@inproceedings{Yen:2018,
  author = 	 {Chia-Cheng Yen and Dipak Ghosal and Michael Zhang and Chen-Nee Chuah and Hao Chen},
  title = 	 {Falsified Data Attack on Backpressure-based Traffic
Signal Control Algorithms},
  booktitle = {IEEE Vehicular Networking Conference (VNC)},
  date = {2018-12-05/2018-12-07},
  address = {Taipei, Taiwan},
}
@inproceedings{Liu:2018:Sanitization,
  author = 	 {Liu, Yongshuai and Chen, Jiyu and Chen, Hao},
  title = 	 {Less is more: culling the training set to improve robustness of deep neural networks},
  booktitle = {Conference on Decision and Game Theory for Security (GameSec)},
  date = {2018-10-29/2018-10-31},
  address = 	 {Seattle, WA, USA},
  annote = 	 {}
}
@inproceedings{Chen:2018:Angora,
  author = {Chen, Peng and Chen, Hao},
  title = {Angora: efficient fuzzing by principled search},
  booktitle = {IEEE Symposium on Security \& Privacy},
  date = {2018-05-21/2018-05-23},
  address = {San Francisco, CA, USA},
  optannote = {55/549=10.0\%}
}
@inproceedings{Zhang:2018:Library,
  author = {Zhang, Yuan and Dai, Jiarun and Zhang, Xiaohan and Huang, Sirong and Yang, Zhemin and Yang, Min and Chen, Hao},
  title = {Detecting third-party libraries in {Android} applications with high precision and recall},
  booktitle = {IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER)},
  date = {2018-03-20/2018-03-23},
  address = {Campobasso, Italy},
  optannote = {39/146=26.7\%}
}
@article{Han:2018:senDroid,
  author = {Han, Weili and Cao, Chang and Chen, Hao and Li, Dong and Fang, Zheran and Xu, Wenyuan and Wang, Xiaoyang},
  title = {senDroid: auditing sensor access in {Android} system-wide},
  journal = {IEEE Transactions on Dependable and Secure Computing},
  year = {2017},
  pages = {},
  number = {},
  volume = {}
}
@inproceedings{Meng:2017:MagNet,
  author = {Meng, Dongyu and Chen, Hao},
  title = {{MagNet}: a two-pronged defense against adversarial examples},
  booktitle = {ACM Conference on Computer and Communications Security},
  date = {2017-10-30/2017-11-03},
  address = {Dallas, TX},
  optannote = {151/843=17.9\%},
  series = {CCS}
}
@inproceedings{Wu:2017:Browser,
  author = {Wu, Yuanyi and Meng, Dongyu and Chen, Hao},
  title = {Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting},
  booktitle = {IEEE Conference on Communications and Network Security (CNS)},
  date = {2017-10-09/2017-10-11},
  address = {Las Vegas, NV},
  optannote = {41/137=29.9\%}
}
@inproceedings{Vronsky:2017:SurgeScan,
  author = {Vronsky, Jonathan and Stevens, Ryan and Chen, Hao},
  title = {SurgeScan: enforcing security policies on untrusted third-party {Android} libraries},
  booktitle = {The 14th IEEE Conference on Advanced and Trusted Computing (ATC)},
  date = {2017-08-04/2017-08-08},
  address = {San Francisco, CA},
}
@article{Zhang:2016:FindDroid,
  author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao},
  title = {Rethinking permission enforcement mechanism on mobile systems},
  journal = {IEEE Transactions on Information Forensics \& Security},
  year = {2016},
  pages = {2227--2240},
  number = {10},
  volume = {11}
}
@inproceedings{Qu:2016:AppShield,
  author = {Qu, Zhengyang and Guo, Guanyu and Shao, Zhengyue and Rastogi, Vaibhav and Chen, Yan and Chen, Hao and Hong, Wangjun},
  title = {AppShield: enabling multi-entity access control cross platforms for mobile app management},
  booktitle = {International Conference on Security and
Privacy in Communication Networks (SECURECOMM)},
  date = {2016-10-10/2016-10-12},
  address = {Guangzhou, China},
  optannote = {23.4\%}
}
@inproceedings{Chen:2016:UAV,
  author = {Chen, Peng and Chen, Hao},
  title = {Security analysis of personal unmanned aerial vehicles},
  booktitle = {International Conference on Security and
Privacy in Communication Networks (SECURECOMM)},
  date = {2016-10-10/2016-10-12},
  address = {Guangzhou, China},
  optannote = {23.4\%}
}
@inproceedings{Fang:2016:revDroid,
  author = {Fang, Zheran and Han, Weili and Li, Dong and Guo, Zeqing and Guo, Danhao and Wang, X. Sean and Qian, Zhiyun and Chen, Hao},
  title = {revDroid: code analysis of the side effects after dynamic permission revocation of {Android} apps},
  booktitle = {ACM Asia Conference on Computer and Communications Security  (ASIACCS)},
  date = {2016-05-30/2016-06-03},
  address = {Xi'an, China},
  optannote = {20.9\%}
}
@inproceedings{Stevens:2015:MTOP,
  author = {Stevens, Ryan and Crussell, Jonathan and Chen, Hao},
  title = {On the origin of mobile apps: network provenance for {Android} applications},
  booktitle = {6th ACM Conference on Data and Application Security and Privacy (CODASPY)},
  date = {2016-03-09/2016-03-11},
  address = {New Orleans, LA},
  optannote = {22\%}
}
@inproceedings{Zhang:2015:FindDroid,
  author = {Zhang, Yuan and Yang, Min and Gu, Guofei and Chen, Hao},
  title = {FineDroid: enforcing permissions with system-wide application},
  booktitle = {International Conference on Security and Privacy in Communication Networks (SECURECOMM)},
  date = {2015-10-26/2015-10-29},
  address = {Dallas, TX},
  optannote = {30/108}
}
@inproceedings{Stevens:2015:Pred,
  author = {Stevens, Ryan and Chen, Hao},
  title = {Predictive eviction: a novel policy for optimizing {TLS} session cache performance},
  booktitle = {IEEE Global Communications Conference: Communications and Information System Security (GLOBECOM)},
  date = {2015-12-06/2015-12-10},
  address = {San Diego, CA},
}
@article{Crussell:2015:AnDarwin,
  author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
  title = {AnDarwin: scalable detection of {Android} application clones based on semantics},
  journal = {IEEE Transactions on Mobile Computing},
  year = {2015},
  pages = {2007--2019},
  number = {10},
  volume = {14}
}
@inproceedings{Cai:2015:AppCracker,
  author = {Cai, Fangda and Chen, Hao and Wu, Yuanyi and Zhang, Yuan},
  title = {AppCracker: widespread vulnerabilities in user and session authentication in mobile apps},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2015-05-21},
  address = {San Jose, CA},
  optannote = {10/33}
}
@inproceedings{Crussell:2014:MAdFraud,
  author = {Crussell, Jonathan and Stevens, Ryan and Chen, Hao},
  title = {MAdFraud: investigating ad fraud in {Android} applications},
  booktitle = {12th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
  date = {2014-06-16/2014-06-19},
  address = {Bretton Woods, NH, USA},
  optannote = {25/185}
}
@inproceedings{Defreez:2014:Firefox,
  author = {Defreez, Daniel and Shastry, Bhargava and Chen, Hao and Seifert, Jean-Pierre},
  title = {A first look at firefox {OS} security},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2014-05-17},
  address = {San Jose, CA},
  optannote = {11/30}
}
@inbook{Goues:2013:MTD,
  author = {Goues, Claire Le and Nguyen-Tuong, Anh and Chen, Hao and Davidson, Jack W. and Forrest, Stephanie and Hiser, Jason D. and Knight, John C. and Gundy, Matthew Van},
  title = {Moving target defenses in the {Helix} self-regenerative architecture},
  booktitle = {Moving Target Defense II: Application of Game Theory and Adversarial Modeling},
  year = {2013},
  pages = {117--149},
  editor = {Sushil Jajodia et al.},
  optseries = {Advances in Information Security},
  optvolume = {100},
  publisher = {Springer-Verlag New York}
}
@inproceedings{Posnett:2013:UA,
  author = {Posnett, Daryl and Kavaler, David and Gibler, Clint and Chen, Hao and Devanbu, Prem and Filkov, Vladimir},
  title = {Using and asking: {APIs} used in the {Android} market and asked about in {StackOverflow}},
  booktitle = {5th International Conference on Social Informatics (SocInfo)},
  date = {2013-11-25/2013-11-27},
  address = {Kyoto, Japan},
}
@inproceedings{Crussell:2013:AnDarwin,
  author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
  title = {Scalable semantics-based detection of similar {Android} applications},
  booktitle = {18th European Symposium on Research in Computer Security (ESORICS)},
  date = {2013-09-09/2013-09-13},
  address = {Egham, U.K.},
  optannote = {43/242}
}
@inproceedings{Gustafson:2013:Permission,
  author = {Gustafson, Eric and Kennedy, Kristen and Chen, Hao},
  title = {Quantifying the effects of removing permissions from {Android} applications},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2013-05-23},
  address = {San Francisco, CA},
  optannote = {9/22},
}
@inproceedings{Stevens:2013:Permission,
  author = {Stevens, Ryan and Ganz, Jonathan and Devanbu, Prem and Chen, Hao and Filkov, Vladimir},
  title = {Asking for (and about) permissions used by {Android} apps},
  booktitle = {10th Working Conference on Mining Software Repositories (MSR)},
  date = {2013-05-18/2013-05-19},
  address = {San Francisco, CA},
  optannote = {31/81}
}
@inproceedings{Davis:2013:Retrofit,
  author = {Davis, Benjamin and Chen, Hao},
  title = {Retrofitting {Android} apps},
  booktitle = {11th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
  date = {2013-06-25/2013-06-28},
  address = {Taipei, Taiwan},
  optannote = {33/210}
}
@inproceedings{Gibler:2013:UEcon,
  author = {Gibler, Clint and Stevens, Ryan and Crussell, Jon and Chen, Hao and Zang, Hui and Choi, Heesook},
  title = {Characterizing {Android} application plagiarism and its impact on developers},
  booktitle = {11th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
  date = {2013-06-25/2013-06-28},
  address = {Taipei, Taiwan},
  optannote = {33/210}
}
@inproceedings{Crussell:2012:DNADroid,
  author = {Crussell, Jonathan and Gibler, Clint and Chen, Hao},
  title = {Attack of the clones: detecting cloned applications on {Android} markets},
  booktitle = {17th European Symposium on Research in Computer Security (ESORICS)},
  date = {2012-09-10/2012-09-12},
  address = {Pisa, Italy},
  optannote = {50/248}
}
@article{VanGundy:2012:Noncespaces,
  author = {Gundy, Matthew Van and Chen, Hao},
  title = {Noncespaces: using randomization to defeat cross-site scripting attacks},
  journal = {Computers \& Security},
  year = {2012},
  pages = {612–628},
  number = {4},
  volume = {31}
}
@inproceedings{Gibler:2012:AndroidLeaks,
  author = {Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao},
  title = {AndroidLeaks: automatically detecting potential privacy leaks in {Android} applications on a large scale},
  booktitle = {5th International Conference on Trust \& Trustworthy Computing (TRUST)},
  date = {2012-06-13/2012-06-15},
  address = {Vienna, Austria},
}
@inproceedings{Cai:2012:Motion,
  author = {Cai, Liang and Chen, Hao},
  title = {On the practicality of motion based keystroke infernce attack},
  booktitle = {5th International Conference on Trust \& Trustworthy Computing (TRUST)},
  date = {2012-06-13/2012-06-15},
  address = {Vienna, Austria},
}
@inproceedings{Stevens:2012:Ad,
  author = {Stevens, Ryan and Gibler, Clint and Crussell, Jon and Erickson, Jeremy and Chen, Hao},
  title = {Investigating user privacy in {Android} ad libraries},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2012-05-24},
  address = {San Francisco, CA},
  optannote = {11/28},
}
@inproceedings{Davis:2012:IARMDroid,
  author = {Davis, Benjamin and Sanders, Ben and Khodaverdian, Armen and Chen, Hao},
  title = {I-ARM-Droid: a rewriting framework for in-app reference monitors for {Android} applications},
  booktitle = {IEEE Mobile Security Technologies (MoST)},
  date = {2012-05-24},
  address = {San Francisco, CA},
  optannote = {11/28},
}
@inproceedings{Davis:2012:Alibi,
  author = {Davis, Benjamin and Chen, Hao and Franklin, Matthew},
  title = {Privacy-Preserving alibi systems},
  booktitle = {7th ACM Symposium on Information, Computer and Communications Security (ASIACCS)},
  date = {2012-05-01/2012-05-03},
  address = {Seoul, South Korea},
  optannote = {30\%},
}
@inproceedings{Maganis:2012:Opaak,
  author = {Maganis, Gabriel and Shi, Elaine and Chen, Hao and Song, Dawn},
  title = {Opaak: using mobile phones to limit anonymous identities online},
  booktitle = {10th International Conference on Mobile Systems,
Applications and Services (MobiSys)},
  date = {2012-06-26/2012-06-28},
  address = {Low Wood Bay, Lake District, United Kingdom},
  optannote = {32/182=17.6\%}
}
@inproceedings{Cai:2011:TouchLogger,
  author = {Cai, Liang and Chen, Hao},
  title = {TouchLogger: inferring keystrokes on touch screen from smartph one motion},
  booktitle = {6th USENIX Workshop on Hot Topics in Security (HotSec 11)},
  date = {2011-08-09/2011-08-09},
  address = {San Francisco, CA},
  optannote = {20\%}
}
@inproceedings{Yuan:2011:Gesture,
  author = {Niu, Yuan and Chen, Hao},
  title = {Gesture authentication with touch input for mobile devices},
  booktitle = {3rd International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec)},
  date = {2011-05-17/2011-05-19},
  address = {Aalborg, Denmark},
}
@inproceedings{Cai:2011:GoodNeighbor,
  author = {Cai, Liang and Zeng, Kai and Chen, Hao and Mohapatra, Prasant},
  title = {{Good neighbor}: ad hoc pairing of nearby wireless devices by multiple antennas},
  booktitle = {Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2011-02-06/2011-02-09},
  address = {San Diego, CA},
  optannote = {20\%},
}
@article{Hsu:2011:WebCallerID,
  author = {Hsu, Francis and Chen, Hao and Machiraju, Sridhar},
  title = {{WebCallerID}: leveraging cellular networks for {Web} authentication},
  journal = {Journal of Computer Security},
  year = {2011},
  number = {5},
  volume = {19}
}
@inproceedings{Davis:2010:DBTaint,
  author = {Davis, Benjamin and Chen, Hao},
  title = {DBTaint: cross-Application information flow tracking via databases},
  booktitle = {USENIX Conference on Web Application},
  date = {2010-06-23/2010-06-24},
  address = {Boston, MA},
  optannote = {50\%}
}
@article{Racic:2010:Scheduling,
  author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin},
  title = {Exploiting and defending opportunistic scheduling in cellular data networks},
  journal = {IEEE Transactions on Mobile Computing},
  year = {2010},
  pages = {609--620},
  issn = {1536-1233},
  volume = {9}
}
@inproceedings{Liang:2010:CapAuth,
  author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao},
  title = {{CapAuth}: a capability-based handover scheme},
  booktitle = {IEEE INFOCOM 2010: The 27th Conference on Computer Communications},
  date = {2010-03-15/2010-03-19},
  address = {San Diego, CA},
  optannote = {(276+106)/1575=24\%}
}
@inproceedings{Hsu:2009:WebFS,
  author = {Hsu, Francis and Chen, Hao},
  title = {Secure file system services for {Web} 2.0 applications},
  booktitle = {Proceedings of the The ACM Cloud Computing Security Workshop (CCSW 2009)},
  date = {2009-11-13/2009-11-13},
  address = {Chicago, IL},
  optannote = {11/30=37\%}
}
@inproceedings{Goldberg:2009:mpOTR,
  author = {Goldberg, Ian and Ustaoglu, Berkant and Gundy, Matthew Van and Chen, Hao},
  title = {Multi-party off-the-record messaging},
  booktitle = {Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS)},
  date = {2009-11-09/2009-11-13},
  address = {Chicago, IL},
  optannote = {58/315=18\%},
}
@inproceedings{Liang:2009:Paging,
  author = {Cai, Liang and Maganis, Gabriel and Zang, Hui and Chen, Hao},
  title = {Mitigating {DoS} attacks on the paging channel by efficient encoding in page messages},
  booktitle = {Proceedings of the 5th International Conference on
Security and Privacy in Communication Networks (SecureComm)},
  date = {2009-09-14/2009-09-18},
  address = {Athens, Greece},
  optannote = {20/76=26\%}
}
@inproceedings{Ye:2009:Search,
  author = {Ye, Shaozhi and Wu, Felix and Pandey, Raju and Chen, Hao},
  title = {Noise injection for search privacy protection},
  booktitle = {Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT)},
  date = {2009-08-29/2009-08-31},
  address = {Vancouver, Canada},
  optannote = {16/115=13\%}
}
@inproceedings{Liang:2009:Sensor,
  author = {Cai, Liang and Machiraju, Sridhar and Chen, Hao},
  title = {Defending against sensor-sniffing attacks on mobile phones},
  booktitle = {The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld)},
  date = {2009-08-17/2009-08-17},
  address = {Barcelona, Spain},
  optannote = {10/21=48\%}
}
@inproceedings{Becker:2009:SocialNetworks,
  author = {Becker, Justin and Chen, Hao},
  title = {Measuring privacy risk in online social networks},
  booktitle = {Web 2.0 Security and Privacy (W2SP)},
  date = {2009-05-21/2009-05-21},
  address = {Oakland, CA}
}
@inproceedings{VanGundy:2009:Noncespaces,
  author = {Gundy, Matthew Van and Chen, Hao},
  title = {{Noncespaces}: using randomization to enforce information flow tracking and thwart cross-Site scripting attacks},
  booktitle = {Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2009-02-08/2009-02-11},
  address = {San Diego, CA},
  optannote = {20/171=12\%},
}
@article{Misherghi:2008:Firewall,
  author = {Misherghi, G and Yuan, Lihua and Su, Zhendong and Chuah, Chen-Nee and Chen, Hao},
  title = {A general framework for benchmarking firewall optimization techniques},
  journal = {IEEE Transactions on Network and Service Management},
  year = {2008},
  month = dec,
  pages = {227--238},
  number = {4},
  volume = {5}
}
@inproceedings{Crites:2008:OMash,
  author = {Crites, Steven and Hsu, Francis and Chen, Hao},
  title = {OMash: enabling secure web mashups via object abstractions},
  booktitle = {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS)},
  date = {2008-10-27/2008-10-31},
  address = {Alexandria, VA},
  pages = {99--107},
  optannote = {51/281=18\%}
}
@inproceedings{Niu:2008:iPhish,
  author = {Niu, Yuan and Hsu, Francis and Chen, Hao},
  title = {{iPhish}: phishing vulnerabilities on consumer electronics},
  booktitle = {Proceedings of Usability, Psychology, and Security 2008},
  date = {2008-04-14/2008-04-14},
  address = {San Francisco, CA},
}
@inproceedings{Machiraju:2008:Authentication,
  author = {Machiraju, Sridhar and Chen, Hao and Bolot, Jean},
  title = {Distributed authentication for low-cost wireless networks},
  booktitle = {Proceedings of the Ninth Workshop on Mobile Computing Systems and Applications (HotMobile)},
  date = {2008-02-25/2008-02-26},
  address = {Napa Valley, CA},
  pages = {55--59},
  optannote = {18/79=23\%}
}
@inproceedings{Racic:2008:PF,
  author = {Racic, Radmilo and Ma, Denys and Chen, Hao and Liu, Xin},
  title = {Exploiting opportunistic scheduling in cellular data networks},
  booktitle = {Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2008-02-10/2008-02-13},
  address = {San Diego, CA},
  pages = {333--345},
  annoate = {21/118=18\%}
}
@inproceedings{VanGundy:2007:FO,
  author = {Gundy, Matthew Van and Chen, Hao and Su, Zhendong and Vigna, Giovanni},
  title = {Feature omission vulnerabilities: thwarting signature generation for polymorphic worms},
  booktitle = {Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC)},
  date = {2007-12-10/2007-12-14},
  address = {Miami Beach, FL},
  pages = {74--83},
  optannote = {42/191=22\%}
}
@inproceedings{Wang:2007:WWW,
  author = {Wang, Yi-Min and Ma, Ming and Niu, Yuan and Chen, Hao},
  title = {Spam double-funnel: connecting web spammers with advertisers},
  booktitle = {Proceedings of the 16th International World Wide Web Conference (WWW)},
  date = {2007-05-08/2007-05-12},
  address = {Banff, Canada},
  optannote = {111/755=15\%},
}
@inproceedings{Niu:2007:Spam,
  author = {Niu, Yuan and Wang, Yi-Ming and Chen, Hao and Ma, Ming and Hsu, Francis},
  title = {A quantitative study of forum spamming using context-based analysis},
  booktitle = {Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2007-02-28/2007-03-02},
  address = {San Diego, CA},
  pages = {79--92},
  optannote = {18/118=15\%},
}
@inproceedings{Hsu:2006:BTTF,
  author = {Hsu, Francis and Chen, Hao and Ristenpart, Thomas and Li, Jason and Su, Zhendong},
  title = {Back to the future: a framework for automatic malware removal and system repair},
  booktitle = {Proceedings of 22rd Annual
Computer Security Applications Conference (ACSAC)},
  date = {2006-12-11/2006-12-15},
  address = {Miami Beach, FL},
  optannote = {30\%},
}
@inproceedings{Racic:2006:MMS,
  author = {Racic, Radmilo and Ma, Denys and Chen, Hao},
  title = {Exploiting {MMS} vulnerabilities to stealthily exhaust mobile phone's battery},
  booktitle = {Proceedings of the Second IEEE Communications Society / 
CreateNet International Conference on Security and Privacy 
in Communication Network (SecureComm)},
  date = {2006-08-28/2006-09-01},
  address = {Baltimore, MD},
  optannote = {32/126=25\%},
}
@inproceedings{Yuan:2006:FIREMAN,
  author = {Yuan, Lihua and Mai, Jianning and Su, Zhendong and Chuah, Hao Chen and Chen-Nee and Mohapatra, Prasant},
  title = {{FIREMAN}: a toolkit for {FIREwall} {Modeling} and {ANalysis}},
  booktitle = {Proceedings of 2006 IEEE Symposium on Security and Privacy},
  date = {2006-05-21/2006-05-24},
  address = {Berkeley, CA},
  pages = {199--213},
  annoate = {32/251=13\%}
}
@inproceedings{Schwarz:2005:Linux,
  author = {Schwarz, Benjamin and Chen, Hao and Morrison, David Wagner and Geoff and West, Jacob and Lin, Jeremy and Tu, Wei},
  title = {Model checking an entire {Linux} distribution for security violations},
  booktitle = {Proceedings of the 2005 Annual Computer Security Applications Conference (ACSAC)},
  date = {2005-12-05/2005-12-09},
  address = {Tucson, Arizona},
  optannote = {23\%},
}
@inproceedings{Chen:2004:EROS,
  author = {Chen, Hao and Shapiro, Jonathan},
  title = {Using build-integrated static checking to preserve correctness invariants},
  booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS)},
  date = {2004-11-25/2004-11-29},
  address = {Washington, DC},
  pages = {288--297},
  optannote = {35/251=14\%}
}
@inproceedings{Chen:2004:million,
  author = {Chen, Hao and Dean, Drew and Wagner, David},
  title = {Model checking one million lines of {C} code},
  booktitle = {Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS)},
  date = {2004-02-04/2004-02-06},
  address = {San Diego, CA},
  pages = {171--185}
}
@inproceedings{Chen:2002:setuid,
  author = {Chen, Hao and Wagner, David and Dean, Drew},
  title = {Setuid demystified},
  booktitle = {Proceedings of the 11th {USENIX} Security Symposium},
  date = {2002-08-05/2002-08-09},
  address = {San Francisco, CA},
  pages = {171--190},
  optannote = {A close look at setuid and setgid implementations and interactions.}
}
@inproceedings{Chen:2002:MOPS,
  author = {Chen, Hao and Wagner, David},
  title = {{MOPS}: an infrastructure for examining security properties of software},
  booktitle = {Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS)},
  date = {2002-11-18/2002-11-22},
  address = {Washington, DC},
  pages = {235--244}
}
@inproceedings{Chen:2001:swish,
  author = {Dumais, Susan and Cutrell, Edward and Chen, Hao},
  title = {Optimizing search by showing results in context},
  booktitle = {Proceedings of the ACM SIGCHI Conference on Human Factors 
in Computing Systems (CHI)},
  year = {2001},
  month = apr,
  address = {Seattle, WA},
  pages = {277--284}
}
@inproceedings{Chen:2000:swish,
  author = {Chen, Hao and Dumais, Susan},
  title = {Bringing order to the web: automatically categorizing search results},
  booktitle = {Proceedings of the ACM SIGCHI Conference on Human Factors 
in Computing Systems (CHI)},
  year = {2000},
  month = apr,
  address = {The Hague, The Netherlands},
  pages = {145--152}
}
@inproceedings{Chen:2000:swishcat,
  author = {Dumais, Susan and Chen, Hao},
  title = {Hierarchical classification of web content},
  booktitle = {Proceedings of the 23rd ACM SIGIR Conference on 
Research and Development in Information Retrieval (SIGIR)},
  year = {2000},
  month = jul,
  address = {Athens, Greece},
  pages = {256--263}
}
@inproceedings{Chen:2000:swishcat2,
  author = {Dumais, Susan and Cutrell, Edward and Chen, Hao},
  title = {Classified displays of web search results},
  booktitle = {Proceedings of the 11th ASIST SIG/CR Classification 
Research Workshop},
  year = {2000},
  month = nov,
  pages = {87--90}
}
@inproceedings{Chen:2000:textcat,
  author = {Chen, Hao and Ho, Tin K.},
  title = {Evaluation of decision forests on text categorization},
  booktitle = {Proceedings of the SPIE Conference on Document Recognition
and Retrieval {VII}},
  year = {2000},
  month = jan,
  address = {San Jose, CA},
  pages = {191--199},
  volume = {3967}
}
@article{Chen:1999:emu,
  author = {Chen, Hao and Hu, Jianying and Sproat, Richard},
  title = {Integrating geometrical and linguistic analysis for e-mail signature block parsing},
  journal = {ACM Transactions on Information Systems},
  year = {1999},
  month = oct,
  pages = {343--366},
  number = {4},
  volume = {17}
}
@inproceedings{Sproat:1998:emu,
  author = {Sproat, Richard and Hu, Jianying and Chen, Hao},
  title = {{\protect\em emu}: an e-mail preprocessor for text-to-speech},
  booktitle = {1998 Workshop on Multimedia Signal Processing},
  year = {1998},
  month = dec,
  address = {Redondo Beach, CA},
  pages = {239--244},
  organization = {{IEEE} Signal Processing Society}
}
@inproceedings{Chen:1998:emu,
  author = {Chen, Hao and Hu, Jianying and Sproat, Richard},
  title = {E-mail signature block analysis},
  booktitle = {Proceedings of the 14th International Conference on 
Pattern Recognition (ICPR)},
  year = {1998},
  month = aug,
  address = {Brisbane, Australia},
  pages = {1153--1156}
}
@inproceedings{Chen:1997:handwriting,
  author = {Chen, Hao and Agazzi, Oscar E. and Suen, Ching Y.},
  title = {Piecewise linear modulation model of handwriting},
  booktitle = {Proceedings of the 4th International Conference on 
Document Analysis and Recognition (ICDAR)},
  year = {1997},
  month = aug,
  address = {Ulm, Germany},
  pages = {363--367}
}