Cliff C. Zou

Orcid: 0000-0003-4229-6957

Affiliations:
  • University of Central Florida, Orlando, USA


According to our database1, Cliff C. Zou authored at least 101 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Military Data Space: Challenges, Opportunities, and Use Cases.
IEEE Commun. Mag., January, 2024

2023
Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach.
Sensors, July, 2023

Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks.
CoRR, 2023

User Profiling Attack Using Windows Registry Data.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

2022
Adaptive Matrix Pattern Steganography on RGB Images.
J. Cyber Secur. Mobil., 2022

On Security of TrustZone-M-Based IoT Systems.
IEEE Internet Things J., 2022

Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms.
Proceedings of the IEEE Military Communications Conference, 2022

A Web Infrastructure for Certifying Multimedia News Content for Fake News Defense.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

MAC-Layer Traffic Shaping Defense Against WiFi Device Fingerprinting Attacks.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

FUME: Fuzzing Message Queuing Telemetry Transport Brokers.
Proceedings of the IEEE INFOCOM 2022, 2022

Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System.
Proceedings of the IEEE Global Communications Conference, 2022

SeeShells: An Optimized Solution for Utilizing Shellbags in a Digital Forensic Investigation.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media Platforms.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

WiFi-based IoT Devices Profiling Attack based on Eavesdropping of Encrypted WiFi Traffic.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Integrating Cybersecurity Into a Big Data Ecosystem.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Hyperparameter Optimization and Comparison of Student Performance Prediction Algorithms.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
A Worm Detection System Based on Deep Learning.
IEEE Access, 2020

Performance Evaluation of TPC-C Benchmark on Various Cloud Providers.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies.
Proceedings of the 19th IEEE International Conference on Trust, 2020

SIC<sup>2</sup>: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

On Runtime Software Security of TrustZone-M Based IoT Devices.
Proceedings of the IEEE Global Communications Conference, 2020

Ambulance Dispatch via Deep Reinforcement Learning.
Proceedings of the SIGSPATIAL '20: 28th International Conference on Advances in Geographic Information Systems, 2020

2019
Improving Rider Safety Using QR Code & Fingerprint Biometrics.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory.
Proceedings of the Internet of Things. A Confluence of Many Disciplines, 2019

Using Disposable Domain Names to Detect Online Card Transaction Fraud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

New Secure Approach to Backup Cryptocurrency Wallets.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Deterministic Sub-Wallet for Cryptocurrencies.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
IoT Security: An End-to-End View and Case Study.
CoRR, 2018

Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients.
Comput. Secur., 2018

An evolutionary routing game for energy balance in Wireless Sensor Networks.
Comput. Networks, 2018

Secure Smart Card Signing with Time-based Digital Signature.
Proceedings of the 2018 International Conference on Computing, 2018

A Game Theoretic Approach to Model Cyber Attack and Defense Strategies.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
A Game Theoretic Approach for Energy-Efficient Clustering in Wireless Sensor Networks.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Circumvent traffic shaping using virtual wireless clients in IEEE 802.11 wireless local area network.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Invariant Diversity as a Proactive Fraud Detection Mechanism for Online Merchants.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Information Hiding in RGB Images Using an Improved Matrix Pattern Approach.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

D-miner: A framework for mining, searching, visualizing, and alerting on darknet events.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Towards trustworthy collaboration in spectrum sensing for ad hoc cognitive radio networks.
Wirel. Networks, 2016

Evolutionary non-cooperative spectrum sharing game: long-term coexistence for collocated cognitive radio networks.
Wirel. Commun. Mob. Comput., 2016

Pseudonym-based privacy-preserving scheme for data collection in smart grid.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Coexistence in heterogeneous spectrum through distributed correlated equilibrium in cognitive radio networks.
Comput. Networks, 2016

User-side Wi-Fi evil twin attack detection using random wireless channel monitoring.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Parallel active dictionary attack on IEEE 802.11 enterprise networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

ADP: An adaptive feedback approach for energy-efficient wireless sensor networks.
Proceedings of the 2016 International Conference on Computing, 2016

Using Credit/Debit Card Dynamic Soft Descriptor as Fraud Prevention System for Merchant.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

An Evolutionary Game for Efficient Routing in Wireless Sensor Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Analysis of Peer-to-Peer Botnet Attacks and Defenses.
Proceedings of the Propagation Phenomena in Real World Networks, 2015

Parallel active dictionary attack on WPA2-PSK Wi-Fi networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Redundancy control through traffic deduplication.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

SPS: An SMS-based push service for energy saving in smartphone's idle state.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Secur. Comput., 2014

Copyright protection in named data networking.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Inducing Cooperation for Optimal Coexistence in Cognitive Radio Networks: A Game Theoretic Approach.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Click-tracking blocker: Privacy preservation by disabling search engines' click-tracking.
Proceedings of the IEEE Global Communications Conference, 2014

An evolutionary game theoretic framework for coexistence in Cognitive Radio Networks.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

2013
Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support.
Secur. Commun. Networks, 2013

SMM rootkit: a new breed of OS independent malware.
Secur. Commun. Networks, 2013

Wi-Fi access denial of service attack to smartphones.
Int. J. Secur. Networks, 2013

Extension of internet access to VANET via satellite receive-only terminals.
Int. J. Ad Hoc Ubiquitous Comput., 2013

PMTR: Privacy-Enhancing Multilayer Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks under denial of service attack.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Denial of convenience attack to smartphones using a fake Wi-Fi access point.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

Transparent cross-layer solutions for throughput boost in Cognitive Radio Networks.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Optimal roadside units placement in urban areas for vehicular networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

nSwitching: Virtual Machine aware relay hardware switching to improve intra-NIC Virtual Machine traffic.
Proceedings of IEEE International Conference on Communications, 2012

Using Hybrid Artificial Bee Colony Algorithm to Extend Wireless Sensor Network Lifetime.
Proceedings of the 2012 Third International Conference on Innovations in Bio-Inspired Computing and Applications, 2012

Encrypted phrase searching in the cloud.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Harnessing the power of BitTorrent for distributed denial-of-service attacks.
Secur. Commun. Networks, 2011

iCAPTCHA: The Next Generation of CAPTCHA Designed to Defend against 3rd Party Human Attacks.
Proceedings of IEEE International Conference on Communications, 2011

Long-term reputation system for vehicular networking based on vehicle's daily commute routine.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Optimal roadside units placement along highways.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

One-way-linkable blind signature security architecture for VANET.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Peer-to-Peer Botnets.
Proceedings of the Handbook of Information and Communication Security, 2010

An Advanced Hybrid Peer-to-Peer Botnet.
IEEE Trans. Dependable Secur. Comput., 2010

Honeypot detection in advanced botnet attacks.
Int. J. Inf. Comput. Secur., 2010

Secure traffic data propagation in Vehicular Ad Hoc Networks.
Int. J. Ad Hoc Ubiquitous Comput., 2010

PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Scene tagging: image-based CAPTCHA using image composition and object relationships.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
A Systematic Study on Peer-to-Peer Botnets.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

A chipset level network backdoor: bypassing host-based firewall & IDS.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
SMM rootkits: a new breed of OS independent malware.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms.
IEEE Trans. Dependable Secur. Comput., 2007

Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Advanced Routing Worm and Its Security Challenges.
Simul., 2006

On the performance of Internet worm scanning strategies.
Perform. Evaluation, 2006

Adaptive Defense Against Various Network Attacks.
IEEE J. Sel. Areas Commun., 2006

Modeling Botnet Propagation Using Time Zones.
Proceedings of the Network and Distributed System Security Symposium, 2006

Honeypot-Aware Advanced Botnet Construction and Maintenance.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Improving software security via runtime instruction-level taint checking.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2005
The monitoring and early detection of internet worms.
IEEE/ACM Trans. Netw., 2005

Adaptive Defense Against Various Network Attacks.
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005

Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

2004
Email Worms Modeling and Defense.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2003
Worm propagation modeling and analysis under dynamic quarantine defense.
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003

Monitoring and early warning for internet worms.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Code red worm propagation modeling and analysis.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002


  Loading...