Остановите войну!
for scientists:
default search action
Ziming Zhao 0001
- > Home > Persons > Ziming Zhao 0001
Publications
- 2024
- [i8]Keyan Guo, Alexander Hu, Jaden Mu, Ziheng Shi, Ziming Zhao, Nishant Vishwamitra, Hongxin Hu:
An Investigation of Large Language Models for Real-World Hate Speech Detection. CoRR abs/2401.03346 (2024) - [i7]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. CoRR abs/2401.15289 (2024) - [i6]Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu:
Moderating Illicit Online Image Promotion for Unsafe User-Generated Content Games Using Large Vision-Language Models. CoRR abs/2403.18957 (2024) - 2023
- [c63]Nishant Vishwamitra, Keyan Guo, Song Liao, Jaden Mu, Zheyuan Ma, Long Cheng, Ziming Zhao, Hongxin Hu:
Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter. ASONAM 2023: 103-107 - [c61]Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang, Hongxin Hu, Ziming Zhao:
Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense. DAC 2023: 1-6 - [c60]Keyan Guo, Alexander Hu, Jaden Mu, Ziheng Shi, Ziming Zhao, Nishant Vishwamitra, Hongxin Hu:
An Investigation of Large Language Models for Real-World Hate Speech Detection. ICMLA 2023: 1568-1573 - [c59]Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu:
xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses. USENIX Security Symposium 2023: 4337-4354 - [i5]Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. CoRR abs/2312.15099 (2023) - 2022
- [c58]Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao:
Understanding and Detecting Remote Infection on Linux-based IoT Devices. AsiaCCS 2022: 873-887 - [c56]Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. CODASPY 2022: 65-76 - 2021
- [i2]Nishant Vishwamitra, Hongxin Hu, Ziming Zhao, Long Cheng, Feng Luo:
Understanding and Measuring Robustness of Multimodal Learning. CoRR abs/2112.12792 (2021) - 2019
- [j11]Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. Comput. Secur. 87 (2019) - 2017
- [c25]Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
On the Safety and Efficiency of Virtual Firewall Elasticity Control. NDSS 2017 - [c24]Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. SACMAT 2017: 129-131 - 2016
- [j5]Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Thomas J. Holt, Yiming Jing, Hongxin Hu:
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces. IEEE Secur. Priv. 14(3): 32-43 (2016) - [j4]Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, Ziming Zhao:
TripleMon: A multi-layer security framework for mediating inter-process communication on Android. J. Comput. Secur. 24(4): 405-426 (2016) - [c16]Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng:
State-aware Network Access Management for Software-Defined Networks. SACMAT 2016: 1-11 - 2015
- [j3]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
Towards Automated Risk Assessment and Mitigation of Mobile Applications. IEEE Trans. Dependable Secur. Comput. 12(5): 571-584 (2015) - [j2]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. ACM Trans. Inf. Syst. Secur. 17(4): 14:1-14:37 (2015) - 2014
- [c12]Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Morpheus: automatically generating heuristics to detect Android emulators. ACSAC 2014: 216-225 - [c11]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
RiskMon: continuous and automated risk assessment of mobile applications. CODASPY 2014: 99-110 - [c10]Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao:
Towards a Reliable SDN Firewall. ONS 2014 - [c9]Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang:
Game theoretic analysis of multiparty access control in online social networks. SACMAT 2014: 93-102 - [c8]Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, Ziming Zhao:
FLOWGUARD: building robust firewalls for software-defined networks. HotSDN 2014: 97-102 - 2013
- [c6]Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu:
On the Security of Picture Gesture Authentication. USENIX Security Symposium 2013: 383-398 - 2012
- [j1]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Mitigation for MANET Routing Attacks. IEEE Trans. Dependable Secur. Comput. 9(2): 250-260 (2012) - [c5]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi:
SocialImpact: Systematic Analysis of Underground Social Dynamics. ESORICS 2012: 877-894 - 2011
- [c4]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Examining Social Dynamics for Countering Botnet Attacks. GLOBECOM 2011: 1-5 - [c3]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Automatic Extraction of Secrets from Malware. WCRE 2011: 159-168 - 2010
- [c2]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Response for Mitigating MANET Routing Attacks. GLOBECOM 2010: 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint