Zhou Li
Zhou Li
Email verificata su uci.edu - Home page
TitoloCitata daAnno
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1872012
When Good Becomes Evil: Keystroke Inference with Smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1082015
Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures
Z Li, S Alrwais, Y Xie, F Yu, XF Wang
2013 IEEE Symposium on Security and Privacy, 112-126, 2013
952013
Privacy-preserving genomic computation through program specialization
R Wang, XF Wang, Z Li, H Tang, MK Reiter, Z Dong
Proceedings of the 16th ACM conference on Computer and communications …, 2009
902009
Detection of early-stage enterprise infection by mining large-scale log data
A Oprea, Z Li, TF Yen, SH Chin, S Alrwais
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
862015
Acing the IOC game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
652016
Detection of malicious web activity in enterprise computer networks
AM Oprea, Z Li, R Norris, KD Bowers
US Patent 9,838,407, 2017
602017
Sidebuster: automated detection and quantification of side-channel leaks in web application development
K Zhang, Z Li, R Wang, XF Wang, S Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
602010
Understanding the dark side of domain parking
S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang
23rd {USENIX} Security Symposium ({USENIX} Security 14), 207-222, 2014
462014
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting
MT Khan, X Huo, Z Li, C Kanich
2015 IEEE Symposium on Security and Privacy, 135-150, 2015
442015
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections
Z Li, S Alrwais, XF Wang, E Alowaisheq
Security and Privacy (SP), 2014 IEEE Symposium on, 2014
352014
No pardon for the interruption: New inference attacks on android through interrupt timing analysis
W Diao, X Liu, Z Li, K Zhang
2016 IEEE Symposium on Security and Privacy (SP), 414-432, 2016
322016
基于 ARM9 的嵌入式 Linux 开发流程的研究
许先斌, 熊慧君, 李洲, 杨芬, 刘炜
微计算机信息, 87-89, 2006
302006
Mash-IF: Practical information-flow control within client-side mashups
Z Li, K Zhang, XF Wang
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
242010
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
International Conference on Security and Privacy in Communication Systems …, 2018
222018
FIRM: Capability-based inline mediation of Flash behaviors
Z Li, XF Wang
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
192010
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO
K Du, H Yang, Z Li, H Duan, K Zhang
25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 2016
182016
Thwarting Wi-Fi side-channel analysis through traffic demultiplexing
F Zhang, W He, Y Chen, Z Li, XF Wang, S Chen, X Liu
IEEE Transactions on Wireless Communications 13 (1), 86-98, 2013
172013
An empirical study on android for saving non-shared data on public storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
IFIP International Information Security and Privacy Conference, 542-556, 2015
162015
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems
J Fu, H Xiong, Z Li, H Zhang
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
152008
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20