ZHIYUN QIAN
ZHIYUN QIAN
cs.ucr.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
L Zhang, B Tiwana, Z Qian, Z Wang, RP Dick, ZM Mao, L Yang
Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware …, 2010
14302010
An untold story of middleboxes in cellular networks
Z Wang, Z Qian, Q Xu, Z Mao, M Zhang
ACM SIGCOMM Computer Communication Review 41 (4), 374-385, 2011
2712011
Peeking into your app without actually seeing it:{UI} state inference and novel android attacks
QA Chen, Z Qian, ZM Mao
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1037-1052, 2014
2292014
Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users
S Rosen, Z Qian, ZM Mao
Proceedings of the third ACM conference on Data and application security and …, 2013
1612013
Off-path TCP sequence number inference attack-how firewall middleboxes reduce security
Z Qian, ZM Mao
2012 IEEE Symposium on Security and Privacy, 347-361, 2012
972012
Collaborative TCP sequence number inference attack: how to crack sequence number under a second
Z Qian, ZM Mao, Y Xie
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
852012
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
822015
On Network-level Clusters for Spam Detection.
Z Qian, ZM Mao, Y Xie, F Yu
NDSS, 2010
822010
Android root and its providers: A double-edged sword
H Zhang, D She, Z Qian
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
632015
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
612016
The ad wars: retrospective measurement and analysis of anti-adblock filter lists
U Iqbal, Z Shafiq, Z Qian
Proceedings of the 2017 Internet Measurement Conference, 171-183, 2017
592017
Rendered insecure: GPU side channel attacks are practical
H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
512018
IotSan: Fortifying the safety of IoT systems
DT Nguyen, C Song, Z Qian, SV Krishnamurthy, EJM Colbert, P McDaniel
Proceedings of the 14th International Conference on emerging Networking …, 2018
492018
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
492018
Detecting anti ad-blockers in the wild
MH Mughees, Z Qian, Z Shafiq
Proceedings on Privacy Enhancing Technologies 2017 (3), 130-146, 2017
422017
Adgraph: A graph-based approach to ad and tracker blocking
U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq
2020 IEEE Symposium on Security and Privacy (SP), 763-776, 2020
41*2020
Off-Path {TCP} Exploits: Global Rate Limit Considered Dangerous
Y Cao, Z Qian, Z Wang, T Dao, SV Krishnamurthy, LM Marvel
25th {USENIX} Security Symposium ({USENIX} Security 16), 209-225, 2016
392016
Malicious co-residency on the cloud: Attacks and defense
AOF Atya, Z Qian, SV Krishnamurthy, T La Porta, P McDaniel, L Marvel
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
382017
Accurate and efficient wireless device fingerprinting using channel state information
J Hua, H Sun, Z Shen, Z Qian, S Zhong
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1700-1708, 2018
322018
The misuse of android unix domain sockets and security implications
Y Shao, J Ott, YJ Jia, Z Qian, ZM Mao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
322016
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20