Year |
Citation |
Score |
2019 |
Mao J, Bian J, Tian W, Zhu S, Wei T, Li A, Liang Z. Phishing page detection via learning classifiers from page layout feature Eurasip Journal On Wireless Communications and Networking. 2019: 43. DOI: 10.1186/S13638-019-1361-0 |
0.416 |
|
2019 |
Xiao Y, Jia Y, Cheng X, Yu J, Liang Z, Tian Z. I Can See Your Brain: Investigating Home-Use Electroencephalography System Security Ieee Internet of Things Journal. 6: 6681-6691. DOI: 10.1109/Jiot.2019.2910115 |
0.373 |
|
2018 |
Yang Z, Liang Z. Automated identification of sensitive data from implicit user specification Cybersecurity. 1: 1-15. DOI: 10.1186/S42400-018-0011-X |
0.403 |
|
2018 |
Mao J, Bian J, Bai G, Wang R, Chen Y, Xiao Y, Liang Z. Detecting Malicious Behaviors in JavaScript Applications Ieee Access. 6: 12284-12294. DOI: 10.1109/Access.2018.2795383 |
0.385 |
|
2018 |
Mao J, Bian J, Tian W, Zhu S, Wei T, Li A, Liang Z. Detecting Phishing Websites via Aggregation Analysis of Page Layouts Procedia Computer Science. 129: 224-230. DOI: 10.1016/J.Procs.2018.03.053 |
0.365 |
|
2017 |
Mao J, Chen Y, Shi F, Jia Y, Liang Z. Toward Exposing Timing-Based Probing Attacks in Web Applications. Sensors (Basel, Switzerland). 17. PMID 28245610 DOI: 10.3390/S17030464 |
0.437 |
|
2017 |
Sun M, Li X, Lui JCS, Ma RTB, Liang Z. Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android Ieee Transactions On Information Forensics and Security. 12: 1103-1112. DOI: 10.1109/Tifs.2016.2646641 |
0.384 |
|
2017 |
Mao J, Tian W, Li P, Wei T, Liang Z. Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity Ieee Access. 5: 17020-17030. DOI: 10.1109/Access.2017.2743528 |
0.416 |
|
2017 |
Dai T, Li X, Hassanshahi B, Yap RH, Liang Z. R opp D roid : Robust permission re-delegation prevention in Android inter-component communication Computers & Security. 68: 98-111. DOI: 10.1016/J.Cose.2017.04.002 |
0.336 |
|
2016 |
Mao J, Ma H, Chen Y, Jia Y, Liang Z. Automatic permission inference for hybrid mobile apps Journal of High Speed Networks. 22: 55-64. DOI: 10.3233/Jhs-160538 |
0.389 |
|
2016 |
Chen G, Jin H, Zou D, Liang Z, Zhou BB, Wang H. A framework for practical dynamic software updating Ieee Transactions On Parallel and Distributed Systems. 27: 941-950. DOI: 10.1109/Tpds.2015.2430854 |
0.365 |
|
2015 |
Jia Y, Dong X, Liang Z, Saxena P. I Know Where You've Been: Geo-Inference Attacks via the Browser Cache Ieee Internet Computing. 19: 44-53. DOI: 10.1109/Mic.2014.103 |
0.384 |
|
2015 |
Jia Y, Chen Y, Dong X, Saxena P, Mao J, Liang Z. Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning Computers and Security. 55: 62-80. DOI: 10.1016/J.Cose.2015.07.004 |
0.421 |
|
2013 |
Chen G, Jin H, Zou D, Zhou BB, Liang Z, Zheng W, Shi X. SafeStack: Automatically patching stack- Based buffer overflow vulnerabilities Ieee Transactions On Dependable and Secure Computing. 10: 368-379. DOI: 10.1109/Tdsc.2013.25 |
0.386 |
|
2012 |
Qi D, Roychoudhury A, Liang Z. DARWIN: An approach to debugging evolving programs Acm Transactions On Software Engineering and Methodology. 21. DOI: 10.1145/2211616.2211622 |
0.304 |
|
2009 |
Liang Z, Sun W, Venkatakrishnan VN, Sekar R. Alcatraz: An isolated environment for experimenting with untrusted software Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455527 |
0.488 |
|
Show low-probability matches. |