Zhuotao Liu

Orcid: 0000-0002-7532-0434

According to our database1, Zhuotao Liu authored at least 63 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-Off.
IEEE Trans. Veh. Technol., May, 2024

CoGNN: Towards Secure and Efficient Collaborative Graph Learning (Artifacts).
Dataset, May, 2024

Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations.
IEEE Trans. Inf. Forensics Secur., 2024

Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping.
IEEE Trans. Dependable Secur. Comput., 2024

CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
IACR Cryptol. ePrint Arch., 2024

Towards Fine-Grained Webpage Fingerprinting at Scale.
CoRR, 2024

Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
Proceedings of the 33rd USENIX Security Symposium, 2024

Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
Proceedings of the 33rd USENIX Security Symposium, 2024

Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

NetSentry: Scalable Volumetric DDoS Detection with Programmable Switches.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

Efficient Clustering on Encrypted Data.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Threshold-Based Routing-Topology Co-Design for Optical Data Center.
IEEE/ACM Trans. Netw., December, 2023

Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments.
CoRR, 2023

CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023

LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers.
CoRR, 2023

Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification.
Proceedings of the ACM Web Conference 2023, 2023

An Efficient Design of Intelligent Network Data Plane.
Proceedings of the 32nd USENIX Security Symposium, 2023

Cross Container Attacks: The Bewildered eBPF on Clouds.
Proceedings of the 32nd USENIX Security Symposium, 2023


Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur., 2022

An Automated Multi-Tab Website Fingerprinting Attack.
IEEE Trans. Dependable Secur. Comput., 2022

Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput., 2022

Practical differentially private online advertising.
Comput. Secur., 2022

RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

Back-Propagating System Dependency Impact for Attack Investigation.
Proceedings of the 31st USENIX Security Symposium, 2022

Unsupervised Contextual Anomaly Detection for Database Systems.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

DIP: unifying network layer innovations using shared L3 core functions.
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 2022

Verifying the Quality of Outsourced Training on Clouds.
Proceedings of the Computer Security - ESORICS 2022, 2022

FlowTele: remotely shaping traffic on internet-scale networks.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022

2021
Efficient Forwarding Anomaly Detection in Software-Defined Networks.
IEEE Trans. Parallel Distributed Syst., 2021

SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks.
IEEE Netw., 2020

HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020

2019
Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective.
IEEE Trans. Parallel Distributed Syst., 2019

Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services.
IEEE Trans. Inf. Forensics Secur., 2019

Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective.
CoRR, 2019

SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control.
IEEE/ACM Trans. Netw., 2018

Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives.
IEEE Access, 2018

SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Minimal deployable endpoint-driven network forwarding: principle, designs and applications
PhD thesis, 2017

Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant- eue Binding.
CoRR, 2017

MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation.
CoRR, 2017

TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems.
CoRR, 2017

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

2016
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
On Multicast Capacity and Delay in Cognitive Radio Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2015

Securing wireless medium access control against insider denial-of-service attackers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2012
Transmission delay in large scale ad hoc cognitive radio networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

K-connectivity of cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2012


  Loading...