Shengzhi Zhang

According to our database1, Shengzhi Zhang authored at least 26 papers between 2007 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 





A Security Model for Dependable Vehicle Middleware and Mobile Applications Connection.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Towards comprehensive protection for OpenFlow controllers.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

A Dual-Linear Kalman Filter for Real-Time Orientation Determination System Using Low-Cost MEMS Sensors.
Sensors, 2016

Towards service continuity for transactional applications via diverse device drivers.
IJICS, 2016

Classifying Android Malware with Dynamic Behavior Dependency Graphs.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors.
Proceedings of the Advances in Information and Computer Security, 2016

A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Quaternion-Based Unscented Kalman Filter for Accurate Indoor Heading Estimation Using Wearable Multi-Sensor System.
Sensors, 2015

A Study of Network Domains Used in Android Applications.
Proceedings of the Network and System Security - 9th International Conference, 2015

Comprehensive Analysis of the Android Google Play's Auto-update Policy.
Proceedings of the Information Security Practice and Experience, 2015

Machine Learning Based Cross-Site Scripting Detection in Online Social Network.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Defending return-oriented programming based on virtualization techniques.
Security and Communication Networks, 2013

Towards transparent and distributed workload management for large scale web servers.
Future Generation Comp. Syst., 2013

Hidden node collision recovery protocol for low rate wireless personal area networks.
Wireless Communications and Mobile Computing, 2012

Assessing the Trustworthiness of Drivers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Letting applications operate through attacks launched from compromised drivers.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

PEDA: Comprehensive Damage Assessment for Production Environment Server Systems.
IEEE Trans. Information Forensics and Security, 2011

HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

LeakProber: a framework for profiling sensitive data leakage paths.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Distributed workload and response time management for web applications.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cross-layer comprehensive intrusion harm analysis for production workload server systems.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Using virtual machines to do cross-layer damage assessment.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

Fast Recovery from Hidden Node Collision for IEEE 802.15.4 LR-WPANs.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007