Name
Affiliation
Papers
ZHIYUN QIAN
Univ Michigan, Ann Arbor, MI 48109 USA
82
Collaborators
Citations 
PageRank 
209
1113
74.48
Referers 
Referees 
References 
3165
1880
848
Search Limit
1001000
Title
Citations
PageRank
Year
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT00.342022
Demystifying the Dependency Challenge in Kernel Fuzzing00.342022
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK00.342022
Who Moves My App Promotion Investment? A Systematic Study About App Distribution Fraud00.342022
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel00.342022
LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution00.342022
DNS Poisoning of Operating System Caches: Attacks and Mitigations00.342022
SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers10.362021
An Empirical Analysis of Hazardous Uses of Android Shared Storage00.342021
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison00.342021
An Investigation of the Android Kernel Patch Ecosystem00.342021
SYZVEGAS: Beating Kernel Fuzzing Odds with Reinforcement Learning00.342021
Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels00.342021
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison00.342021
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems00.342021
Side Channel Attacks on GPUs00.342021
A nationwide census on wifi security threats: prevalence, riskiness, and the economics00.342021
Eluding ML-based Adblockers With Actionable Adversarial Examples.00.342021
Undo Workarounds for Kernel Bugs00.342021
DNS Cache Poisoning Attack: Resurrections with Side Channels00.342021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs20.372021
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery10.402020
Packet Header Obfuscation Using MIMO00.342020
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels50.492020
Experiences of landing machine learning onto market-scale mobile malware detection20.372020
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel00.342020
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning10.362020
Unveiling your keystrokes - A Cache-based Side-channel Attack on Graphics Libraries.10.342019
Collaborative Client-Side DNS Cache Poisoning Attack20.392019
Employing attack graphs for intrusion detection.20.382019
PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack10.352019
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things00.342019
Principled Unearthing of TCP Side Channel Vulnerabilities10.372019
Application Level Attacks On Connected Vehicle Protocols00.342019
App in the Middle: Demystify Application Virtualization in Android and its Security Threats10.372019
Figment: Fine-grained Permission Management for Mobile Apps00.342019
ShadowBlock: A Lightweight and Stealthy Adblocking Browser10.352019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud10.382019
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit.10.402018
Resilient decentralized Android application repackaging detection using logic bombs.10.352018
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information.00.342018
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis.20.362018
A Framework for MIMO-based Packet Header Obfuscation.00.342018
Static Evaluation of Noninterference Using Approximate Model Counting00.342018
Rendered Insecure: GPU Side Channel Attacks are Practical.200.662018
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking.10.352018
Invetter: Locating Insecure Input Validations in Android Services.40.432018
Droid M+: Developer Support for Imbibing Android's New Permission Model.20.362018
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.60.582018
IotSan: fortifying the safety of IoT systems150.692018
  • 1
  • 2