Dingbang Xu , Peng Ning , William Enck , Xinwen Zhang
usenix security symposium 351 -366
Xuxian Jiang , Yajin Zhou , Wu Zhou , Zhi Wang
network and distributed system security symposium
Wu Zhou , Xinwen Zhang , Xuxian Jiang
computer and communications security 1 -12
Linhai Song , Heqing Huang , Wu Zhou , Wenfei Wu
asia pacific workshop on systems 12
Michael C. Grace , Wu Zhou , Xuxian Jiang , Ahmad-Reza Sadeghi
wireless network security 101 -112
Heqing Huang , Cong Zheng , Junyuan Zeng , Wu Zhou
2016 IEEE International Conference on Big Data (Big Data) 1090 -1099
Wu Zhou , Peng Ning , Xiaolan Zhang , Glenn Ammons
annual computer security applications conference 377 -386
Wu Zhou , Zhi Wang , Yajin Zhou , Xuxian Jiang
conference on data and application security and privacy 199 -210
Wu Zhou , Yajin Zhou , Michael Grace , Xuxian Jiang
Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13 185 -196
Wu Zhou , Yajin Zhou , Xuxian Jiang , Peng Ning
Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12 317 -326
Heqing Huang , Cong Zheng , Junyuan Zeng , Wu Zhou
IEEE Transactions on Big Data 1 -1
Yuping Li , Sankardas Roy , Xinming Ou , Wu Zhou
international conference on detection of intrusions and malware, and vulnerability assessment 252 -276
Wu Zhou , Zhaofeng Chen , Jimmy Su , Jing Xie
Retrieved from FireEye: https://www. fireeye. com/blog/threat-research/2015/12/slembunk_an_evolvin. html
Wu Zhou
North Carolina State University
Zhou Wu , Dang En Ren , Hong Bo Peng , Jiang Dong Sun