A first look at cellular machine-to-machine traffic: large scale measurement and characterization MZ Shafiq, L Ji, AX Liu, J Pang, J Wang ACM SIGMETRICS performance evaluation review 40 (1), 65-76, 2012 | 349 | 2012 |
Characterizing and modeling internet traffic dynamics of cellular devices MZ Shafiq, L Ji, AX Liu, J Wang ACM SIGMETRICS Performance Evaluation Review 39 (1), 265-276, 2011 | 293 | 2011 |
Pe-miner: Mining structural information to detect malicious executables in realtime MZ Shafiq, SM Tabish, F Mirza, M Farooq Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 281 | 2009 |
A large scale exploratory analysis of software vulnerability life cycles M Shahzad, MZ Shafiq, AX Liu 2012 34th International Conference on Software Engineering (ICSE), 771-781, 2012 | 261 | 2012 |
Malware detection using statistical analysis of byte-level file content SM Tabish, MZ Shafiq, M Farooq Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence …, 2009 | 241 | 2009 |
Using spatio-temporal information in API calls with machine learning algorithms for malware detection F Ahmed, H Hameed, MZ Shafiq, M Farooq Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence …, 2009 | 230 | 2009 |
Large-scale measurement and characterization of cellular machine-to-machine traffic MZ Shafiq, L Ji, AX Liu, J Pang, J Wang IEEE/ACM transactions on Networking 21 (6), 1960-1973, 2013 | 186 | 2013 |
A first look at cellular network performance during crowded events MZ Shafiq, L Ji, AX Liu, J Pang, S Venkataraman, J Wang ACM SIGMETRICS performance evaluation review 41 (1), 17-28, 2013 | 184 | 2013 |
A semantics aware approach to automated reverse engineering unknown protocols Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ... 2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012 | 177 | 2012 |
Understanding the impact of network dynamics on mobile video user engagement MZ Shafiq, J Erman, L Ji, AX Liu, J Pang, J Wang ACM SIGMETRICS Performance Evaluation Review 42 (1), 367-379, 2014 | 171 | 2014 |
Paying for likes? understanding facebook like fraud using honeypots E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014 | 169 | 2014 |
Embedded Malware Detection Using Markov n-Grams MZ Shafiq, SA Khayam, M Farooq International conference on detection of intrusions and malware, and …, 2008 | 152 | 2008 |
Adgraph: A graph-based approach to ad and tracker blocking U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq 2020 IEEE Symposium on security and privacy (SP), 763-776, 2020 | 147* | 2020 |
Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors U Iqbal, S Englehardt, Z Shafiq 2021 IEEE Symposium on Security and Privacy (SP), 1143-1161, 2021 | 142 | 2021 |
The ad wars: retrospective measurement and analysis of anti-adblock filter lists U Iqbal, Z Shafiq, Z Qian Proceedings of the 2017 Internet Measurement Conference, 171-183, 2017 | 128 | 2017 |
Real-time video quality of experience monitoring for https and quic MH Mazhar, Z Shafiq IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1331-1339, 2018 | 124 | 2018 |
Characterizing geospatial dynamics of application usage in a 3G cellular data network MZ Shafiq, L Ji, AX Liu, J Pang, J Wang 2012 Proceedings IEEE INFOCOM, 1341-1349, 2012 | 122 | 2012 |
Guidelines to select machine learning scheme for classification of biomedical datasets AK Tanwani, J Afridi, MZ Shafiq, M Farooq Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics …, 2009 | 114 | 2009 |
The rich and the poor: A Markov decision process approach to optimizing taxi driver revenue efficiency H Rong, X Zhou, C Yang, Z Shafiq, A Liu Proceedings of the 25th ACM international on conference on information and …, 2016 | 101 | 2016 |
Assessing accelerator-based HPC reverse time migration M Araya-Polo, J Cabezas, M Hanzich, M Pericas, F Rubio, I Gelado, ... IEEE Transactions on Parallel and Distributed Systems 22 (1), 147-162, 2010 | 94 | 2010 |