Zhibo Sun
Zhibo Sun
Verified email at - Homepage
Cited by
Cited by
A survey on large language model (llm) security and privacy: The good, the bad, and the ugly
Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang
High-Confidence Computing, 100211, 2024
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021
RTIDS: A robust transformer-based approach for intrusion detection system
Z Wu, H Zhang, P Wang, Z Sun
IEEE Access 10, 64375-64387, 2022
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
Towards automated threat intelligence fusion
A Modi, Z Sun, A Panwar, T Khairnar, Z Zhao, A Doupé, GJ Ahn, P Black
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
Dart: A geographic information system on hadoop
H Zhang, Z Sun, Z Liu, C Xu, L Wang
2015 IEEE 8th International Conference on Cloud Computing, 90-97, 2015
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
Migrating GIS big data computing from Hadoop to Spark: an exemplary study Using Twitter
Z Sun, H Zhang, Z Liu, C Xu, L Wang
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 351-358, 2016
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Effects on performance of analytical tools for visually demanding tasks through direct and indirect touch interaction in an immersive visualization
Z Sun, A Dhital, N Areejitkasem, N Pradhan, A Banic
2014 International Conference on Virtual Reality and Visualization, 186-193, 2014
In the Light and in the Shadows: Human-Centered Analysis in Cybercrime
Z Sun
Arizona State University, 2022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
T Bao, R Wang, Y Shoshitaishvili, A Doupé
The system can't perform the operation now. Try again later.
Articles 1–13