Kaifa Zhao
YOU?
Author Swipe
View article: Exposing the Achilles' Heel: Black-box Reverse Engineering of Commercial LLM Plugins' Hidden Prompts
Exposing the Achilles' Heel: Black-box Reverse Engineering of Commercial LLM Plugins' Hidden Prompts Open
View article: Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation
Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation Open
The progress of automotive technologies has made cybersecurity a crucial focus, leading to various cyber attacks. These attacks primarily target the Controller Area Network (CAN) and specialized Electronic Control Units (ECUs). In order to…
View article: Light-field deep learning enables high-throughput, scattering-mitigated calcium imaging
Light-field deep learning enables high-throughput, scattering-mitigated calcium imaging Open
Light field microscopy (LFM) enables volumetric, high throughput functional imaging. However, the computational burden and vulnerability to scattering limit LFM’s application to neuroscience. We present a light-field strategy for volumetri…
View article: CydiOS: A Model-Based Testing Framework for iOS Apps
CydiOS: A Model-Based Testing Framework for iOS Apps Open
This is the artifacts for paper cydios: a model-based testing framework for ios apps.
View article: Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps Open
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE), 14-20 May 2023, Melbourne, Australia
View article: ATPChecker Dataset 2
ATPChecker Dataset 2 Open
Dataset for the ICSE 2023 technical paper ``Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps". Main repository: https://doi.org/10.5281/zenodo.7647779 The first part of the dataset: 10.5281/zenodo.7787453
View article: ATPChecker Dataset 2
ATPChecker Dataset 2 Open
Dataset for the ICSE 2023 technical paper ``Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps". Main repository: https://doi.org/10.5281/zenodo.7647779 The first part of the dataset: 10.5281/zenodo.7787453
View article: ATPChecker Dataset 1
ATPChecker Dataset 1 Open
Dataset for the ICSE 2023 technical paper ``Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps". Main repository: https://doi.org/10.5281/zenodo.7647779
View article: ATPChecker Dataset 1
ATPChecker Dataset 1 Open
Dataset for the ICSE 2023 technical paper ``Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps". The second part of the dataset is given at: 10.5281/zenodo.7790328 Main repository: https://doi.org/10.5281/zenodo.7647779 If…
View article: ATPChecker Dataset 1
ATPChecker Dataset 1 Open
Dataset for the ICSE 2023 technical paper ``Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps". The second part of the dataset is given at: 10.5281/zenodo.7790328 Main repository: https://doi.org/10.5281/zenodo.7647779 If…
View article: A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification
A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification Open
Privacy protection raises great attention on both legal levels and user awareness. To protect user privacy, countries enact laws and regulations requiring software privacy policies to regulate their behavior. However, privacy policies are …
View article: From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection
From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection Open
The success of graph neural networks stimulates the prosperity of graph mining and the corresponding downstream tasks including graph anomaly detection (GAD). However, it has been explored that those graph mining methods are vulnerable to …
View article: A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification
A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification Open
Privacy protection raises great attention on both legal levels and user awareness. To protect user privacy, countries enact laws and regulations requiring software privacy policies to regulate their behavior. However, privacy policies are …
View article: BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection Open
Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well as recent advances in graph mining techniques. These GAD tools, however, expose a new attacking surface, ironically du…