Zizhan Zheng
Orcid: 0000-0003-4799-1051
According to our database1,
Zizhan Zheng
authored at least 69 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Improving Targeted Mass Spectrometry Data Analysis with Nested Active Machine Learning.
Adv. Intell. Syst., August, 2024
Meta Stackelberg Game: Robust Federated Learning against Adaptive and Mixed Poisoning Attacks.
CoRR, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
2023
Toward Optimal Tradeoff Between Data Freshness and Update Cost in Information-Update Systems.
IEEE Internet Things J., August, 2023
IEEE Trans. Mob. Comput., July, 2023
Proc. ACM Meas. Anal. Comput. Syst., 2023
A First Order Meta Stackelberg Method for Robust Federated Learning (Technical Report).
CoRR, 2023
Proceedings of the Uncertainty in Artificial Intelligence, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023
2022
Proceedings of the HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9, 2022
Learning to Attack Federated Learning: A Model-based Reinforcement Learning Attack Framework.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
Robust Moving Target Defense Against Unknown Attacks: A Meta-reinforcement Learning Approach.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
2021
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Trans. Mob. Comput., 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
2020
Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis.
IEEE Trans. Control. Netw. Syst., 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020
2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
2018
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples.
CoRR, 2018
Proceedings of the Thirty-Fourth Conference on Uncertainty in Artificial Intelligence, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 57th IEEE Conference on Decision and Control, 2018
2017
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications.
IEEE Trans. Control. Netw. Syst., 2017
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017
LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Stealthy attacks with insider information: A game theoretic model with asymmetric feedback.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
2015
Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access on the Go.
IEEE/ACM Trans. Netw., 2015
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications.
CoRR, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
2014
IEEE/ACM Trans. Netw., 2014
Submodular Utility Maximization for Deadline Constrained Data Collection in Sensor Networks.
IEEE Trans. Autom. Control., 2014
Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014
Proceedings of the Fifth International Conference on Future Energy Systems, 2014
2013
Maximizing Information in Unreliable Sensor Networks Under Deadline and Energy Constraints.
IEEE Trans. Autom. Control., 2013
Maximizing social welfare in operator-based Cognitive Radio Networks under spectrum uncertainty and sensing inaccuracy.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
Sparse WiFi Deployment for Vehicular Internet Access With Bounded Interconnection Gap.
IEEE/ACM Trans. Netw., 2012
Maximizing a submodular utility for deadline constrained data collection in sensor networks.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012
Maximizing system throughput using cooperative sensing in multi-channel cognitive radio networks.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
2011
Perpetual and fair data collection for environmental energy harvesting sensor networks.
IEEE/ACM Trans. Netw., 2011
2010
Proceedings of the 9th Workshop on Adaptive and Reflective Middleware, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
Comput. Commun., 2009
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
2008
Steady and fair rate allocation for rechargeable sensors in perpetual sensor networks.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
2007
Proceedings of the Fourth International Conference on Broadband Communications, 2007
2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004