According to our database1, Shengzhi Zhang authored at least 26 papers between 2007 and 2018.
Legend:Book In proceedings Article PhD thesis Other
A Security Model for Dependable Vehicle Middleware and Mobile Applications Connection.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Towards comprehensive protection for OpenFlow controllers.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
A Dual-Linear Kalman Filter for Real-Time Orientation Determination System Using Low-Cost MEMS Sensors.
Towards service continuity for transactional applications via diverse device drivers.
Classifying Android Malware with Dynamic Behavior Dependency Graphs.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors.
Proceedings of the Advances in Information and Computer Security, 2016
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Quaternion-Based Unscented Kalman Filter for Accurate Indoor Heading Estimation Using Wearable Multi-Sensor System.
A Study of Network Domains Used in Android Applications.
Proceedings of the Network and System Security - 9th International Conference, 2015
Comprehensive Analysis of the Android Google Play's Auto-update Policy.
Proceedings of the Information Security Practice and Experience, 2015
Machine Learning Based Cross-Site Scripting Detection in Online Social Network.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Defending return-oriented programming based on virtualization techniques.
Security and Communication Networks, 2013
Towards transparent and distributed workload management for large scale web servers.
Future Generation Comp. Syst., 2013
Hidden node collision recovery protocol for low rate wireless personal area networks.
Wireless Communications and Mobile Computing, 2012
Assessing the Trustworthiness of Drivers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Letting applications operate through attacks launched from compromised drivers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems.
IEEE Trans. Information Forensics and Security, 2011
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
LeakProber: a framework for profiling sensitive data leakage paths.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Distributed workload and response time management for web applications.
Proceedings of the 7th International Conference on Network and Service Management, 2011
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Using virtual machines to do cross-layer damage assessment.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
Fast Recovery from Hidden Node Collision for IEEE 802.15.4 LR-WPANs.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007