Ziming Zhao
Ziming Zhao
Verified email at mail.rit.edu - Homepage
TitleCited byYear
FlowGuard: Building Robust Firewalls for Software-Defined Networks
H Hu, W Han, GJ Ahn, Z Zhao
3rd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), 2014
2592014
Deep Android Malware Detection
N McLaughlin, JM del Rincon, BJ Kang, S Yerima, P Miller, S Sezer, ...
ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
1022017
Risk-Aware Mitigation for MANET Routing Attacks
Z Zhao, H Hu, G Ahn, R Wu
IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (2), 250-260, 2012
772012
Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin
K Liao, Z Zhao, A Doupé, GJ Ahn
APWG Symposium on Electronic Crime Research (eCrime), 2016
732016
Morpheus: Automatically Generating Heuristics to Detect Android Emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
30th Annual Computer Security Applications Conference (ACSAC), 2014
732014
RiskMon: Continuous and Automated Risk Assessment for Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
ACM Conference on Data and Application Security and Privacy (CODASPY), 2014
672014
On the Security of Picture Gesture Authentication
Z Zhao, GJ Ahn, JJ Seo, H Hu
22nd USENIX Security Symposium, 2013
632013
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017
492017
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
H Tu, A Doupé, Z Zhao, GJ Ahn
37th IEEE Symposium on Security and Privacy (Oakland), 2016
472016
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks
H Hu, GJ Ahn, Z Zhao, D Yang
ACM Symposium on Access Control Models and Technologies (SACMAT), 2014
452014
HoneyMix: Toward SDN-based Intelligent Honeynet
W Han, Z Zhao, A Doupé, GJ Ahn
ACM International Workshop on Security in Software Defined Networks and …, 2016
342016
Methods, Systems, and Media for Measuring Quality of Gesture-based Passwords
GJ Ahn, Z Zhao
US Patent US9069948 B2, 2015
322015
Towards a Reliable SDN Firewall
H Hu, GJ Ahn, W Han, Z Zhao
2014 Open Networking Summit Research Track (ONS), 2014
322014
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation
Z Zhao, GJ Ahn, H Hu
ACM Transactions on Information and System Security (TISSEC), 2015
312015
Toward a Moving Target Defense for Web Applications
M Taguinod, A Doupé, Z Zhao, A Gail-Joon
16th IEEE International Conference on Information Reuse and Integration (IRI), 2015
292015
Moving target defense for web applications using bayesian stackelberg games
SG Vadlamudi, S Sengupta, M Taguinod, Z Zhao, A Doupé, GJ Ahn, ...
Proceedings of the 2016 International Conference on Autonomous Agents …, 2016
272016
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications
S Sengupta, SG Vadlamudi, S Kambhampati, A Doupé, Z Zhao, ...
International Conference on Autonomous Agents and Multiagent Systems, 2017
262017
Towards Automated Risk Assessment and Mitigation of Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
IEEE Transactions on Dependable and Secure Computing (TDSC), 2015
262015
SocialImpact: Systematic Analysis of Underground Social Dynamics
Z Zhao, GJ Ahn, H Hu, D Mahi
European Conference on Research in Computer Security (ESORICS), 877-895, 2012
212012
Using Instruction Sequence Abstraction for Shellcode Detection and Attribution
Z Zhao, GJ Ahn
1st IEEE Conference on Communications and Network Security (CNS), 2013
172013
The system can't perform the operation now. Try again later.
Articles 1–20