Z. Morley Mao
Orcid: 0000-0002-9844-2055Affiliations:
- University of Michigan, Ann Arbor, USA
According to our database1,
Z. Morley Mao
authored at least 236 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2023, "For contributions to Internet security and performance".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
FATH: Authentication-based Test-time Defense against Indirect Prompt Injection Attacks.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models.
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
The Case for Boosting Mobile Application QoE via Smart Band Switching in 5G/xG Networks.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024
Boosting Collaborative Vehicular Perception on the Edge with Vehicle-to-Vehicle Communication.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024
Proceedings of the 15th ACM Multimedia Systems Conference, 2024
Proceedings of the Seventh Annual Conference on Machine Learning and Systems, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
2023
Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration.
IEEE Trans. Intell. Transp. Syst., September, 2023
Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free Backdoor Removal via Stabilized Model Inversion.
Trans. Mach. Learn. Res., 2023
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Detecting Data Spoofing in Connected Vehicle based Intelligent Traffic Signal Control using Infrastructure-Side Sensors and Traffic Invariants.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2023
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
A Critical Revisit of Adversarial Robustness in 3D Point Cloud Recognition with Diffusion-Driven Purification.
Proceedings of the International Conference on Machine Learning, 2023
LEO Satellite vs. Cellular Networks: Exploring the Potential for Synergistic Integration.
Proceedings of the Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, 2023
Proceedings of the 34th British Machine Vision Conference 2023, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition.
CoRR, 2022
CoRR, 2022
Toward an Automated Learning Control Architecture for Cyber-Physical Manufacturing Systems.
IEEE Access, 2022
Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
A Spectral View of Randomized Smoothing Under Common Corruptions: Benchmarking and Improving Certified Robustness.
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Conference on Robot Learning, 2022
Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software.
Proc. ACM Meas. Anal. Comput. Syst., 2021
Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines.
CoRR, 2021
Commun. ACM, 2021
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021
Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection Sensor Fusion Models.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the 32nd British Machine Vision Conference 2021, 2021
2020
Impact Evaluation of Falsified Data Attacks on Connected Vehicle Based Traffic Signal Control.
CoRR, 2020
Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.
Proceedings of the 29th USENIX Security Symposium, 2020
What you see is what you get: measure ABR video streaming QoE via on-device screen recording.
Proceedings of the 30th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2020
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, 2020
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020
2019
Proc. ACM Meas. Anal. Comput. Syst., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM Symposium on SDN Research, 2019
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019
Proceedings of the 11th on Wireless of the Students, 2019
Proceedings of the 11th on Wireless of the Students, 2019
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
PerfProbe: a systematic, cross-layer performance diagnosis framework for mobile platforms.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Production as a Service: A Digital Manufacturing Framework for Optimizing Utilization.
IEEE Trans Autom. Sci. Eng., 2018
Dragon: Scalable, Flexible, and Efficient Traffic Engineering in Software Defined ISP Networks.
IEEE J. Sel. Areas Commun., 2018
IEEE J. Sel. Areas Commun., 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Proceedings of the Symposium on SDN Research, 2018
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018
2017
Categorization of Anomalies in Smart Manufacturing Systems to Support the Selection of Detection Mechanisms.
IEEE Robotics Autom. Lett., 2017
Push or Request: An Investigation of HTTP/2 Server Push for Improving Mobile Performance.
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017
2016
IEEE Internet Comput., 2016
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Symposium on SDN Research, 2016
Proceedings of the 2016 workshop on QoE-based Analysis and Management of Data Communication Networks, 2016
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
An in-depth understanding of multipath TCP on mobile devices: measurement and system design.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
ACM Trans. Internet Techn., 2015
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
IEEE Trans. Mob. Comput., 2015
GetMobile Mob. Comput. Commun., 2015
suMMarY report for the First NSF Workshop on Mobile Community Measurement Infrastructure.
GetMobile Mob. Comput. Commun., 2015
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015
SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015
2014
IEEE Internet Comput., 2014
MCNet: Crowdsourcing wireless performance measurements through the eyes of mobile devices.
IEEE Commun. Mag., 2014
Comput. Commun. Rev., 2014
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Proceedings of the Open Networking Summit 2014 - Research Track, 2014
Distributing Mobile Music Applications for Audience Participation Using Mobile Ad-hoc Network (MANET).
Proceedings of the 14th International Conference on New Interfaces for Musical Expression, 2014
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014
Proceedings of the 6th annual workshop on Wireless of the students, 2014
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014
2013
An in-depth study of LTE: effect of network protocol and application behavior on performance.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013
PROTEUS: network performance forecast for real-time, interactive mobile applications.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Panappticon: Event-based tracing to measure mobile application and platform performance.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2013
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Periodic transfers in mobile applications: network-wide origin, impact, and optimization.
Proceedings of the 21st World Wide Web Conference 2012, 2012
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 10th International Conference on Mobile Systems, 2012
Proceedings of the 10th International Conference on Mobile Systems, 2012
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012
Proceedings of the European Workshop on Software Defined Networking, 2012
Proceedings of the 10th International Conference on Hardware/Software Codesign and System Synthesis, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011
Cellular data network infrastructure characterization and implication on mobile content placement.
Proceedings of the SIGMETRICS 2011, 2011
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Using predictable mobility patterns to support scalable and secure MANETs of handheld devices.
Proceedings of the sixth international workshop on MobiArch, MobiArch '11, Bethesda, 2011
Proceedings of the Middleware 2011, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the SIGMETRICS 2010, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the 8th International Conference on Mobile Systems, 2010
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2010
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010
Proceedings of the 47th Design Automation Conference, 2010
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010
Accurate online power estimation and automatic battery behavior based power model generation for smartphones.
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010
2009
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, 2009
Proceedings of the ACM SIGCOMM 2009 Workshop on Programmable Routers for Extensible Services of Tomorrow, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
PACMAN: a platform for automated and controlled network operations and configuration management.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009
2008
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 7th ACM Workshop on Hot Topics in Networks, 2008
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007
Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management, 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007
2006
Internet-scale malware mitigation: combining intelligence of the control and data plane.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006
Proceedings of the 2006 USENIX Annual Technical Conference, 2006
A measurement study on the impact of routing events on end-to-end internet path performance.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
2005
IEEE Netw., 2005
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005
Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the 5th Internet Measurement Conference, 2005
2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004
Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, 2004
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004
2003
Proceedings of the Twelfth International World Wide Web Conference, 2003
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003
2002
IEEE Commun. Mag., 2002
A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers.
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002
Proceedings of the Pervasive Computing, 2002
2001
Comput. Networks, 2001
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001
2000
IEEE Wirel. Commun., 2000