Junjie Zhang
Affiliations:- Wright State University, Dayton, OH, USA
- Georgia Institute of Technology, Atlanta, GA, USA (former)
According to our database1,
Junjie Zhang
authored at least 38 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures.
IEEE/ACM Trans. Netw., June, 2024
2023
Detecting suspicious transactions in a virtual-currency-enabled online social network.
J. Netw. Comput. Appl., February, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2021
UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
2019
Soc. Netw. Anal. Min., 2019
Comput. Secur., 2019
UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense.
Secur. Commun. Networks, 2018
IEEE Netw., 2018
Comput. Networks, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
Inf. Sci., 2017
IEEE Access, 2017
Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture Model.
Proceedings of the 20th ACM International Conference on Modelling, 2017
Proceedings of the IEEE International Conference on Communications, 2017
2015
J. Netw. Comput. Appl., 2015
An Inference Attack Model for Flow Table Capacity and Usage: Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network.
CoRR, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
2012
Proceedings of the 9th International Conference on Autonomic Computing, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Computer Security, 2010
2008
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008