Zubair Shafiq
Cited by
Cited by
A first look at cellular machine-to-machine traffic: large scale measurement and characterization
MZ Shafiq, L Ji, AX Liu, J Pang, J Wang
ACM SIGMETRICS performance evaluation review 40 (1), 65-76, 2012
Characterizing and modeling internet traffic dynamics of cellular devices
MZ Shafiq, L Ji, AX Liu, J Wang
ACM SIGMETRICS Performance Evaluation Review 39 (1), 265-276, 2011
Pe-miner: Mining structural information to detect malicious executables in realtime
MZ Shafiq, SM Tabish, F Mirza, M Farooq
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
A large scale exploratory analysis of software vulnerability life cycles
M Shahzad, MZ Shafiq, AX Liu
2012 34th International Conference on Software Engineering (ICSE), 771-781, 2012
Malware detection using statistical analysis of byte-level file content
SM Tabish, MZ Shafiq, M Farooq
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence …, 2009
Using spatio-temporal information in API calls with machine learning algorithms for malware detection
F Ahmed, H Hameed, MZ Shafiq, M Farooq
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence …, 2009
Large-scale measurement and characterization of cellular machine-to-machine traffic
MZ Shafiq, L Ji, AX Liu, J Pang, J Wang
IEEE/ACM transactions on Networking 21 (6), 1960-1973, 2013
A first look at cellular network performance during crowded events
MZ Shafiq, L Ji, AX Liu, J Pang, S Venkataraman, J Wang
ACM SIGMETRICS performance evaluation review 41 (1), 17-28, 2013
A semantics aware approach to automated reverse engineering unknown protocols
Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ...
2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012
Understanding the impact of network dynamics on mobile video user engagement
MZ Shafiq, J Erman, L Ji, AX Liu, J Pang, J Wang
ACM SIGMETRICS Performance Evaluation Review 42 (1), 367-379, 2014
Paying for likes? understanding facebook like fraud using honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014
Embedded Malware Detection Using Markov n-Grams
MZ Shafiq, SA Khayam, M Farooq
International conference on detection of intrusions and malware, and …, 2008
Adgraph: A graph-based approach to ad and tracker blocking
U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq
2020 IEEE Symposium on security and privacy (SP), 763-776, 2020
Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors
U Iqbal, S Englehardt, Z Shafiq
2021 IEEE Symposium on Security and Privacy (SP), 1143-1161, 2021
The ad wars: retrospective measurement and analysis of anti-adblock filter lists
U Iqbal, Z Shafiq, Z Qian
Proceedings of the 2017 Internet Measurement Conference, 171-183, 2017
Real-time video quality of experience monitoring for https and quic
MH Mazhar, Z Shafiq
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1331-1339, 2018
Characterizing geospatial dynamics of application usage in a 3G cellular data network
MZ Shafiq, L Ji, AX Liu, J Pang, J Wang
2012 Proceedings IEEE INFOCOM, 1341-1349, 2012
Guidelines to select machine learning scheme for classification of biomedical datasets
AK Tanwani, J Afridi, MZ Shafiq, M Farooq
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics …, 2009
The rich and the poor: A Markov decision process approach to optimizing taxi driver revenue efficiency
H Rong, X Zhou, C Yang, Z Shafiq, A Liu
Proceedings of the 25th ACM international on conference on information and …, 2016
Assessing accelerator-based HPC reverse time migration
M Araya-Polo, J Cabezas, M Hanzich, M Pericas, F Rubio, I Gelado, ...
IEEE Transactions on Parallel and Distributed Systems 22 (1), 147-162, 2010
The system can't perform the operation now. Try again later.
Articles 1–20