Cited by
Cited by
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
L Zhang, B Tiwana, Z Qian, Z Wang, RP Dick, ZM Mao, L Yang
Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware …, 2010
An untold story of middleboxes in cellular networks
Z Wang, Z Qian, Q Xu, Z Mao, M Zhang
ACM SIGCOMM Computer Communication Review 41 (4), 374-385, 2011
Peeking into your app without actually seeing it:{UI} state inference and novel android attacks
QA Chen, Z Qian, ZM Mao
23rd USENIX Security Symposium (USENIX Security 14), 1037-1052, 2014
Rendered insecure: Gpu side channel attacks are practical
H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users
S Rosen, Z Qian, ZM Mao
Proceedings of the third ACM conference on Data and application security and …, 2013
IotSan: Fortifying the safety of IoT systems
DT Nguyen, C Song, Z Qian, SV Krishnamurthy, EJM Colbert, P McDaniel
Proceedings of the 14th International Conference on emerging Networking …, 2018
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Adgraph: A graph-based approach to ad and tracker blocking
U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq
2020 IEEE Symposium on security and privacy (SP), 763-776, 2020
The ad wars: retrospective measurement and analysis of anti-adblock filter lists
U Iqbal, Z Shafiq, Z Qian
Proceedings of the 2017 Internet Measurement Conference, 171-183, 2017
Off-path TCP sequence number inference attack-how firewall middleboxes reduce security
Z Qian, ZM Mao
2012 IEEE Symposium on Security and Privacy, 347-361, 2012
Accurate and efficient wireless device fingerprinting using channel state information
J Hua, H Sun, Z Shen, Z Qian, S Zhong
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1700-1708, 2018
Collaborative TCP sequence number inference attack: how to crack sequence number under a second
Z Qian, ZM Mao, Y Xie
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.
K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang
NDSS, 2015
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Y Shao, QA Chen, ZM Mao, J Ott, Z Qian
NDSS, 2016
Charm: Facilitating dynamic analysis of device drivers of mobile systems
SMS Talebi, H Tavakoli, H Zhang, Z Zhang, AA Sani, Z Qian
27th USENIX Security Symposium (USENIX Security 18), 291-307, 2018
Android root and its providers: A double-edged sword
H Zhang, D She, Z Qian
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
On Network-level Clusters for Spam Detection.
Z Qian, ZM Mao, Y Xie, F Yu
NDSS, 2010
Dns cache poisoning attack reloaded: Revolutions with side channels
K Man, Z Qian, Z Wang, X Zheng, Y Huang, H Duan
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Precise and accurate patch presence test for binaries
H Zhang, Z Qian
27th USENIX Security Symposium (USENIX Security 18), 887-902, 2018
Your state is not mine: A closer look at evading stateful internet censorship
Z Wang, Y Cao, Z Qian, C Song, SV Krishnamurthy
Proceedings of the 2017 Internet Measurement Conference, 114-127, 2017
The system can't perform the operation now. Try again later.
Articles 1–20