Zubair Shafiq

Orcid: 0000-0002-4500-9354

Affiliations:
  • University of California, Davis, USA
  • The University of Iowa, USA (former)


According to our database1, Zubair Shafiq authored at least 137 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Editors' Introduction.
Proc. Priv. Enhancing Technol., January, 2024

Google's Chrome Antitrust Paradox.
CoRR, 2024

FP-Inconsistent: Detecting Evasive Bots using Browser Fingerprint Inconsistencies.
CoRR, 2024

Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain.
CoRR, 2024

COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar.
CoRR, 2024

Blocking Tracking JavaScript at the Function Granularity.
CoRR, 2024

PURL: Safe and Effective Sanitization of Link Decoration.
Proceedings of the 33rd USENIX Security Symposium, 2024

The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Harnessing TI Feeds for Exploitation Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

Understanding Underground Incentivized Review Services.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Aragorn: A Privacy-Enhancing System for Mobile Cameras.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

A Utility-Preserving Obfuscation Approach for YouTube Recommendations.
Proc. Priv. Enhancing Technol., October, 2023

Blocking JavaScript Without Breaking the Web: An Empirical Investigation.
Proc. Priv. Enhancing Technol., July, 2023

Before Blue Birds Became X-tinct: Understanding the Effect of Regime Change on Twitter's Advertising and Compliance of Advertising Policies.
CoRR, 2023

Benchmarking Adversarial Robustness of Compressed Deep Learning Models.
CoRR, 2023

Centauri: Practical Rowhammer Fingerprinting.
CoRR, 2023

AutoFR: Automated Filter Rule Generation for Adblocking.
Proceedings of the 32nd USENIX Security Symposium, 2023

Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

CookieGraph: Understanding and Detecting First-Party Tracking Cookies.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting.
Proc. Priv. Enhancing Technol., 2022

No Video Left Behind: A Utility-Preserving Obfuscation Approach for YouTube Recommendations.
CoRR, 2022

The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain.
CoRR, 2022

COOKIEGRAPH: Measuring and Countering First-Party Tracking Cookies.
CoRR, 2022

Nowhere to Hide: Detecting Obfuscated Fingerprinting Scripts.
CoRR, 2022

Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem.
CoRR, 2022

A Girl Has A Name, And It's ... Adversarial Authorship Attribution for Deobfuscation.
CoRR, 2022

YouTube, The Great Radicalizer? Auditing and Mitigating Ideological Biases in YouTube Recommendations.
CoRR, 2022

WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking.
Proceedings of the 31st USENIX Security Symposium, 2022

Khaleesi: Breaker of Advertising and Tracking Request Chains.
Proceedings of the 31st USENIX Security Symposium, 2022

HARPO: Learning to Subvert Online Behavioral Advertising.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Stealthy Inference Attack on DNN via Cache-based Side-Channel Attacks.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

Adversarial Authorship Attribution for Deobfuscation.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

On the Robustness of Offensive Language Classifiers.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
Avengers Ensemble! Improving Transferability of Authorship Obfuscation.
CoRR, 2021

Accuracy-Privacy Trade-off in Deep Ensembles.
CoRR, 2021

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

CV-Inspector: Towards Automating Detection of Adblock Circumvention.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

TrackerSift: untangling mixed tracking and functional web resources.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Through the Looking Glass: Learning to Attribute Synthetic Text Generated by Language Models.
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021

Eluding ML-based Adblockers With Actionable Adversarial Examples.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Fingerprinting Fine-tuned Language Models in the Wild.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

2020
Large Scale Characterization of Software Vulnerability Life Cycles.
IEEE Trans. Dependable Secur. Comput., 2020

Optimizing Taxi Driver Profit Efficiency: A Spatial Network-Based Markov Decision Process Approach.
IEEE Trans. Big Data, 2020

The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking.
Proc. Priv. Enhancing Technol., 2020

CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks.
Proc. Priv. Enhancing Technol., 2020

Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding.
Proc. Priv. Enhancing Technol., 2020

A4 : Evading Learning-based Adblockers.
CoRR, 2020

Measuring and mitigating OAuth access token abuse by collusion networks.
Commun. ACM, 2020

AdGraph: A Graph-Based Approach to Ad and Tracker Blocking.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

FlowTrace : A Framework for Active Bandwidth Measurements Using In-band Packet Trains.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020

Characterizing Smart Home IoT Traffic in the Wild.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

Understanding Incentivized Mobile App Installs on Google Play Store.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

A Girl Has A Name: Detecting Authorship Obfuscation.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
No Place to Hide: Inadvertent Location Privacy Leaks on Twitter.
Proc. Priv. Enhancing Technol., 2019

A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X.
Proc. Priv. Enhancing Technol., 2019

The TV is Smart and Full of Trackers: Towards Understanding the Smart TV Advertising and Tracking Ecosystem.
CoRR, 2019

ShadowBlock: A Lightweight and Stealthy Adblocking Browser.
Proceedings of the World Wide Web Conference, 2019

Measuring Political Personalization of Google News Search.
Proceedings of the World Wide Web Conference, 2019

Measurement and Early Detection of Third-Party Application Abuse on Twitter.
Proceedings of the World Wide Web Conference, 2019

A postmortem of suspended Twitter accounts in the 2016 U.S. presidential election.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Optimizing Internet Transit Routing for Content Delivery Networks.
IEEE/ACM Trans. Netw., 2018

NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking.
Proc. Priv. Enhancing Technol., 2018

AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking.
CoRR, 2018

LocWeb2018 Chairs' Welcome & Organization.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Real-time Video Quality of Experience Monitoring for HTTPS and QUIC.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
A Traffic Flow Approach to Early Detection of Gathering Events: Comprehensive Results.
ACM Trans. Intell. Syst. Technol., 2017

Measuring, Characterizing, and Detecting Facebook Like Farms.
ACM Trans. Priv. Secur., 2017

Detecting Anti Ad-blockers in the Wild.
Proc. Priv. Enhancing Technol., 2017

Characterizing and Modeling Patching Practices of Industrial Control Systems.
Proc. ACM Meas. Anal. Comput. Syst., 2017

Tracking and optimizing Quality of Experience in the encrypted internet.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

A graph theoretic approach to fast and accurate malware detection.
Proceedings of the 2017 IFIP Networking Conference, 2017

Cascade size prediction in online social networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

The ad wars: retrospective measurement and analysis of anti-adblock filter lists.
Proceedings of the 2017 Internet Measurement Conference, 2017

Scalable News Slant Measurement Using Twitter.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Multipath TCP traffic diversion attacks and countermeasures.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Suffering from buffering? Detecting QoE impairments in live video streams.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Peering vs. transit: Performance comparison of peering and transit interconnections.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Accurate Detection of Automatically Spun Content via Stylometric Analysis.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Distributed Load Balancing in Key-Value Networked Caches.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Bumps and Bruises: Mining Presidential Campaign Announcements on Twitter.
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017

Characterizing key stakeholders in an online black-hat marketplace.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

Revisiting The American Voter on Twitter.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Characterizing and Optimizing Cellular Network Performance During Crowded Events.
IEEE/ACM Trans. Netw., 2016

A First Look at Ad-block Detection: A New Arms Race on the Web.
CoRR, 2016

Special Issue on Mobile Traffic Analytics.
Comput. Commun., 2016

QoE Analysis of a Large-Scale Live Video Streaming Event.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

Characterizing caching workload of a large commercial Content Delivery Network.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

The Internet is for Porn: Measurement and Analysis of Online Adult Traffic.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

A traffic flow approach to early detection of gathering events.
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2016, Burlingame, California, USA, October 31, 2016

Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
Geospatial and Temporal Dynamics of Application Usage in Cellular Data Networks.
IEEE Trans. Mob. Comput., 2015

Spying on Spammers: Tracking Like Farm Accounts on Facebook.
CoRR, 2015

Characterizing Seller-Driven Black-Hat Marketplaces.
CoRR, 2015

2014
Revisiting caching in content delivery networks.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Understanding the impact of network dynamics on mobile video user engagement.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots.
Proceedings of the 2014 Internet Measurement Conference, 2014

Breaching IM session privacy using causality.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic.
IEEE/ACM Trans. Netw., 2013

Identifying Leaders and Followers in Online Social Networks.
IEEE J. Sel. Areas Commun., 2013

A Distributed Algorithm for Identifying Information Hubs in Social Networks.
IEEE J. Sel. Areas Commun., 2013

TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems.
J. Netw. Syst. Manag., 2013

Modeling Morphology of Social Network Cascades
CoRR, 2013

A first look at cellular network performance during crowded events.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Who are you talking to? Breaching privacy in encrypted IM networks.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Cross-path inference attacks on multipath TCP.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

Is news sharing on Twitter ideologically biased?
Proceedings of the Computer Supported Cooperative Work, 2013

Leveraging diversity to optimize performance in mobile networks.
Proceedings of the 2013 workshop on Student workhop, 2013

2012
A first look at cellular machine-to-machine traffic: large scale measurement and characterization.
Proceedings of the ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, 2012

Characterizing geospatial dynamics of application usage in a 3G cellular data network.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A large scale exploratory analysis of software vulnerability life cycles.
Proceedings of the 34th International Conference on Software Engineering, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
Characterizing and modeling internet traffic dynamics of cellular devices.
Proceedings of the SIGMETRICS 2011, 2011

A Random Walk Approach to Modeling the Dynamics of the Blogosphere.
Proceedings of the NETWORKING 2011, 2011

A distributed and privacy preserving algorithm for identifying information hubs in social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2009
Fuzzy case-based reasoning for facial expression recognition.
Fuzzy Sets Syst., 2009

PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Using Formal Grammar and Genetic Operators to Evolve Malware.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

On the Inefficient Use of Entropy for Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Malware detection using statistical analysis of byte-level file content.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

A Sense of 'Danger' for Windows Processes.
Proceedings of the Artificial Immune Systems, 8th International Conference, 2009

On the appropriateness of evolutionary rule learning algorithms for malware detection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Are evolutionary rule learning algorithms appropriate for malware detection?
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Evolvable malware.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets.
Proceedings of the Evolutionary Computation, 2009

Using spatio-temporal information in API calls with machine learning algorithms for malware detection.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

2008
Improving accuracy of immune-inspired malware detectors by using intelligent features.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection.
Proceedings of the Applications of Evolutionary Computing, 2008

Embedded Malware Detection Using Markov n-Grams.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Defence Against 802.11 DoS Attacks Using Artificial Immune System.
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007

Extended thymus action for reducing false positives in ais based network intrusion detection systems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Extended thymus action for improving response of AIS based NID system against malicious traffic.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

CBR: Fuzzified case retrieval approach for facial expression recognition.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2007


  Loading...