팔로우
Zhibo Sun
Zhibo Sun
drexel.edu의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
A survey on large language model (llm) security and privacy: The good, the bad, and the ugly
Y Yao, J Duan, K Xu, Y Cai, Z Sun, Y Zhang
High-Confidence Computing, 100211, 2024
1332024
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
P Zhang, A Oest, H Cho, Z Sun, RC Johnson, B Wardman, S Sarker, ...
2021 IEEE Symposium on Security and Privacy (SP), 1109-1124, 2021
922021
RTIDS: A robust transformer-based approach for intrusion detection system
Z Wu, H Zhang, P Wang, Z Sun
IEEE Access 10, 64375-64387, 2022
842022
Scam pandemic: How attackers exploit public fear through phishing
M Bitaab, H Cho, A Oest, P Zhang, Z Sun, R Pourmohamad, D Kim, T Bao, ...
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-10, 2020
442020
Towards automated threat intelligence fusion
A Modi, Z Sun, A Panwar, T Khairnar, Z Zhao, A Doupé, GJ Ahn, P Black
2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016
392016
Dart: A geographic information system on hadoop
H Zhang, Z Sun, Z Liu, C Xu, L Wang
2015 IEEE 8th International Conference on Cloud Computing, 90-97, 2015
332015
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
222019
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
182021
Migrating GIS big data computing from Hadoop to Spark: an exemplary study Using Twitter
Z Sun, H Zhang, Z Liu, C Xu, L Wang
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 351-358, 2016
142016
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
P Zhang, Z Sun, S Kyung, HW Behrens, ZL Basque, H Cho, A Oest, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
Effects on performance of analytical tools for visually demanding tasks through direct and indirect touch interaction in an immersive visualization
Z Sun, A Dhital, N Areejitkasem, N Pradhan, A Banic
2014 International Conference on Virtual Reality and Visualization, 186-193, 2014
52014
In the Light and in the Shadows: Human-Centered Analysis in Cybercrime
Z Sun
Arizona State University, 2022
22022
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing
T Bao, R Wang, Y Shoshitaishvili, A Doupé
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–13