Junjie Zhang

Affiliations:
  • Wright State University, Dayton, OH, USA
  • Georgia Institute of Technology, Atlanta, GA, USA (former)


According to our database1, Junjie Zhang authored at least 38 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures.
IEEE/ACM Trans. Netw., June, 2024

2023
Detecting suspicious transactions in a virtual-currency-enabled online social network.
J. Netw. Comput. Appl., February, 2023

An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting.
Proceedings of the 32nd USENIX Security Symposium, 2023

2021
UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Context-aware Website Fingerprinting over Encrypted Proxies.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2019
User interactions and behaviors in a large-scale online emotional support service.
Soc. Netw. Anal. Min., 2019

<i>ShellBreaker</i>: Automatically detecting PHP-based malicious web shells.
Comput. Secur., 2019

UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network.
IEEE Trans. Inf. Forensics Secur., 2018

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense.
Secur. Commun. Networks, 2018

Analyzing and Detecting Money-Laundering Accounts in Online Social Networks.
IEEE Netw., 2018

Designing self-destructing wireless sensors with security and performance assurance.
Comput. Networks, 2018

Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Detecting Suspicious Members in an Online Emotional Support Service.
Proceedings of the Security and Privacy in Communication Networks, 2018

Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture.
Proceedings of the Network and System Security - 12th International Conference, 2018

Can We Learn what People are Doing from Raw DNS Queries?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Deriving and measuring DNS-based fingerprints.
J. Inf. Secur. Appl., 2017

Mining repeating pattern in packet arrivals: Metrics, models, and applications.
Inf. Sci., 2017

ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions.
IEEE Access, 2017

Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture Model.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Online-relaying-based image communication in unmanned aerial vehicle networks.
Proceedings of the IEEE International Conference on Communications, 2017

2015
Accurate DNS query characteristics estimation via active probing.
J. Netw. Comput. Appl., 2015

An Inference Attack Model for Flow Table Capacity and Usage: Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network.
CoRR, 2015

Detecting fake anti-virus software distribution webpages.
Comput. Secur., 2015

You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic.
Proceedings of the Security and Privacy in Communication Networks, 2015

Modeling repeating behaviors in packet arrivals: Detection and measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Building a Scalable System for Stealthy P2P-Botnet Detection.
IEEE Trans. Inf. Forensics Secur., 2014

DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Inf. Forensics Secur., 2014

Morphing communications of Cyber-Physical Systems towards moving-target defense.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Intention and Origination: An Inside Look at Large-Scale Bot Queries.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Net-cohort: detecting and managing VM ensembles in virtualized data centers.
Proceedings of the 9th International Conference on Autonomic Computing, 2012

2011
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads.
Proceedings of the 20th International Conference on World Wide Web, 2011

Detecting stealthy P2P botnets using statistical traffic fingerprints.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Boosting the scalability of botnet detection using adaptive traffic sampling.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Exposing invisible timing-based traffic watermarks with BACKLIT.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
On the Secrecy of Spread-Spectrum Flow Watermarks.
Proceedings of the Computer Security, 2010

2008
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
Proceedings of the Network and Distributed System Security Symposium, 2008


  Loading...