Seguir
Kehuan Zhang
Título
Citado por
Citado por
Ano
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang
Proceedings of the 18th Annual Network & Distributed System Security …, 2011
6102011
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
2010 IEEE Symposium on Security and Privacy, 191-206, 2010
5562010
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
KZ Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin ...
The 25th Annual Network and Distributed System Security Symposium, 2018
428*2018
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3282012
Sedic: privacy-aware data intensive computing on hybrid clouds
K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2872011
When good becomes evil: Keystroke inference with smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2482015
Your voice assistant is mine: how to abuse speakers to steal information and control your phone
W Diao, X Liu, Z Zhou, K Zhang
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
2132014
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
D Tang, XF Wang, H Tang, K Zhang
USENIX Security Symposium, 1541-1558, 2021
2022021
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
1692018
Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems
K Zhang, XF Wang
Proceedings of the 18th conference on USENIX security symposium, Pages 17-32, 2009
1532009
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound
Z Zhou, W Diao, X Liu, K Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1302014
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding
J Zhang, Z Qin, H Yin, L Ou, K Zhang
Computers & Security 84, 376-392, 2019
1092019
On Code Execution Tracking via Power Side-Channel
Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1042016
Invisible mask: Practical attacks on face recognition with infrared
Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang
CoRR abs/1803.04683 (2018), 2018
1002018
Sidebuster: automated detection and quantification of side-channel leaks in web application development
K Zhang, Z Li, R Wang, XF Wang, S Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
872010
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
832017
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic
S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
76*2020
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
W Diao, X Liu, Z Li, K Zhang
Proceeding of the 37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
752016
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
D Tang, Z Zhou, Y Zhang, K Zhang
Network and Distributed Systems Security (NDSS) Symposium 2018, 2018
722018
Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations
R Yang, G Li, WC Lau, K Zhang, P Hu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
692016
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20