Lies in the air: Characterizing fake-base-station spam ecosystem in china Y Zhang, B Liu, C Lu, Z Li, H Duan, S Hao, M Liu, Y Liu, D Wang, Q Li Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 42 | 2020 |
Casino royale: a deep exploration of illegal online gambling H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu, H Wang, H Duan, Y Shi, X Su, ... Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 41 | 2019 |
Encrypted malware traffic detection via graph-based network analysis Z Fu, M Liu, Y Qin, J Zhang, Y Zou, Q Yin, Q Li, H Duan Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 29 | 2022 |
Argot: Generating adversarial readable chinese texts Z Zhang, M Liu, C Zhang, Y Zhang, Z Li, Q Li, H Duan, D Sun Proceedings of the Twenty-Ninth International Conference on International …, 2021 | 25 | 2021 |
Detecting and characterizing SMS spearphishing attacks M Liu, Y Zhang, B Liu, Z Li, H Duan, D Sun Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 24 | 2021 |
TL; DR hazard: a comprehensive study of levelsquatting scams K Du, H Yang, Z Li, H Duan, S Hao, B Liu, Y Ye, M Liu, X Su, G Liu, ... Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 11 | 2019 |
Valcat: Variable-length contextualized adversarial transformations using encoder-decoder language model C Deng, M Liu, Y Qin, J Zhang, HX Duan, D Sun Proceedings of the 2022 Conference of the North American Chapter of the …, 2022 | 8 | 2022 |
Ethics in security research: Visions, reality, and paths forward Y Zhang, M Liu, M Zhang, C Lu, H Duan 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022 | 6 | 2022 |
Automatic generation of adversarial readable chinese texts M Liu, Z Zhang, Y Zhang, C Zhang, Z Li, Q Li, H Duan, D Sun IEEE Transactions on Dependable and Secure Computing 20 (2), 1756-1770, 2022 | 5 | 2022 |
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu, C Wang, J Chen, B Liu, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
Exploring the characteristics and security risks of emerging emoji domain names M Liu, Y Zhang, B Liu, H Duan European Symposium on Research in Computer Security, 186-206, 2022 | 2 | 2022 |
ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse M Liu, Z Jin, J Yang, B Liu, H Duan, Y Liu, X Liu, S Tang 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems …, 2024 | 1 | 2024 |
Oxygen doping and interface engineering in O-MoS2&rGO heterostructure for efficient piezocatalytic dye degradation Z Lu, Y Bai, S Zhang, Y Li, M Liu, L Fang, L Liu, K Du, G Liu, L Xu, Y Liao, ... Journal of Materials Research, 1-10, 2024 | 1 | 2024 |
Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO Y Zhang, M Liu, B Liu, Y Zhang, H Duan, M Zhang, H Jiang, Y Li, F Shi 33rd USENIX Security Symposium (USENIX Security 24), 1561-1578, 2024 | | 2024 |
Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing Apps Y Liu, Y Zhang, B Liu, H Duan, Q Li, M Liu, R Li, J Yao 33rd USENIX Security Symposium (USENIX Security 24), 5107-5124, 2024 | | 2024 |
Understanding the Implementation and Security Implications of Protective DNS Services M Liu, Y Zhang, X Li, C Lu, B Liu, H Duan, X Zheng | | |