Zhenkai Liang, Ph.D. - Publications

Affiliations: 
2006 Stony Brook University, Stony Brook, NY, United States 
Area:
Computer and Network Security, Software/Distributed Systems, Programming Languages, Software Engineering.

16 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Mao J, Bian J, Tian W, Zhu S, Wei T, Li A, Liang Z. Phishing page detection via learning classifiers from page layout feature Eurasip Journal On Wireless Communications and Networking. 2019: 43. DOI: 10.1186/S13638-019-1361-0  0.416
2019 Xiao Y, Jia Y, Cheng X, Yu J, Liang Z, Tian Z. I Can See Your Brain: Investigating Home-Use Electroencephalography System Security Ieee Internet of Things Journal. 6: 6681-6691. DOI: 10.1109/Jiot.2019.2910115  0.373
2018 Yang Z, Liang Z. Automated identification of sensitive data from implicit user specification Cybersecurity. 1: 1-15. DOI: 10.1186/S42400-018-0011-X  0.403
2018 Mao J, Bian J, Bai G, Wang R, Chen Y, Xiao Y, Liang Z. Detecting Malicious Behaviors in JavaScript Applications Ieee Access. 6: 12284-12294. DOI: 10.1109/Access.2018.2795383  0.385
2018 Mao J, Bian J, Tian W, Zhu S, Wei T, Li A, Liang Z. Detecting Phishing Websites via Aggregation Analysis of Page Layouts Procedia Computer Science. 129: 224-230. DOI: 10.1016/J.Procs.2018.03.053  0.365
2017 Mao J, Chen Y, Shi F, Jia Y, Liang Z. Toward Exposing Timing-Based Probing Attacks in Web Applications. Sensors (Basel, Switzerland). 17. PMID 28245610 DOI: 10.3390/S17030464  0.437
2017 Sun M, Li X, Lui JCS, Ma RTB, Liang Z. Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android Ieee Transactions On Information Forensics and Security. 12: 1103-1112. DOI: 10.1109/Tifs.2016.2646641  0.384
2017 Mao J, Tian W, Li P, Wei T, Liang Z. Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity Ieee Access. 5: 17020-17030. DOI: 10.1109/Access.2017.2743528  0.416
2017 Dai T, Li X, Hassanshahi B, Yap RH, Liang Z. R opp D roid : Robust permission re-delegation prevention in Android inter-component communication Computers & Security. 68: 98-111. DOI: 10.1016/J.Cose.2017.04.002  0.336
2016 Mao J, Ma H, Chen Y, Jia Y, Liang Z. Automatic permission inference for hybrid mobile apps Journal of High Speed Networks. 22: 55-64. DOI: 10.3233/Jhs-160538  0.389
2016 Chen G, Jin H, Zou D, Liang Z, Zhou BB, Wang H. A framework for practical dynamic software updating Ieee Transactions On Parallel and Distributed Systems. 27: 941-950. DOI: 10.1109/Tpds.2015.2430854  0.365
2015 Jia Y, Dong X, Liang Z, Saxena P. I Know Where You've Been: Geo-Inference Attacks via the Browser Cache Ieee Internet Computing. 19: 44-53. DOI: 10.1109/Mic.2014.103  0.384
2015 Jia Y, Chen Y, Dong X, Saxena P, Mao J, Liang Z. Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning Computers and Security. 55: 62-80. DOI: 10.1016/J.Cose.2015.07.004  0.421
2013 Chen G, Jin H, Zou D, Zhou BB, Liang Z, Zheng W, Shi X. SafeStack: Automatically patching stack- Based buffer overflow vulnerabilities Ieee Transactions On Dependable and Secure Computing. 10: 368-379. DOI: 10.1109/Tdsc.2013.25  0.386
2012 Qi D, Roychoudhury A, Liang Z. DARWIN: An approach to debugging evolving programs Acm Transactions On Software Engineering and Methodology. 21. DOI: 10.1145/2211616.2211622  0.304
2009 Liang Z, Sun W, Venkatakrishnan VN, Sekar R. Alcatraz: An isolated environment for experimenting with untrusted software Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455527  0.488
Show low-probability matches.