


default search action
Junjie Zhang 0004
Person information
- affiliation: Wright State University, Dayton, OH, USA
- affiliation (former): Georgia Institute of Technology, Atlanta, GA, USA
Other persons with the same name
- Junjie Zhang (aka: Jun-Jie Zhang) — disambiguation page
- Junjie Zhang 0001
— New York University Polytechnic School of Engineering, Brooklyn, NY, USA
- Junjie Zhang 0002
— Shanghai University, China (and 2 more)
- Junjie Zhang 0003
— Beihang University, Beijing, China
- Junjie Zhang 0005 — University of Toronto, Toronto, Ontario, Canada
- Junjie Zhang 0006
— Beijing Normal University, China (and 1 more)
- Jun-Jie Zhang 0007
(aka: Junjie Zhang 0007) — Northwest Institute of Nuclear Technology, Xi'an, China (and 1 more)
- Jun-Jie Zhang 0008 (aka: Junjie Zhang 0008) — Central South University, School of Civil Engineering, Changsha, China
- Junjie Zhang 0009
— Renmin University of China, Beijing, China
- Junjie Zhang 0010
— Fuzhou University, Fuzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Xiaobo Ma
, Jian Qu
, Mawei Shi, Bingyu An, Jianfeng Li
, Xiapu Luo
, Junjie Zhang, Zhenhua Li
, Xiaohong Guan
:
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures. IEEE/ACM Trans. Netw. 32(3): 1904-1919 (2024) - 2023
- [j14]Yadong Zhou, Bowen Hu
, Junjie Zhang, Liyuan Sun, Xingyu Zhu, Ting Liu:
Detecting suspicious transactions in a virtual-currency-enabled online social network. J. Netw. Comput. Appl. 211: 103555 (2023) - [c24]Daniel Grahn, Lingwei Chen, Junjie Zhang:
Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models. TrustCom 2023: 1606-1613 - [c23]Daniel Chong, Junjie Zhang, Nathaniel Boland, Lingwei Chen:
Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features. UbiSec 2023: 450-461 - [c22]Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan:
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. USENIX Security Symposium 2023: 589-606 - 2021
- [c21]Xiaobo Ma, Mawei Shi, Bingyu An, Jianfeng Li, Daniel Xiapu Luo, Junjie Zhang, Xiaohong Guan:
Context-aware Website Fingerprinting over Encrypted Proxies. INFOCOM 2021: 1-10 - [c20]Jin Huang, Junjie Zhang, Jialun Liu, Chuang Li, Rui Dai:
UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis. RAID 2021: 78-90
2010 – 2019
- 2019
- [j13]Yu Li
, Jin Huang, Ademola Ayodeji Ikusan, Milliken Mitchell, Junjie Zhang
, Rui Dai:
ShellBreaker: Automatically detecting PHP-based malicious web shells. Comput. Secur. 87 (2019) - [j12]Derek Doran, Luisa Massari
, Maria Carla Calzarossa
, Yu Li, Daniele Tessera
, Junjie Zhang:
User interactions and behaviors in a large-scale online emotional support service. Soc. Netw. Anal. Min. 9(1): 36:1-36:22 (2019) - [c19]Jin Huang, Yu Li, Junjie Zhang, Rui Dai:
UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities. DSN 2019: 581-592 - 2018
- [j11]Yu Li, Xiaotian Wang, Dae Wook Kim
, Junjie Zhang, Rui Dai:
Designing self-destructing wireless sensors with security and performance assurance. Comput. Networks 141: 44-56 (2018) - [j10]Yadong Zhou, Ximi Wang, Junjie Zhang, Peng Zhang, Lili Liu, Huan Jin, Hongbo Jin:
Analyzing and Detecting Money-Laundering Accounts in Online Social Networks. IEEE Netw. 32(3): 115-121 (2018) - [j9]Yadong Zhou
, Kaiyue Chen, Junjie Zhang, Junyuan Leng, Yazhe Tang:
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense. Secur. Commun. Networks 2018: 4760632:1-4760632:15 (2018) - [j8]Yuan Yang
, Zhongmin Cai
, Chunyan Wang, Junjie Zhang:
Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network. IEEE Trans. Inf. Forensics Secur. 13(11): 2913-2928 (2018) - [c18]Jianfeng Li, Xiaobo Ma, Guodong Li, Xiapu Luo, Junjie Zhang, Wei Li, Xiaohong Guan:
Can We Learn what People are Doing from Raw DNS Queries? INFOCOM 2018: 2240-2248 - [c17]Yu Li, Ivan Frasure, Ademola Ayodeji Ikusan, Junjie Zhang, Rui Dai:
Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture. NSS 2018: 266-276 - [c16]Yu Li, Dae Wook Kim, Junjie Zhang, Derek Doran:
Detecting Suspicious Members in an Online Emotional Support Service. SecureComm (2) 2018: 22-42 - [c15]Soham Kelkar, Timothy Kraus, Daria Morgan, Junjie Zhang, Rui Dai:
Analyzing HTTP-Based Information Exfiltration of Malicious Android Applications. TrustCom/BigDataSE 2018: 1642-1645 - 2017
- [j7]Yadong Zhou
, Dae Wook Kim, Junjie Zhang, Lili Liu, Huan Jin, Hongbo Jin, Ting Liu:
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions. IEEE Access 5: 1990-1999 (2017) - [j6]Jianfeng Li, Xiaobo Ma, Junjie Zhang, Jing Tao, Pinghui Wang, Xiaohong Guan:
Mining repeating pattern in packet arrivals: Metrics, models, and applications. Inf. Sci. 408: 1-22 (2017) - [j5]Dae Wook Kim, Junjie Zhang:
Deriving and measuring DNS-based fingerprints. J. Inf. Secur. Appl. 36: 32-42 (2017) - [c14]Kevon Scott, Rui Dai, Junjie Zhang:
Online-relaying-based image communication in unmanned aerial vehicle networks. ICC 2017: 1-6 - [c13]Mingxuan Sun, Guangyue Xu, Junjie Zhang, Dae Wook Kim:
Tracking You through DNS Traffic: Linking User Sessions by Clustering with Dirichlet Mixture Model. MSWiM 2017: 303-310 - 2015
- [j4]Dae Wook Kim
, Peiying Yan, Junjie Zhang:
Detecting fake anti-virus software distribution webpages. Comput. Secur. 49: 95-106 (2015) - [j3]Xiaobo Ma, Junjie Zhang, Zhenhua Li, Jianfeng Li, Jing Tao, Xiaohong Guan, John C. S. Lui, Don Towsley
:
Accurate DNS query characteristics estimation via active probing. J. Netw. Comput. Appl. 47: 72-84 (2015) - [c12]Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan:
Modeling repeating behaviors in packet arrivals: Detection and measurement. INFOCOM 2015: 2461-2469 - [c11]Dae Wook Kim, Junjie Zhang:
You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic. SecureComm 2015: 348-366 - [i1]Junyuan Leng, Yadong Zhou, Junjie Zhang, Chengchen Hu:
An Inference Attack Model for Flow Table Capacity and Usage: Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network. CoRR abs/1504.03095 (2015) - 2014
- [j2]Junjie Zhang, Roberto Perdisci
, Wenke Lee, Xiapu Luo
, Unum Sarfraz:
Building a Scalable System for Stealthy P2P-Botnet Detection. IEEE Trans. Inf. Forensics Secur. 9(1): 27-38 (2014) - [j1]Xiaobo Ma, Junjie Zhang, Jing Tao, Jianfeng Li, Jue Tian, Xiaohong Guan:
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints. IEEE Trans. Inf. Forensics Secur. 9(11): 1906-1921 (2014) - [c10]Yu Li, Rui Dai, Junjie Zhang:
Morphing communications of Cyber-Physical Systems towards moving-target defense. ICC 2014: 592-598 - 2013
- [c9]Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee:
Intention and Origination: An Inside Look at Large-Scale Bot Queries. NDSS 2013 - 2012
- [c8]Liting Hu, Karsten Schwan, Ajay Gulati, Junjie Zhang, Chengwei Wang:
Net-cohort: detecting and managing VM ensembles in virtualized data centers. ICAC 2012: 3-12 - 2011
- [c7]Xiapu Luo
, Peng Zhou, Junjie Zhang, Roberto Perdisci
, Wenke Lee, Rocky K. C. Chang:
Exposing invisible timing-based traffic watermarks with BACKLIT. ACSAC 2011: 197-206 - [c6]Junjie Zhang, Xiapu Luo
, Roberto Perdisci
, Guofei Gu, Wenke Lee, Nick Feamster:
Boosting the scalability of botnet detection using adaptive traffic sampling. AsiaCCS 2011: 124-134 - [c5]Junjie Zhang, Roberto Perdisci
, Wenke Lee, Unum Sarfraz, Xiapu Luo
:
Detecting stealthy P2P botnets using statistical traffic fingerprints. DSN 2011: 121-132 - [c4]Junjie Zhang, Christian Seifert, Jack W. Stokes, Wenke Lee:
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads. WWW 2011: 187-196 - 2010
- [c3]Xiapu Luo
, Junjie Zhang, Roberto Perdisci, Wenke Lee:
On the Secrecy of Spread-Spectrum Flow Watermarks. ESORICS 2010: 232-248
2000 – 2009
- 2008
- [c2]Guofei Gu, Junjie Zhang, Wenke Lee:
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. NDSS 2008 - [c1]Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. USENIX Security Symposium 2008: 139-154
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-22 01:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint