ZHIYUN QIAN
Title
Cited by
Cited by
Year
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
L Zhang, B Tiwana, Z Qian, Z Wang, RP Dick, ZM Mao, L Yang
Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware …, 2010
13592010
An untold story of middleboxes in cellular networks
Z Wang, Z Qian, Q Xu, Z Mao, M Zhang
ACM SIGCOMM Computer Communication Review 41 (4), 374-385, 2011
2682011
Peeking into Your App without Actually Seeing It:{UI} State Inference and Novel Android Attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
2132014
Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users
S Rosen, Z Qian, ZM Mao
Proceedings of the third ACM conference on Data and application security and …, 2013
1482013
Off-path TCP sequence number inference attack-how firewall middleboxes reduce security
Z Qian, ZM Mao
2012 IEEE Symposium on Security and Privacy, 347-361, 2012
952012
Collaborative TCP sequence number inference attack: how to crack sequence number under a second
Z Qian, ZM Mao, Y Xie
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
802012
On Network-level Clusters for Spam Detection.
Z Qian, ZM Mao, Y Xie, F Yu
NDSS, 2010
802010
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
792015
Android root and its providers: A double-edged sword
H Zhang, D She, Z Qian
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
592015
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
562016
The ad wars: retrospective measurement and analysis of anti-adblock filter lists
U Iqbal, Z Shafiq, Z Qian
Proceedings of the 2017 Internet Measurement Conference, 171-183, 2017
552017
Rendered insecure: GPU side channel attacks are practical
H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
462018
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
412018
Detecting anti ad-blockers in the wild
MH Mughees, Z Qian, Z Shafiq
Proceedings on Privacy Enhancing Technologies 2017 (3), 130-146, 2017
392017
Adgraph: A graph-based approach to ad and tracker blocking
U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq
2020 IEEE Symposium on Security and Privacy (SP), 763-776, 2020
37*2020
IoTSan: Fortifying the safety of IoT systems
DT Nguyen, C Song, Z Qian, SV Krishnamurthy, EJM Colbert, P McDaniel
Proceedings of the 14th International Conference on emerging Networking …, 2018
372018
Malicious co-residency on the cloud: Attacks and defense
AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, L Marvel
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
362017
Off-Path {TCP} Exploits: Global Rate Limit Considered Dangerous
Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel
25th {USENIX} Security Symposium ({USENIX} Security 16), 209-225, 2016
352016
The misuse of android unix domain sockets and security implications
Y Shao, J Ott, YJ Jia, Z Qian, ZM Mao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
302016
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Z Qian, Z Wang, Q Xu, ZM Mao, M Zhang, YM Wang
NDSS, 2012
29*2012
The system can't perform the operation now. Try again later.
Articles 1–20