Ziming Zhao
Orcid: 0000-0002-4930-5556Affiliations:
- Northeastern University, CactiLab, Boston, MA, USA (since 2024)
- University at Buffalo, NY, USA (2020-2024)
- Rochester Institute of Technology, Henrietta, NY, USA (2018-2020)
- Arizona State University, Tempe, AZ, USA (2009-2018)
According to our database1,
Ziming Zhao
authored at least 100 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on github.com
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput., June, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
CoRR, 2024
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
CoRR, 2024
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024
Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
Inf. Syst. Frontiers, April, 2023
FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocol.
IEEE Trans. Dependable Secur. Comput., 2023
xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
Proceedings of the International Conference on Machine Learning and Applications, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023
2022
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022
CoRR, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021
<i>ExSol</i>: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
DTRAP, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020
Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems.
Proceedings of the Second IEEE International Conference on Trust, 2020
SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Commun. Stand. Mag., 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
2016
TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
J. Comput. Secur., 2016
IEEE Secur. Priv., 2016
Digit. Investig., 2016
CoRR, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation.
Proceedings of the 2016 ITU Kaleidoscope: ICTs for a Sustainable World, 2016
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
2015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
ACM Trans. Inf. Syst. Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
2014
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Open Networking Summit 2014 - Research Track, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the 18th Working Conference on Reverse Engineering, 2011
Proceedings of the Global Communications Conference, 2011
2010
Proceedings of the Global Communications Conference, 2010
2008
Proceedings of the International Conference on Cyberworlds 2008, 2008