|Adgraph: A graph-based approach to ad and tracker blocking|
U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq
2020 IEEE Symposium on Security and Privacy (SP), 763-776, 2020
|Measuring and disrupting anti-adblockers using differential execution analysis|
S Zhu, X Hu, Z Qian, Z Shafiq, H Yin
The Network and Distributed System Security Symposium (NDSS), 2018
|SymTCP: Eluding stateful deep packet inspection with automated discrepancy discovery|
Z Wang, S Zhu
Network and Distributed System Security Symposium (NDSS), 2020
|Connecting the dots: Detecting adversarial perturbations using context inconsistency|
S Li, S Zhu, S Paul, A Roy-Chowdhury, C Song, S Krishnamurthy, ...
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
|Adversarial attacks on black box video classifiers: Leveraging the power of geometric transformations|
S Li, A Aich, S Zhu, S Asif, C Song, A Roy-Chowdhury, S Krishnamurthy
Advances in Neural Information Processing Systems 34, 2085-2096, 2021
|Shadowblock: A lightweight and stealthy adblocking browser|
S Zhu, U Iqbal, Z Wang, Z Qian, Z Shafiq, W Chen
The World Wide Web Conference, 2483-2493, 2019
|You do (not) belong here: detecting DPI evasion attacks with context learning|
S Zhu, S Li, Z Wang, X Chen, Z Qian, SV Krishnamurthy, KS Chan, ...
Proceedings of the 16th International Conference on emerging Networking …, 2020
|A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs|
J Huang, M Sun, S Zhu, Y Sun, C Xing, Q Duan
Proceedings of the 30th annual ACM symposium on applied computing, 688-694, 2015
|Eluding ML-based Adblockers With Actionable Adversarial Examples|
S Zhu, Z Wang, X Chen, S Li, K Man, U Iqbal, Z Qian, KS Chan, ...
Annual Computer Security Applications Conference, 541-553, 2021
|Generating practical adversarial network traffic flows using NIDSGAN|
BE Zolbayar, R Sheatsley, P McDaniel, MJ Weisman, S Zhu, S Zhu, ...
arXiv preprint arXiv:2203.06694, 2022
|On selecting composite network-cloud services: a quality-of-service based approach|
MM Jalloh, S Zhu, F Fang, J Huang
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
|Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison|
Z Wang, S Zhu, K Man, P Zhu, Y Hao, Z Qian, SV Krishnamurthy, ...
Proceedings of the 8th ACM Workshop on Moving Target Defense, 31-32, 2021
|Propagation of Active Worms in P2P Networks: Modeling and Analysis.|
H Tang, Y Lu, S Zhou, J Huang
J. Comput. 9 (11), 2514-2524, 2014
|A Defense Model of Reactive Worms Based on Dynamic Time.|
H Tang, S Zhu, J Huang, H Liu
J. Softw. 9 (11), 2778-2788, 2014
|SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers|
Y Hao, G Li, X Zou, W Chen, S Zhu, Z Qian, AA Sani
2023 IEEE Symposium on Security and Privacy (SP), 3262-3278, 2023
|Understanding and Taming Adversarial Actions Against Internet Content Blockers|
University of California, Riverside, 2021
|Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations (Supplementary Material)|
S Li, A Aich, S Zhu, MS Asif, C Song, SV Krishnamurthy, ...