Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
Roland Zumkeller
Meriem Ben-Salah Akin
Maximilian Dürr
Liangliang Shang
F. Morain-Nicolier
Chen Ma
Levent Tasci
Home
/
Author
/
ZIMING ZHAO
Author Info
Open Visualization
Name
Affiliation
Papers
ZIMING ZHAO
Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
67
Collaborators
Citations
PageRank
118
322
30.52
Referers
Referees
References
1123
1560
682
Search Limit
100
1000
Publications (67 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks
0
0.34
2022
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices
0
0.34
2022
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps
0
0.34
2021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
0
0.34
2021
Toward Multi-FPGA Acceleration of the Neural Networks
1
0.36
2021
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture
0
0.34
2020
DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection
1
0.35
2020
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems
0
0.34
2020
Towards a reliable firewall for software-defined networks.
1
0.35
2019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies
0
0.34
2019
iCore - continuous and proactive extrospection on multi-core IoT devices.
0
0.34
2019
An Efficient and Flexible Metadata Management Layer for Local File Systems
1
0.35
2019
A Foundation for Automated Placement of Data
0
0.34
2019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues
4
0.45
2019
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems
0
0.34
2019
Understanding and Predicting Private Interactions in Underground Forums.
1
0.35
2019
Users Really Do Answer Telephone Scams
0
0.34
2019
RTVirt: enabling time-sensitive computing on virtualized systems through cross-layer CPU scheduling
1
0.35
2018
Measuring E-mail header injections on the world wide web.
2
0.37
2018
Advances in Infrastructure Mobility for Future Networks.
0
0.34
2018
Are Existing Knowledge Transfer Techniques Effective for Deep Learning with Edge Devices?
4
0.40
2018
Challenges, Opportunities and a Framework for Web Environment Forensics.
0
0.34
2018
AIM-SDN: Attacking Information Mismanagement in SDN-datastores.
1
0.35
2018
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
13
0.58
2018
Secure Display for FIDO Transaction Confirmation.
0
0.34
2018
CacheLight: Defeating the CacheKit Attack.
0
0.34
2018
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.
0
0.34
2018
EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems
1
0.37
2018
Exploring the Capabilities of Mobile Devices Supporting Deep Learning
4
0.37
2018
Challenges and Preparedness of SDN-based Firewalls.
0
0.34
2018
Improving the Performance and Endurance of Encrypted Non-Volatile Main Memory through Deduplicating Writes.
2
0.36
2018
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS
0
0.34
2018
HoneyProxy: Design and implementation of next-generation honeynet via SDN.
1
0.34
2017
Toward Standardization of Authenticated Caller ID Transmission.
0
0.34
2017
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.
0
0.34
2017
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements
0
0.34
2017
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.
4
0.42
2017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps
3
0.40
2017
Deep Android Malware Detection.
38
1.12
2017
On the Safety and Efficiency of Virtual Firewall Elasticity Control.
2
0.38
2017
E-Mail Header Injection Vulnerabilities
0
0.34
2017
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control
4
0.42
2017
HoneyMix: Toward SDN-based Intelligent Honeynet.
7
0.56
2016
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces.
1
0.34
2016
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam
12
0.53
2016
dbling
0
0.34
2016
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
0
0.34
2016
TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
0
0.34
2016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).
1
0.35
2016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games.
5
0.54
2016
1
2
50 / page