Follow
Zhou Li
Zhou Li
Verified email at uci.edu - Homepage
Title
Cited by
Cited by
Year
Acing the IOC game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3602016
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3242012
Detection of malicious web activity in enterprise computer networks
AM Oprea, Z Li, R Norris, KD Bowers
US Patent 9,838,407, 2017
3192017
When Good Becomes Evil: Keystroke Inference with Smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2492015
Detection of early-stage enterprise infection by mining large-scale log data
A Oprea, Z Li, TF Yen, SH Chin, S Alrwais
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
2372015
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
1722018
Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures
Z Li, S Alrwais, Y Xie, F Yu, XF Wang
2013 IEEE Symposium on Security and Privacy, 112-126, 2013
1472013
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang, C Leng, Y Liu, Z Zhang, J Wu
Proceedings of the Internet Measurement Conference, 22-35, 2019
1272019
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel
J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
1122020
Privacy-preserving genomic computation through program specialization
R Wang, XF Wang, Z Li, H Tang, MK Reiter, Z Dong
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1102009
Resident Evil: Understanding residential ip proxy as a dark service
X Mi, X Feng, X Liao, B Liu, XF Wang, F Qian, Z Li, S Alrwais, L Sun, Y Liu
2019 IEEE Symposium on Security and Privacy (SP), 1185-1201, 2019
972019
An investigation on information leakage of DNS over TLS
R Houser, Z Li, C Cotton, H Wang
Proceedings of the 15th International Conference on Emerging Networking …, 2019
912019
MADE: Security Analytics for Enterprise Threat Detection
A Oprea, Z Li, R Norris, K Bowers
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
892018
Sidebuster: automated detection and quantification of side-channel leaks in web application development
K Zhang, Z Li, R Wang, XF Wang, S Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
872010
Every second counts: Quantifying the negative externalities of cybercrime via typosquatting
MT Khan, X Huo, Z Li, C Kanich
2015 IEEE Symposium on Security and Privacy, 135-150, 2015
852015
Understanding the dark side of domain parking
S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang
23rd {USENIX} Security Symposium ({USENIX} Security 14), 207-222, 2014
812014
Stealing Neural Network Structure through Remote FPGA Side-channel Analysis
Y Zhang, R Yasaei, H Chen, Z Li, MA Al Faruque
IEEE Transactions on Information Forensics and Security, 2021
792021
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic
S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
76*2020
Who Is Answering My Queries: Understanding and Characterizing Interception of the {DNS} Resolution Path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th {USENIX} Security Symposium ({USENIX} Security 18), 1113-1128, 2018
752018
No pardon for the interruption: New inference attacks on android through interrupt timing analysis
W Diao, X Liu, Z Li, K Zhang
2016 IEEE Symposium on Security and Privacy (SP), 414-432, 2016
752016
The system can't perform the operation now. Try again later.
Articles 1–20