Research
CONFERENCE PUBLICATIONS
- Jin Huang, Junjie Zhang, Jialun Liu, Chuang Li, and Rui Dai, “UQuery: Static Security Analysis of PHP-Based Web Programs Using Graph Models”, IEEE Conference on Communications and Network Security (CNS), Oct. 2024
- Nathaniel Christian Boland, Junjie Zhang, Daniel Chong, and Rui Dai, “An Empirical Study of Software Sanitization Locality”, IEEE National Aerospace and Electronics Conference (NAECON), Jul. 2024.
- James MacLennan and Junjie Zhang, “Path-Safe: Enabling Dynamic Mandatory Access Controls Using Security Tokens”, IEEE National Aerospace and Electronics Conference (NAECON), Jul. 2024
- Al Amin Hossain, Mithun Kumar PK, Junjie Zhang, and Fathi Amsaad,“Malicious Code Detection Using LLM”, IEEE National Aerospace and Electronics Conference (NAECON), Jul. 2024.
- Zhuobin Yuan, Ademola Ikusan, Rui Dai, and Junjie Zhang, “No-Reference Image Quality Assessment for Intelligent Sensing Applications”, IEEE National Aerospace and Electronics Conference (NAECON), Jul. 2024.
- David Elmo, George Fragkos, Jay Johnson, Kenneth Rohde, Sean Salinas, and Junjie Zhang, ”Disrupting EV Charging Sessions and Gaining Remote Code Execution with DoS, MITM, and Code Injection Exploits using OCPP 1.6”, Proceedings of 2023 Resilience Week (RWS), Nov. 2023.
- Daniel Grahn, Lingwei Chen, and Junjie Zhang, ”Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models”, in Proceedings of the 22nd IEEE International Conference on Trust, Securityand Privacy in Computing and Communications (TrustCom 2023), Nov. 2023.
- Daniel Chong, Junjie Zhang, Nathaniel Boland, and Lingwei Chen, “Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features”, in Proceedings of the 12th International Symposium on Security and Privacy on Internet of Things (SPIoT’23), Nov. 2023.
- Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, and Xiaohong Guan, “An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting”, in Proceedings of the 32nd USENIX Security Symposium (USENIX Security’23), Aug. 2023.
- Daniel Grahn and Junjie Zhang, “An Analysis of C/C++ Datasets for Machine Learning-Assisted Software Vulnerability Detection”, in Proceedings of Conference on Applied Machine Learning for Information Security (CAMLIS’21), Nov. 2021.
- Jin Huang, Junjie Zhang, Jialun Liu, Chuang Li, and Rui Dai, “UFuzzer: Detecting PHP-Based Unrestricted File Upload Vulnerabilities Using Targeted Fuzzing”, in Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021), Oct, 2021
- Xiaobo Ma, Mawei Shi, Bingyu An, Jianfeng Li, Xiapu Luo, Junjie Zhang, and Xiaohong Guan, “Context-aware Website Fingerprinting over Encrypted Proxies”, In Proceedings of INFOCOM 2021, Aug 15, 2021.
- Jin Huang, Yu Li, Junjie Zhang, Rui Dai, “UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities”, in Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2019), Portland, Oregon, USA, June 2019.
- Yu Li, Ivan Frasure, Ademola Ayodeji Ikusan, Junjie Zhang, and Rui Dai, “Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture”, in Proceedings of 12th International Conference on Network and System Security (NSS-2018), Hong Kong, China, August 2018.
- Soham Kelkar, Timothy Kraus, Daria Morgan, Junjie Zhang, and Rui Dai, “Analyzing HTTPBased Information Exfiltration of Malicious Android Applications”, in Proceedings of IEEE TrustCom 2018.
- Yu Li, Dae Wook Kim, Junjie Zhang, and Derek Doran, “Detecting Suspicious Members in An Online Emotional Support Service”, in Proceedings of Securecomm 2018.
- Jianfeng Li, Xiaobo Ma, Guodong Li, Xiapu Luo, Junjie Zhang, Wei Li, and Xiaohong Guan, “Can We Learn What People Are Doing from RAW DNS Queries?”, in Proceedings of INFOCOM 2018.
- Guangyue Xu, Mingxuan, Sun, Junjie Zhang, Dae Wook Kim, “Tracking You Through DNS Traffic: Linking User Sessions By Clustering With Dirichlet Mixture Model”, in Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Nov. 2017.
- Kevon Scott, Rui Dai, and Junjie Zhang, “Online-Relaying-Based Image Communication in Unmanned Aerial Vehicle Networks”, in Proceedings of the IEEE International Conference on Communications (ICC), May 2017.
- Dae Wook Kim and Junjie Zhang, “You Are How You Query: Deriving Behavioral Fingerprints From DNS Traffic”, in the Proceedings of 11th International Conference on Security and Privacy in Communication Networks, (SecureComm), Dallas, USA, 2015.
- Xiaotian Wang, Matthew Davis, Junjie Zhang, and Vance Saunders. “Mission-Aware Vulnerability Assessment for Cyber-Physical Systems.” in Proceedings of the 1st IEEE International Workshop on Trustworthy Software Systems (TrustSoft’15), Helsinki, Finland, 2015
- Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, and Xiaohong Guan, “Modeling Repeating Behaviors in Packet Arrivals: Detection and Measurement”, in Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM’15), HONG KONG, China, 2015.
- Yu Li, Rui Dai, and Junjie Zhang, “Morphing Communications of Cyber-Physical Systems Towards Moving Target Defense”, In Proceedings of the 2014 IEEE International Conference on Communications (ICC’14), Jun. 2014.
- Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, and Wenke Lee, “Intention and Origination: An Inside Look at Large-Scale Bot Queries”, In Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS’13), San Diego, USA, 2013.
- Liting Hu, Karsten Schwan, Ajay Gulati, Junjie Zhang, and Chengwei Wang, “Net-Cohort: Detecting and Managing VM Ensembles in Virtualized Data Centers”, In Proceedings of the 9th International Conference on Autonomic Computing (ICAC’12), San Jose, USA, 2012.
- Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, and Rocky KC Chang. “Exposing invisible timing-based traffic watermarks with BACKLIT”, In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC’11), Orlando, USA, 2011.
- Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz and Xiapu Luo, “Detecting Stealthy P2P Botnets Using Statistical Traffic Fingerprints”, In Proceedings of the 41th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’11), Hong Kong, China, 2011.
- Junjie Zhang, Christian Seifert, Jack W. Stokes, and Wenke Lee, “ARROW: Generating Signatures to Detect Drive-By Downloads”, In Proceedings of 20th International world wide web conference (WWW’11), Hyderabad, India, 2011.
- Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee and Nick Feamster, “Boosting the Scalability of Botnet Detection using Adaptive Traffic Sampling”, In Proceedings of 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS’11), Hong Kong, China, 2011.
- Xiapu Luo, Junjie Zhang, and Wenke Lee, “On the Secrecy of Spread Spectrum Flow Watermarks”, In Proceedings of the 15th European conference on Research in computer security (ESORICS’10), Athens, Greece, 2010.
- Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee, “BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection”, In Proceedings of the 17th USENIX Security Symposium (Security’08), San Jose, CA, 2008.
- Guofei Gu, Junjie Zhang, and Wenke Lee, “BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic”, In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS’08), San Diego, CA, February 2008.
JOURNAL PUBLICATIONS
- Daniel Grahn, Lingwei Chen, and Junjie Zhang, “Vul-Mixer: Efficient and Effective Machine Learning–Assisted Software Vulnerability Detection”, Electronics, Volume 13, Issue 13, pp. 2538, July 2024.
- Xiaobo Ma, Jian Qu, Mawei Shi, Bingyu An, Jianfeng Li, Xiapu Luo, Junjie Zhang, Zhenhua Li, and Xiaohong Guan, ”Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures”, IEEE/ACM Transactions on Networking, Volume 32, No. 3, pp. 1904-1919, Jun 2024.
- Mahendra Suthar, Rui Dai, Junjie Zhang, Sasu Tarkoma, and Ian F. Akyildiz, ”Multi-Codec Rate Adaptive Point Cloud Streaming for Holographic Type Communication”, ITU Journal on Future and Evolving Technologies, Volume 4, Issue 4, pp. 590-603, Nov. 2023.
- Yadong Zhou, Bowen Hu, Junjie Zhang, Liyuan Sun, Xingyu Zhu, Ting Liu, “Detecting Suspicious Transactions in A Virtual-Currency-Enabled Online Social Network”, Journal of Network and Computer Applications, Volume 211, February 2023.
- Yu Li, Jin Huang, Ademola Ikusan, Milliken Mitchell, Junjie Zhang, and Rui Dai, “ShellBreaker: Automatically Detecting PHP-Based Malicious Web Shells”, Journal of Computers and Security, Volume 87, November 2019.
- Derek Doran, Luisa Massari, Maria Carla Calzarossa, Yu Li, Daniele Tessera, and Junjie Zhang, “User Interactions and Behaviors in A Large-Scale Online Emotional Support Service”, Journal of Social Network Analysis and Mining, Volume 9, Issue 36, July 2019, Springer.
- Yuang Yang, Zhongmin Cai, Chunyan Wang, and Junjie Zhang, “Probabilistically Inferring Attack Ramifications Using Temporal Dependency Network”, IEEE Transactions on Information Forensics and Security, Volume 13, Issue 11, pp. 2913-1929, Nov. 2018.
- Yu Li, Xiaotian Wang, Dae Wook Kim, Junjie Zhang, Rui Dai, “Designing self-destructing wireless sensors with security and performance assurance”, Computer Networks, Volume 141, 2018, Pages 44-56, ISSN 1389-1286.
- Yadong Zhou, Kaiyue Chen, Junjie Zhang, Junyuan Leng and Yazhe Tang. Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation and Defense. Security and Communication Networks, Volume 2018, January 2018.
- Yadong Zhou, Ximi Wang, Junjie Zhang, Peng Zhang, Lili Liu, Huan Jin, and Hongbo Jin, “Analyzing and Detecting Money-Laundering Accounts in Online Social Networks”, IEEE Network Magazine, Volume 32, Issue 3, 2017.
- Dae Wook Kim and Junjie Zhang, “Deriving and Measuring DNS-Based Fingerprints,” Journal of Information Security and Applications, In Journal of Information Security and Applications, Volume 36, 2017, Pages 32-42.
- Jianfeng Li, Xiaobo Ma, Junjie Zhang, Jing Tao, Pinghui Wang, and Xiaohong Guan, “Mining Repeating Patterns in Packet Arrivals: Metrics, Models, and Applications”, in Journal of Information Sciences, VOL. 408, Oct. 2017.
- Yadong Zhou, Dae Wook Kim, Junjie Zhang, Lili Liu, Huan Jin, Hongbo Jin, and Ting Liu “ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions”, IEEE Access, Special Issue on Trust Management in Pervasive Social Networking (TruPSN), VOL. 5, Jan, 2017.
- Dae Wook Kim, Peiying Yan, and Junjie Zhang, “Detecting Fake Anti-Virus Software Distribution Webpages”, in Journal of Computers and Security (JCS), VOL. 49, MARCH. 2015, Elsevier.
- Xiaobo Ma, Junjie Zhang, Zhenhua Li, Jianfeng Li, Jing Tao, Xiaohong Guan, John C.S. Lui, and Don Towsley, “Accurate DNS Query Characteristics Estimation via Active Probing”, Journal of Network and Computer Applications (JNCA), VOL. 47, JAN. 2015, Elsevier.
- Xiaobo Ma, Junjie Zhang, Jing Tao, Jianfeng Li, Jue Tian, and Xiaohong Guan, “DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints”, IEEE Transactions On Information Forensics and Security, VOL. 9, NO. 11, NOV. 2014.
- Junjie Zhang, Roberto Perdisci, Wenke Lee, Xiapu Luo, and Unum Sarfraz, “Building a Scalable System for Stealthy P2P-Botnet Detection”, IEEE Transactions On Information Forensics and Security, VOL. 9, NO. 1, JANUARY 2014.