Login / Signup
Zhou Li
ORCID
Publication Activity (10 Years)
Years Active: 2007-2024
Publications (10 Years): 75
Top Topics
Chinese Texts
Neural Network
Automatic Discovery
Smart Home
Top Venues
CoRR
USENIX Security Symposium
IEEE Symposium on Security and Privacy
ACSAC
</>
Publications
</>
Qifan Zhang
,
Xuesong Bai
,
Xiang Li
,
Haixin Duan
,
Qi Li
,
Zhou Li
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
USENIX Security Symposium
(2024)
Jiacen Xu
,
Jack W. Stokes
,
Geoff McDonald
,
Xuesong Bai
,
David Marshall
,
Siyue Wang
,
Adith Swaminathan
,
Zhou Li
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks.
CoRR
(2024)
Margarita Geleta
,
Jiacen Xu
,
Manikanta Loya
,
Junlin Wang
,
Sameer Singh
,
Zhou Li
,
Sergio Gago Masagué
Maestro: A Gamified Platform for Teaching AI Robustness.
CoRR
(2023)
Fan Yang
,
Jiacen Xu
,
Chunlin Xiong
,
Zhou Li
,
Kehuan Zhang
PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding.
USENIX Security Symposium
(2023)
Zhe Zhou
,
Yanxiang Bi
,
Junpeng Wan
,
Yangfan Zhou
,
Zhou Li
Userspace Bypass: Accelerating Syscall-intensive Applications.
OSDI
(2023)
Mingxuan Liu
,
Zihan Zhang
,
Yiming Zhang
,
Chao Zhang
,
Zhou Li
,
Qi Li
,
Haixin Duan
,
Donghong Sun
Automatic Generation of Adversarial Readable Chinese Texts.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Xiaoliang Wang
,
Guangsheng Zhou
,
Xiaomin Lv
,
Zhou Li
,
Mingcheng Hu
,
Xiaohui He
,
Zhihui Tian
Comparison of Lake Extraction and Classification Methods for the Tibetan Plateau Based on Topographic-Spectral Information.
Remote. Sens.
15 (1) (2023)
Jiacen Xu
,
Zhe Zhou
,
Boyuan Feng
,
Yufei Ding
,
Zhou Li
On Adversarial Robustness of Point Cloud Semantic Segmentation.
DSN
(2023)
Margarita Geleta
,
Jiacen Xu
,
Manikanta Loya
,
Junlin Wang
,
Sameer Singh
,
Zhou Li
,
Sergio Gago Masagué
Maestro: A Gamified Platform for Teaching AI Robustness.
AAAI
(2023)
Mingcheng Hu
,
Guangsheng Zhou
,
Xiaomin Lv
,
Zhou Li
,
Xiaoliang Wang
,
Xiaohui He
,
Zhihui Tian
Warming Has Accelerated the Melting of Glaciers on the Tibetan Plateau, but the Debris-Covered Glaciers Are Rapidly Expanding.
Remote. Sens.
15 (1) (2023)
Margarita Geleta
,
Jiacen Xu
,
Manikanta Loya
,
Junlin Wang
,
Sameer Singh
,
Zhou Li
,
Sergio Gago Masagué
Design Factors of Maestro: A Serious Game for Robust AI Education.
SIGCSE (2)
(2023)
Xiang Li
,
Baojun Liu
,
Xuesong Bai
,
Mingming Zhang
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
NDSS
(2023)
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
The Maginot Line: Attacking the Boundary of DNS Caching Protection.
USENIX Security Symposium
(2023)
Junpeng Wan
,
Yanxiang Bi
,
Zhe Zhou
,
Zhou Li
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh.
IEEE Symposium on Security and Privacy
(2022)
Qifan Zhang
,
Junjie Shen
,
Mingtian Tan
,
Zhe Zhou
,
Zhou Li
,
Qi Alfred Chen
,
Haipeng Zhang
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
ACSAC
(2022)
Deliang Chang
,
Joann Qiongna Chen
,
Zhou Li
,
Xing Li
Hide and Seek: Revisiting DNS-based User Tracking.
EuroS&P
(2022)
Rui Li
,
Wenrui Diao
,
Zhou Li
,
Shishuai Yang
,
Shuang Li
,
Shanqing Guo
Android Custom Permissions Demystified: A Comprehensive Security Evaluation.
IEEE Trans. Software Eng.
48 (11) (2022)
Mingcheng Hu
,
Guangsheng Zhou
,
Xiaomin Lv
,
Zhou Li
,
Xiaohui He
,
Zhihui Tian
A New Automatic Extraction Method for Glaciers on the Tibetan Plateau under Clouds, Shadows and Snow Cover.
Remote. Sens.
14 (13) (2022)
Xianran Liao
,
Jiacen Xu
,
Qifan Zhang
,
Zhou Li
A Comprehensive Study of DNS Operational Issues by Mining DNS Forums.
IEEE Access
10 (2022)
Rebekah Houser
,
Shuai Hao
,
Zhou Li
,
Daiping Liu
,
Chase Cotton
,
Haining Wang
A Comprehensive Measurement-based Investigation of DNS Hijacking.
SRDS
(2021)
Junpeng Wan
,
Yanxiang Bi
,
Zhe Zhou
,
Zhou Li
Volcano: Stateless Cache Side-channel Attack by Exploiting Mesh Interconnect.
CoRR
(2021)
Behnam Pourghassemi
,
Jordan Bonecutter
,
Zhou Li
,
Aparna Chandramowlishwaran
adPerf: Characterizing the Performance of Third-party Ads.
Proc. ACM Meas. Anal. Comput. Syst.
5 (1) (2021)
Fenghao Xu
,
Siyu Shen
,
Wenrui Diao
,
Zhou Li
,
Yi Chen
,
Rui Li
,
Kehuan Zhang
Android on PC: On the Security of End-user Android Emulators.
CCS
(2021)
Behnam Pourghassemi
,
Jordan Bonecutter
,
Zhou Li
,
Aparna Chandramowlishwaran
adPerf: Characterizing the Performance of Third-party Ads.
SIGMETRICS (Abstracts)
(2021)
Yicheng Zhang
,
Rozhin Yasaei
,
Hao Chen
,
Zhou Li
,
Mohammad Abdullah Al Faruque
Stealing Neural Network Structure through Remote FPGA Side-channel Analysis.
FPGA
(2021)
Mingtian Tan
,
Junpeng Wan
,
Zhe Zhou
,
Zhou Li
Invisible Probe: Timing Attacks with PCIe Congestion Side-channel.
IEEE Symposium on Security and Privacy
(2021)
Tianhao Wang
,
Joann Qiongna Chen
,
Zhikun Zhang
,
Dong Su
,
Yueqiang Cheng
,
Zhou Li
,
Ninghui Li
,
Somesh Jha
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
CCS
(2021)
Mingtian Tan
,
Zhe Zhou
,
Zhou Li
The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery.
ACSAC
(2021)
Chaoyi Lu
,
Baojun Liu
,
Yiming Zhang
,
Zhou Li
,
Fenglu Zhang
,
Haixin Duan
,
Ying Liu
,
Joann Qiongna Chen
,
Jinjin Liang
,
Zaifeng Zhang
,
Shuang Hao
,
Min Yang
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
NDSS
(2021)
Peng Fei
,
Zhou Li
,
Zhiying Wang
,
Xiao Yu
,
Ding Li
,
Kangkook Jee
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
USENIX Security Symposium
(2021)
Mingxuan Liu
,
Yiming Zhang
,
Baojun Liu
,
Zhou Li
,
Haixin Duan
,
Donghong Sun
Detecting and Characterizing SMS Spearphishing Attacks.
ACSAC
(2021)
Yicheng Zhang
,
Rozhin Yasaei
,
Hao Chen
,
Zhou Li
,
Mohammad Abdullah Al Faruque
Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Rui Li
,
Wenrui Diao
,
Zhou Li
,
Jianqi Du
,
Shanqing Guo
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
IEEE Symposium on Security and Privacy
(2021)
Deliang Chang
,
Shanshan Hao
,
Zhou Li
,
Baojun Liu
,
Xing Li
DNSWeight: Quantifying Country-Wise Importance of Domain Name System.
IEEE Access
9 (2021)
Yiming Zhang
,
Baojun Liu
,
Chaoyi Lu
,
Zhou Li
,
Haixin Duan
,
Jiachen Li
,
Zaifeng Zhang
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
CCS
(2021)
Shuaike Dong
,
Zhou Li
,
Di Tang
,
Jiongyi Chen
,
Menghan Sun
,
Kehuan Zhang
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
AsiaCCS
(2020)
Kun Du
,
Hao Yang
,
Yubao Zhang
,
Haixin Duan
,
Haining Wang
,
Shuang Hao
,
Zhou Li
,
Min Yang
Understanding Promotion-as-a-Service on GitHub.
ACSAC
(2020)
Qing Huang
,
Deliang Chang
,
Zhou Li
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.
FOCI @ USENIX Security Symposium
(2020)
Yiming Zhang
,
Baojun Liu
,
Chaoyi Lu
,
Zhou Li
,
Haixin Duan
,
Shuang Hao
,
Mingxuan Liu
,
Ying Liu
,
Dong Wang
,
Qiang Li
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
CCS
(2020)
Tianhao Wang
,
Joann Qiongna Chen
,
Zhikun Zhang
,
Dong Su
,
Yueqiang Cheng
,
Zhou Li
,
Ninghui Li
,
Somesh Jha
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
CoRR
(2020)
Behnam Pourghassemi
,
Jordan Bonecutter
,
Zhou Li
,
Aparna Chandramowlishwaran
adPerf: Characterizing the Performance of Third-party Ads.
CoRR
(2020)
Junyi Wei
,
Yicheng Zhang
,
Zhe Zhou
,
Zhou Li
,
Mohammad Abdullah Al Faruque
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel.
DSN
(2020)
Zihan Zhang
,
Mingxuan Liu
,
Chao Zhang
,
Yiming Zhang
,
Zhou Li
,
Qi Li
,
Haixin Duan
,
Donghong Sun
Argot: Generating Adversarial Readable Chinese Texts.
IJCAI
(2020)
Hao Yang
,
Kun Du
,
Yubao Zhang
,
Shuang Hao
,
Zhou Li
,
Mingxuan Liu
,
Haining Wang
,
Hai-Xin Duan
,
Yazhou Shi
,
XiaoDong Su
,
Guang Liu
,
Zhifeng Geng
,
Jianping Wu
Casino royale: a deep exploration of illegal online gambling.
ACSAC
(2019)
Rebekah Houser
,
Zhou Li
,
Chase Cotton
,
Haining Wang
An investigation on information leakage of DNS over TLS.
CoNEXT
(2019)
Wenrui Diao
,
Yue Zhang
,
Li Zhang
,
Zhou Li
,
Fenghao Xu
,
Xiaorui Pan
,
Xiangyu Liu
,
Jian Weng
,
Kehuan Zhang
,
XiaoFeng Wang
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android.
RAID
(2019)
Kun Du
,
Hao Yang
,
Zhou Li
,
Hai-Xin Duan
,
Shuang Hao
,
Baojun Liu
,
Yuxiao Ye
,
Mingxuan Liu
,
XiaoDong Su
,
Guang Liu
,
Zhifeng Geng
,
Zaifeng Zhang
,
Jinjin Liang
TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams.
SecureComm (2)
(2019)
Fenghao Xu
,
Wenrui Diao
,
Zhou Li
,
Jiongyi Chen
,
Kehuan Zhang
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
NDSS
(2019)
Baojun Liu
,
Zhou Li
,
Peiyuan Zong
,
Chaoyi Lu
,
Hai-Xin Duan
,
Ying Liu
,
Sumayah A. Alrwais
,
XiaoFeng Wang
,
Shuang Hao
,
Yaoqi Jia
,
Yiming Zhang
,
Kai Chen
,
Zaifeng Zhang
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
EuroS&P
(2019)
Baojun Liu
,
Chaoyi Lu
,
Hai-Xin Duan
,
Ying Liu
,
Zhou Li
,
Shuang Hao
,
Min Yang
Who is answering my queries: understanding and characterizing interception of the DNS resolution path.
ANRW
(2019)
Shuaike Dong
,
Zhou Li
,
Di Tang
,
Jiongyi Chen
,
Menghan Sun
,
Kehuan Zhang
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.
CoRR
(2019)
Xianghang Mi
,
Xuan Feng
,
Xiaojing Liao
,
Baojun Liu
,
XiaoFeng Wang
,
Feng Qian
,
Zhou Li
,
Sumayah A. Alrwais
,
Limin Sun
,
Ying Liu
Resident Evil: Understanding Residential IP Proxy as a Dark Service.
IEEE Symposium on Security and Privacy
(2019)
Chaoyi Lu
,
Baojun Liu
,
Zhou Li
,
Shuang Hao
,
Hai-Xin Duan
,
Mingming Zhang
,
Chunying Leng
,
Ying Liu
,
Zaifeng Zhang
,
Jianping Wu
An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
Internet Measurement Conference
(2019)
Zhe Zhou
,
Di Tang
,
Wenhao Wang
,
Xiaofeng Wang
,
Zhou Li
,
Kehuan Zhang
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
ACSAC
(2018)
Ke Tian
,
Zhou Li
,
Kevin D. Bowers
,
Danfeng (Daphne) Yao
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale.
SecureComm (2)
(2018)
Baojun Liu
,
Chaoyi Lu
,
Hai-Xin Duan
,
Ying Liu
,
Zhou Li
,
Shuang Hao
,
Min Yang
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
USENIX Security Symposium
(2018)
Baojun Liu
,
Chaoyi Lu
,
Zhou Li
,
Ying Liu
,
Hai-Xin Duan
,
Shuang Hao
,
Zaifeng Zhang
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
DSN
(2018)
Alina Oprea
,
Zhou Li
,
Robin Norris
,
Kevin D. Bowers
MADE: Security Analytics for Enterprise Threat Detection.
ACSAC
(2018)
Shuaike Dong
,
Menghao Li
,
Wenrui Diao
,
Xiangyu Liu
,
Jian Liu
,
Zhou Li
,
Fenghao Xu
,
Kai Chen
,
Xiaofeng Wang
,
Kehuan Zhang
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
SecureComm (1)
(2018)
Wenrui Diao
,
Rui Liu
,
Xiangyu Liu
,
Zhe Zhou
,
Zhou Li
,
Kehuan Zhang
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur.
26 (3) (2018)
Shuaike Dong
,
Menghao Li
,
Wenrui Diao
,
Xiangyu Liu
,
Jian Liu
,
Zhou Li
,
Fenghao Xu
,
Kai Chen
,
Xiaofeng Wang
,
Kehuan Zhang
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
CoRR
(2018)
Zhe Zhou
,
Zhou Li
,
Kehuan Zhang
All Your VMs are Disconnected: Attacking Hardware Virtualized Network.
CODASPY
(2017)
Zhe Zhou
,
Wenrui Diao
,
Xiangyu Liu
,
Zhou Li
,
Kehuan Zhang
,
Rui Liu
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU.
Proc. Priv. Enhancing Technol.
2017 (2) (2017)
Ahmet Salih Buyukkayhan
,
Alina Oprea
,
Zhou Li
,
William K. Robertson
Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis.
RAID
(2017)
Xiaolong Bai
,
Zhe Zhou
,
XiaoFeng Wang
,
Zhou Li
,
Xianghang Mi
,
Nan Zhang
,
Tongxin Li
,
Shi-Min Hu
,
Kehuan Zhang
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
USENIX Security Symposium
(2017)
Daiping Liu
,
Zhou Li
,
Kun Du
,
Haining Wang
,
Baojun Liu
,
Hai-Xin Duan
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
CCS
(2017)
Hao Yang
,
Xiulin Ma
,
Kun Du
,
Zhou Li
,
Hai-Xin Duan
,
XiaoDong Su
,
Guang Liu
,
Zhifeng Geng
,
Jianping Wu
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy.
IEEE Symposium on Security and Privacy
(2017)
Zhe Zhou
,
Wenrui Diao
,
Xiangyu Liu
,
Zhou Li
,
Kehuan Zhang
,
Rui Liu
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU.
CoRR
(2016)
Wenrui Diao
,
Xiangyu Liu
,
Zhou Li
,
Kehuan Zhang
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis.
IEEE Symposium on Security and Privacy
(2016)
Zhou Li
,
Alina Oprea
Operational Security Log Analytics for Enterprise Breach Detection.
SecDev
(2016)
Kun Du
,
Hao Yang
,
Zhou Li
,
Hai-Xin Duan
,
Kehuan Zhang
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO.
USENIX Security Symposium
(2016)
Wei Liu
,
Yueqian Zhang
,
Zhou Li
,
Hai-Xin Duan
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps.
SPSM@CCS
(2016)
Xiaojing Liao
,
Kan Yuan
,
XiaoFeng Wang
,
Zhou Li
,
Luyi Xing
,
Raheem A. Beyah
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
CCS
(2016)
Sumayah A. Alrwais
,
Kan Yuan
,
Eihal Alowaisheq
,
Xiaojing Liao
,
Alina Oprea
,
XiaoFeng Wang
,
Zhou Li
Catching predators at watering holes: finding and understanding strategically compromised websites.
ACSAC
(2016)
Wenrui Diao
,
Xiangyu Liu
,
Zhou Li
,
Kehuan Zhang
Evading Android Runtime Analysis Through Detecting Programmed Interactions.
WISEC
(2016)
Xiangyu Liu
,
Zhe Zhou
,
Wenrui Diao
,
Zhou Li
,
Kehuan Zhang
An Empirical Study on Android for Saving Non-shared Data on Public Storage.
SEC
(2015)
Xiangyu Liu
,
Zhe Zhou
,
Wenrui Diao
,
Zhou Li
,
Kehuan Zhang
When Good Becomes Evil: Keystroke Inference with Smartwatch.
CCS
(2015)
Wenrui Diao
,
Xiangyu Liu
,
Zhe Zhou
,
Kehuan Zhang
,
Zhou Li
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections.
ESORICS (2)
(2015)
Alina Oprea
,
Zhou Li
,
Ting-Fang Yen
,
Sang H. Chin
,
Sumayah A. Alrwais
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
DSN
(2015)
Mohammad Taha Khan
,
Xiang Huo
,
Zhou Li
,
Chris Kanich
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting.
IEEE Symposium on Security and Privacy
(2015)
Xiangyu Liu
,
Wenrui Diao
,
Zhe Zhou
,
Zhou Li
,
Kehuan Zhang
Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR
(2014)
Sumayah A. Alrwais
,
Kan Yuan
,
Eihal Alowaisheq
,
Zhou Li
,
XiaoFeng Wang
Understanding the Dark Side of Domain Parking.
USENIX Security Symposium
(2014)
Fan Zhang
,
Wenbo He
,
Yangyi Chen
,
Zhou Li
,
XiaoFeng Wang
,
Shuo Chen
,
Xue Liu
Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing.
IEEE Trans. Wirel. Commun.
13 (1) (2014)
Alina Oprea
,
Zhou Li
,
Ting-Fang Yen
,
Sang H. Chin
,
Sumayah A. Alrwais
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
CoRR
(2014)
Zhou Li
,
Sumayah A. Alrwais
,
XiaoFeng Wang
,
Eihal Alowaisheq
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections.
IEEE Symposium on Security and Privacy
(2014)
Zhou Li
,
Sumayah A. Alrwais
,
Yinglian Xie
,
Fang Yu
,
XiaoFeng Wang
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.
IEEE Symposium on Security and Privacy
(2013)
Zhou Li
,
Kehuan Zhang
,
Yinglian Xie
,
Fang Yu
,
XiaoFeng Wang
Knowing your enemy: understanding and detecting malicious web advertising.
CCS
(2012)
Zhou Li
,
XiaoFeng Wang
FIRM: capability-based inline mediation of Flash behaviors.
ACSAC
(2010)
Zhou Li
,
Kehuan Zhang
,
XiaoFeng Wang
Mash-IF: Practical information-flow control within client-side mashups.
DSN
(2010)
Kehuan Zhang
,
Zhou Li
,
Rui Wang
,
XiaoFeng Wang
,
Shuo Chen
Sidebuster: automated detection and quantification of side-channel leaks in web application development.
CCS
(2010)
Rui Wang
,
XiaoFeng Wang
,
Zhou Li
,
Haixu Tang
,
Michael K. Reiter
,
Zheng Dong
Privacy-preserving genomic computation through program specialization.
CCS
(2009)
Jianming Fu
,
Huijun Xiong
,
Zhou Li
,
Huanguo Zhang
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems.
AICCSA
(2008)
Zhou Li
,
Yiwen Liang
,
Zejun Wu
,
Chengyu Tan
Immunity based Virus Detection with Process Call Arguments and User Feedback.
BIONETICS
(2007)