Shitong Zhu
Orcid: 0009-0000-7034-4202
According to our database1,
Shitong Zhu
authored at least 21 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Ingest-And-Ground: Dispelling Hallucinations from Continually-Pretrained LLMs with RAG.
CoRR, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
2022
Incremental-Compensation based Low-Cost Offline Robust Topology Control for Micro/Nano Satellite Network.
J. Inf. Sci. Eng., 2022
2021
PhD thesis, 2021
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency.
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020
2019
Proceedings of the World Wide Web Conference, 2019
2018
CoRR, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2015
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
2014