi Guo, Carnegie Mellon University Tianshi Chen, Institute of Computing Technology, Chinese Academy of Sciences

            Add to Reading List

            Source URL: pages.saclay.inria.fr

            Language: English - Date: 2015-01-01 13:30:05
              9

              BenchNN: On the Broad Potential Application Scope of Hardware Neural Network Accelerators Tianshi Chen⋄ , Yunji Chen⋄ , Marc Duranton† , Qi Guo♭ , Atif Hashmi∗ , Mikko Lipasti∗ , Andrew Nere∗ , Shi Qiu♯ ,

              Add to Reading List

              Source URL: pages.saclay.inria.fr

              Language: English - Date: 2014-08-30 17:11:00
                UPDATE