Dr  Xiao Chen

Dr Xiao Chen

Lecturer

School of Information and Physical Sciences (Computing and Information Technology)

Career Summary

Biography

Dr. Xiao Chen currently holds the position of Lecturer within the School of Information and Physical Sciences at The University of Newcastle. Prior to this role, he served as a Research Fellow in the Faculty of Information Technology at Monash University from 2019 onwards. He earned his Ph.D. from Swinburne University of Technology. Xiao's research focuses on enhancing the security of software and machine learning systems. He has published in top software engineering and cybersecurity conferences and journals, including FSE, ASE, ISSTA, TSE, TOSEM, TIFS, and TDSC. He has also contributed as a reviewer for esteemed journals such as TIFS, TDSC, TSE, TOSEM, and ACM CSUR, etc. Additionally, Xiao has actively participated as a Program Committee member for numerous conferences, including ASE, MSR, MobileSoft, and others.

Qualifications

  • DOCTOR OF PHILOSOPHY, Swinburne University of Technology

Keywords

  • AI for Security
  • AI for Software Engineering
  • Digital Health
  • Smart Contract Security
  • Software Engineering for AI
  • Software Quality Assurance
  • Software Security

Languages

  • English (Fluent)
  • Mandarin (Mother)

Fields of Research

Code Description Percentage
460406 Software and application security 80
460499 Cybersecurity and privacy not elsewhere classified 20

Professional Experience

UON Appointment

Title Organisation / Department
Lecturer University of Newcastle
School of Information and Physical Sciences
Australia

Academic appointment

Dates Title Organisation / Department
2/12/2019 - 2/2/2024 Research Fellow Monash University
Faculty of Information Technology
Australia

Awards

Research Award

Year Award
2020 Outstanding HDR Published Award 2020
Swinburne University of Technology

Teaching

Code Course Role Duration
FIT3173 Software Security
Monash University
Lecturer 21/2/2022 - 3/6/2022
Edit

Publications

For publications that are currently unpublished or in-press, details are shown in italics.


Chapter (4 outputs)

Year Citation Altmetrics Link
2019 Shi L, Chen X, Wen S, Xiang Y, 'Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats', , SPRINGER INTERNATIONAL PUBLISHING AG 588-597 (2019)
DOI 10.1007/978-3-030-37352-8_53
Citations Scopus - 8Web of Science - 4
2019 Zhang R, Chen X, Wen S, Zheng J, 'Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users Awareness', 378-396 (2019)

Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually come with h... [more]

Voice Assistant (VAs) are increasingly popular for human-computer interaction (HCI) smartphones. To help users automatically conduct various tasks, these tools usually come with high privileges and are able to access sensitive system resources. A comprised VA is a stepping stone for attackers to hack into users¿ phones. Prior work has experimentally demonstrated that VAs can be a promising attack point for HCI tools. However, the state-of-the-art approaches require ad-hoc mechanisms to activate VAs that are non-trivial to trigger in practice and are usually limited to specific mobile platforms. To mitigate the limitations faced by the state-of-the-art, we propose a novel attack approach, namely Vaspy, which crafts the users¿ ¿activation voice¿ by silently listening to users¿ phone calls. Once the activation voice is formed, Vaspy can select a suitable occasion to launch an attack. Vaspy embodies a machine learning model that learns suitable attacking times to prevent the attack from being noticed by the user. We implement a proof-of-concept spyware and test it on a range of popular Android phones. The experimental results demonstrate that this approach can silently craft the activation voice of the users and launch attacks. In the wrong hands, a technique like Vaspy can enable automated attacks to HCI tools. By raising awareness, we urge the community and manufacturers to revisit the risks of VAs and subsequently revise the activation logic to be resilient to the style of attacks proposed in this work.

DOI 10.1007/978-3-030-30619-9_27
Citations Scopus - 6
2014 Wu D, Chen X, Chen C, Zhang J, Xiang Y, Zhou W, 'On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification', , SPRINGER INTERNATIONAL PUBLISHING AG 138-151 (2014)
Citations Scopus - 10Web of Science - 4
2013 Zhang J, Chen X, Xiang Y, Zhou W, 'Zero-day traffic identification', 213-227 (2013)

Recent research on Internet traffic classification has achieved certain success in the application of machine learning techniques into flow statistics based method. However, exist... [more]

Recent research on Internet traffic classification has achieved certain success in the application of machine learning techniques into flow statistics based method. However, existing methods fail to deal with zero-day traffic which are generated by previously unknown applications in a traffic classification system. To tackle this critical problem, we propose a novel traffic classification scheme which has the capability of identifying zero-day traffic as well as accurately classifying the traffic generated by pre-defined application classes. In addition, the proposed scheme provides a new mechanism to achieve fine-grained classification of zero-day traffic through manually labeling very few traffic flows. The preliminary empirical study on a big traffic data show that the proposed scheme can address the problem of zero-day traffic effectively. When zero-day traffic present, the classification performance of the proposed scheme is significantly better than three state-of-the-art methods, random forest classifier, classification with flow correlation, and semi-supervised traffic classification. © Springer International Publishing Switzerland 2013.

DOI 10.1007/978-3-319-03584-0_16
Citations Scopus - 8
Show 1 more chapter

Journal article (9 outputs)

Year Citation Altmetrics Link
2024 Tang L, Wu T, Chen X, Wen S, Zhou W, Zhu X, Xiang Y, 'How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse', Connection Science, 36 (2024) [C1]
DOI 10.1080/09540091.2023.2282942
2023 Sun X, Chen X, Liu Y, Grundy J, Li L, 'Taming Android Fragmentation Through Lightweight Crowdsourced Testing', IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 49 3599-3615 (2023) [C1]
DOI 10.1109/TSE.2023.3266324
Citations Scopus - 2
2023 Sun X, Chen X, Li L, Cai H, Grundy J, Samhi J, et al., 'Demystifying Hidden Sensitive Operations in Android Apps', ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 32 (2023) [C1]
DOI 10.1145/3574158
Citations Scopus - 1
2023 Tang L, Wu T, Chen X, Wen S, Li L, Xia X, et al., 'How Does Visualisation Help App Practitioners Analyse Android Apps?', IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 20 2238-2255 [C1]
DOI 10.1109/TDSC.2022.3178181
2023 Tang L, Chen X, Wen S, Li L, Grobler M, Xiang Y, 'Demystifying the Evolution of Android Malware Variants', IEEE Transactions on Dependable and Secure Computing, (2023) [C1]

It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So far, researc... [more]

It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So far, researchers mainly rely on dendrogram or family-tree analysis for malware&#x0027;s evolutionary development. However, our research finds that these techniques cannot support comprehensive malware evolution modelling, which provides a detailed explanation for why Android malware samples evolve in specific ways. This shortcoming is mainly caused by the coarse-grained clustering and analysis of malware samples. For example, because these works do not divide malware samples of a family into variant sets and explore the evolution principles among those sets, they usually fail to capture new variants that have been empowered by the feature &#x2018;drifting&#x2019; in evolution. To address this problem, we propose a fine-grained and in-depth analysis of Android malware. Our experimental work systematically reveals the phylogenetic relationships among the variant sets for a deeper malware evolution analysis. We introduce five metrics: silhouette coefficient, creation date, variant labels, the presentativeness of the variant set formula, and the correctness of the linked edges to evaluate the correctness of our analysis. The results show that our variant clustering achieved a high silhouette value at a small sample distance (0.3), a small standard deviation (three months and 16 days) date based on when the malware samples are lastly modified, a high label consistency (91.4&#x0025;), a high representativeness (93.1&#x0025;) of the variant set formula. All the linked variant sets are connected based on our PhyloNet construction rules. We further analyse the coding details of Android malware for each variant set and summarise models of their evolutionary development. In this work, we successfully expose two major models of malware evolution: <italic>active evolution</italic> and <italic>passive evolution</italic>. We also disclose four technical explanations on the incentives of the two evolution models (two for each model respectively). These findings are valuable for proactive defence against newly emerged malware samples.

DOI 10.1109/TDSC.2023.3325912
2022 Li C, Chen X, Wang D, Wen S, Ahmed ME, Camtepe S, Xiang Y, 'Backdoor Attack on Machine Learning Based Android Malware Detectors', IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19 3357-3370 (2022) [C1]
DOI 10.1109/TDSC.2021.3094824
Citations Scopus - 14Web of Science - 9
2020 Chen X, Li C, Wang D, Wen S, Zhang J, Nepal S, et al., 'Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection', IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 15 987-1001 (2020)
DOI 10.1109/TIFS.2019.2932228
Citations Scopus - 191Web of Science - 157
2019 Zhang R, Chen X, Wen S, Zheng X, Ding Y, 'Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones', IEEE ACCESS, 7 153542-153554 (2019)
DOI 10.1109/ACCESS.2019.2945791
Citations Scopus - 11Web of Science - 5
2015 Zhang J, Chen X, Xiang Y, Zhou W, Wu J, 'Robust Network Traffic Classification', IEEE-ACM TRANSACTIONS ON NETWORKING, 23 1257-1270 (2015)
DOI 10.1109/TNET.2014.2320577
Citations Scopus - 298Web of Science - 246
Show 6 more journal articles

Conference (13 outputs)

Year Citation Altmetrics Link
2023 Zhou M, Gao X, Wu J, Grundy J, Chen X, Chen C, Li L, 'ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems', ISSTA 2023 - Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, USA (2023) [E1]
DOI 10.1145/3597926.3598113
2023 Sun X, Chen X, Liu Y, Grundy J, Li L, 'LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android Fragmentation', ESEC/FSE 2023 - Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, San Francisco, CA (2023) [E1]
DOI 10.1145/3611643.3613098
2023 Zhang R, Wu T, Chen X, Wen S, Nepal S, Paris C, Xiang Y, 'Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention', ACM Web Conference 2023 - Proceedings of the World Wide Web Conference, WWW 2023, Austin, Texas (2023) [E1]
DOI 10.1145/3543507.3583330
2023 Liu Y, Chen X, Liu P, Grundy J, Chen C, Li L, 'ReuNify: A Step Towards Whole Program Analysis for React Native Android Apps', Proceedings - 2023 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023 (2023)

React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to interact with native-... [more]

React Native is a widely-used open-source frame-work that facilitates the development of cross-platform mobile apps. The framework enables JavaScript code to interact with native-side code, such as Objective-C/Swift for iOS and Java/Kotlin for Android, via a communication mechanism provided by React Native. However, previous research and tools have overlooked this mechanism, resulting in incomplete analysis of React Native app code. To address this limitation, we have developed REUNIFY, a prototype tool that integrates the JavaScript and native-side code of React Native apps into an intermediate language that can be processed by the Soot static analysis framework. By doing so, REUNIFY enables the generation of a comprehensive model of the app's behavior. Our evaluation indicates that, by leveraging REUNIFY, the Soot-based framework can improve its coverage of static analysis for the 1,007 most popular React Native Android apps, augmenting the number of lines of Jimple code by 70%. Additionally, we observed an average increase of 84% in new nodes reached in the callgraph for these apps, after integrating REUNIFY. When REUNIFY is used for taint flow analysis, an average of two additional privacy leaks were identified. Overall, our results demonstrate that REUNIFY significantly enhances the Soot-based framework's capability to analyze React Native Android apps.

DOI 10.1109/ASE56229.2023.00113
2022 Li C, Chen X, Sun R, Xue M, Wen S, Ahmed ME, et al., 'Cross-language Android permission specification', ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2022)

The Android system manages access to sensitive APIs by permission enforcement. An application (app) must declare proper permissions before invoking specific Android APIs. However,... [more]

The Android system manages access to sensitive APIs by permission enforcement. An application (app) must declare proper permissions before invoking specific Android APIs. However, there is no official documentation providing the complete list of permission-protected APIs and the corresponding permissions to date. Researchers have spent significant efforts extracting such API protection mapping from the Android API framework, which leverages static code analysis to determine if specific permissions are required before accessing an API. Nevertheless, none of them has attempted to analyze the protection mapping in the native library (i.e., code written in C and C++), an essential component of the Android framework that handles communication with the lower-level hardware, such as cameras and sensors. While the protection mapping can be utilized to detect various security vulnerabilities in Android apps, such as permission over-privilege, imprecise mapping will lead to false results in detecting such security vulnerabilities. To fill this gap, we thereby propose to construct the protection mapping involved in the native libraries of the Android framework to present a complete and accurate specification of Android API protection. We develop a prototype system, named NatiDroid, to facilitate the cross-language static analysis and compare its performance with two state-of-the-practice tools, termed Axplorer and Arcade. We evaluate NatiDroid on more than 11,000 Android apps, including system apps from custom Android ROMs and third-party apps from the Google Play. Our NatiDroid can identify up to 464 new API-permission mappings, in contrast to the worst-case results derived from both Axplorer and Arcade, where approximately 71% apps have at least one false positive in permission over-privilege. We have disclosed all the potential vulnerabilities detected to the stakeholders.

DOI 10.1145/3540250.3549142
Citations Scopus - 2
2022 Sun X, Chen X, Zhao Y, Liu P, Grundy J, Li L, 'Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues', ACM International Conference Proceeding Series (2022)

Despite being one of the largest and most popular projects, the official Android framework has only provided test cases for less than 30% of its APIs. Such a poor test case covera... [more]

Despite being one of the largest and most popular projects, the official Android framework has only provided test cases for less than 30% of its APIs. Such a poor test case coverage rate has led to many compatibility issues that can cause apps to crash at runtime on specific Android devices, resulting in poor user experiences for both apps and the Android ecosystem. To mitigate this impact, various approaches have been proposed to automatically detect such compatibility issues. Unfortunately, these approaches have only focused on detecting signature-induced compatibility issues (i.e., a certain API does not exist in certain Android versions), leaving other equally important types of compatibility issues unresolved. In this work, we propose a novel prototype tool, JUnitTestGen, to fill this gap by mining existing Android API usage to generate unit test cases. After locating Android API usage in given real-world Android apps, JUnitTestGen performs inter-procedural backward data-flow analysis to generate a minimal executable code snippet (i.e., test case). Experimental results on thousands of real-world Android apps show that JUnitTestGen is effective in generating valid unit test cases for Android APIs. We show that these generated test cases are indeed helpful for pinpointing compatibility issues, including ones involving semantic code changes.

DOI 10.1145/3551349.3561151
Citations Scopus - 6
2021 Chen X, Chen W, Liu K, Chen C, Li L, 'A comparative study of smartphone and smartwatch apps', Proceedings of the ACM Symposium on Applied Computing (2021)

Despite that our community has spent numerous efforts on analyzing mobile apps, there is no study proposed for characterizing the relationship between smartphone and smartwatch ap... [more]

Despite that our community has spent numerous efforts on analyzing mobile apps, there is no study proposed for characterizing the relationship between smartphone and smartwatch apps. To fill this gap, we present to the community a comparative study of smartphone and smartwatch apps, aiming at understanding the status quo of cross-phone/watch apps. Specifically, in this work, we first collect a set of cross-phone/watch app pairs and then experimentally look into them to explore their similarities or dissimilarities from different perspectives. Experimental results show that (1) Approximately, up to 40% of resource files, 30% of code methods are reused between smartphone/watch app pairs, (2) Smartphone apps may require more than twice as many as permissions and adopt more than five times as many as user interactions than their watch counterparts, and (3) Smartwatch apps can be released as either standalone (can be run independently) or companion versions (i.e., have to co-work with their smartphone counterparts), for which the former type of apps tends to require more permissions and reuse more code, involve more user interactions than the latter type. Our findings can help developers and researchers understand the ecosystem of smartwatch apps and further gain insight into migrating smartphone apps for smartwatches.

DOI 10.1145/3412841.3442023
Citations Scopus - 8Web of Science - 2
2021 Wang X, Liu X, Li L, Chen X, Liu J, Wu H, 'Time-aware User Modeling with Check-in Time Prediction for Next POI Recommendation', Proceedings - 2021 IEEE International Conference on Web Services, ICWS 2021 (2021)

POI (point-of-interest) recommendation as an important type of location-based services has received increasing attention with the rise of location-based social networks. Although ... [more]

POI (point-of-interest) recommendation as an important type of location-based services has received increasing attention with the rise of location-based social networks. Although significant efforts have been dedicated to learning and recommending users' next POIs based on their historical mobility traces, there still lacks consideration of the discrepancy of users' check-in time preferences and the inherent relationships between POIs and check-in times. To fill this gap, this paper proposes a novel recommendation method which applies multi-task learning over historical user mobility traces known to be sparse. Specifically, we design a cross-graph neural network to obtain time-aware user modeling and control how much information flows across different semantic spaces, which makes up the inadequate representation of existing user modeling methods. In addition, we design a check-in time prediction task to learn users' activities from a time perspective and learn internal patterns between POIs and their check-in times, aiming to reduce the search space to overcome the data sparsity problem. Comprehensive experiments on two real-world public datasets demonstrate that our proposed method outperforms several representative POI recommendation methods with 8.93% to 20.21 % improvement on Recall@1, 5, 10, and 9.25% to 17.56% improvement on Mean Reciprocal Rank.

DOI 10.1109/ICWS53863.2021.00028
Citations Scopus - 9
2021 Sun X, Chen X, Liu K, Wen S, Li L, Grundy J, 'Characterizing Sensor Leaks in Android Apps', Proceedings - International Symposium on Software Reliability Engineering, ISSRE (2021)

While extremely valuable to achieve advanced functions, mobile phone sensors can be abused by attackers to implement malicious activities in Android apps, as experimentally demons... [more]

While extremely valuable to achieve advanced functions, mobile phone sensors can be abused by attackers to implement malicious activities in Android apps, as experimentally demonstrated by many state-of-the-art studies. There is hence a strong need to regulate the usage of mobile sensors so as to keep them from being exploited by malicious attackers. However, despite the fact that various efforts have been put in achieving this, i.e., detecting privacy leaks in Android apps, we have not yet found approaches to automatically detect sensor leaks in Android apps. To fill the gap, we designed and implemented a novel prototype tool, Seeker, that extends the famous FlowDroid tool to detect sensor-based data leaks in Android apps. Seeker conducts sensor-focused static taint analyses directly on the Android apps' bytecode and reports not only sensor-triggered privacy leaks but also the sensor types involved in the leaks. Experimental results using over 40,000 real-world Android apps show that Seeker is effective in detecting sensor leaks in Android apps, and malicious apps are more interested in leaking sensor data than benign apps.

DOI 10.1109/ISSRE52982.2021.00058
Citations Scopus - 6
2020 Wang X, Liu J, Li L, Chen X, Liu X, Wu H, 'Detecting and Explaining Self-Admitted Technical Debts with Attention- based Neural Networks', 2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), ELECTR NETWORK (2020)
DOI 10.1145/3324884.3416583
Citations Scopus - 20Web of Science - 18
2020 Li Y, Xiao X, Zhu X, Chen X, Wen S, Zhang B, 'SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge', 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), PEOPLES R CHINA, Guangzhou (2020)
DOI 10.1109/TrustCom50675.2020.00068
Citations Scopus - 2Web of Science - 1
2015 Chen C, Zhang J, Chen X, Xiang Y, Zhou W, '6 million spam tweets: A large ground truth for timely Twitter spam detection', IEEE International Conference on Communications (2015)

Twitter has changed the way of communication and getting news for people&apos;s daily life in recent years. Meanwhile, due to the popularity of Twitter, it also becomes a main tar... [more]

Twitter has changed the way of communication and getting news for people's daily life in recent years. Meanwhile, due to the popularity of Twitter, it also becomes a main target for spamming activities. In order to stop spammers, Twitter is using Google SafeBrowsing to detect and block spam links. Despite that blacklists can block malicious URLs embedded in tweets, their lagging time hinders the ability to protect users in real-time. Thus, researchers begin to apply different machine learning algorithms to detect Twitter spam. However, there is no comprehensive evaluation on each algorithms' performance for real-time Twitter spam detection due to the lack of large groundtruth. To carry out a thorough evaluation, we collected a large dataset of over 600 million public tweets. We further labelled around 6.5 million spam tweets and extracted 12 light-weight features, which can be used for online detection. In addition, we have conducted a number of experiments on six machine learning algorithms under various conditions to better understand their effectiveness and weakness for timely Twitter spam detection. We will make our labelled dataset for researchers who are interested in validating or extending our work.

DOI 10.1109/ICC.2015.7249453
Citations Scopus - 104
2013 Chen X, Zhang J, Xiang Y, Zhou W, 'Traffic Identification in Semi-known Network Environment', 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), AUSTRALIA, Sydney (2013)
DOI 10.1109/CSE.2013.91
Citations Scopus - 4Web of Science - 6
Show 10 more conferences

Preprint (1 outputs)

Year Citation Altmetrics Link
2023 Kalla M, Robins-Browne K, Palmer VJ, Wulandari T, Parker C, Franco ME, et al., 'Understanding experiences of telehealth in palliative care: An exploration using photo interviewing (Preprint) (2023)
DOI 10.2196/preprints.53913
Edit

Grants and Funding

Summary

Number of grants 1
Total funding $2,000,000

Click on a grant title below to expand the full details for that specific grant.


20211 grants / $2,000,000

Enhanced Telehealth Capabilities for Improved Patient and Clinician Experiences$2,000,000

Deliver enhanced telehealth capabilities (ETHC) to improve patient and clinician experiences of the telehealth delivery method.

This project will make use of an experience-based co-design, prototyping, and evaluation method to enhance telehealth capabilities. By improving the patient experience, as well as the efficiency of telehealth, researchers hope to facilitate a greater uptake of it in the future.

ETHC can improve the technical, as well as the user experience parameters of telehealth. This includes increasing the speed and quality of virtual systems during major events like pandemics, but also providing better and more equitable access to specialist services all the time.

Researchers will apply their methodology to real-world settings and will develop modules for palliative care and mental health as a starting point, while looking to apply their findings across the whole of healthcare in due course.

Funding body: Digital Health CRC

Funding body Digital Health CRC
Scheme Digital Health CRC
Role Investigator
Funding Start 2021
Funding Finish 2024
GNo
Type Of Funding CRC - Cooperative Research Centre
Category 4CRC
UON N
Edit

Research Supervision

Number of supervisions

Completed1
Current5

Current Supervision

Commenced Level of Study Research Title Program Supervisor Type
2021 PhD Static Analysis in Python Computer Science, Monash University Co-Supervisor
2021 PhD Android App GUI Testing Computer Science, Monash University Co-Supervisor
2021 PhD Cross‑platform Mobile App Analysis Computer Science, Monash University Co-Supervisor
2021 PhD Enhancing Security of On‑device Machine Learning Models Computer Science, Monash University Co-Supervisor
2020 PhD Detecting and Preventing Deceptive Ads in Mobile Apps Computer Science, Monash University Principal Supervisor

Past Supervision

Year Level of Study Research Title Program Supervisor Type
2022 PhD Evolutionary Study of Android Apps Computer Science, Swinburne University of Technology Co-Supervisor
Edit

Dr Xiao Chen

Position

Lecturer
School of Information and Physical Sciences
College of Engineering, Science and Environment

Focus area

Computing and Information Technology

Contact Details

Email xiao.chen@newcastle.edu.au
Phone (02) 4055 0243

Office

Room SR273
Building Social Sciences Building
Location Callaghan
University Drive
Callaghan, NSW 2308
Australia
Edit