Biblio

Export 24 results:
Filters: Author is Kai Chen  [Clear All Filters]
2023
Wei C'an, Lee Y, Chen K, Meng G, Lv P.  2023.  Aliasing Backdoor Attacks on Pre-trained Models. 32nd USENIX Security Symposium (USENIX Security 23). :2707--2724.
Hu P, Liang R, Cao Y, Chen K, Zhang R.  2023.  AURC: Detecting Errors in Program Code and Documentation. 32nd USENIX Security Symposium (USENIX Security 23). :1415--1432.
Wang D, Li Y, Zhang Z, Chen K.  2023.  CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing. 32nd USENIX Security Symposium (USENIX Security 23). :1919--1936.
Lv P, Yue C, Liang R, Yang Y, Zhang S, Ma H, Chen K.  2023.  A Data-free Backdoor Injection Approach in Neural Networks. 32nd USENIX Security Symposium (USENIX Security 23). :2671--2688.
Lin M, Chen K, Xiao Y.  2023.  Detecting API Post-Handling Bugs Using Code and Description in Patches. 32nd USENIX Security Symposium (USENIX Security 23). :3709--3726.
Deng Z, Meng G, Chen K, Liu T, Xiang L, Chen C.  2023.  Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities. 32nd USENIX Security Symposium (USENIX Security 23). :7393--7410.
Zhang J, Cheng X, Wang W, Yang L, Hu J, Chen K.  2023.  FLASH: Towards a High-performance Hardware Acceleration Architecture for Cross-silo Federated Learning. 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). :1057--1079.
Wang Z, Luo L, Ning Q, Zeng C, Li W, Wan X, Xie P, Feng T, Cheng K, Geng X et al..  2023.  SRNIC: A Scalable Architecture for RDMA NICs. 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). :1--14.
2022
Zeng C, Luo L, Ning Q, Han Y, Jiang Y, Tang D, Wang Z, Chen K, Guo C.  2022.  FAERY: An FPGA-accelerated Embedding-based Retrieval System. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :841--856.
Zeng C, Luo L, Zhang T, Wang Z, Li L, Han W, Chen N, Wan L, Liu L, Ding Z et al..  2022.  Tiara: A Scalable and Efficient Hardware Acceleration Architecture for Stateful Layer-4 Load Balancing. 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). :1345--1358.
2021
He Y, Meng G, Chen K, Hu X, He J.  2021.  DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. 30th USENIX Security Symposium (USENIX Security 21). :1901--1918.
2018
Yuan X, Chen Y, Zhao Y, Long Y, Liu X, Chen K, Zhang S, Huang H, Wang XF, Gunter CA.  2018.  CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. 27th USENIX Security Symposium (USENIX Security 18). :49--64.
Chen L, Xia J, Yi B, Chen K.  2018.  PowerMan: An Out-of-Band Management Network for Datacenters Using Power Line Communication. 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). :561--578.
2017
Chen L, Chen K, Zhu Z, Yu M, Porter G, Qiao C, Zhong S.  2017.  Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :577--593.
2016
Bai W, Chen L, Chen K, Wu H.  2016.  Enabling ECN in Multi-Service Multi-Queue Data Centers. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :537--549.
2015
Hu S, Chen K, Wu H, Bai W, Lan C, Wang H, Zhao H, Guo C.  2015.  Explicit Path Control in Commodity Data Centers: Design and Applications. 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). :15--28.
Chen K, Wang P, Lee Y, Wang XF, Zhang N, Huang H, Zou W, Liu P.  2015.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th USENIX Security Symposium (USENIX Security 15). :659--674.
Bai W, Chen L, Chen K, Han D, Tian C, Wang H.  2015.  Information-Agnostic Flow Scheduling for Commodity Data Centers. 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). :455--468.
2014
Chen L, Chen K.  2014.  BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing. 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14).