Adgraph: A graph-based approach to ad and tracker blocking U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq 2020 IEEE Symposium on security and privacy (SP), 763-776, 2020 | 154* | 2020 |
Measuring and disrupting anti-adblockers using differential execution analysis S Zhu, X Hu, Z Qian, Z Shafiq, H Yin The Network and Distributed System Security Symposium (NDSS), 2018 | 58 | 2018 |
SymTCP: Eluding stateful deep packet inspection with automated discrepancy discovery Z Wang, S Zhu Network and Distributed System Security Symposium (NDSS), 2020 | 57 | 2020 |
Connecting the dots: Detecting adversarial perturbations using context inconsistency S Li, S Zhu, S Paul, A Roy-Chowdhury, C Song, S Krishnamurthy, ... Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020 | 50 | 2020 |
Adversarial attacks on black box video classifiers: Leveraging the power of geometric transformations S Li, A Aich, S Zhu, S Asif, C Song, A Roy-Chowdhury, S Krishnamurthy Advances in Neural Information Processing Systems 34, 2085-2096, 2021 | 41 | 2021 |
Generating practical adversarial network traffic flows using NIDSGAN BE Zolbayar, R Sheatsley, P McDaniel, MJ Weisman, S Zhu, S Zhu, ... arXiv preprint arXiv:2203.06694, 2022 | 25 | 2022 |
You do (not) belong here: detecting DPI evasion attacks with context learning S Zhu, S Li, Z Wang, X Chen, Z Qian, SV Krishnamurthy, KS Chan, ... Proceedings of the 16th International Conference on emerging Networking …, 2020 | 21 | 2020 |
Syzdescribe: Principled, automated, static generation of syscall descriptions for kernel drivers Y Hao, G Li, X Zou, W Chen, S Zhu, Z Qian, AA Sani 2023 IEEE Symposium on Security and Privacy (SP), 3262-3278, 2023 | 15 | 2023 |
Shadowblock: A lightweight and stealthy adblocking browser S Zhu, U Iqbal, Z Wang, Z Qian, Z Shafiq, W Chen The World Wide Web Conference, 2483-2493, 2019 | 15 | 2019 |
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs J Huang, M Sun, S Zhu, Y Sun, C Xing, Q Duan Proceedings of the 30th annual ACM symposium on applied computing, 688-694, 2015 | 11 | 2015 |
Eluding ml-based adblockers with actionable adversarial examples S Zhu, Z Wang, X Chen, S Li, K Man, U Iqbal, Z Qian, KS Chan, ... Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 10* | 2021 |
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison Z Wang, S Zhu, K Man, P Zhu, Y Hao, Z Qian, SV Krishnamurthy, ... Proceedings of the 8th ACM Workshop on Moving Target Defense, 31-32, 2021 | 7 | 2021 |
On selecting composite network-cloud services: a quality-of-service based approach MM Jalloh, S Zhu, F Fang, J Huang Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015 | 5 | 2015 |
Propagation of Active Worms in P2P Networks: Modeling and Analysis. H Tang, Y Lu, S Zhou, J Huang J. Comput. 9 (11), 2514-2524, 2014 | 1 | 2014 |
A Defense Model of Reactive Worms Based on Dynamic Time. H Tang, S Zhu, J Huang, H Liu J. Softw. 9 (11), 2778-2788, 2014 | 1 | 2014 |
DNS Exfiltration Guided by Generative Adversarial Networks A Fahim, S Zhu, Z Qian, C Song, E Papalexakis, S Chakraborty, K Chan, ... 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P), 580-599, 2024 | | 2024 |
Understanding and Taming Adversarial Actions Against Internet Content Blockers S Zhu University of California, Riverside, 2021 | | 2021 |
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations (Supplementary Material) S Li, A Aich, S Zhu, MS Asif, C Song, SV Krishnamurthy, ... | | |