Jialong Zhang
Jialong Zhang
ByteDance AI Lab
Email verificata su bytedance.com
TitoloCitata daAnno
Analyzing Spammers’ Social Networks for Fun and Profit
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Proc. World Wide Web, 16-20, 2012
280*2012
Systematic mining of associated server herds for uncovering malware and attack campaigns
J Zhang, S Saha, G Gu, SJ Lee, B Nardelli
US Patent 9,088,598, 2015
512015
SRID: state relation based intrusion detection for false data injection attacks in SCADA
Y Wang, Z Xu, J Zhang, L Xu, H Wang, G Gu
European Symposium on Research in Computer Security, 401-418, 2014
482014
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
342018
GoldenEye: Efficiently and Effectively Unveiling Malware’s Targeted Environment
Z Xu, J Zhang, G Gu, Z Lin
International Workshop on Recent Advances in Intrusion Detection, 22-45, 2014
302014
Systematic mining of associated server herds for malware campaign discovery
J Zhang, S Saha, G Gu, SJ Lee, M Mellia
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
242015
Attacking the Brain: Races in the {SDN} Control Plane
L Xu, J Huang, S Hong, J Zhang, G Gu
26th {USENIX} Security Symposium ({USENIX} Security 17), 451-468, 2017
232017
A taste of tweets: reverse engineering Twitter spammers
C Yang, J Zhang, G Gu
Proceedings of the 30th Annual Computer Security Applications Conference, 86-95, 2014
232014
Identifying malicious web infrastructures
X Hu, J Jang, T Wang, J Zhang
US Patent 9,578,042, 2017
202017
Poisonamplifier: A guided approach of discovering compromised websites through reversing search poisoning attacks
J Zhang, C Yang, Z Xu, G Gu
International Workshop on Recent Advances in Intrusion Detection, 230-253, 2012
192012
NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.
J Zhang, G Gu
NDSS, 2013
182013
Autovac: Automatically extracting system resource constraints and generating vaccines for malware immunization
Z Xu, J Zhang, G Gu, Z Lin
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
142013
Precisely and scalably vetting javascript bridge in android hybrid apps
G Yang, A Mendoza, J Zhang, G Gu
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
102017
Characterizing google hacking: A first large-scale quantitative study
J Zhang, J Notani, G Gu
International Conference on Security and Privacy in Communication Networks …, 2014
92014
Understanding the market-level and network-level behaviors of the Android malware ecosystem
C Yang, J Zhang, G Gu
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
72017
YerbaBuena: Securing Deep Learning Inference Data via Enclave-based Ternary Model Partitioning
Z Gu, H Huang, J Zhang, D Su, H Jamjoom, A Lamba, D Pendarakis, ...
arXiv preprint arXiv:1807.00969, 2018
62018
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis
J Zhang, X Hu, J Jang, T Wang, G Gu, M Stoecklin
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
52016
Dressed up: Baiting attackers through endpoint service projection
MP Stoecklin, J Zhang, F Araujo, T Taylor
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
32018
Automatic generation of vaccines for malware immunization
Z Xu, J Zhang, G Gu, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
32012
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence
J Zhang, J Jang, G Gu, MP Stoecklin, X Hu
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
22018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20