Xiaoli Zhang

Orcid: 0009-0005-8317-5539

Affiliations:
  • Zhejiang University of Technology, Department of Computer Science, Hangzhou, China
  • Tsinghua University, Computer Science and Technology, Beijing, China (PhD 2020)


According to our database1, Xiaoli Zhang authored at least 20 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TEBChain: A Trusted and Efficient Blockchain-Based Data Sharing Scheme in UAV-Assisted IoV for Disaster Rescue.
IEEE Trans. Netw. Serv. Manag., August, 2024

Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds.
IEEE/ACM Trans. Netw., February, 2024

EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention.
IEEE Trans. Inf. Forensics Secur., 2024

From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

RobustETH: Ensuring Economic Fairness in ETH2.0's Distributed Validator Technology.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
An Efficient and Secure Trading Framework for Shared Charging Service Based on Multiple Consortium Blockchains.
IEEE Trans. Serv. Comput., 2023

EPT: Enhancing User Transparency for Confidential Smart Contract.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Accelerating State Synchronization in Bitcoin Combining Secure Snapshot with IPFS.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

An Efficient Fully Homomorphic Encryption Sorting Algorithm Using Addition Over TFHE.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud.
IEEE/ACM Trans. Netw., 2021

Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Toward Comprehensive Network Verification: Practices, Challenges and Beyond.
IEEE Netw., 2020

Enabling Execution Assurance of Federated Learning at Untrusted Participants.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2017
Generic and agile service function chain verification on cloud.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017


  Loading...