Jialong Zhang
Affiliations:- ByteDance AI Lab, Beijing, China
- IBM Research, USA
- Texas A&M University, SUCCESS Lab, College Station, TX, USA
According to our database1,
Jialong Zhang
authored at least 22 papers
between 2012 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
On csauthors.net:
Bibliography
2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
2012
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012