Scarecrow: Deactivating Evasive Malware via Its Own Evasive LogicJialong ZhangZhongshu Guet al.2020DSN 2020
DeepLocker - Concealing Targeted Attacks with AI LocksmithingDhilung KiratJiyong Janget al.2018Black Hat USA 2018
Cross-Stack Threat Sensing for Cyber Security and ResilienceFrederico AraujoTeryl Tayloret al.2018DSN-W 2018
Protecting intellectual property of deep neural networks with watermarkingJialong ZhangZhongshu Guet al.2018ASIACCS 2018
Dressed up: Baiting attackers through endpoint service projectionMarc StoecklinFrederico Araujoet al.2018SDN-NFVSec 2018
Poster: Hidden in plain sight: A filesystem for data integrity and confidentialityAnne KohlbrennerFrederico Araujoet al.2017CCS 2017
BAYWATCH: Robust beaconing detection to identify infected hosts in large-scale enterprise networksXin HuJiyong Janget al.2016DSN 2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysisJialong ZhangXin Huet al.2016INFOCOM 2016