default search action
Shitong Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy:
DNS Exfiltration Guided by Generative Adversarial Networks. EuroS&P 2024: 580-599 - [i8]Chenhao Fang, Derek Larson, Shitong Zhu, Sophie Zeng, Wendy Summer, Yanqing Peng, Yuriy Hulovatyy, Rajeev Rao, Gabriel Forgues, Arya Pudota, Alex Goncalves, Hervé Robert:
Ingest-And-Ground: Dispelling Hallucinations from Continually-Pretrained LLMs with RAG. CoRR abs/2410.02825 (2024) - 2023
- [c14]Chenyang Qiu, Yingsheng Geng, Junrui Lu, Kaida Chen, Shitong Zhu, Ya Su, Guoshun Nan, Can Zhang, Junsong Fu, Qimei Cui, Xiaofeng Tao:
3D-IDS: Doubly Disentangled Dynamic Intrusion Detection. KDD 2023: 1965-1977 - [c13]Yu Hao, Guoren Li, Xiaochen Zou, Weiteng Chen, Shitong Zhu, Zhiyun Qian, Ardalan Amiri Sani:
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers. SP 2023: 3262-3278 - [i7]Chenyang Qiu, Yingsheng Geng, Junrui Lu, Kaida Chen, Shitong Zhu, Ya Su, Guoshun Nan, Can Zhang, Junsong Fu, Qimei Cui, Xiaofeng Tao:
3D-IDS: Doubly Disentangled Dynamic Intrusion Detection. CoRR abs/2307.11079 (2023) - 2022
- [j2]Zhao Li, Yuyu Hu, Zhendong Hu, Jingling Li, Shitong Zhu, Yang Xu:
Incremental-Compensation based Low-Cost Offline Robust Topology Control for Micro/Nano Satellite Network. J. Inf. Sci. Eng. 38(1): 139-164 (2022) - [i6]Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick D. McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth V. Krishnamurthy:
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN. CoRR abs/2203.06694 (2022) - 2021
- [b1]Shitong Zhu:
Understanding and Taming Adversarial Actions Against Internet Content Blockers. University of California, Riverside, USA, 2021 - [c12]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou:
Eluding ML-based Adblockers With Actionable Adversarial Examples. ACSAC 2021: 541-553 - [c11]Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia:
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. MTD@CCS 2021: 31-32 - [c10]Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia:
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. CCS 2021: 3384-3399 - [c9]Shasha Li, Abhishek Aich, Shitong Zhu, M. Salman Asif, Chengyu Song, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy:
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations. NeurIPS 2021: 2085-2096 - [i5]Shasha Li, Abhishek Aich, Shitong Zhu, M. Salman Asif, Chengyu Song, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy:
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations. CoRR abs/2110.01823 (2021) - 2020
- [c8]Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami:
You do (not) belong here: detecting DPI evasion attacks with context learning. CoNEXT 2020: 183-197 - [c7]Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song, Srikanth V. Krishnamurthy, Ananthram Swami, Kevin S. Chan:
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. ECCV (23) 2020: 396-413 - [c6]Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun:
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. NDSS 2020 - [c5]Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq:
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking. SP 2020: 763-776 - [i4]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq:
A4 : Evading Learning-based Adblockers. CoRR abs/2001.10999 (2020) - [i3]Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song, Srikanth V. Krishnamurthy, Ananthram Swami, Kevin S. Chan:
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. CoRR abs/2007.09763 (2020) - [i2]Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami:
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning. CoRR abs/2011.01514 (2020)
2010 – 2019
- 2019
- [c4]Shitong Zhu, Umar Iqbal, Zhongjie Wang, Zhiyun Qian, Zubair Shafiq, Weiteng Chen:
ShadowBlock: A Lightweight and Stealthy Adblocking Browser. WWW 2019: 2483-2493 - 2018
- [c3]Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin:
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. NDSS 2018 - [i1]Umar Iqbal, Zubair Shafiq, Peter Snyder, Shitong Zhu, Zhiyun Qian, Benjamin Livshits:
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking. CoRR abs/1805.09155 (2018) - 2015
- [c2]Minkailu Mohamed Jalloh, Shitong Zhu, Fang Fang, Jun Huang:
On selecting composite network-cloud services: a quality-of-service based approach. RACS 2015: 242-246 - [c1]Jun Huang, Meisong Sun, Shitong Zhu, Yi Sun, Cong-Cong Xing, Qiang Duan:
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs. SAC 2015: 688-694 - 2014
- [j1]Haokun Tang, Shitong Zhu, Jun Huang, Hong Liu:
A Defense Model of Reactive Worms Based on Dynamic Time. J. Softw. 9(11): 2778-2788 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint