Follow
Yubao Zhang
Yubao Zhang
Palo Alto Networks, Inc
Verified email at udel.edu
Title
Cited by
Cited by
Year
Twitter trends manipulation: a first look inside the security of twitter trending
Y Zhang, X Ruan, H Wang, H Wang, S He
IEEE Transactions on Information Forensics and Security 12 (1), 144-156, 2016
612016
Casino royale: a deep exploration of illegal online gambling
H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu, H Wang, H Duan, Y Shi, X Su, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
342019
{End-Users} get maneuvered: Empirical analysis of redirection hijacking in content delivery networks
S Hao, Y Zhang, H Wang, A Stavrou
27th USENIX Security Symposium (USENIX Security 18), 1129-1145, 2018
312018
Understanding human dynamics in microblog posting activities
Z Jiang, Y Zhang, H Wang, P Li
Journal of Statistical Mechanics: Theory and Experiment 2013 (02), P02006, 2013
152013
Understanding promotion-as-a-service on GitHub
K Du, H Yang, Y Zhang, H Duan, H Wang, S Hao, Z Li, M Yang
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
112020
What scale of audience a campaign can reach in what price on twitter?
Y Zhang, X Ruan, H Wang, H Wang
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1168-1176, 2014
112014
Understanding the manipulation on recommender systems through web injection
Y Zhang, J Xiao, S Hao, H Wang, S Zhu, S Jajodia
IEEE Transactions on Information Forensics and Security 15, 3807-3818, 2019
92019
The benefits of network coding in distributed caching in large-scale P2P-VoD systems
H Wang, Y Zhang, P Li, Z Jiang
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
92010
How can peers assist each other in large-scale P2P-VoD systems
Y Zhang, H Wang, P Li, Z Jiang, C Gao
2010 International Conference on Multimedia Information Networking and …, 2010
52010
Mingling of clear and muddy water: Understanding and detecting semantic confusion in blackhat seo
H Yang, K Du, Y Zhang, S Hao, H Wang, J Zhang, H Duan
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
42021
Modeling analysis of server loading in large-scale P2P-VoD systems with actively collaborative helpers
Y Zhang, H Wang, P Li, Z Jiang
Telecommunication Systems 54 (3), 215-227, 2013
22013
Dial" N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains
G Liu, L Jin, S Hao, Y Zhang, D Liu, A Stavrou, H Wang
Proceedings of the 2023 ACM on Internet Measurement Conference, 198-212, 2023
12023
Characterizing top user behavior of Sina microblogging in the context of different events
Y Zhang, H Wang, Z Jiang, P Li
2012 International Conference on Computing, Networking and Communications …, 2012
12012
Review Trade: Everything Is Free in Incentivized Review Groups
Y Zhang, S Hao, H Wang
Security and Privacy in Communication Networks: 16th EAI International …, 2020
2020
Understanding and defending vulnerabilities of web-based information systems
Y Zhang
University of Delaware, 2020
2020
A geographic analysis of P2P-TV viewership
Z Jiang, H Wang, Y Zhang, P Li
Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–16