E-commerce reputation manipulation: The emergence of reputation-escalation-as-a-service H Xu, D Liu, H Wang, A Stavrou Proceedings of the 24th International Conference on World Wide Web, 1296-1306, 2015 | 81 | 2015 |
All your dns records point to us: Understanding the security threats of dangling dns records D Liu, S Hao, H Wang Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 80 | 2016 |
Detecting malicious javascript in pdf through document instrumentation D Liu, H Wang, A Stavrou 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014 | 67 | 2014 |
Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains D Liu, Z Li, K Du, H Wang, B Liu, H Duan Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 55 | 2017 |
Click fraud detection on the advertiser side H Xu, D Liu, A Koehl, H Wang, A Stavrou Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 46 | 2014 |
A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping D Liu, M Zhang, H Wang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 38 | 2018 |
E-android: A new energy profiling tool for smartphones X Gao, D Liu, D Liu, H Wang, A Stavrou 2017 IEEE 37th international conference on distributed computing systems …, 2017 | 26 | 2017 |
A Comprehensive Measurement-based Investigation of DNS Hijacking R Houser, S Hao, Z Li, D Liu, C Cotton, H Wang 2021 40th International Symposium on Reliable Distributed Systems (SRDS …, 2021 | 11 | 2021 |
An empirical investigation of ecommerce-reputation-escalation-as-a-service H Xu, D Liu, H Wang, A Stavrou ACM Transactions on the Web (TWEB) 11 (2), 1-35, 2017 | 10 | 2017 |
Network traffic analysis using refined Bayesian reasoning to detect flooding and port scan attacks D Liu, M Zhang, T Li 2008 International Conference on Advanced Computer Theory and Engineering …, 2008 | 10 | 2008 |
Detecting passive cheats in online games via performance-skillfulness inconsistency D Liu, X Gao, M Zhang, H Wang, A Stavrou 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 9 | 2017 |
executable-only-memory-switch (xom-switch): Hiding your code from advanced code reuse attacks in one shot M Zhang, R Sahita, D Liu Black Hat Asia, 2018 | 7 | 2018 |
Automated extraction and classification of malicious indicators J Szurdi, D Liu, J Wang US Patent App. 17/185,760, 2022 | 1 | 2022 |
Ready Raider One: Exploring the Misuse of Cloud Gaming Services G Liu, D Liu, S Hao, X Gao, K Sun, H Wang | 1 | 2022 |
In-line detection of algorithmically generated domains D Liu, M Walter, B Hua, S Li, F Fei, S Chung, J Wang, W Xu US Patent App. 16/588,169, 2021 | 1 | 2021 |
Dynamic application flow cluster based on traffic behavior distance B Peng, W Guo, D Liu, J Fu 2010 3rd International Conference on Advanced Computer Theory and …, 2010 | 1 | 2010 |
Scalable and accurate application signature discovery M Zhang, D Liu 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial …, 2008 | 1 | 2008 |
Predictive dns cache to improve security and performance D Liu, J Wang, W Xu US Patent App. 17/511,390, 2023 | | 2023 |
Inline identify and block dangling dns records D Liu, R Duan, J Wang US Patent App. 17/511,393, 2023 | | 2023 |
Domain squatting detection Z Chen, J Wang, D Liu US Patent App. 17/408,054, 2023 | | 2023 |