Jia Zhang

Orcid: 0000-0001-7896-3382

Affiliations:
  • Tsinghua University, Beijing National Research Center for Information Science and Technology, Department of Computer Science and Technology, China


According to our database1, Jia Zhang authored at least 20 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
CoRR, 2023

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Stolen Risks of Models with Security Properties.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Encrypted Malware Traffic Detection via Graph-based Network Analysis.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G.
Proceedings of the IEEE Global Communications Conference, 2021

Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
CDN Judo: Breaking the CDN DoS Protection with Itself.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

CDN Backfired: Amplification Attacks Based on HTTP Range Requests.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Finding the best answer: measuring the optimization of public and authoritative DNS.
Sci. China Inf. Sci., 2019

2018
Measuring Privacy Threats in China-Wide Mobile Networks.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Analysis and Measurement of Zone Dependency in the Domain Name System.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2011
Anonymity analysis of P2P anonymous communication systems.
Comput. Commun., 2011

2010
Analysis of Anonymity in P2P Anonymous Communication Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network.
IEICE Trans. Commun., 2009

2008
AMCAS: An Automatic Malicious Code Analysis System.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008


  Loading...