Jian Mao
Jian Mao
Verified email at
Cited by
Cited by
Phishing-alarm: Robust and efficient phishing detection via page component similarity
J Mao, W Tian, P Li, T Wei, Z Liang
IEEE Access 5, 17020-17030, 2017
A new algorithm for identifying loops in decompilation
T Wei, J Mao, W Zou, Y Chen
International Static Analysis Symposium, 170-183, 2007
BaitAlarm: detecting phishing sites using similarity in fundamental visual features
J Mao, P Li, K Li, T Wei, Z Liang
2013 5th International Conference on Intelligent Networking and …, 2013
A position-aware Merkle tree for dynamic cloud data integrity verification
J Mao, Y Zhang, P Li, T Li, Q Wu, J Liu
Soft Computing 21, 2151-2164, 2017
Phishing page detection via learning classifiers from page layout feature
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
EURASIP Journal on Wireless Communications and Networking 2019, 1-14, 2019
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao
NDSS, 2021
Detecting phishing websites via aggregation analysis of page layouts
J Mao, J Bian, W Tian, S Zhu, T Wei, A Li, Z Liang
Procedia Computer Science 129, 224-230, 2018
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80, 2015
Application of learning algorithms in smart home IoT system security
J Mao, Q Lin, J Bian
Mathematical foundations of computing 1 (1), 63-76, 2018
Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks
H Cheng, J Liu, T Xu, B Ren, J Mao, W Zhang
International Journal of Sensor Networks 34 (1), 56-69, 2020
Perm-guard: Authenticating the validity of flow rules in software defined networking
M Wang, J Liu, J Chen, X Liu, J Mao
Journal of Signal Processing Systems 86, 157-173, 2017
Who is touching my cloud
H Deng, Q Wu, B Qin, J Mao, X Liu, L Zhang, W Shi
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
RouteGuardian: Constructing secure routing paths in software-defined networking
M Wang, J Liu, J Mao, H Cheng, J Chen, C Qi
Tsinghua Science and Technology 22 (4), 400-412, 2017
Watchdog: Detecting ultrasonic-based inaudible voice attacks to smart home systems
J Mao, S Zhu, X Dai, Q Lin, J Liu
IEEE Internet of Things Journal 7 (9), 8025-8035, 2020
A novel identity-based multi-signcryption scheme
J Zhang, J Mao
Computer Communications 32 (1), 14-18, 2009
Detecting malicious behaviors in javascript applications
J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang
Ieee Access 6, 12284-12294, 2018
An improved anonymous multi‐receiver identity‐based encryption scheme
J Zhang, J Mao
International Journal of Communication Systems 28 (4), 645-658, 2015
An effective integrity verification scheme of cloud data based on BLS signature
X Luo, Z Zhou, L Zhong, J Mao, C Chen
Security and Communication Networks 2018 (1), 2615249, 2018
A comprehensive client-side behavior model for diagnosing attacks in ajax applications
X Dong, K Patil, J Mao, Z Liang
2013 18th International Conference on Engineering of Complex Computer …, 2013
Efficient public verification proof of retrievability scheme in cloud
J Zhang, W Tang, J Mao
Cluster computing 17, 1401-1411, 2014
The system can't perform the operation now. Try again later.
Articles 1–20