Personal information

Network Security
China

Activities

Employment (1)

Tsinghua University: Beijing, Beijing, CN

Employment
Source: Self-asserted source
Jia Zhang

Works (16)

Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider

2024-11-04 | Conference paper
Contributors: Ruixuan Li; Shaodong Xiao; Baojun Liu; Yanzhong Lin; Haixin Duan; Qingfeng Pan; Jianjun Chen; Jia Zhang; Ximeng Liu; Xiuqi Lu et al.
Source: check_circle
Crossref

Stolen Risks of Models with Security Properties

2023-11-15 | Conference paper
Contributors: Yue Qin; Zhuoqun Fu; Chuyun Deng; Xiaojing Liao; Jia Zhang; Haixin Duan
Source: check_circle
Crossref

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers

2023-11-15 | Conference paper
Contributors: Wei Xu; Xiang Li; Chaoyi Lu; Baojun Liu; Haixin Duan; Jia Zhang; Jianjun Chen; Tao Wan
Source: check_circle
Crossref

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild

2023-11-15 | Conference paper
Contributors: Zhenrui Zhang; Geng Hong; Xiang Li; Zhuoqun Fu; Jia Zhang; Mingxuan Liu; Chuhan Wang; Jianjun Chen; Baojun Liu; Haixin Duan et al.
Source: check_circle
Crossref

CDN Backfired: Amplification Attacks Based on HTTP Range Requests

2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
2020-06 | Conference paper
Source: Self-asserted source
Jia Zhang

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation

2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)
2018-10 | Conference paper
Source: Self-asserted source
Jia Zhang

Analysis and Measurement of Zone Dependency in the Domain Name System

2018 IEEE International Conference on Communications (ICC)
2018-05 | Conference paper
Source: Self-asserted source
Jia Zhang

How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope

GLOBECOM 2017 - 2017 IEEE Global Communications Conference
2017-12 | Conference paper
Source: Self-asserted source
Jia Zhang

Analysis of Anonymity in P2P Anonymous Communication Systems

2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
2010 | Conference paper
Source: Self-asserted source
Jia Zhang

WindTalker: A P2P-Based Low-Latency Anonymous Communication Network

IEICE Transactions on Communications
2009 | Journal article
Part of ISSN: 0916-8516
Part of ISSN: 1745-1345
Source: Self-asserted source
Jia Zhang

A Fast Method of Signature Generation for Polymorphic Worms

2008 International Conference on Computer and Electrical Engineering
2008-12 | Conference paper
Source: Self-asserted source
Jia Zhang

A Novel Method to Prevent Traffic Analysis in Low-Latency Anonymous Communication Systems

2008 International Conference on Computer and Electrical Engineering
2008-12 | Conference paper
Source: Self-asserted source
Jia Zhang

AMCAS: An Automatic Malicious Code Analysis System

2008 The Ninth International Conference on Web-Age Information Management
2008-07 | Conference paper
Source: Self-asserted source
Jia Zhang

Anonymity analysis of P2P anonymous communication systems

COMPUTER COMMUNICATIONS
Journal article
Part of ISSN: {0140-3664}
Part of ISSN: {1873-703X}
Source: Self-asserted source
Jia Zhang

Finding the best answer: measuring the optimization of public and authoritative DNS

SCIENCE CHINA-INFORMATION SCIENCES
Journal article
Part of ISSN: {1674-733X}
Part of ISSN: {1869-1919}
Source: Self-asserted source
Jia Zhang

Wind Talker: A P2P-Based Low-Latency Anonymous Communication Network

IEICE TRANSACTIONS ON COMMUNICATIONS
Journal article
Part of ISSN: {0916-8516}
Part of ISSN: {1745-1345}
Source: Self-asserted source
Jia Zhang