default search action
Xiaoli Zhang 0003
Person information
- affiliation: Zhejiang University of Technology, Department of Computer Science, Hangzhou, China
- affiliation (PhD 2020): Tsinghua University, Computer Science and Technology, Beijing, China
Other persons with the same name
- Xiaoli Zhang — disambiguation page
- Xiaoli Zhang 0001 — Jilin University, College of Computer Science and Technology, China
- Xiaoli Zhang 0002 — Colorado School of Mines, Intelligent Robotics and Systems Lab, Golden, CO, USA
- Xiaoli Zhang 0004 — Chang'an University, School of Construction Machinery, Xi'an, China (and 1 more)
- Xiaoli Zhang 0005 — Beijing Forestry University, Beijing Key Laboratory of Precision Forestry, College of Forestry, China
- Xiaoli Zhang 0006 — Xiamen University, School of Aerospace Engineering, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Xiaoli Zhang, Wenxiang Sun, Zhicheng Xu, Hongbing Cheng, Chengjun Cai, Helei Cui, Qi Li:
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention. IEEE Trans. Inf. Forensics Secur. 19: 2517-2532 (2024) - [j6]Huihui Wang, Chunping Wang, Kun Zhou, Duanyang Liu, Xiaoli Zhang, Hongbing Cheng:
TEBChain: A Trusted and Efficient Blockchain-Based Data Sharing Scheme in UAV-Assisted IoV for Disaster Rescue. IEEE Trans. Netw. Serv. Manag. 21(4): 4119-4130 (2024) - [j5]Xiaoli Zhang, Wei Geng, Yiqiao Song, Hongbing Cheng, Ke Xu, Qi Li:
Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds. IEEE/ACM Trans. Netw. 32(1): 159-174 (2024) - [c13]Neil Gong, Qi Li, Xiaoli Zhang:
AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense. CCS 2024: 4884-4885 - [c12]Shenghang Chen, Zhicheng Xu, Kun Zhou, Xiaoli Zhang, Hongbing Cheng:
RobustETH: Ensuring Economic Fairness in ETH2.0's Distributed Validator Technology. ICCCN 2024: 1-9 - [c11]Yi Liu, Chengjun Cai, Xiaoli Zhang, Xingliang Yuan, Cong Wang:
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts. ACM Multimedia 2024: 3578-3586 - [c10]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. NDSS 2024 - [i3]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. CoRR abs/2403.15271 (2024) - [i2]Yi Liu, Chengjun Cai, Xiaoli Zhang, Xingliang Yuan, Cong Wang:
Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts. CoRR abs/2407.15050 (2024) - 2023
- [j4]Zhe Sun, Peng Zhao, Chunping Wang, Xiaoli Zhang, Hongbing Cheng:
An Efficient and Secure Trading Framework for Shared Charging Service Based on Multiple Consortium Blockchains. IEEE Trans. Serv. Comput. 16(4): 2437-2450 (2023) - [c9]Xiaoli Zhang, Zhicheng Xu, Hongbing Cheng, Tong Che, Ke Xu, Weiqiang Wang, Wenbiao Zhao, Chunping Wang, Qi Li:
Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification. ICDCS 2023: 794-805 - [c8]Juan Du, Zhicheng Xu, Duanyang Liu, Xiaoli Zhang, Hongbing Cheng:
EPT: Enhancing User Transparency for Confidential Smart Contract. MSN 2023: 431-438 - 2022
- [j3]Zijie Yang, Jiahao Cao, Zhuotao Liu, Xiaoli Zhang, Kun Sun, Qi Li:
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems. IEEE Trans. Inf. Forensics Secur. 17: 1069-1082 (2022) - [c7]Chunping Wang, Jiahui Chen, Xiaoli Zhang, Hongbing Cheng:
An Efficient Fully Homomorphic Encryption Sorting Algorithm Using Addition Over TFHE. ICPADS 2022: 226-233 - [c6]Can Jiang, Duanyang Liu, Xiaoli Zhang, Kun Zhou, Hongbing Cheng:
Accelerating State Synchronization in Bitcoin Combining Secure Snapshot with IPFS. ISPA/BDCloud/SocialCom/SustainCom 2022: 739-746 - 2021
- [j2]Xiaoli Zhang, Qi Li, Zeyu Zhang, Jianping Wu, Jiahai Yang:
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud. IEEE/ACM Trans. Netw. 29(1): 78-91 (2021) - [c5]Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li:
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. AsiaCCS 2021: 931-943 - [c4]Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li:
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. INFOCOM 2021: 1-10 - [i1]Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li:
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. CoRR abs/2102.05241 (2021) - 2020
- [j1]Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu:
Toward Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Netw. 34(1): 108-115 (2020) - [c3]Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu:
Enabling Execution Assurance of Federated Learning at Untrusted Participants. INFOCOM 2020: 1877-1886
2010 – 2019
- 2019
- [c2]Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu:
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. INFOCOM 2019: 1162-1170 - 2017
- [c1]Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang:
Generic and agile service function chain verification on cloud. IWQoS 2017: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint