Zheng Dong
Zheng Dong
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Privacy-preserving genomic computation through program specialization
R Wang, XF Wang, Z Li, H Tang, MK Reiter, Z Dong
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Beyond the lock icon: real-time detection of phishing websites using public key certificates
Z Dong, A Kapadia, J Blythe, LJ Camp
2015 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2015
Detection of rogue certificates from trusted certificate authorities using deep neural networks
Z Dong, K Kane, LJ Camp
ACM Transactions on Privacy and Security (TOPS) 19 (2), 1-31, 2016
Pools, clubs and security: designing for a party not a person
Z Dong, V Garg, LJ Camp, A Kapadia
Proceedings of the 2012 New Security Paradigms Workshop, 77-86, 2012
PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security.
Z Dong, LJ Camp
HotSec, 2012
Probabilistic classifiers for certificates
KS Yiu, Z Dong, AP Penta, K Kane
US Patent 10,193,699, 2019
Systems and methods for identifying certificates
LJ Camp, Z Dong
US Patent App. 15/766,745, 2018
Phishing in smooth waters: The state of banking certificates in the us
Z Dong, K Kane, LJ Camp
2014 TPRC Conference Paper, 2014
Pinning & binning: Real time classification of certificates
Z Dong, A Kapadia, LJ Camp
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
Enabling users to self-manage networks: Collaborative anomaly detection in wireless personal area networks
Z Dong
Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR …, 2012
The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online
Z Dong, K Kane, S Chen, LJ Camp
Touch-enabled programming for the lab of things
Z Dong, A Samuel
arXiv preprint arXiv:1310.0867, 2013
Small communities with strong ties {and, or, versus} big data in detecting masquerade attacks
Z Dong
Indiana University, 2015
Policy proposal: limit address allocation to extend the lifetime of IPv4 in the APNIC region
Z Dong, LJ Camp
Proceedings of the 2010 Workshop on Governance of Technology, Information …, 2010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–14