Don't let one rotten apple spoil the whole barrel: Towards automated detection of shadowed domains D Liu, Z Li, K Du, H Wang, B Liu, H Duan Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 70 | 2017 |
How to learn klingon without a dictionary: Detection and measurement of black keywords used by the underground economy H Yang, X Ma, K Du, Z Li, H Duan, X Su, G Liu, Z Geng, J Wu 2017 IEEE Symposium on Security and Privacy (SP), 751-769, 2017 | 55 | 2017 |
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ... 2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016 | 50 | 2016 |
The {Ever-Changing} labyrinth: A {Large-Scale} analysis of wildcard {DNS} powered blackhat {SEO} K Du, H Yang, Z Li, H Duan, K Zhang 25th USENIX Security Symposium (USENIX Security 16), 245-262, 2016 | 50 | 2016 |
Casino royale: a deep exploration of illegal online gambling H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu, H Wang, H Duan, Y Shi, X Su, ... Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 41 | 2019 |
A market in dream: the rapid development of anonymous cybercrime G Zhou, J Zhuge, Y Fan, K Du, S Lu Mobile Networks and Applications 25, 259-270, 2020 | 28 | 2020 |
Understanding promotion-as-a-service on GitHub K Du, H Yang, Y Zhang, H Duan, H Wang, S Hao, Z Li, M Yang Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 13 | 2020 |
TL; DR hazard: a comprehensive study of levelsquatting scams K Du, H Yang, Z Li, H Duan, S Hao, B Liu, Y Ye, M Liu, X Su, G Liu, ... Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 11 | 2019 |
Mingling of clear and muddy water: Understanding and detecting semantic confusion in blackhat seo H Yang, K Du, Y Zhang, S Hao, H Wang, J Zhang, H Duan Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 5 | 2021 |