A survey on large language model (llm) security and privacy: The good, the bad, and the ugly Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang High-Confidence Computing, 100211, 2024 | 118 | 2024 |
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ... 2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021 | 91 | 2021 |
RTIDS: A robust transformer-based approach for intrusion detection system Z Wu, H Zhang, P Wang, Z Sun IEEE Access 10, 64375-64387, 2022 | 83 | 2022 |
Scam pandemic: How attackers exploit public fear through phishing M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ... 2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020 | 44 | 2020 |
Towards automated threat intelligence fusion A Modi, Z Sun, A Panwar, T Khairnar, Z Zhao, A Doupé, GJ Ahn, P Black 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 39 | 2016 |
Dart: A geographic information system on hadoop H Zhang, Z Sun, Z Liu, C Xu, L Wang 2015 IEEE 8th International Conference on Cloud Computing, 90-97, 2015 | 33 | 2015 |
Understanding and predicting private interactions in underground forums Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 22 | 2019 |
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ... 30th {USENIX} Security Symposium ({USENIX} Security 21), 2021 | 18 | 2021 |
Migrating GIS big data computing from Hadoop to Spark: an exemplary study Using Twitter Z Sun, H Zhang, Z Liu, C Xu, L Wang 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 351-358, 2016 | 14 | 2016 |
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 10 | 2022 |
Effects on performance of analytical tools for visually demanding tasks through direct and indirect touch interaction in an immersive visualization Z Sun, A Dhital, N Areejitkasem, N Pradhan, A Banic 2014 International Conference on Virtual Reality and Visualization, 186-193, 2014 | 5 | 2014 |
In the Light and in the Shadows: Human-Centered Analysis in Cybercrime Z Sun Arizona State University, 2022 | 2 | 2022 |
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing T Bao, R Wang, Y Shoshitaishvili, A Doupé | | |