关注
Zhibo Sun
Zhibo Sun
在 drexel.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on large language model (llm) security and privacy: The good, the bad, and the ugly
Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang
High-Confidence Computing, 100211, 2024
1182024
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021
912021
RTIDS: A robust transformer-based approach for intrusion detection system
Z Wu, H Zhang, P Wang, Z Sun
IEEE Access 10, 64375-64387, 2022
832022
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
442020
Towards automated threat intelligence fusion
A Modi, Z Sun, A Panwar, T Khairnar, Z Zhao, A Doupé, GJ Ahn, P Black
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
392016
Dart: A geographic information system on hadoop
H Zhang, Z Sun, Z Liu, C Xu, L Wang
2015 IEEE 8th International Conference on Cloud Computing, 90-97, 2015
332015
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
222019
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
182021
Migrating GIS big data computing from Hadoop to Spark: an exemplary study Using Twitter
Z Sun, H Zhang, Z Liu, C Xu, L Wang
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 351-358, 2016
142016
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
Effects on performance of analytical tools for visually demanding tasks through direct and indirect touch interaction in an immersive visualization
Z Sun, A Dhital, N Areejitkasem, N Pradhan, A Banic
2014 International Conference on Virtual Reality and Visualization, 186-193, 2014
52014
In the Light and in the Shadows: Human-Centered Analysis in Cybercrime
Z Sun
Arizona State University, 2022
22022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
T Bao, R Wang, Y Shoshitaishvili, A Doupé
系统目前无法执行此操作,请稍后再试。
文章 1–13