Follow
Zheng Dong
Title
Cited by
Cited by
Year
Privacy-preserving genomic computation through program specialization
R Wang, XF Wang, Z Li, H Tang, MK Reiter, Z Dong
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1092009
Beyond the lock icon: real-time detection of phishing websites using public key certificates
Z Dong, A Kapadia, J Blythe, LJ Camp
2015 APWG Symposium on Electronic Crime Research (eCrime), 1-12, 2015
742015
Detection of rogue certificates from trusted certificate authorities using deep neural networks
Z Dong, K Kane, LJ Camp
ACM Transactions on Privacy and Security (TOPS) 19 (2), 1-31, 2016
442016
PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security.
Z Dong, LJ Camp
HotSec, 2012
162012
Pools, clubs and security: designing for a party not a person
Z Dong, V Garg, LJ Camp, A Kapadia
Proceedings of the 2012 New Security Paradigms Workshop, 77-86, 2012
152012
Probabilistic classifiers for certificates
KS Yiu, Z Dong, AP Penta, K Kane
US Patent 10,193,699, 2019
112019
Systems and methods for identifying certificates
LJ Camp, Z Dong
US Patent App. 15/766,745, 2018
52018
Phishing in smooth waters: The state of banking certificates in the us
Z Dong, K Kane, LJ Camp
2014 TPRC Conference Paper, 2014
52014
Pinning & binning: Real time classification of certificates
Z Dong, A Kapadia, LJ Camp
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
42013
Enabling users to self-manage networks: Collaborative anomaly detection in wireless personal area networks
Z Dong
International Conference on Financial Cryptography and Data Security, 53-67, 2012
22012
The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online
Z Dong, K Kane, S Chen, LJ Camp
12016
Touch-enabled programming for the lab of things
Z Dong, A Samuel
arXiv preprint arXiv:1310.0867, 2013
12013
Small communities with strong ties {and, or, versus} big data in detecting masquerade attacks
Z Dong
Indiana University, 2015
2015
Policy proposal: limit address allocation to extend the lifetime of IPv4 in the APNIC region
Z Dong, LJ Camp
Proceedings of the 2010 Workshop on Governance of Technology, Information …, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–14