Follow
Ziming Zhao (赵子铭)
Ziming Zhao (赵子铭)
Associate Professor, Northeastern University
Verified email at northeastern.edu - Homepage
Title
Cited by
Cited by
Year
Deep Android Malware Detection
N McLaughlin, JM del Rincon, BJ Kang, S Yerima, P Miller, S Sezer, ...
ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
5942017
FlowGuard: Building Robust Firewalls for Software-Defined Networks
H Hu, W Han, GJ Ahn, Z Zhao
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), 2014
3762014
Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin
K Liao, Z Zhao, A Doupé, GJ Ahn
APWG Symposium on Electronic Crime Research (eCrime), 2016
2222016
Uncovering the Face of Android Ransomware: Characterization and Real-time Detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security (TIFS) 13 (5), 1286-1300, 2017
1892017
Matched and mismatched socs: A qualitative study on security operations center issues
FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn
ACM SIGSAC Conference on Computer and Communications Security (CCS), 1955-1970, 2019
1482019
Morpheus: Automatically Generating Heuristics to Detect Android Emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Annual Computer Security Applications Conference (ACSAC), 2014
1372014
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
H Tu, A Doupé, Z Zhao, GJ Ahn
IEEE Symposium on Security and Privacy (Oakland), 2016
1342016
RiskMon: Continuous and Automated Risk Assessment for Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
ACM Conference on Data and Application Security and Privacy (CODASPY), 2014
1072014
HoneyMix: Toward SDN-based Intelligent Honeynet
W Han, Z Zhao, A Doupé, GJ Ahn
ACM International Workshop on Security in Software Defined Networks and …, 2016
872016
Toward a Moving Target Defense for Web Applications
M Taguinod, A Doupé, Z Zhao, A Gail-Joon
16th IEEE International Conference on Information Reuse and Integration (IRI), 2015
872015
Risk-Aware Mitigation for MANET Routing Attacks
Z Zhao, H Hu, G Ahn, R Wu
IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (2), 250-260, 2012
872012
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks
H Hu, GJ Ahn, Z Zhao, D Yang
ACM Symposium on Access Control Models and Technologies (SACMAT), 2014
812014
On the Security of Picture Gesture Authentication
Z Zhao, GJ Ahn, JJ Seo, H Hu
USENIX Security Symposium, 2013
802013
Dandroid: A multi-view discriminative adversarial network for obfuscated android malware detection
S Millar, N McLaughlin, J Martinez del Rincon, P Miller, Z Zhao
ACM conference on data and application security and privacy (CODASPY), 353-364, 2020
762020
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications
S Sengupta, SG Vadlamudi, S Kambhampati, A Doupé, Z Zhao, ...
International Conference on Autonomous Agents and Multiagent Systems, 2017
752017
Users Really Do Answer Telephone Scams
H Tu, A Doupé, Z Zhao, GJ Ahn
USENIX Security Symposium, 1327-1340, 2019
652019
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks
C Wu, K He, J Chen, Z Zhao, R Du
USENIX Security Symposium, 2020
612020
HoneyProxy: Design and implementation of next-generation honeynet via SDN
S Kyung, W Han, N Tiwari, VH Dixit, L Srinivas, Z Zhao, A Doupé, GJ Ahn
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
592017
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone
H Cho, P Zhang, D Kim, J Park, CH Lee, Z Zhao, A Doupé, GJ Ahn
Annual Computer Security Applications Conference (ACSAC), 2018
572018
Moving target defense for web applications using bayesian stackelberg games
SG Vadlamudi, S Sengupta, M Taguinod, Z Zhao, A Doupé, GJ Ahn, ...
2016 International Conference on Autonomous Agents & Multiagent systems …, 2016
552016
The system can't perform the operation now. Try again later.
Articles 1–20