A first look at cellular machine-to-machine traffic: large scale measurement and characterization MZ Shafiq, L Ji, AX Liu, J Pang, J Wang ACM SIGMETRICS performance evaluation review 40 (1), 65-76, 2012 | 305 | 2012 |
Characterizing and modeling internet traffic dynamics of cellular devices MZ Shafiq, L Ji, AX Liu, J Wang ACM SIGMETRICS Performance Evaluation Review 39 (1), 265-276, 2011 | 256 | 2011 |
Malware detection using statistical analysis of byte-level file content SM Tabish, MZ Shafiq, M Farooq Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence …, 2009 | 191 | 2009 |
Pe-miner: Mining structural information to detect malicious executables in realtime MZ Shafiq, SM Tabish, F Mirza, M Farooq International Workshop on Recent Advances in Intrusion Detection, 121-141, 2009 | 186 | 2009 |
Using spatio-temporal information in API calls with machine learning algorithms for malware detection F Ahmed, H Hameed, MZ Shafiq, M Farooq Proceedings of the 2nd ACM workshop on Security and artificial intelligence …, 2009 | 166 | 2009 |
A large scale exploratory analysis of software vulnerability life cycles M Shahzad, MZ Shafiq, AX Liu 2012 34th International Conference on Software Engineering (ICSE), 771-781, 2012 | 158 | 2012 |
A first look at cellular network performance during crowded events MZ Shafiq, L Ji, AX Liu, J Pang, S Venkataraman, J Wang ACM SIGMETRICS Performance Evaluation Review 41 (1), 17-28, 2013 | 153 | 2013 |
Large-scale measurement and characterization of cellular machine-to-machine traffic MZ Shafiq, L Ji, AX Liu, J Pang, J Wang IEEE/ACM Transactions on Networking 21 (6), 1960-1973, 2013 | 150 | 2013 |
Understanding the impact of network dynamics on mobile video user engagement MZ Shafiq, J Erman, L Ji, AX Liu, J Pang, J Wang ACM SIGMETRICS Performance Evaluation Review 42 (1), 367-379, 2014 | 146 | 2014 |
A semantics aware approach to automated reverse engineering unknown protocols Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ... 2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012 | 124 | 2012 |
Paying for likes? understanding facebook like fraud using honeypots E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014 | 117 | 2014 |
Embedded Malware Detection Using Markov n-Grams MZ Shafiq, SA Khayam, M Farooq International conference on detection of intrusions and malware, and …, 2008 | 111 | 2008 |
Characterizing geospatial dynamics of application usage in a 3G cellular data network MZ Shafiq, L Ji, AX Liu, J Pang, J Wang 2012 Proceedings IEEE INFOCOM, 1341-1349, 2012 | 100 | 2012 |
Assessing accelerator-based HPC reverse time migration M Araya-Polo, J Cabezas, M Hanzich, M Pericas, F Rubio, I Gelado, ... IEEE Transactions on Parallel and Distributed Systems 22 (1), 147-162, 2010 | 86 | 2010 |
Guidelines to select machine learning scheme for classification of biomedical datasets AK Tanwani, J Afridi, MZ Shafiq, M Farooq European Conference on Evolutionary Computation, Machine Learning and Data …, 2009 | 79 | 2009 |
Fuzzy case-based reasoning for facial expression recognition A Khanum, M Mufti, MY Javed, MZ Shafiq Fuzzy sets and systems 160 (2), 231-250, 2009 | 72 | 2009 |
PE-probe: leveraging packer detection and structural information to detect malicious portable executables MZ Shafiq, S Tabish, M Farooq Proceedings of the Virus Bulletin Conference (VB) 8, 2009 | 65 | 2009 |
Is news sharing on Twitter ideologically biased? JS Morgan, C Lampe, MZ Shafiq Proceedings of the 2013 conference on Computer supported cooperative work …, 2013 | 59 | 2013 |
Evolvable malware S Noreen, S Murtaza, MZ Shafiq, M Farooq Proceedings of the 11th Annual conference on Genetic and evolutionary …, 2009 | 59 | 2009 |
The ad wars: retrospective measurement and analysis of anti-adblock filter lists U Iqbal, Z Shafiq, Z Qian Proceedings of the 2017 Internet Measurement Conference, 171-183, 2017 | 57 | 2017 |