Suivre
Ziming Zhao (赵子铭)
Ziming Zhao (赵子铭)
Assistant Professor, University at Buffalo
Adresse e-mail validée de buffalo.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Deep Android Malware Detection
N McLaughlin, JM del Rincon, BJ Kang, S Yerima, P Miller, S Sezer, ...
ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
5402017
FlowGuard: Building Robust Firewalls for Software-Defined Networks
H Hu, W Han, GJ Ahn, Z Zhao
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), 2014
3662014
Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin
K Liao, Z Zhao, A Doupé, GJ Ahn
APWG Symposium on Electronic Crime Research (eCrime), 2016
2032016
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security (TIFS) 13 (5), 1286-1300, 2017
1662017
Morpheus: Automatically Generating Heuristics to Detect Android Emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Annual Computer Security Applications Conference (ACSAC), 2014
1292014
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
H Tu, A Doupé, Z Zhao, GJ Ahn
IEEE Symposium on Security and Privacy (Oakland), 2016
1182016
Matched and mismatched socs: A qualitative study on security operations center issues
FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn
ACM SIGSAC Conference on Computer and Communications Security (CCS), 1955-1970, 2019
1092019
RiskMon: Continuous and Automated Risk Assessment for Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
ACM Conference on Data and Application Security and Privacy (CODASPY), 2014
1052014
Risk-Aware Mitigation for MANET Routing Attacks
Z Zhao, H Hu, G Ahn, R Wu
IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (2), 250-260, 2012
862012
HoneyMix: Toward SDN-based Intelligent Honeynet
W Han, Z Zhao, A Doupé, GJ Ahn
ACM International Workshop on Security in Software Defined Networks and …, 2016
832016
Toward a Moving Target Defense for Web Applications
M Taguinod, A Doupé, Z Zhao, A Gail-Joon
16th IEEE International Conference on Information Reuse and Integration (IRI), 2015
832015
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks
H Hu, GJ Ahn, Z Zhao, D Yang
ACM Symposium on Access Control Models and Technologies (SACMAT), 2014
792014
On the Security of Picture Gesture Authentication
Z Zhao, GJ Ahn, JJ Seo, H Hu
USENIX Security Symposium, 2013
792013
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications
S Sengupta, SG Vadlamudi, S Kambhampati, A Doupé, Z Zhao, ...
International Conference on Autonomous Agents and Multiagent Systems, 2017
722017
Dandroid: A multi-view discriminative adversarial network for obfuscated android malware detection
S Millar, N McLaughlin, J Martinez del Rincon, P Miller, Z Zhao
ACM conference on data and application security and privacy (CODASPY), 353-364, 2020
602020
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation
Z Zhao, GJ Ahn, H Hu
ACM Transactions on Information and System Security (TISSEC), 2015
562015
Moving target defense for web applications using bayesian stackelberg games
SG Vadlamudi, S Sengupta, M Taguinod, Z Zhao, A Doupé, GJ Ahn, ...
2016 International Conference on Autonomous Agents & Multiagent systems …, 2016
552016
HoneyProxy: Design and implementation of next-generation honeynet via SDN
S Kyung, W Han, N Tiwari, VH Dixit, L Srinivas, Z Zhao, A Doupé, GJ Ahn
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
542017
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Annual Computer Security Applications Conference (ACSAC), 2018
522018
Methods, Systems, and Media for Measuring Quality of Gesture-based Passwords
GJ Ahn, Z Zhao
US Patent US9069948 B2, 2015
512015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20