Seguir
Zhou Li
Zhou Li
Dirección de correo verificada de uci.edu - Página principal
Título
Citado por
Citado por
Año
Acing the IOC game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3332016
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3142012
Detection of malicious web activity in enterprise computer networks
AM Oprea, Z Li, R Norris, KD Bowers
US Patent 9,838,407, 2017
3132017
When Good Becomes Evil: Keystroke Inference with Smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2352015
Detection of early-stage enterprise infection by mining large-scale log data
A Oprea, Z Li, TF Yen, SH Chin, S Alrwais
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
2302015
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
1512018
Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures
Z Li, S Alrwais, Y Xie, F Yu, XF Wang
2013 IEEE Symposium on Security and Privacy, 112-126, 2013
1462013
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang, C Leng, Y Liu, Z Zhang, J Wu
Proceedings of the Internet Measurement Conference, 22-35, 2019
1162019
Privacy-preserving genomic computation through program specialization
R Wang, XF Wang, Z Li, H Tang, MK Reiter, Z Dong
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1092009
An investigation on information leakage of DNS over TLS
R Houser, Z Li, C Cotton, H Wang
Proceedings of the 15th International Conference on Emerging Networking …, 2019
882019
Resident Evil: Understanding residential ip proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE Symposium on Security and Privacy (SP), 1185-1201, 2019
862019
Sidebuster: automated detection and quantification of side-channel leaks in web application development
K Zhang, Z Li, R Wang, XF Wang, S Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
842010
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel
J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
832020
Understanding the dark side of domain parking
S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang
23rd {USENIX} Security Symposium ({USENIX} Security 14), 207-222, 2014
802014
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting
MT Khan, X Huo, Z Li, C Kanich
2015 IEEE Symposium on Security and Privacy, 135-150, 2015
792015
MADE: Security Analytics for Enterprise Threat Detection
A Oprea, Z Li, R Norris, K Bowers
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
782018
No pardon for the interruption: New inference attacks on android through interrupt timing analysis
W Diao, X Liu, Z Li, K Zhang
2016 IEEE Symposium on Security and Privacy (SP), 414-432, 2016
732016
Who Is Answering My Queries: Understanding and Characterizing Interception of the {DNS} Resolution Path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th {USENIX} Security Symposium ({USENIX} Security 18), 1113-1128, 2018
722018
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic
S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
662020
Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains
D Liu, Z Li, K Du, H Wang, B Liu, H Duan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
642017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20