Jialong Zhang

Affiliations:
  • ByteDance AI Lab, Beijing, China
  • IBM Research, USA
  • Texas A&M University, SUCCESS Lab, College Station, TX, USA


According to our database1, Jialong Zhang authored at least 22 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

2019
Reaching Data Confidentiality and Model Accountability on the CalTrain.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Cross-Stack Threat Sensing for Cyber Security and Resilience.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Dressed up: Baiting Attackers through Endpoint Service Projection.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Attacking the Brain: Races in the SDN Control Plane.
Proceedings of the 26th USENIX Security Symposium, 2017

Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Systematic Mining of Associated Server Herds for Malware Campaign Discovery.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Characterizing Google Hacking: A First Large-Scale Quantitative Study.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA.
Proceedings of the Computer Security - ESORICS 2014, 2014

A taste of tweets: reverse engineering Twitter spammers.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

2012
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Automatic generation of vaccines for malware immunization.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...