Accurate online power estimation and automatic battery behavior based power model generation for smartphones L Zhang, B Tiwana, Z Qian, Z Wang, RP Dick, ZM Mao, L Yang Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware …, 2010 | 1587 | 2010 |
An untold story of middleboxes in cellular networks Z Wang, Z Qian, Q Xu, Z Mao, M Zhang ACM SIGCOMM Computer Communication Review 41 (4), 374-385, 2011 | 306 | 2011 |
Peeking into your app without actually seeing it:{UI} state inference and novel android attacks QA Chen, Z Qian, ZM Mao 23rd USENIX Security Symposium (USENIX Security 14), 1037-1052, 2014 | 272 | 2014 |
Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users S Rosen, Z Qian, ZM Mao Proceedings of the third ACM conference on Data and application security and …, 2013 | 191 | 2013 |
Rendered insecure: Gpu side channel attacks are practical H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 190 | 2018 |
IotSan: Fortifying the safety of IoT systems DT Nguyen, C Song, Z Qian, SV Krishnamurthy, EJM Colbert, P McDaniel Proceedings of the 14th International Conference on emerging Networking …, 2018 | 169 | 2018 |
How you get shot in the back: A systematical study about cryptojacking in the real world G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ... Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 147 | 2018 |
Adgraph: A graph-based approach to ad and tracker blocking U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq 2020 IEEE Symposium on security and privacy (SP), 763-776, 2020 | 146* | 2020 |
The ad wars: retrospective measurement and analysis of anti-adblock filter lists U Iqbal, Z Shafiq, Z Qian Proceedings of the 2017 Internet Measurement Conference, 171-183, 2017 | 128 | 2017 |
Off-path TCP sequence number inference attack-how firewall middleboxes reduce security Z Qian, ZM Mao 2012 IEEE Symposium on Security and Privacy, 347-361, 2012 | 125 | 2012 |
Accurate and efficient wireless device fingerprinting using channel state information J Hua, H Sun, Z Shen, Z Qian, S Zhong IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1700-1708, 2018 | 110 | 2018 |
Collaborative TCP sequence number inference attack: how to crack sequence number under a second Z Qian, ZM Mao, Y Xie Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 107 | 2012 |
Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting. K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian, W Lee, G Jiang NDSS, 2015 | 104 | 2015 |
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework. Y Shao, QA Chen, ZM Mao, J Ott, Z Qian NDSS, 2016 | 100 | 2016 |
Charm: Facilitating dynamic analysis of device drivers of mobile systems SMS Talebi, H Tavakoli, H Zhang, Z Zhang, AA Sani, Z Qian 27th USENIX Security Symposium (USENIX Security 18), 291-307, 2018 | 97 | 2018 |
Android root and its providers: A double-edged sword H Zhang, D She, Z Qian Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 88 | 2015 |
On Network-level Clusters for Spam Detection. Z Qian, ZM Mao, Y Xie, F Yu NDSS, 2010 | 86 | 2010 |
Dns cache poisoning attack reloaded: Revolutions with side channels K Man, Z Qian, Z Wang, X Zheng, Y Huang, H Duan Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 83 | 2020 |
Precise and accurate patch presence test for binaries H Zhang, Z Qian 27th USENIX Security Symposium (USENIX Security 18), 887-902, 2018 | 83 | 2018 |
Your state is not mine: A closer look at evading stateful internet censorship Z Wang, Y Cao, Z Qian, C Song, SV Krishnamurthy Proceedings of the 2017 Internet Measurement Conference, 114-127, 2017 | 83 | 2017 |