Zhenkai Liang, Ph.D.
Affiliations: | 2006 | Stony Brook University, Stony Brook, NY, United States |
Area:
Computer and Network Security, Software/Distributed Systems, Programming Languages, Software Engineering.Google:
"Zhenkai Liang"Parents
Sign in to add mentorR. Sekar | grad student | 2006 | SUNY Stony Brook | |
(Techniques in automated cyber-attack response and recovery.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Mao J, Bian J, Tian W, et al. (2019) Phishing page detection via learning classifiers from page layout feature Eurasip Journal On Wireless Communications and Networking. 2019: 43 |
Xiao Y, Jia Y, Cheng X, et al. (2019) I Can See Your Brain: Investigating Home-Use Electroencephalography System Security Ieee Internet of Things Journal. 6: 6681-6691 |
Yang Z, Liang Z. (2018) Automated identification of sensitive data from implicit user specification Cybersecurity. 1: 1-15 |
Mao J, Bian J, Bai G, et al. (2018) Detecting Malicious Behaviors in JavaScript Applications Ieee Access. 6: 12284-12294 |
Mao J, Bian J, Tian W, et al. (2018) Detecting Phishing Websites via Aggregation Analysis of Page Layouts Procedia Computer Science. 129: 224-230 |
Mao J, Chen Y, Shi F, et al. (2017) Toward Exposing Timing-Based Probing Attacks in Web Applications. Sensors (Basel, Switzerland). 17 |
Sun M, Li X, Lui JCS, et al. (2017) Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android Ieee Transactions On Information Forensics and Security. 12: 1103-1112 |
Mao J, Tian W, Li P, et al. (2017) Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity Ieee Access. 5: 17020-17030 |
Dai T, Li X, Hassanshahi B, et al. (2017) R opp D roid : Robust permission re-delegation prevention in Android inter-component communication Computers & Security. 68: 98-111 |
Mao J, Ma H, Chen Y, et al. (2016) Automatic permission inference for hybrid mobile apps Journal of High Speed Networks. 22: 55-64 |