default search action
Zubair Shafiq
Person information
- affiliation: University of California, Davis, USA
- affiliation (former): The University of Iowa, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Micah Sherr, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2024(1): 1-4 (2024) - [j29]Micah Sherr, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2024(2): 1-4 (2024) - [j28]Micah Sherr, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2024(3): 1-3 (2024) - [j27]Micah Sherr, Zubair Shafiq:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2024(4): 1-4 (2024) - [c89]Rajvardhan Oak, Zubair Shafiq:
Understanding Underground Incentivized Review Services. CHI 2024: 950:1-950:18 - [c88]Kajal Patel, Zubair Shafiq, Mateus Schulz Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins:
Harnessing TI Feeds for Exploitation Detection. CSR 2024: 200-207 - [c87]Gianluca Anselmi, Yash Vekaria, Alexander D'Souza, Patricia Callejo, Anna Maria Mandalari, Zubair Shafiq:
Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs. IMC 2024: 622-634 - [c86]Yash Vekaria, Rishab Nithyanand, Zubair Shafiq:
The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain. SP 2024: 1590-1608 - [c85]Shaoor Munir, Patrick Lee, Umar Iqbal, Sandra Siby, Zubair Shafiq:
PURL: Safe and Effective Sanitization of Link Decoration. USENIX Security Symposium 2024 - [i43]Abdul Haddi Amjad, Shaoor Munir, Zubair Shafiq, Muhammad Ali Gulzar:
Blocking Tracking JavaScript at the Function Granularity. CoRR abs/2405.18385 (2024) - [i42]Pouneh Nikkhah Bahrami, Aurore Fass, Zubair Shafiq:
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar. CoRR abs/2406.05310 (2024) - [i41]Yash Vekaria, Rishab Nithyanand, Zubair Shafiq:
Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain. CoRR abs/2406.06958 (2024) - [i40]Hari Venugopalan, Shaoor Munir, Shuaib Ahmed, Tangbaihe Wang, Samuel T. King, Zubair Shafiq:
FP-Inconsistent: Detecting Evasive Bots using Browser Fingerprint Inconsistencies. CoRR abs/2406.07647 (2024) - [i39]Shaoor Munir, Konrad Kollnig, Anastasia Shuba, Zubair Shafiq:
Google's Chrome Antitrust Paradox. CoRR abs/2406.11856 (2024) - [i38]Gianluca Anselmi, Yash Vekaria, Alexander D'Souza, Patricia Callejo, Anna Maria Mandalari, Zubair Shafiq:
Watching TV with the Second-Party: A First Look at Automatic Content Recognition Tracking in Smart TVs. CoRR abs/2409.06203 (2024) - [i37]Kajal Patel, Zubair Shafiq, Mateus Schulz Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins:
Harnessing TI Feeds for Exploitation Detection. CoRR abs/2409.07709 (2024) - 2023
- [j26]Hari Venugopalan, Zain ul Abi Din, Trevor Carpenter, Jason Lowe-Power, Samuel T. King, Zubair Shafiq:
Aragorn: A Privacy-Enhancing System for Mobile Cameras. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(4): 181:1-181:31 (2023) - [j25]Abdul Haddi Amjad, Zubair Shafiq, Muhammad Ali Gulzar:
Blocking JavaScript Without Breaking the Web: An Empirical Investigation. Proc. Priv. Enhancing Technol. 2023(3): 391-404 (2023) - [j24]Jiang Zhang, Hadi Askari, Konstantinos Psounis, Zubair Shafiq:
A Utility-Preserving Obfuscation Approach for YouTube Recommendations. Proc. Priv. Enhancing Technol. 2023(4): 522-539 (2023) - [c84]Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso:
CookieGraph: Understanding and Detecting First-Party Tracking Cookies. CCS 2023: 3490-3504 - [c83]Umar Iqbal, Pouneh Nikkhah Bahrami, Rahmadi Trimananda, Hao Cui, Alexander Gamero-Garrido, Daniel J. Dubois, David R. Choffnes, Athina Markopoulou, Franziska Roesner, Zubair Shafiq:
Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem. IMC 2023: 569-583 - [c82]Shahbaz Rezaei, Zubair Shafiq, Xin Liu:
Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective. SP 2023: 364-381 - [c81]Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq:
AutoFR: Automated Filter Rule Generation for Adblocking. USENIX Security Symposium 2023: 7535-7552 - [i36]Abdul Haddi Amjad, Zubair Shafiq, Muhammad Ali Gulzar:
Blocking JavaScript without Breaking the Web: An Empirical Investigation. CoRR abs/2302.01182 (2023) - [i35]Hari Venugopalan, Kaustav Goswami, Zain ul Abi Din, Jason Lowe-Power, Samuel T. King, Zubair Shafiq:
Centauri: Practical Rowhammer Fingerprinting. CoRR abs/2307.00143 (2023) - [i34]Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby:
PURL: Safe and Effective Sanitization of Link Decoration. CoRR abs/2308.03417 (2023) - [i33]Brijesh Vora, Kartik Patwari, Syed Mahbub Hafiz, Zubair Shafiq, Chen-Nee Chuah:
Benchmarking Adversarial Robustness of Compressed Deep Learning Models. CoRR abs/2308.08160 (2023) - [i32]Yash Vekaria, Zubair Shafiq, Savvas Zannettou:
Before Blue Birds Became X-tinct: Understanding the Effect of Regime Change on Twitter's Advertising and Compliance of Advertising Policies. CoRR abs/2309.12591 (2023) - 2022
- [j23]Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq:
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting. Proc. Priv. Enhancing Technol. 2022(2): 557-577 (2022) - [c80]Wanyue Zhai, Jonathan Rusert, Zubair Shafiq, Padmini Srinivasan:
Adversarial Authorship Attribution for Deobfuscation. ACL (1) 2022: 7372-7384 - [c79]Jonathan Rusert, Zubair Shafiq, Padmini Srinivasan:
On the Robustness of Offensive Language Classifiers. ACL (1) 2022: 7424-7438 - [c78]Han Wang, Syed Mahbub Hafiz, Kartik Patwari, Chen-Nee Chuah, Zubair Shafiq, Houman Homayoun:
Stealthy Inference Attack on DNN via Cache-based Side-Channel Attacks. DATE 2022: 1515-1520 - [c77]Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah:
DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices. EuroS&P 2022: 337-355 - [c76]Jiang Zhang, Konstantinos Psounis, Muhammad Haroon, Zubair Shafiq:
HARPO: Learning to Subvert Online Behavioral Advertising. NDSS 2022 - [c75]Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso:
WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking. USENIX Security Symposium 2022: 2875-2892 - [c74]Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq:
Khaleesi: Breaker of Advertising and Tracking Request Chains. USENIX Security Symposium 2022: 2911-2928 - [i31]Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq:
AutoFR: Automated Filter Rule Generation for Adblocking. CoRR abs/2202.12872 (2022) - [i30]Muhammad Haroon, Anshuman Chhabra, Xin Liu, Prasant Mohapatra, Zubair Shafiq, Magdalena Wojcieszak:
YouTube, The Great Radicalizer? Auditing and Mitigating Ideological Biases in YouTube Recommendations. CoRR abs/2203.10666 (2022) - [i29]Jonathan Rusert, Zubair Shafiq, Padmini Srinivasan:
On The Robustness of Offensive Language Classifiers. CoRR abs/2203.11331 (2022) - [i28]Wanyue Zhai, Jonathan Rusert, Zubair Shafiq, Padmini Srinivasan:
A Girl Has A Name, And It's ... Adversarial Authorship Attribution for Deobfuscation. CoRR abs/2203.11849 (2022) - [i27]Umar Iqbal, Pouneh Nikkhah Bahrami, Rahmadi Trimananda, Hao Cui, Alexander Gamero-Garrido, Daniel J. Dubois, David R. Choffnes, Athina Markopoulou, Franziska Roesner, Zubair Shafiq:
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem. CoRR abs/2204.10920 (2022) - [i26]Ray Ngan, Surya Konkimalla, Zubair Shafiq:
Nowhere to Hide: Detecting Obfuscated Fingerprinting Scripts. CoRR abs/2206.13599 (2022) - [i25]Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso:
COOKIEGRAPH: Measuring and Countering First-Party Tracking Cookies. CoRR abs/2208.12370 (2022) - [i24]Yash Vekaria, Rishab Nithyanand, Zubair Shafiq:
The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain. CoRR abs/2210.06654 (2022) - [i23]Jiang Zhang, Hadi Askari, Konstantinos Psounis, Zubair Shafiq:
No Video Left Behind: A Utility-Preserving Obfuscation Approach for YouTube Recommendations. CoRR abs/2210.08136 (2022) - 2021
- [c73]Nirav Diwan, Tanmoy Chakraborty, Zubair Shafiq:
Fingerprinting Fine-tuned Language Models in the Wild. ACL/IJCNLP (Findings) 2021: 4652-4664 - [c72]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou:
Eluding ML-based Adblockers With Actionable Adversarial Examples. ACSAC 2021: 541-553 - [c71]Shaoor Munir, Brishna Batool, Zubair Shafiq, Padmini Srinivasan, Fareed Zaffar:
Through the Looking Glass: Learning to Attribute Synthetic Text Generated by Language Models. EACL 2021: 1811-1822 - [c70]Abdul Haddi Amjad, Danial Saleem, Muhammad Ali Gulzar, Zubair Shafiq, Fareed Zaffar:
TrackerSift: untangling mixed tracking and functional web resources. Internet Measurement Conference 2021: 569-576 - [c69]Hieu Le, Athina Markopoulou, Zubair Shafiq:
CV-Inspector: Towards Automating Detection of Adblock Circumvention. NDSS 2021 - [c68]Umar Iqbal, Steven Englehardt, Zubair Shafiq:
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors. SP 2021: 1143-1161 - [i22]Shahbaz Rezaei, Zubair Shafiq, Xin Liu:
Accuracy-Privacy Trade-off in Deep Ensembles. CoRR abs/2105.05381 (2021) - [i21]Nirav Diwan, Tanmoy Chakraborty, Zubair Shafiq:
Fingerprinting Fine-tuned Language Models in the Wild. CoRR abs/2106.01703 (2021) - [i20]Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso:
WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking. CoRR abs/2107.11309 (2021) - [i19]Abdul Haddi Amjad, Danial Saleem, Fareed Zaffar, Muhammad Ali Gulzar, Zubair Shafiq:
TrackerSift: Untangling Mixed Tracking and Functional Web Resources. CoRR abs/2108.13923 (2021) - [i18]Muhammad Haroon, Muhammad Fareed Zaffar, Padmini Srinivasan, Zubair Shafiq:
Avengers Ensemble! Improving Transferability of Authorship Obfuscation. CoRR abs/2109.07028 (2021) - [i17]Jiang Zhang, Konstantinos Psounis, Muhammad Haroon, Zubair Shafiq:
HARPO: Learning to Subvert Online Behavioral Advertising. CoRR abs/2111.05792 (2021) - [i16]Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq:
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting. CoRR abs/2112.01662 (2021) - 2020
- [j22]Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq:
Measuring and mitigating OAuth access token abuse by collusion networks. Commun. ACM 63(5): 103-111 (2020) - [j21]John Cook, Rishab Nithyanand, Zubair Shafiq:
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding. Proc. Priv. Enhancing Technol. 2020(1): 65-82 (2020) - [j20]Janus Varmarken, Hieu Le, Anastasia Shuba, Athina Markopoulou, Zubair Shafiq:
The TV is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking. Proc. Priv. Enhancing Technol. 2020(2): 129-154 (2020) - [j19]Shehroze Farooqi, Maaz Bin Musa, Zubair Shafiq, Fareed Zaffar:
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks. Proc. Priv. Enhancing Technol. 2020(4): 336-354 (2020) - [j18]Xun Zhou, Huigui Rong, Chang Yang, Qun Zhang, Amin Vahedian Khezerlou, Hui Zheng, Zubair Shafiq, Alex X. Liu:
Optimizing Taxi Driver Profit Efficiency: A Spatial Network-Based Markov Decision Process Approach. IEEE Trans. Big Data 6(1): 145-158 (2020) - [j17]Muhammad Shahzad, M. Zubair Shafiq, Alex X. Liu:
Large Scale Characterization of Software Vulnerability Life Cycles. IEEE Trans. Dependable Secur. Comput. 17(4): 730-744 (2020) - [c67]Asad Mahmood, Zubair Shafiq, Padmini Srinivasan:
A Girl Has A Name: Detecting Authorship Obfuscation. ACL 2020: 2235-2245 - [c66]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez:
Understanding Incentivized Mobile App Installs on Google Play Store. Internet Measurement Conference 2020: 696-709 - [c65]M. Hammad Mazhar, Zubair Shafiq:
Characterizing Smart Home IoT Traffic in the Wild. IoTDI 2020: 203-215 - [c64]Adnan Ahmed, Ricky Mok, Zubair Shafiq:
FlowTrace : A Framework for Active Bandwidth Measurements Using In-band Packet Trains. PAM 2020: 37-51 - [c63]Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq:
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking. SP 2020: 763-776 - [i15]M. Hammad Mazhar, Zubair Shafiq:
Characterizing Smart Home IoT Traffic in the Wild. CoRR abs/2001.08288 (2020) - [i14]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq:
A4 : Evading Learning-based Adblockers. CoRR abs/2001.10999 (2020) - [i13]Asad Mahmood, Zubair Shafiq, Padmini Srinivasan:
A Girl Has A Name: Detecting Authorship Obfuscation. CoRR abs/2005.00702 (2020) - [i12]Shehroze Farooqi, Maaz Bin Musa, Zubair Shafiq, Fareed Zaffar:
CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks. CoRR abs/2006.15794 (2020) - [i11]Umar Iqbal, Steven Englehardt, Zubair Shafiq:
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors. CoRR abs/2008.04480 (2020) - [i10]Shehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez:
Understanding Incentivized Mobile App Installs on Google Play Store. CoRR abs/2010.01497 (2020)
2010 – 2019
- 2019
- [j16]Asad Mahmood, Faizan Ahmad, Zubair Shafiq, Padmini Srinivasan, Fareed Zaffar:
A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X. Proc. Priv. Enhancing Technol. 2019(4): 54-71 (2019) - [j15]Jonathan Rusert, Osama Khalid, Dat Hong, Zubair Shafiq, Padmini Srinivasan:
No Place to Hide: Inadvertent Location Privacy Leaks on Twitter. Proc. Priv. Enhancing Technol. 2019(4): 172-189 (2019) - [c62]Huyen T. Le, G. R. Boynton, Zubair Shafiq, Padmini Srinivasan:
A postmortem of suspended Twitter accounts in the 2016 U.S. presidential election. ASONAM 2019: 258-265 - [c61]Shehroze Farooqi, Zubair Shafiq:
Measurement and Early Detection of Third-Party Application Abuse on Twitter. WWW 2019: 448-458 - [c60]Shitong Zhu, Umar Iqbal, Zhongjie Wang, Zhiyun Qian, Zubair Shafiq, Weiteng Chen:
ShadowBlock: A Lightweight and Stealthy Adblocking Browser. WWW 2019: 2483-2493 - [c59]Huyen T. Le, Raven Maragh, Brian Ekdale, Andrew High, Timothy Havens, Zubair Shafiq:
Measuring Political Personalization of Google News Search. WWW 2019: 2957-2963 - [i9]John Cook, Rishab Nithyanand, Zubair Shafiq:
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding. CoRR abs/1907.07275 (2019) - [i8]Janus Varmarken, Hieu Le, Anastasia Shuba, Zubair Shafiq, Athina Markopoulou:
The TV is Smart and Full of Trackers: Towards Understanding the Smart TV Advertising and Tracking Ecosystem. CoRR abs/1911.03447 (2019) - 2018
- [j14]Anastasia Shuba, Athina Markopoulou, Zubair Shafiq:
NoMoAds: Effective and Efficient Cross-App Mobile Ad-Blocking. Proc. Priv. Enhancing Technol. 2018(4): 125-140 (2018) - [j13]Faraz Ahmed, M. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu:
Optimizing Internet Transit Routing for Content Delivery Networks. IEEE/ACM Trans. Netw. 26(1): 76-89 (2018) - [c58]M. Hammad Mazhar, Zubair Shafiq:
Real-time Video Quality of Experience Monitoring for HTTPS and QUIC. INFOCOM 2018: 1331-1339 - [c57]Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin:
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. NDSS 2018 - [c56]Dirk Ahlers, Erik Wilde, Rossano Schifanella, Jalal S. Alowibdi, Muhammad Zubair Shafiq:
LocWeb2018 Chairs' Welcome & Organization. WWW (Companion Volume) 2018: 1188-1189 - [i7]Umar Iqbal, Zubair Shafiq, Peter Snyder, Shitong Zhu, Zhiyun Qian, Benjamin Livshits:
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking. CoRR abs/1805.09155 (2018) - 2017
- [j12]Brandon Wang, Xiaoye Li, Leandro Pfleger de Aguiar, Daniel S. Menasché, Zubair Shafiq:
Characterizing and Modeling Patching Practices of Industrial Control Systems. Proc. ACM Meas. Anal. Comput. Syst. 1(1): 18:1-18:23 (2017) - [j11]Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq:
Detecting Anti Ad-blockers in the Wild. Proc. Priv. Enhancing Technol. 2017(3): 130 (2017) - [j10]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Trans. Priv. Secur. 20(4): 13:1-13:28 (2017) - [j9]Amin Vahedian Khezerlou, Xun Zhou, Lufan Li, Zubair Shafiq, Alex X. Liu, Fan Zhang:
A Traffic Flow Approach to Early Detection of Gathering Events: Comprehensive Results. ACM Trans. Intell. Syst. Technol. 8(6): 74:1-74:24 (2017) - [c55]Huyen T. Le, G. R. Boynton, Yelena Mejova, Zubair Shafiq, Padmini Srinivasan:
Revisiting The American Voter on Twitter. CHI 2017: 4507-4519 - [c54]Shehroze Farooqi, Guillaume Jourjon, Muhammad Ikram, Mohamed Ali Kâafar, Emiliano De Cristofaro, Muhammad Zubair Shafiq, Arik Friedman, Fareed Zaffar:
Characterizing key stakeholders in an online black-hat marketplace. eCrime 2017: 17-27 - [c53]Huyen T. Le, G. R. Boynton, Yelena Mejova, Zubair Shafiq, Padmini Srinivasan:
Bumps and Bruises: Mining Presidential Campaign Announcements on Twitter. HT 2017: 215-224 - [c52]Sikder Huq, M. Zubair Shafiq, Sukumar Ghosh, Amir R. Khakpour, Harkeerat Bedi:
Distributed Load Balancing in Key-Value Networked Caches. ICDCS 2017: 583-593 - [c51]Usman Shahid, Shehroze Farooqi, Raza Ahmad, Zubair Shafiq, Padmini Srinivasan, Fareed Zaffar:
Accurate Detection of Automatically Spun Content via Stylometric Analysis. ICDM 2017: 425-434 - [c50]Adnan Ahmed, Zubair Shafiq, Harkeerat Bedi, Amir R. Khakpour:
Peering vs. transit: Performance comparison of peering and transit interconnections. ICNP 2017: 1-10 - [c49]Adnan Ahmed, Zubair Shafiq, Harkeerat Bedi, Amir R. Khakpour:
Suffering from buffering? Detecting QoE impairments in live video streams. ICNP 2017: 1-10 - [c48]Ali Munir, Zhiyun Qian, Zubair Shafiq, Alex X. Liu, Franck Le:
Multipath TCP traffic diversion attacks and countermeasures. ICNP 2017: 1-10 - [c47]Huyen T. Le, Zubair Shafiq, Padmini Srinivasan:
Scalable News Slant Measurement Using Twitter. ICWSM 2017: 584-587 - [c46]Umar Iqbal, Zubair Shafiq, Zhiyun Qian:
The ad wars: retrospective measurement and analysis of anti-adblock filter lists. Internet Measurement Conference 2017: 171-183 - [c45]Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq:
Measuring and mitigating oauth access token abuse by collusion networks. Internet Measurement Conference 2017: 355-368 - [c44]Zubair Shafiq, Alex X. Liu:
Cascade size prediction in online social networks. Networking 2017: 1-9 - [c43]Zubair Shafiq, Alex X. Liu:
A graph theoretic approach to fast and accurate malware detection. Networking 2017: 1-9 - [c42]M. Zubair Shafiq:
Tracking and optimizing Quality of Experience in the encrypted internet. PerCom Workshops 2017: 296 - [c41]Brandon Wang, Xiaoye Li, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché, Zubair Shafiq:
Characterizing and Modeling Patching Practices of Industrial Control Systems. SIGMETRICS (Abstracts) 2017: 9 - [i6]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. CoRR abs/1707.00190 (2017) - 2016
- [j8]Marco Fiore, Zubair Shafiq, Zbigniew Smoreda, Razvan Stanica, Roberto Trasarti:
Special Issue on Mobile Traffic Analytics. Comput. Commun. 95: 1-2 (2016) - [j7]M. Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang:
Characterizing and Optimizing Cellular Network Performance During Crowded Events. IEEE/ACM Trans. Netw. 24(3): 1308-1321 (2016) - [c40]Huigui Rong, Xun Zhou, Chang Yang, M. Zubair Shafiq, Alex X. Liu:
The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency. CIKM 2016: 2329-2334 - [c39]Salman Yousaf, Umar Iqbal, Shehroze Farooqi, Raza Ahmad, Muhammad Zubair Shafiq, Fareed Zaffar:
Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges. DSN 2016: 572-582 - [c38]Xun Zhou, Amin Vahedian Khezerlou, Alex X. Liu, M. Zubair Shafiq, Fan Zhang:
A traffic flow approach to early detection of gathering events. SIGSPATIAL/GIS 2016: 4:1-4:10 - [c37]Faraz Ahmed, M. Zubair Shafiq, Alex X. Liu:
The Internet is for Porn: Measurement and Analysis of Online Adult Traffic. ICDCS 2016: 88-97 - [c36]Faraz Ahmed, M. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu:
Optimizing Internet transit routing for content delivery networks. ICNP 2016: 1-10 - [c35]M. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu:
Characterizing caching workload of a large commercial Content Delivery Network. INFOCOM 2016: 1-9 - [c34]Adnan Ahmed, M. Zubair Shafiq, Amir R. Khakpour:
QoE Analysis of a Large-Scale Live Video Streaming Event. SIGMETRICS 2016: 395-396 - [i5]Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui:
A First Look at Ad-block Detection: A New Arms Race on the Web. CoRR abs/1605.05841 (2016) - 2015
- [j6]M. Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Geospatial and Temporal Dynamics of Application Usage in Cellular Data Networks. IEEE Trans. Mob. Comput. 14(7): 1369-1381 (2015) - [i4]Shehroze Farooqi, Muhammad Ikram, Gohar Irfan, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq, Fareed Zaffar:
Characterizing Seller-Driven Black-Hat Marketplaces. CoRR abs/1505.01637 (2015) - [i3]Muhammad Ikram, Lucky Onwuzurike, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Spying on Spammers: Tracking Like Farm Accounts on Facebook. CoRR abs/1506.00506 (2015) - 2014
- [c33]Saad Saleh, Mamoon Raja, Muhammad Shahnawaz, Muhammad Usman Ilyas, Khawar Khurshid, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha, Shirish S. Karande:
Breaching IM session privacy using causality. GLOBECOM 2014: 686-691 - [c32]Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq:
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. Internet Measurement Conference 2014: 129-136 - [c31]Muhammad Zubair Shafiq, Jeffrey Erman, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Understanding the impact of network dynamics on mobile video user engagement. SIGMETRICS 2014: 367-379 - [c30]Muhammad Zubair Shafiq, Alex X. Liu, Amir R. Khakpour:
Revisiting caching in content delivery networks. SIGMETRICS 2014: 567-568 - [i2]Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots. CoRR abs/1409.2097 (2014) - 2013
- [j5]Muhammad Zubair Shafiq, Chad R. Meiners, Zheng Qin, Ke Shen, Alex X. Liu:
TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems. J. Netw. Syst. Manag. 21(3): 335-352 (2013) - [j4]Muhammad Zubair Shafiq, Muhammad Usman Ilyas, Alex X. Liu, Hayder Radha:
Identifying Leaders and Followers in Online Social Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 618-628 (2013) - [j3]Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha:
A Distributed Algorithm for Identifying Information Hubs in Social Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 629-640 (2013) - [j2]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic. IEEE/ACM Trans. Netw. 21(6): 1960-1973 (2013) - [c29]M. Zubair Shafiq:
Leveraging diversity to optimize performance in mobile networks. CoNEXT Student Workhop 2013: 9-12 - [c28]Jonathan Scott Morgan, Cliff Lampe, Muhammad Zubair Shafiq:
Is news sharing on Twitter ideologically biased? CSCW 2013: 887-896 - [c27]M. Zubair Shafiq, Franck Le, Mudhakar Srivatsa, Alex X. Liu:
Cross-path inference attacks on multipath TCP. HotNets 2013: 15:1-15:7 - [c26]Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha:
Who are you talking to? Breaching privacy in encrypted IM networks. ICNP 2013: 1-10 - [c25]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang:
A first look at cellular network performance during crowded events. SIGMETRICS 2013: 17-28 - [i1]Muhammad Zubair Shafiq, Alex X. Liu:
Modeling Morphology of Social Network Cascades. CoRR abs/1302.2376 (2013) - 2012
- [c24]Yipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao, Yongzheng Zhang, Li Guo:
A semantics aware approach to automated reverse engineering unknown protocols. ICNP 2012: 1-10 - [c23]Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. Liu:
A large scale exploratory analysis of software vulnerability life cycles. ICSE 2012: 771-781 - [c22]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Characterizing geospatial dynamics of application usage in a 3G cellular data network. INFOCOM 2012: 1341-1349 - [c21]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
A first look at cellular machine-to-machine traffic: large scale measurement and characterization. SIGMETRICS 2012: 65-76 - 2011
- [c20]Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha:
A distributed and privacy preserving algorithm for identifying information hubs in social networks. INFOCOM 2011: 561-565 - [c19]Muhammad Zubair Shafiq, Alex X. Liu:
A Random Walk Approach to Modeling the Dynamics of the Blogosphere. Networking (1) 2011: 294-306 - [c18]Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jia Wang:
Characterizing and modeling internet traffic dynamics of cellular devices. SIGMETRICS 2011: 305-316
2000 – 2009
- 2009
- [j1]Aasia Khanum, Muid Mufti, Muhammad Younus Javed, M. Zubair Shafiq:
Fuzzy case-based reasoning for facial expression recognition. Fuzzy Sets Syst. 160(2): 231-250 (2009) - [c17]Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq:
Using spatio-temporal information in API calls with machine learning algorithms for malware detection. AISec 2009: 55-62 - [c16]Ajay Kumar Tanwani, M. Jamal Afridi, M. Zubair Shafiq, Muddassar Farooq:
Guidelines to Select Machine Learning Scheme for Classification of Biomedical Datasets. EvoBIO 2009: 128-139 - [c15]Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq:
Evolvable malware. GECCO 2009: 1569-1576 - [c14]M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq:
Are evolutionary rule learning algorithms appropriate for malware detection? GECCO 2009: 1915-1916 - [c13]M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq:
On the appropriateness of evolutionary rule learning algorithms for malware detection. GECCO (Companion) 2009: 2609-2616 - [c12]Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish, Muddassar Farooq:
A Sense of 'Danger' for Windows Processes. ICARIS 2009: 220-233 - [c11]S. Momina Tabish, M. Zubair Shafiq, Muddassar Farooq:
Malware detection using statistical analysis of byte-level file content. KDD Workshop on CyberSecurity and Intelligence Informatics 2009: 23-31 - [c10]M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq:
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. RAID 2009: 121-141 - [c9]Mobin Javed, Ayesha Binte Ashfaq, M. Zubair Shafiq, Syed Ali Khayam:
On the Inefficient Use of Entropy for Anomaly Detection. RAID 2009: 369-370 - [c8]Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq:
Using Formal Grammar and Genetic Operators to Evolve Malware. RAID 2009: 374-375 - 2008
- [c7]M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq:
Embedded Malware Detection Using Markov n-Grams. DIMVA 2008: 88-107 - [c6]M. Zubair Shafiq, Muddassar Farooq, Syed Ali Khayam:
A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. EvoWorkshops 2008: 52-61 - [c5]M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq:
Improving accuracy of immune-inspired malware detectors by using intelligent features. GECCO 2008: 119-126 - 2007
- [c4]Aasia Khanum, M. Zubair Shafiq, E. Muhammad:
CBR: Fuzzified case retrieval approach for facial expression recognition. Artificial Intelligence and Applications 2007: 182-187 - [c3]M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq:
Extended thymus action for improving response of AIS based NID system against malicious traffic. IEEE Congress on Evolutionary Computation 2007: 3369-3376 - [c2]M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq:
Extended thymus action for reducing false positives in ais based network intrusion detection systems. GECCO 2007: 182 - [c1]M. Zubair Shafiq, Muddassar Farooq:
Defence Against 802.11 DoS Attacks Using Artificial Immune System. ICARIS 2007: 95-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint