Artikel dengan mandat akses publik - Zhou LiPelajari lebih lanjut
Tersedia di suatu tempat: 53
Acing the IOC game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Mandat: US National Science Foundation
When Good Becomes Evil: Keystroke Inference with Smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Mandat: Research Grants Council, Hong Kong
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang, C Leng, Y Liu, Z Zhang, J Wu
Proceedings of the Internet Measurement Conference, 22-35, 2019
Mandat: National Natural Science Foundation of China
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel
J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
Mandat: US Department of Defense, National Natural Science Foundation of China
Resident Evil: Understanding residential ip proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE Symposium on Security and Privacy (SP), 1185-1201, 2019
Mandat: US National Science Foundation, US Department of Defense, National Natural …
An investigation on information leakage of DNS over TLS
R Houser, Z Li, C Cotton, H Wang
Proceedings of the 15th International Conference on Emerging Networking …, 2019
Mandat: US National Science Foundation
Stealing Neural Network Structure through Remote FPGA Side-channel Analysis
Y Zhang, R Yasaei, H Chen, Z Li, MA Al Faruque
IEEE Transactions on Information Forensics and Security, 2021
Mandat: US National Science Foundation
Who Is Answering My Queries: Understanding and Characterizing Interception of the {DNS} Resolution Path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th {USENIX} Security Symposium ({USENIX} Security 18), 1113-1128, 2018
Mandat: National Natural Science Foundation of China
No pardon for the interruption: New inference attacks on android through interrupt timing analysis
W Diao, X Liu, Z Li, K Zhang
2016 IEEE Symposium on Security and Privacy (SP), 414-432, 2016
Mandat: National Natural Science Foundation of China
Continuous Release of Data Streams under both Centralized and Local Differential Privacy
T Wang, JQ Chen, Z Zhang, D Su, Y Cheng, Z Li, N Li, S Jha
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Mandat: US National Science Foundation
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
B Liu, C Lu, Z Li, Y Liu, HX Duan, S Hao, Z Zhang
DSN, 654-665, 2018
Mandat: National Natural Science Foundation of China
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
F Xu, W Diao, Z Li, J Chen, K Zhang
NDSS, 2019
Mandat: National Natural Science Foundation of China
How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy
H Yang, X Ma, K Du, Z Li, H Duan, X Su, G Liu, Z Geng, J Wu
Security and Privacy (SP), 2017 IEEE Symposium on, 2017
Mandat: National Natural Science Foundation of China
{PROGRAPHER}: An Anomaly Detection System based on Provenance Graph Embedding
F Yang, J Xu, C Xiong, Z Li, K Zhang
32nd USENIX Security Symposium (USENIX Security 23), 4355-4372, 2023
Mandat: National Natural Science Foundation of China, Research Grants Council, Hong Kong
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO
K Du, H Yang, Z Li, H Duan, K Zhang
25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 2016
Mandat: National Natural Science Foundation of China
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR
C Lu, B Liu, Y Zhang, Z Li, F Zhang, H Duan, Y Liu, JQ Chen, J Liang, ...
NDSS, 2021
Mandat: National Natural Science Foundation of China
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
J Wan, Y Bi, Z Zhou, Z Li
S&P, 2022
Mandat: National Natural Science Foundation of China
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings
R Li, W Diao, Z Li, J Du, S Guo
IEEE Symposium on Security and Privacy (SP), 2021
Mandat: National Natural Science Foundation of China
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China
Y Zhang, B Liu, C Lu, Z Li, H Duan, S Hao, M Liu, Y Liu, D Wang, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Mandat: National Natural Science Foundation of China
Informasi terbitan dan pendanaan ditentukan secara otomatis oleh program komputer