Zubair Shafiq
Orcid: 0000-0002-4500-9354Affiliations:
- University of California, Davis, USA
- The University of Iowa, USA (former)
According to our database1,
Zubair Shafiq
authored at least 137 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
Proc. Priv. Enhancing Technol., October, 2023
Proc. Priv. Enhancing Technol., July, 2023
Before Blue Birds Became X-tinct: Understanding the Effect of Regime Change on Twitter's Advertising and Compliance of Advertising Policies.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
No Video Left Behind: A Utility-Preserving Obfuscation Approach for YouTube Recommendations.
CoRR, 2022
The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain.
CoRR, 2022
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem.
CoRR, 2022
A Girl Has A Name, And It's ... Adversarial Authorship Attribution for Deobfuscation.
CoRR, 2022
YouTube, The Great Radicalizer? Auditing and Mitigating Ideological Biases in YouTube Recommendations.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022
2021
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021
Through the Looking Glass: Learning to Attribute Synthetic Text Generated by Language Models.
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Optimizing Taxi Driver Profit Efficiency: A Spatial Network-Based Markov Decision Process Approach.
IEEE Trans. Big Data, 2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding.
Proc. Priv. Enhancing Technol., 2020
Commun. ACM, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
FlowTrace : A Framework for Active Bandwidth Measurements Using In-band Packet Trains.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
Proc. Priv. Enhancing Technol., 2019
Proc. Priv. Enhancing Technol., 2019
The TV is Smart and Full of Trackers: Towards Understanding the Smart TV Advertising and Tracking Ecosystem.
CoRR, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019
2018
IEEE/ACM Trans. Netw., 2018
Proc. Priv. Enhancing Technol., 2018
CoRR, 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
A Traffic Flow Approach to Early Detection of Gathering Events: Comprehensive Results.
ACM Trans. Intell. Syst. Technol., 2017
ACM Trans. Priv. Secur., 2017
Proc. ACM Meas. Anal. Comput. Syst., 2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the 2017 IFIP Networking Conference, 2017
Proceedings of the 2017 IFIP Networking Conference, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
IEEE/ACM Trans. Netw., 2016
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2016, Burlingame, California, USA, October 31, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
2015
IEEE Trans. Mob. Comput., 2015
2014
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
2013
IEEE/ACM Trans. Netw., 2013
IEEE J. Sel. Areas Commun., 2013
IEEE J. Sel. Areas Commun., 2013
TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems.
J. Netw. Syst. Manag., 2013
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013
Proceedings of the Computer Supported Cooperative Work, 2013
Proceedings of the 2013 workshop on Student workhop, 2013
2012
A first look at cellular machine-to-machine traffic: large scale measurement and characterization.
Proceedings of the ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, 2012
Characterizing geospatial dynamics of application usage in a 3G cellular data network.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 34th International Conference on Software Engineering, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
2011
Proceedings of the SIGMETRICS 2011, 2011
Proceedings of the NETWORKING 2011, 2011
A distributed and privacy preserving algorithm for identifying information hubs in social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009
Proceedings of the Artificial Immune Systems, 8th International Conference, 2009
On the appropriateness of evolutionary rule learning algorithms for malware detection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets.
Proceedings of the Evolutionary Computation, 2009
Using spatio-temporal information in API calls with machine learning algorithms for malware detection.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
2008
Improving accuracy of immune-inspired malware detectors by using intelligent features.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection.
Proceedings of the Applications of Evolutionary Computing, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
2007
Proceedings of the Artificial Immune Systems, 6th International Conference, 2007
Extended thymus action for reducing false positives in ais based network intrusion detection systems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
Extended thymus action for improving response of AIS based NID system against malicious traffic.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
CBR: Fuzzified case retrieval approach for facial expression recognition.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2007