When HTTPS meets CDN: A case of authentication in delegated service J Liang, J Jiang, H Duan, K Li, T Wan, J Wu 2014 IEEE Symposium on Security and Privacy, 67-82, 2014 | 155 | 2014 |
How you get shot in the back: A systematical study about cryptojacking in the real world G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ... Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 147 | 2018 |
{Dependence-Preserving} data compaction for scalable forensic analysis MN Hossain, J Wang, O Weisse, R Sekar, D Genkin, B He, SD Stoller, ... 27th USENIX Security Symposium (USENIX Security 18), 1723-1740, 2018 | 125 | 2018 |
An end-to-end, large-scale measurement of dns-over-encryption: How far have we come? C Lu, B Liu, Z Li, S Hao, H Duan, M Zhang, C Leng, Y Liu, Z Zhang, J Wu Proceedings of the Internet Measurement Conference, 22-35, 2019 | 120 | 2019 |
An empirical reexamination of global DNS behavior H Gao, V Yegneswaran, Y Chen, P Porras, S Ghosh, J Jiang, H Duan Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 267-278, 2013 | 116 | 2013 |
Behavior-based malware analysis and detection W Liu, P Ren, K Liu, H Duan 2011 first international workshop on complexity and data mining, 39-42, 2011 | 104 | 2011 |
IntentFuzzer: detecting capability leaks of android applications K Yang, J Zhuge, Y Wang, L Zhou, H Duan Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 101 | 2014 |
Improved Electrical Properties of Low-Temperature Sintered Cu Doped BaCaZrTiO Ceramics. Y Zhang, H Sun, W Chen Journal of Electronic Materials 45 (10), 2016 | 94 | 2016 |
Dns cache poisoning attack reloaded: Revolutions with side channels K Man, Z Qian, Z Wang, X Zheng, Y Huang, H Duan Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 82 | 2020 |
校园网安全问题分析与对策 段海新 中国教育网络, 22-25, 2005 | 78 | 2005 |
Who is answering my queries: Understanding and characterizing interception of the {DNS} resolution path B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang 27th USENIX Security Symposium (USENIX Security 18), 1113-1128, 2018 | 73 | 2018 |
Cookies Lack Integrity:{Real-World} Implications X Zheng, J Jiang, J Liang, H Duan, S Chen, T Wan, N Weaver 24th USENIX Security Symposium (USENIX Security 15), 707-721, 2015 | 65 | 2015 |
Don't let one rotten apple spoil the whole barrel: Towards automated detection of shadowed domains D Liu, Z Li, K Du, H Wang, B Liu, H Duan Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 64 | 2017 |
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly. B Liu, C Lu, Z Li, Y Liu, HX Duan, S Hao, Z Zhang DSN, 654-665, 2018 | 63 | 2018 |
Hold-on: Protecting against on-path DNS poisoning H Duan, N Weaver, Z Zhao, M Hu, J Liang, J Jiang, K Li, V Paxson Proc. Workshop on Securing and Trusting Internet Names, SATIN, 2012 | 59 | 2012 |
僵尸网络机理与防御技术 江健, 诸葛建伟, 段海新, 吴建平 软件学报 23 (1), 82-96, 2012 | 56 | 2012 |
Efficient performance estimate for one-class support vector machine QA Tran, X Li, H Duan Pattern Recognition Letters 26 (8), 1174-1182, 2005 | 56 | 2005 |
One-class support vector machine for anomaly network traffic detection QA Tran, H Duan, X Li China Education and Research Network (CERNET), Tsinghua University, Main …, 2004 | 56 | 2004 |
Can voters detect malicious manipulation of ballot marking devices? M Bernhard, A McDonald, H Meng, J Hwa, N Bajaj, K Chang, ... 2020 IEEE Symposium on Security and Privacy (SP), 679-694, 2020 | 54* | 2020 |
How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy H Yang, X Ma, K Du, Z Li, H Duan, X Su, G Liu, Z Geng, J Wu IEEE Symposium on Security and Privacy, 2017 | 54 | 2017 |