Phishing-alarm: Robust and efficient phishing detection via page component similarity J Mao, W Tian, P Li, T Wei, Z Liang IEEE Access 5, 17020-17030, 2017 | 127 | 2017 |
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics. J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao NDSS, 2021 | 114 | 2021 |
A new algorithm for identifying loops in decompilation T Wei, J Mao, W Zou, Y Chen International Static Analysis Symposium, 170-183, 2007 | 97 | 2007 |
BaitAlarm: detecting phishing sites using similarity in fundamental visual features J Mao, P Li, K Li, T Wei, Z Liang 2013 5th international conference on intelligent networking and …, 2013 | 87 | 2013 |
Phishing page detection via learning classifiers from page layout feature J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang EURASIP Journal on Wireless Communications and Networking 2019, 1-14, 2019 | 84 | 2019 |
A position-aware Merkle tree for dynamic cloud data integrity verification J Mao, Y Zhang, P Li, T Li, Q Wu, J Liu Soft Computing 21, 2151-2164, 2017 | 79 | 2017 |
Detecting phishing websites via aggregation analysis of page layouts J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang Procedia Computer Science 129, 224-230, 2018 | 70 | 2018 |
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang computers & security 55, 62-80, 2015 | 60 | 2015 |
Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks H Cheng, J Liu, T Xu, B Ren, J Mao, W Zhang International Journal of Sensor Networks 34 (1), 56-69, 2020 | 53 | 2020 |
Application of learning algorithms in smart home IoT system security J Mao, Q Lin, J Bian Mathematical foundations of computing 1 (1), 63-76, 2018 | 52 | 2018 |
Watchdog: Detecting ultrasonic-based inaudible voice attacks to smart home systems J Mao, S Zhu, X Dai, Q Lin, J Liu IEEE Internet of Things Journal 7 (9), 8025-8035, 2020 | 47 | 2020 |
RouteGuardian: Constructing secure routing paths in software-defined networking M Wang, J Liu, J Mao, H Cheng, J Chen, C Qi Tsinghua Science and Technology 22 (4), 400-412, 2017 | 41 | 2017 |
Perm-guard: Authenticating the validity of flow rules in software defined networking M Wang, J Liu, J Chen, X Liu, J Mao Journal of Signal Processing Systems 86, 157-173, 2017 | 41 | 2017 |
Who is touching my cloud H Deng, Q Wu, B Qin, J Mao, X Liu, L Zhang, W Shi Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 41 | 2014 |
Detecting malicious behaviors in javascript applications J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang Ieee Access 6, 12284-12294, 2018 | 33 | 2018 |
An effective integrity verification scheme of cloud data based on BLS signature X Luo, Z Zhou, L Zhong, J Mao, C Chen Security and Communication Networks 2018 (1), 2615249, 2018 | 31 | 2018 |
A novel identity-based multi-signcryption scheme J Zhang, J Mao Computer Communications 32 (1), 14-18, 2009 | 31 | 2009 |
An improved anonymous multi‐receiver identity‐based encryption scheme J Zhang, J Mao International Journal of Communication Systems 28 (4), 645-658, 2015 | 29 | 2015 |
An inaudible voice attack to context-based device authentication in smart IoT systems J Mao, S Zhu, J Liu Journal of Systems Architecture 104, 101696, 2020 | 23 | 2020 |
Efficient public verification proof of retrievability scheme in cloud J Zhang, W Tang, J Mao Cluster computing 17, 1401-1411, 2014 | 23 | 2014 |