default search action
Ziming Zhao 0001
Person information
- affiliation (since 2024): Northeastern University, CactiLab, Boston, MA, USA
- affiliation (2020-2024): University at Buffalo, NY, USA
- affiliation (2018-2020): Rochester Institute of Technology, Henrietta, NY, USA
- affiliation (2009-2018): Arizona State University, Tempe, AZ, USA
Other persons with the same name
- Ziming Zhao 0002 — National University of Defense Technology, Changsha, China
- Ziming Zhao 0003 — Shanghai Jiao Tong University, Shanghai, China
- Ziming Zhao 0004 — East China University of Science and Technology, Shanghai, China
- Ziming Zhao 0005 — Beijing Jiaotong University, School of Mechanical and Electronic Control Engineering, China
- Ziming Zhao 0006 — Tongji University, Shanghai, China
- Ziming Zhao 0007 — Southeast University, State Key Laboratory of Millimeter-Wave, Nanjing, China
- Ziming Zhao 0008 — Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China
- Ziming Zhao 0009 — Nanchang University, Software Engineering Institute, China
- Ziming Zhao 0010 — Ant Group, Hangzhou, China
- Ziming Zhao 0011 — Northeast Agricultural University, College of Engineering, Harbin, China
- Ziming Zhao 0012 — Henan University, School of Software, Kaifeng, China
- Ziming Zhao 0013 — Purdue University, West Lafayette, IN, USA
- Ziming Zhao 0014 — Aerospace Science and Engineering Microsystem Technology Co., Ltd, Nanjing, China
- Ziming Zhao 0015 — Shanxi University of Finance and Economics, Statistic Institute, Taiyuan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Cong Wu, Jing Chen, Qianru Fang, Kun He, Ziming Zhao, Hao Ren, Guowen Xu, Yang Liu, Yang Xiang:
Rethinking Membership Inference Attacks Against Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 6441-6454 (2024) - [j18]Yangyang Gu, Jing Chen, Kun He, Cong Wu, Ziming Zhao, Ruiying Du:
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices. IEEE Trans. Mob. Comput. 23(6): 6997-7011 (2024) - [c73]Md. Armanuzzaman, Ahmad-Reza Sadeghi, Ziming Zhao:
Building Your Own Trusted Execution Environments Using FPGA. AsiaCCS 2024 - [c72]Wenbo Ding, Song Liao, Long Cheng, Xianghang Mi, Ziming Zhao, Hongxin Hu:
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform. AsiaCCS 2024 - [c71]Yujie Wang, Cailani Lemieux Mack, Xi Tan, Ning Zhang, Ziming Zhao, Sanjoy K. Baruah, Bryan C. Ward:
InsectACIDE: Debugger-Based Holistic Asynchronous CFI for Embedded System. RTAS 2024: 360-372 - [c70]Xi Tan, Sagar Mohan, Md. Armanuzzaman, Zheyuan Ma, Gaoxiang Liu, Alex Eastman, Hongxin Hu, Ziming Zhao:
Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems. SAC 2024: 1350-1357 - [c69]Ziming Zhao, Md. Armanuzzaman, Xi Tan, Zheyuan Ma:
Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective. SEED 2024: 96-106 - [c68]Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. SP 2024: 788-806 - [c67]Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu:
Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models. USENIX Security Symposium 2024 - [c66]Nicolas Nino, Ruibo Lu, Wei Zhou, Kyu Hyung Lee, Ziming Zhao, Le Guan:
Unveiling IoT Security in Reality: A Firmware-Centric Journey. USENIX Security Symposium 2024 - [c65]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. WOOT @ USENIX Security Symposium 2024: 149-169 - [i9]Keyan Guo, Alexander Hu, Jaden Mu, Ziheng Shi, Ziming Zhao, Nishant Vishwamitra, Hongxin Hu:
An Investigation of Large Language Models for Real-World Hate Speech Detection. CoRR abs/2401.03346 (2024) - [i8]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. CoRR abs/2401.15289 (2024) - [i7]Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu:
Moderating Illicit Online Image Promotion for Unsafe User-Generated Content Games Using Large Vision-Language Models. CoRR abs/2403.18957 (2024) - [i6]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Ruochen Cao, Ruiying Du, Yang Liu, Ziming Zhao:
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. CoRR abs/2408.10116 (2024) - 2023
- [j17]Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ziming Zhao, Ruiying Du:
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(4): 160:1-160:24 (2023) - [j16]Sagar Samtani, Ziming Zhao, Ram Krishnan:
Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence. Inf. Syst. Frontiers 25(2): 425-429 (2023) - [j15]Haonan Feng, Jingjing Guan, Hui Li, Xuesong Pan, Ziming Zhao:
FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocol. IEEE Trans. Dependable Secur. Comput. 20(5): 4291-4310 (2023) - [c64]Nishant Vishwamitra, Keyan Guo, Song Liao, Jaden Mu, Zheyuan Ma, Long Cheng, Ziming Zhao, Hongxin Hu:
Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter. ASONAM 2023: 103-107 - [c63]Xi Tan, Ziming Zhao:
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems. CCS 2023: 1332-1346 - [c62]Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang, Hongxin Hu, Ziming Zhao:
Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense. DAC 2023: 1-6 - [c61]Keyan Guo, Alexander Hu, Jaden Mu, Ziheng Shi, Ziming Zhao, Nishant Vishwamitra, Hongxin Hu:
An Investigation of Large Language Models for Real-World Hate Speech Detection. ICMLA 2023: 1568-1573 - [c60]Wenbo Ding, Song Liao, Keyan Guo, Fuqiang Zhang, Long Cheng, Ziming Zhao, Hongxin Hu:
Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles. SmartSP 2023: 3-14 - [c59]Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu:
xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses. USENIX Security Symposium 2023: 4337-4354 - [i5]Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. CoRR abs/2312.15099 (2023) - 2022
- [j14]Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors. IEEE Trans. Dependable Secur. Comput. 19(6): 4002-4018 (2022) - [c58]Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao:
Understanding and Detecting Remote Infection on Linux-based IoT Devices. AsiaCCS 2022: 873-887 - [c57]Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang:
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. CCS 2022: 2931-2945 - [c56]Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. CODASPY 2022: 65-76 - [c55]Jingjing Guan, Hui Li, Haisong Ye, Ziming Zhao:
A Formal Analysis of the FIDO2 Protocols. ESORICS (3) 2022: 3-21 - [e4]Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani, Ziming Zhao:
Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings. Communications in Computer and Information Science 1549, Springer 2022, ISBN 978-3-030-97531-9 [contents] - [i4]Md. Armanuzzaman, Ziming Zhao:
BYOTee: Towards Building Your Own Trusted Execution Environments Using FPGA. CoRR abs/2203.04214 (2022) - [i3]Junjie Shen, Ningfei Wang, Ziwen Wan, Yunpeng Luo, Takami Sato, Zhisheng Hu, Xinyang Zhang, Shengjian Guo, Zhenyu Zhong, Kang Li, Ziming Zhao, Chunming Qiao, Qi Alfred Chen:
SoK: On the Semantic AI Security in Autonomous Driving. CoRR abs/2203.05314 (2022) - 2021
- [j13]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. DTRAP 2(3): 21:1-21:23 (2021) - [j12]Jing Chen, Chiheng Wang, Kun He, Ziming Zhao, Min Chen, Ruiying Du, Gail-Joon Ahn:
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. IEEE Trans. Dependable Secur. Comput. 18(1): 15-29 (2021) - [c54]Haonan Feng, Hui Li, Xuesong Pan, Ziming Zhao:
A Formal Analysis of the FIDO UAF Protocol. NDSS 2021 - [c53]Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. USENIX Security Symposium 2021: 4169-4186 - [i2]Nishant Vishwamitra, Hongxin Hu, Ziming Zhao, Long Cheng, Feng Luo:
Understanding and Measuring Robustness of Multimodal Learning. CoRR abs/2112.12792 (2021) - 2020
- [c52]Stuart Millar, Niall McLaughlin, Jesús Martínez del Rincón, Paul Miller, Ziming Zhao:
DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection. CODASPY 2020: 353-364 - [c51]Haehyun Cho, Jinbum Park, Donguk Kim, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture. MobiSys 2020: 107-120 - [c50]Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems. TPS-ISA 2020: 319-322 - [c49]Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. USENIX Security Symposium 2020: 2219-2236 - [e3]Qi Alfred Chen, Ziming Zhao, Gail-Joon Ahn:
AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, New Orleans, LA, USA, March 18, 2020. ACM 2020, ISBN 978-1-4503-7113-1 [contents]
2010 – 2019
- 2019
- [j11]Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. Comput. Secur. 87 (2019) - [c48]Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues. CCS 2019: 1955-1970 - [c47]Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao, Tiffany Bao, Adam Doupé, Gail-Joon Ahn:
Understanding and Predicting Private Interactions in Underground Forums. CODASPY 2019: 303-314 - [c46]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems. MSCPES@CPSIoTWeek 2019: 1-6 - [c45]Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
iCore: continuous and proactive extrospection on multi-core IoT devices. SAC 2019: 851-860 - [c44]Carlos E. Rubio-Medrano, Shaishavkumar Jogani, Maria Leitner, Ziming Zhao, Gail-Joon Ahn:
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. SACMAT 2019: 195-206 - [c43]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Users Really Do Answer Telephone Scams. USENIX Security Symposium 2019: 1327-1340 - [e2]Ziming Zhao, Qi Alfred Chen, Gail-Joon Ahn:
Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6180-4 [contents] - 2018
- [j10]Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, Gail-Joon Ahn:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. IEEE Trans. Inf. Forensics Secur. 13(5): 1286-1300 (2018) - [j9]Lu Wang, Ziming Zhao, Wei Wang:
Advances in Infrastructure Mobility for Future Networks. Wirel. Commun. Mob. Comput. 2018: 3962128:1 (2018) - [c42]Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. ACSAC 2018: 278-288 - [c41]Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. ACSAC 2018: 441-452 - [c40]Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn:
CacheLight: Defeating the CacheKit Attack. ASHES@CCS 2018: 65-74 - [c39]Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn:
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. CCS 2018: 664-676 - [c38]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS. CHASE 2018: 94-99 - [c37]Vaibhav Hemant Dixit, Sukwha Kyung, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, Gail-Joon Ahn:
Challenges and Preparedness of SDN-based Firewalls. SDN-NFV@CODASPY 2018: 33-38 - [c36]Yongxian Zhang, Xinluo Wang, Ziming Zhao, Hui Li:
Secure Display for FIDO Transaction Confirmation. CODASPY 2018: 155-157 - [c35]Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. CODASPY 2018: 161-163 - [c34]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Challenges, Opportunities and a Framework for Web Environment Forensics. IFIP Int. Conf. Digital Forensics 2018: 11-33 - [c33]Sai Prashanth Chandramouli, Pierre-Marie Bajan, Christopher Kruegel, Giovanni Vigna, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Measuring E-mail header injections on the world wide web. SAC 2018: 1647-1656 - [c32]Vu Coughlin, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems. SmartGridComm 2018: 1-6 - [e1]Ziming Zhao, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita:
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - 2017
- [j8]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward Standardization of Authenticated Caller ID Transmission. IEEE Commun. Stand. Mag. 1(3): 30-36 (2017) - [j7]Sai Prashanth Chandramouli, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
E-mail Header Injection Vulnerabilities. it Inf. Technol. 59(2): 67 (2017) - [c31]Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Adam Doupé, Ziming Zhao, Marthony Taguinod, Gail-Joon Ahn:
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications. AAMAS 2017: 178-186 - [c30]Carlos E. Rubio-Medrano, Josephine Lamp, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control. MTD@CCS 2017: 39-49 - [c29]Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyProxy: Design and implementation of next-generation honeynet via SDN. CNS 2017: 1-9 - [c28]Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c27]Josephine Lamp, Carlos E. Rubio-Medrano, Ziming Zhao, Gail-Joon Ahn:
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements. CIC 2017: 1-10 - [c26]Junjie Tang, Xingmin Cui, Ziming Zhao, Shanqing Guo, Xin-Shun Xu, Chengyu Hu, Tao Ban, Bing Mao:
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps. ICST 2017: 492-499 - [c25]Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
On the Safety and Efficiency of Virtual Firewall Elasticity Control. NDSS 2017 - [c24]Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. SACMAT 2017: 129-131 - 2016
- [j6]Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
dbling: Identifying extensions installed on encrypted web thin clients. Digit. Investig. 18 Supplement: S55-S65 (2016) - [j5]Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Thomas J. Holt, Yiming Jing, Hongxin Hu:
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces. IEEE Secur. Priv. 14(3): 32-43 (2016) - [j4]Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, Ziming Zhao:
TripleMon: A multi-layer security framework for mediating inter-process communication on Android. J. Comput. Secur. 24(4): 405-426 (2016) - [c23]Satya Gautam Vadlamudi, Sailik Sengupta, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Subbarao Kambhampati:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract). AAMAS 2016: 1377-1378 - [c22]Wonkyu Han, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyMix: Toward SDN-based Intelligent Honeynet. SDN-NFV@CODASPY 2016: 1-6 - [c21]Carlos E. Rubio-Medrano, Josephine Lamp, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control. ABAC@CODASPY 2016: 68-71 - [c20]Ajay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black:
Towards Automated Threat Intelligence Fusion. CIC 2016: 408-416 - [c19]Kevin Liao, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. eCrime 2016: 1-13 - [c18]Jia Chen, Xingmin Cui, Ziming Zhao, Jie Liang, Shanqing Guo:
Toward Discovering and Exploiting Private Server-Side Web APIs. ICWS 2016: 420-427 - [c17]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation. Kaleidoscope 2016: 1-8 - [c16]Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng:
State-aware Network Access Management for Software-Defined Networks. SACMAT 2016: 1-11 - [c15]Huahong Tu, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam. IEEE Symposium on Security and Privacy 2016: 320-338 - [i1]Satya Gautam Vadlamudi, Sailik Sengupta, Subbarao Kambhampati, Marthony Taguinod, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Moving Target Defense for Web Applications using Bayesian Stackelberg Games. CoRR abs/1602.07024 (2016) - 2015
- [j3]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
Towards Automated Risk Assessment and Mitigation of Mobile Applications. IEEE Trans. Dependable Secur. Comput. 12(5): 571-584 (2015) - [j2]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. ACM Trans. Inf. Syst. Secur. 17(4): 14:1-14:37 (2015) - [c14]Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Toward a Moving Target Defense for Web Applications. IRI 2015: 510-517 - [c13]Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Federated Access Management for Collaborative Network Environments: Framework and Case Study. SACMAT 2015: 125-134 - 2014
- [b1]Ziming Zhao:
Discovering and Using Patterns for Countering Security Challenges. Arizona State University, Tempe, USA, 2014 - [c12]Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Morpheus: automatically generating heuristics to detect Android emulators. ACSAC 2014: 216-225 - [c11]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
RiskMon: continuous and automated risk assessment of mobile applications. CODASPY 2014: 99-110 - [c10]Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao:
Towards a Reliable SDN Firewall. ONS 2014 - [c9]Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang:
Game theoretic analysis of multiparty access control in online social networks. SACMAT 2014: 93-102 - [c8]Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, Ziming Zhao:
FLOWGUARD: building robust firewalls for software-defined networks. HotSDN 2014: 97-102 - 2013
- [c7]Ziming Zhao, Gail-Joon Ahn:
Using instruction sequence abstraction for shellcode detection and attribution. CNS 2013: 323-331 - [c6]Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu:
On the Security of Picture Gesture Authentication. USENIX Security Symposium 2013: 383-398 - 2012
- [j1]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Mitigation for MANET Routing Attacks. IEEE Trans. Dependable Secur. Comput. 9(2): 250-260 (2012) - [c5]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi:
SocialImpact: Systematic Analysis of Underground Social Dynamics. ESORICS 2012: 877-894 - 2011
- [c4]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Examining Social Dynamics for Countering Botnet Attacks. GLOBECOM 2011: 1-5 - [c3]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Automatic Extraction of Secrets from Malware. WCRE 2011: 159-168 - 2010
- [c2]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Response for Mitigating MANET Routing Attacks. GLOBECOM 2010: 1-6
2000 – 2009
- 2008
- [c1]Yanfei Liu, Ziming Zhao, Hui Li, Qun Luo, Yixian Yang:
An Efficient Remote User Authentication Scheme with Strong Anonymity. CW 2008: 180-185
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint