Follow
Zhibo Sun
Zhibo Sun
Verified email at drexel.edu - Homepage
Title
Cited by
Cited by
Year
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021
782021
RTIDS: A robust transformer-based approach for intrusion detection system
Z Wu, H Zhang, P Wang, Z Sun
IEEE Access 10, 64375-64387, 2022
642022
A survey on large language model (llm) security and privacy: The good, the bad, and the ugly
Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang
High-Confidence Computing, 100211, 2024
522024
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
432020
Towards automated threat intelligence fusion
A Modi, Z Sun, A Panwar, T Khairnar, Z Zhao, A Doupé, GJ Ahn, P Black
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
392016
Dart: A geographic information system on hadoop
H Zhang, Z Sun, Z Liu, C Xu, L Wang
2015 IEEE 8th International Conference on Cloud Computing, 90-97, 2015
332015
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
212019
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
172021
Migrating GIS big data computing from Hadoop to Spark: an exemplary study Using Twitter
Z Sun, H Zhang, Z Liu, C Xu, L Wang
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 351-358, 2016
142016
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
Effects on performance of analytical tools for visually demanding tasks through direct and indirect touch interaction in an immersive visualization
Z Sun, A Dhital, N Areejitkasem, N Pradhan, A Banic
2014 International Conference on Virtual Reality and Visualization, 186-193, 2014
52014
In the Light and in the Shadows: Human-Centered Analysis in Cybercrime
Z Sun
Arizona State University, 2022
22022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
T Bao, R Wang, Y Shoshitaishvili, A Doupé
The system can't perform the operation now. Try again later.
Articles 1–13