Name
Affiliation
Papers
ZIMING ZHAO
Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
67
Collaborators
Citations 
PageRank 
118
322
30.52
Referers 
Referees 
References 
1123
1560
682
Search Limit
1001000
Title
Citations
PageRank
Year
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks00.342022
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices00.342022
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps00.342021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service00.342021
Toward Multi-FPGA Acceleration of the Neural Networks10.362021
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture00.342020
DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection10.352020
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems00.342020
Towards a reliable firewall for software-defined networks.10.352019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies00.342019
iCore - continuous and proactive extrospection on multi-core IoT devices.00.342019
An Efficient and Flexible Metadata Management Layer for Local File Systems10.352019
A Foundation for Automated Placement of Data00.342019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues40.452019
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems00.342019
Understanding and Predicting Private Interactions in Underground Forums.10.352019
Users Really Do Answer Telephone Scams00.342019
RTVirt: enabling time-sensitive computing on virtualized systems through cross-layer CPU scheduling10.352018
Measuring E-mail header injections on the world wide web.20.372018
Advances in Infrastructure Mobility for Future Networks.00.342018
Are Existing Knowledge Transfer Techniques Effective for Deep Learning with Edge Devices?40.402018
Challenges, Opportunities and a Framework for Web Environment Forensics.00.342018
AIM-SDN: Attacking Information Mismanagement in SDN-datastores.10.352018
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.130.582018
Secure Display for FIDO Transaction Confirmation.00.342018
CacheLight: Defeating the CacheKit Attack.00.342018
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.00.342018
EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems10.372018
Exploring the Capabilities of Mobile Devices Supporting Deep Learning40.372018
Challenges and Preparedness of SDN-based Firewalls.00.342018
Improving the Performance and Endurance of Encrypted Non-Volatile Main Memory through Deduplicating Writes.20.362018
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS00.342018
HoneyProxy: Design and implementation of next-generation honeynet via SDN.10.342017
Toward Standardization of Authenticated Caller ID Transmission.00.342017
Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.00.342017
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements00.342017
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.40.422017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps30.402017
Deep Android Malware Detection.381.122017
On the Safety and Efficiency of Virtual Firewall Elasticity Control.20.382017
E-Mail Header Injection Vulnerabilities00.342017
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control40.422017
HoneyMix: Toward SDN-based Intelligent Honeynet.70.562016
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces.10.342016
SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam120.532016
dbling00.342016
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.00.342016
TripleMon: A multi-layer security framework for mediating inter-process communication on Android.00.342016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).10.352016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games.50.542016
  • 1
  • 2