Mingyi Zhao
Mingyi Zhao
Verified email at
Cited by
Cited by
Comparing different moving target defense techniques
J Xu, P Guo, M Zhao, RF Erbacher, M Zhu, P Liu
Proceedings of the First ACM Workshop on Moving Target Defense, 97-107, 2014
An empirical study of web vulnerability discovery ecosystems
M Zhao, J Grossklags, P Liu
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs
T Maillart, M Zhao, J Grossklags, J Chuang
Journal of Cybersecurity 3 (2), 81-90, 2017
Devising effective policies for bug-bounty platforms and security vulnerability discovery
M Zhao, A Laszka, J Grossklags
Journal of Information Policy 7, 372-418, 2017
Banishing misaligned incentives for validating reports in bug-bounty platforms
A Laszka, M Zhao, J Grossklags
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
An exploratory study of white hat behaviors in a web vulnerability disclosure program
M Zhao, J Grossklags, K Chen
Proceedings of the 2014 ACM workshop on security information workers, 51-58, 2014
The rules of engagement for bug bounty programs
A Laszka, M Zhao, A Malbari, J Grossklags
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
Risk assessment of buffer" Heartbleed" over-read vulnerabilities
J Wang, M Zhao, Q Zeng, D Wu, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
Heaptherapy: An efficient end-to-end solution against heap buffer overflows
Q Zeng, M Zhao, P Liu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
Crowdsourced security vulnerability discovery: Modeling and organizing bug-bounty programs
M Zhao, A Laszka, T Maillart, J Grossklags
The HCOMP Workshop on Mathematical Foundations of Human Computation, Austin …, 2016
Enforcement of autonomous authorizations in collaborative distributed query evaluation
Q Zeng, M Zhao, P Liu, P Yadav, S Calo, J Lobo
IEEE Transactions on Knowledge and Data Engineering 27 (4), 979-992, 2014
Towards Agile Cyber Analysis: Leveraging Visualization as Functions in Collaborative Visual Analytics
C Zhong, M Zhao, G Xiao, J Xu
IEEE, 2017
Empirical analysis and modeling of black-box mutational fuzzing
M Zhao, P Liu
Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016
Towards collaborative query planning in multi-party database networks
M Zhao, P Liu, J Lobo
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
Modeling and checking the security of DIFC system configurations
M Zhao, P Liu
Automated Security Management, 21-38, 2013
Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration
M Zhao
Poster: Targeted therapy for program bugs
Q Zeng, M Zhao, P Liu
the 35th IEEE Symposium on Security and Privacy, 2014
Federating geovisual analytic tools for cyber security analysis
M Zhao, C Zhong, R Ciamaichelo, M Konek, N Sawant, NA Giacobe
2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 303-304, 2012
Secure Zero-Day Detection: Wiping Off the VEP Trade-Off
M Zhao, M Yung
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race …, 2019
Authorization Information Leakage Control in Collaborative Distributed Query Processing
M Zhao, P Liu, Q Zeng, F Ye, S Calo, G Bent, P Dantressangle, J Lobo
order 10, 10, 0
The system can't perform the operation now. Try again later.
Articles 1–20