Follow
Ziming Zhao
Ziming Zhao
Assistant Professor, University at Buffalo
Verified email at buffalo.edu - Homepage
Title
Cited by
Cited by
Year
Deep Android Malware Detection
N McLaughlin, JM del Rincon, BJ Kang, S Yerima, P Miller, S Sezer, ...
ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
4412017
FlowGuard: Building Robust Firewalls for Software-Defined Networks
H Hu, W Han, GJ Ahn, Z Zhao
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), 2014
3482014
Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin
K Liao, Z Zhao, A Doupé, GJ Ahn
APWG Symposium on Electronic Crime Research (eCrime), 2016
1632016
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security (TIFS) 13 (5), 1286-1300, 2017
1352017
Morpheus: Automatically Generating Heuristics to Detect Android Emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Annual Computer Security Applications Conference (ACSAC), 2014
1132014
RiskMon: Continuous and Automated Risk Assessment for Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
ACM Conference on Data and Application Security and Privacy (CODASPY), 2014
962014
SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephone Spam
H Tu, A Doupé, Z Zhao, GJ Ahn
IEEE Symposium on Security and Privacy (Oakland), 2016
952016
Risk-Aware Mitigation for MANET Routing Attacks
Z Zhao, H Hu, G Ahn, R Wu
IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (2), 250-260, 2012
802012
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks
H Hu, GJ Ahn, Z Zhao, D Yang
ACM Symposium on Access Control Models and Technologies (SACMAT), 2014
742014
On the Security of Picture Gesture Authentication
Z Zhao, GJ Ahn, JJ Seo, H Hu
USENIX Security Symposium, 2013
742013
Toward a Moving Target Defense for Web Applications
M Taguinod, A Doupé, Z Zhao, A Gail-Joon
16th IEEE International Conference on Information Reuse and Integration (IRI), 2015
672015
HoneyMix: Toward SDN-based Intelligent Honeynet
W Han, Z Zhao, A Doupé, GJ Ahn
ACM International Workshop on Security in Software Defined Networks and …, 2016
662016
Matched and mismatched socs: A qualitative study on security operations center issues
FB Kokulu, A Soneji, T Bao, Y Shoshitaishvili, Z Zhao, A Doupé, GJ Ahn
ACM SIGSAC Conference on Computer and Communications Security (CCS), 1955-1970, 2019
572019
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications
S Sengupta, SG Vadlamudi, S Kambhampati, A Doupé, Z Zhao, ...
International Conference on Autonomous Agents and Multiagent Systems, 2017
562017
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation
Z Zhao, GJ Ahn, H Hu
ACM Transactions on Information and System Security (TISSEC), 2015
502015
Moving target defense for web applications using bayesian stackelberg games
SG Vadlamudi, S Sengupta, M Taguinod, Z Zhao, A Doupé, GJ Ahn, ...
2016 International Conference on Autonomous Agents & Multiagent systems …, 2016
492016
Methods, Systems, and Media for Measuring Quality of Gesture-based Passwords
GJ Ahn, Z Zhao
US Patent US9069948 B2, 2015
492015
Towards a Reliable SDN Firewall
H Hu, GJ Ahn, W Han, Z Zhao
2014 Open Networking Summit Research Track (ONS), 2014
422014
Towards Automated Risk Assessment and Mitigation of Mobile Applications
Y Jing, GJ Ahn, Z Zhao, H Hu
IEEE Transactions on Dependable and Secure Computing (TDSC), 2015
392015
Dandroid: A multi-view discriminative adversarial network for obfuscated android malware detection
S Millar, N McLaughlin, J Martinez del Rincon, P Miller, Z Zhao
ACM conference on data and application security and privacy (CODASPY), 353-364, 2020
382020
The system can't perform the operation now. Try again later.
Articles 1–20