Kun Du
Kun Du
Email verificata su mails.tsinghua.edu.cn
Citata da
Citata da
Don't let one rotten apple spoil the whole barrel: Towards automated detection of shadowed domains
D Liu, Z Li, K Du, H Wang, B Liu, H Duan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard {DNS} Powered Blackhat {SEO}
K Du, H Yang, Z Li, H Duan, K Zhang
25th {USENIX} Security Symposium ({USENIX} Security 16), 245-262, 2016
How to learn klingon without a dictionary: Detection and measurement of black keywords used by the underground economy
H Yang, X Ma, K Du, Z Li, H Duan, X Su, G Liu, Z Geng, J Wu
2017 IEEE Symposium on Security and Privacy (SP), 751-769, 2017
A Market in Dream: the Rapid Development of Anonymous Cybercrime
G Zhou, J Zhuge, Y Fan, K Du, S Lu
Mobile Networks and Applications 25 (1), 259-270, 2020
TL; DR Hazard: A Comprehensive Study of Levelsquatting Scams
K Du, H Yang, Z Li, H Duan, S Hao, B Liu, Y Ye, M Liu, X Su, G Liu, ...
International Conference on Security and Privacy in Communication Systems, 3-25, 2019
Casino royale: a deep exploration of illegal online gambling
H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu, H Wang, H Duan, Y Shi, X Su, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
Understanding Promotion-as-a-Service on GitHub
K Du, H Yang, Y Zhang, H Duan, H Wang, S Hao, Z Li, M Yang
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–8