default search action
Zizhan Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Duran Bao, Qingbo Shu, Bo Ning, Michael Tang, Yubing Liu, Noel Wong, Zhengming Ding, Zizhan Zheng, Christopher J. Lyon, Tony Hu, Jia Fan:
Improving Targeted Mass Spectrometry Data Analysis with Nested Active Machine Learning. Adv. Intell. Syst. 6(8) (2024) - [j14]Duran Bao, Qingbo Shu, Bo Ning, Michael Tang, Yubing Liu, Noel Wong, Zhengming Ding, Zizhan Zheng, Christopher J. Lyon, Tony Hu, Jia Fan:
Improving Targeted Mass Spectrometry Data Analysis with Nested Active Machine Learning. Adv. Intell. Syst. 6(8) (2024) - [c49]Xiaolin Sun, Zizhan Zheng:
Belief-Enriched Pessimistic Q-Learning against Adversarial State Perturbations. ICLR 2024 - [i31]Zixuan Liu, Xiaolin Sun, Zizhan Zheng:
Enhancing LLM Safety via Constrained Direct Preference Optimization. CoRR abs/2403.02475 (2024) - [i30]Xiaolin Sun, Zizhan Zheng:
Belief-Enriched Pessimistic Q-Learning against Adversarial State Perturbations. CoRR abs/2403.04050 (2024) - 2023
- [j13]Zhongdong Liu, Bin Li, Zizhan Zheng, Y. Thomas Hou, Bo Ji:
Toward Optimal Tradeoff Between Data Freshness and Update Cost in Information-Update Systems. IEEE Internet Things J. 10(16): 13988-14002 (2023) - [j12]Ding Zhang, Panneer Selvam Santhalingam, Parth Pathak, Zizhan Zheng:
CoBF: Coordinated Beamforming in Dense mmWave Networks. Proc. ACM Meas. Anal. Comput. Syst. 7(2): 31:1-31:26 (2023) - [j11]Gamal Sallam, Zizhan Zheng, Bo Ji:
Placement and Allocation of Virtual Network Functions: Multi-Dimensional Case. IEEE Trans. Mob. Comput. 22(7): 4195-4211 (2023) - [c48]Xiaolin Sun, Jacob Masur, Ben Abramowitz, Nicholas Mattei, Zizhan Zheng:
Does Delegating Votes Protect Against Pandering Candidates? AAMAS 2023: 2685-2687 - [c47]Tianyi Xu, Ding Zhang, Zizhan Zheng:
Online Learning for Adaptive Probing and Scheduling in Dense WLANs. INFOCOM 2023: 1-10 - [c46]Ding Zhang, Panneer Selvam Santhalingam, Parth H. Pathak, Zizhan Zheng:
CoBF: Coordinated Beamforming in Dense mmWave Networks. SIGMETRICS (Abstracts) 2023: 105-106 - [c45]Xiaolin Sun, Jacob Masur, Ben Abramowitz, Nicholas Mattei, Zizhan Zheng:
Pandering in a (flexible) representative democracy. UAI 2023: 2058-2068 - [i29]Henger Li, Chen Wu, Sencun Zhu, Zizhan Zheng:
Learning to Backdoor Federated Learning. CoRR abs/2303.03320 (2023) - [i28]Henger Li, Tianyi Xu, Tao Li, Yunian Pan, Quanyan Zhu, Zizhan Zheng:
A First Order Meta Stackelberg Method for Robust Federated Learning (Technical Report). CoRR abs/2306.13273 (2023) - [i27]Yunian Pan, Tao Li, Henger Li, Tianyi Xu, Zizhan Zheng, Quanyan Zhu:
A First Order Meta Stackelberg Method for Robust Federated Learning. CoRR abs/2306.13800 (2023) - 2022
- [c44]Henger Li, Zizhan Zheng:
Robust Moving Target Defense Against Unknown Attacks: A Meta-reinforcement Learning Approach. GameSec 2022: 107-126 - [c43]Zhongdong Liu, Bin Li, Zizhan Zheng, Y. Thomas Hou, Bo Ji:
Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems. ICCCN 2022: 1-10 - [c42]Henger Li, Xiaolin Sun, Zizhan Zheng:
Learning to Attack Federated Learning: A Model-based Reinforcement Learning Attack Framework. NeurIPS 2022 - [c41]Ding Zhang, Panneer Selvam Santhalingam, Parth H. Pathak, Zizhan Zheng:
Networked beamforming in dense mmWave WLANs. HotMobile 2022: 102-108 - [i26]Zhongdong Liu, Bin Li, Zizhan Zheng, Y. Thomas Hou, Bo Ji:
Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems. CoRR abs/2204.14123 (2022) - [i25]Xiaolin Sun, Jacob Masur, Ben Abramowitz, Nicholas Mattei, Zizhan Zheng:
Pandering in a Flexible Representative Democracy. CoRR abs/2211.09986 (2022) - [i24]Tianyi Xu, Ding Zhang, Zizhan Zheng:
Online Learning for Adaptive Probing and Scheduling in Dense WLANs. CoRR abs/2212.13585 (2022) - 2021
- [j10]Hao Fu, Pengfei Hu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Tianbo Gu, Sencun Zhu, Prasant Mohapatra:
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications. IEEE Trans. Mob. Comput. 20(10): 3066-3080 (2021) - [c40]Tianyi Xu, Ding Zhang, Parth H. Pathak, Zizhan Zheng:
Joint AP Probing and Scheduling: A Contextual Bandit Approach. MILCOM 2021: 37-42 - [i23]Tianyi Xu, Ding Zhang, Parth H. Pathak, Zizhan Zheng:
Joint AP Probing and Scheduling: A Contextual Bandit Approach. CoRR abs/2108.03297 (2021) - 2020
- [j9]Ming Zhang, Zizhan Zheng, Ness B. Shroff:
Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis. IEEE Trans. Control. Netw. Syst. 7(4): 1665-1677 (2020) - [c39]Henger Li, Wen Shen, Zizhan Zheng:
Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model. AAMAS 2020: 717-725 - [c38]Dan Peng, Zizhan Zheng, Linhao Luo, Xiaofeng Zhang:
Structure Matters: Towards Generating Transferable Adversarial Images. ECAI 2020: 1419-1426 - [c37]Gamal Sallam, Zizhan Zheng, Jie Wu, Bo Ji:
Robust Sequence Submodular Maximization. NeurIPS 2020 - [i22]Henger Li, Wen Shen, Zizhan Zheng:
Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model. CoRR abs/2002.10390 (2020) - [i21]Gamal Sallam, Zizhan Zheng, Jie Wu, Bo Ji:
Robust Sequence Submodular Maximization. CoRR abs/2011.00542 (2020)
2010 – 2019
- 2019
- [c36]Ding Zhang, Panneer Selvam Santhalingam, Parth H. Pathak, Zizhan Zheng:
Characterizing Interference Mitigation Techniques in Dense 60 GHz mmWave WLANs. ICCCN 2019: 1-9 - [c35]Gamal Sallam, Zizhan Zheng, Bo Ji:
Placement and Allocation of Virtual Network Functions: Multi-dimensional Case. ICNP 2019: 1-11 - [c34]Hao Fu, Zizhan Zheng, Sencun Zhu, Prasant Mohapatra:
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection. INFOCOM 2019: 2089-2097 - [c33]Henger Li, Zizhan Zheng:
Optimal Timing of Moving Target Defense: A Stackelberg Game Model. MILCOM 2019: 1-6 - [i20]Henger Li, Zizhan Zheng:
Optimal Timing of Moving Target Defense: A Stackelberg Game Model. CoRR abs/1905.13293 (2019) - [i19]Gamal Sallam, Zizhan Zheng, Bo Ji:
Placement and Allocation of Virtual Network Functions: Multi-dimensional Case. CoRR abs/1910.06299 (2019) - [i18]Dan Peng, Zizhan Zheng, Linhao Luo, Xiaofeng Zhang:
Structure Matters: Towards Generating Transferable Adversarial Images. CoRR abs/1910.09821 (2019) - 2018
- [c32]Ming Zhang, Zizhan Zheng, Ness B. Shroff:
An Online Algorithm for Power-Proportional Data Centers with Switching Cost. CDC 2018: 6025-6032 - [c31]Sungjin Im, Maryam Shadloo, Zizhan Zheng:
Online Partial Throughput Maximization for Multidimensional Coflow. INFOCOM 2018: 2042-2050 - [c30]Fang Liu, Zizhan Zheng, Ness B. Shroff:
Analysis of Thompson Sampling for Graphical Bandits Without the Graphs. UAI 2018: 13-22 - [i17]Ming Zhang, Zizhan Zheng, Ness B. Shroff:
An Online Algorithm for Power-proportional Data Centers with Switching Cost. CoRR abs/1803.07649 (2018) - [i16]Fang Liu, Zizhan Zheng, Ness B. Shroff:
Analysis of Thompson Sampling for Graphical Bandits Without the Graphs. CoRR abs/1805.08930 (2018) - [i15]Dan Peng, Zizhan Zheng, Xiaofeng Zhang:
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples. CoRR abs/1809.02786 (2018) - 2017
- [j8]Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal, Tarek M. El-Fouly:
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications. IEEE Trans. Control. Netw. Syst. 4(4): 886-898 (2017) - [c29]Zizhan Zheng, Ness B. Shroff, Prasant Mohapatra:
When to Reset Your Keys: Optimal Timing of Security Updates via Learning. AAAI 2017: 3679-3685 - [c28]Xiaotao Feng, Zizhan Zheng, Prasant Mohapatra, Derya Cansever:
A Stackelberg Game and Markov Modeling of Moving Target Defense. GameSec 2017: 315-335 - [c27]Xiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra:
A signaling game model for moving target defense. INFOCOM 2017: 1-9 - [c26]Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra:
LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications. INFOCOM 2017: 1-9 - [c25]Zhenzhi Qian, Fei Wu, Zizhan Zheng, Kannan Srinivasan, Ness B. Shroff:
Concurrent Channel Probing and Data Transmission in Full-duplex MIMO Systems. MobiHoc 2017: 15:1-15:10 - [i14]Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra:
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications. CoRR abs/1702.01160 (2017) - [i13]Zhenzhi Qian, Fei Wu, Zizhan Zheng, Kannan Srinivasan, Ness B. Shroff:
Concurrent Channel Probing and Data Transmission in Full-duplex MIMO Systems. CoRR abs/1705.08000 (2017) - [i12]Hao Fu, Zizhan Zheng, Sencun Zhu, Pransant Mohapatra:
INSPIRED: Intention-based Privacy-preserving Permission Model. CoRR abs/1709.06654 (2017) - 2016
- [c24]Eilwoo Baik, Amit Pande, Zizhan Zheng, Prasant Mohapatra:
VSync: Cloud based video streaming service for mobile devices. INFOCOM 2016: 1-9 - [c23]Zizhan Zheng, Ness B. Shroff:
Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud. INFOCOM 2016: 1-9 - [c22]Xiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra:
Stealthy attacks with insider information: A game theoretic model with asymmetric feedback. MILCOM 2016: 277-282 - [c21]Hao Fu, Hongxing Li, Zizhan Zheng, Pengfei Hu, Prasant Mohapatra:
Trust exploitation and attention competition: A game theoretical model. MILCOM 2016: 1255-1260 - [c20]Hao Fu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Pengfei Hu, Prasant Mohapatra:
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping. SECON 2016: 1-9 - [i11]Hao Fu, Hongxing Li, Zizhan Zheng, Pengfei Hu, Prasant Mohapatra:
Optimal System Maneuver for Trust Management in Social Networks. CoRR abs/1604.07139 (2016) - [i10]Hao Fu, Zizhan Zheng, Aveek K. Das, Parth H. Pathak, Pengfei Hu, Prasant Mohapatra:
FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping. CoRR abs/1605.04025 (2016) - [i9]Zizhan Zheng, Ness B. Shroff, Prasant Mohapatra:
When to Reset Your Keys: Optimal Timing of Security Updates via Learning. CoRR abs/1612.00108 (2016) - 2015
- [j7]Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kumar:
Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access on the Go. IEEE/ACM Trans. Netw. 23(3): 768-781 (2015) - [c19]Ming Zhang, Zizhan Zheng, Ness B. Shroff:
A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources. GameSec 2015: 93-112 - [c18]Yin Sun, Zizhan Zheng, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff:
Provably delay efficient data retrieving in storage clouds. INFOCOM 2015: 585-593 - [c17]Xiaotao Feng, Zizhan Zheng, Pengfei Hu, Derya Cansever, Prasant Mohapatra:
Stealthy attacks meets insider threats: A three-player game model. MILCOM 2015: 25-30 - [i8]Yin Sun, Zizhan Zheng, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff:
Provably Delay Efficient Data Retrieving in Storage Clouds. CoRR abs/1501.01661 (2015) - [i7]Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal:
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications. CoRR abs/1502.06004 (2015) - [i6]Ming Zhang, Zizhan Zheng, Ness B. Shroff:
A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources. CoRR abs/1508.01950 (2015) - 2014
- [j6]Zizhan Zheng, Ness B. Shroff:
Submodular Utility Maximization for Deadline Constrained Data Collection in Sensor Networks. IEEE Trans. Autom. Control. 59(9): 2400-2412 (2014) - [j5]Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks. IEEE/ACM Trans. Netw. 22(4): 1245-1256 (2014) - [c16]Zizhan Zheng, Ness B. Shroff:
Online welfare maximization for electric vehicle charging with electricity cost. e-Energy 2014: 253-263 - [c15]Ming Zhang, Zizhan Zheng, Ness B. Shroff:
Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints. GlobalSIP 2014: 813-817 - [i5]Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kumar:
Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access On the Go. CoRR abs/1401.0781 (2014) - 2013
- [j4]Srikanth Hariharan, Zizhan Zheng, Ness B. Shroff:
Maximizing Information in Unreliable Sensor Networks Under Deadline and Energy Constraints. IEEE Trans. Autom. Control. 58(6): 1416-1429 (2013) - [c14]Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing social welfare in operator-based Cognitive Radio Networks under spectrum uncertainty and sensing inaccuracy. INFOCOM 2013: 953-961 - 2012
- [j3]Zizhan Zheng, Prasun Sinha, Santosh Kumar:
Sparse WiFi Deployment for Vehicular Internet Access With Bounded Interconnection Gap. IEEE/ACM Trans. Netw. 20(3): 956-969 (2012) - [c13]Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal:
On the efficiency-vs-security tradeoff in the smart grid. CDC 2012: 1954-1959 - [c12]Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing system throughput using cooperative sensing in multi-channel cognitive radio networks. CDC 2012: 5858-5863 - [c11]Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing system throughput by cooperative sensing in Cognitive Radio Networks. INFOCOM 2012: 1575-1583 - [c10]Zizhan Zheng, Ness B. Shroff:
Maximizing a submodular utility for deadline constrained data collection in sensor networks. WiOpt 2012: 116-123 - [i4]Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing Social Welfare in Operator-based Cognitive Radio Networks under Spectrum Uncertainty and Sensing Inaccuracy. CoRR abs/1207.6603 (2012) - [i3]Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal:
On the Efficiency-vs-Security Tradeoff in the Smart Grid. CoRR abs/1209.1763 (2012) - [i2]Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing System Throughput Using Cooperative Sensing in Multi-Channel Cognitive Radio Networks. CoRR abs/1211.3666 (2012) - 2011
- [j2]Ren-Shiou Liu, Kai-Wei Fan, Zizhan Zheng, Prasun Sinha:
Perpetual and fair data collection for environmental energy harvesting sensor networks. IEEE/ACM Trans. Netw. 19(4): 947-960 (2011) - [i1]Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks. CoRR abs/1111.3041 (2011) - 2010
- [c9]Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kumar:
Maximizing the Contact Opportunity for Vehicular Internet Access. INFOCOM 2010: 1109-1117 - [c8]Ying Zhang, Gang Huang, Xuanzhe Liu, Zizhan Zheng, Hong Mei:
Towards automatic tuning of adaptive computations in autonomic middleware. ARM 2010: 46-51
2000 – 2009
- 2009
- [j1]Zizhan Zheng, Prasun Sinha:
Buffer Coding for Reliable Transmissions over Wireless Networks. Comput. Commun. 32(1): 111-123 (2009) - [c7]Paul Balister, Zizhan Zheng, Santosh Kumar, Prasun Sinha:
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks. INFOCOM 2009: 136-144 - [c6]Zizhan Zheng, Prasun Sinha, Santosh Kumar:
Alpha Coverage: Bounding the Interconnection Gap for Vehicular Internet Access. INFOCOM 2009: 2831-2835 - [c5]Somnath Mitra, Zizhan Zheng, Santanu Guha, Animikh Ghosh, Prabal Dutta, Bhagavathy Krishna, Kurt Plarre, Santosh Kumar, Prasun Sinha:
An affordable, long-lasting, and autonomous theft detection and tracking system. SenSys 2009: 351-352 - 2008
- [c4]Zizhan Zheng, Kai-Wei Fan, Prasun Sinha, Yusu Wang:
Distributed roadmap aided routing in sensor networks. MASS 2008: 347-352 - [c3]Kai-Wei Fan, Zizhan Zheng, Prasun Sinha:
Steady and fair rate allocation for rechargeable sensors in perpetual sensor networks. SenSys 2008: 239-252 - 2007
- [c2]Zizhan Zheng, Prasun Sinha:
XBC: XOR-based buffer coding for reliable transmissions over wireless networks. BROADNETS 2007: 76-85 - 2004
- [c1]Gang Huang, Tiancheng Liu, Hong Mei, Zizhan Zheng, Zhao Liu, Gang Fan:
Towards Autonomic Computing Middleware via Reflection. COMPSAC 2004: 135-140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint