Follow
Zhenyu Wu
Title
Cited by
Cited by
Year
Chex: statically vetting android apps for component hijacking vulnerabilities
L Lu, Z Li, Z Wu, W Lee, G Jiang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7942012
Whispers in the Hyper-space: High-bandwidth and Reliable Covert Channel Attacks inside the Cloud
Z Wu, Z Xu, H Wang
IEEE/ACM TRANSACTIONS ON NETWORKING 23 (2), 603-615, 2015
3912015
Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud
Z Wu, Z Xu, H Wang
The 21st USENIX Security Symposium, 159-173, 2012
390*2012
A measurement study on co-residence threat inside the cloud
Z Xu, H Wang, Z Wu
24th USENIX Security Symposium (USENIX Security 15), 929-944, 2015
1272015
{SUPOR}: Precise and scalable sensitive user input detection for android apps
J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang
24th USENIX Security Symposium (USENIX Security 15), 977-992, 2015
1242015
Battle of botcraft: fighting bots in online games with human observational proofs
S Gianvecchio, Z Wu, M Xie, H Wang
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1162009
Towards privacy-preserving visual recognition via adversarial training: A pilot study
Z Wu, Z Wang, Z Wang, H Jin
Proceedings of the European Conference on Computer Vision (ECCV), 606-624, 2018
1112018
Profiling online social behaviors for compromised account detection
X Ruan, Z Wu, H Wang, S Jajodia
IEEE transactions on information forensics and security 11 (1), 176-187, 2015
1072015
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1002016
Towards a Timely Causality Analysis for Enterprise Security
Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal
NDSS, 2018
962018
Deep k-means: Re-training and parameter sharing with harder cluster assignments for compressing deep convolutions
J Wu, Y Wang, Z Wu, Z Wang, A Veeraraghavan, Y Lin
International Conference on Machine Learning, 5363-5372, 2018
912018
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
912015
Humans and bots in internet chat: measurement, analysis, and automated classification
S Gianvecchio, M Xie, Z Wu, H Wang
IEEE/ACM Transactions On Networking 19 (5), 1557-1571, 2011
702011
Mimimorphism: A new approach to binary code obfuscation
Z Wu, S Gianvecchio, M Xie, H Wang
Proceedings of the 17th ACM conference on Computer and communications …, 2010
692010
{SAQL}: A Stream-based Query System for {Real-Time} Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th USENIX Security Symposium (USENIX Security 18), 639-656, 2018
602018
All-in-One Underwater Image Enhancement Using Domain-Adversarial Learning.
PM Uplavikar, Z Wu, Z Wang
CVPR workshops, 1-8, 2019
592019
Swift: A Fast Dynamic Packet Filter.
Z Wu, M Xie, H Wang
NSDI 8, 279-292, 2008
532008
Delving into robust object detection from unmanned aerial vehicles: A deep nuisance disentanglement approach
Z Wu, K Suresh, P Narayanan, H Xu, H Kwon, Z Wang
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
482019
HoneyIM: Fast detection and suppression of instant messaging malware in enterprise-like networks
M Xie, Z Wu, H Wang
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
432007
Nodemerge: Template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
412018
The system can't perform the operation now. Try again later.
Articles 1–20