default search action
Zhuotao Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Ziming Zhao, Zhuotao Liu, Huan Chen, Fan Zhang, Zhuoxue Song, Zhaoxuan Li:
Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping. IEEE Trans. Dependable Secur. Comput. 21(4): 4271-4289 (2024) - [j16]Yuanyuan Qing, Tao Bai, Zhuotao Liu, Pierre Moulin, Bihan Wen:
Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations. IEEE Trans. Inf. Forensics Secur. 19: 2814-2825 (2024) - [j15]Xiaokun Fan, Yali Chen, Min Liu, Sheng Sun, Zhuotao Liu, Ke Xu, Zhongcheng Li:
UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-Off. IEEE Trans. Veh. Technol. 73(5): 6993-7006 (2024) - [c37]Mengyu Zhang, Long Wang, Xiaoping Zhang, Zhuotao Liu, Yisong Wang, Han Bao:
Efficient Clustering on Encrypted Data. ACNS (1) 2024: 213-236 - [c36]Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu:
Towards Fine-Grained Webpage Fingerprinting at Scale. CCS 2024: 423-436 - [c35]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. CCS 2024: 4032-4046 - [c34]Junchen Pan, Kunpeng He, Lei Zhang, Zhuotao Liu, Xinggong Zhang, Yong Cui:
NetSentry: Scalable Volumetric DDoS Detection with Programmable Switches. IWQoS 2024: 1-10 - [c33]Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. NDSS 2024 - [c32]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. NDSS 2024 - [c31]Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu:
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. NSDI 2024: 419-440 - [c30]Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu:
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. USENIX Security Symposium 2024 - [c29]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. USENIX Security Symposium 2024 - [d1]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning (Artifacts). Zenodo, 2024 - [i21]Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu:
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. CoRR abs/2402.16025 (2024) - [i20]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. CoRR abs/2403.01268 (2024) - [i19]Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu:
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. CoRR abs/2403.11090 (2024) - [i18]Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. CoRR abs/2403.11166 (2024) - [i17]Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu:
Towards Fine-Grained Webpage Fingerprinting at Scale. CoRR abs/2409.04341 (2024) - [i16]Hanbo Huang, Yihan Li, Bowen Jiang, Lin Liu, Ruoyu Sun, Zhuotao Liu, Shiyu Liang:
Archilles' Heel in Semi-open LLMs: Hiding Bottom against Recovery Attacks. CoRR abs/2410.11182 (2024) - [i15]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. IACR Cryptol. ePrint Arch. 2024: 987 (2024) - 2023
- [j14]Peirui Cao, Shizhen Zhao, Dai Zhang, Zhuotao Liu, Mingwei Xu, Min Yee Teh, Yunzhuo Liu, Xinbing Wang, Chenghu Zhou:
Threshold-Based Routing-Topology Co-Design for Optical Data Center. IEEE/ACM Trans. Netw. 31(6): 2870-2885 (2023) - [c28]Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. CCS 2023: 1020-1034 - [c27]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CCS 2023: 1496-1510 - [c26]Pengcheng Fang, Zhenhua Zou, Xusheng Xiao, Zhuotao Liu:
iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements. ISSTA 2023: 727-739 - [c25]Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:
Robust Multi-tab Website Fingerprinting Attacks in the Wild. SP 2023: 1005-1022 - [c24]Mohammad Al-Fares, Virginia Beauregard, Kevin Grant, Angus Griffith, Jahangir Hasan, Chen Huang, Quan Leng, Jiayao Li, Alexander Lin, Zhuotao Liu, Ahmed Mansy, Bill Martinusen, Nikil Mehta, Jeffrey C. Mogul, Andrew Narver, Anshul Nigham, Melanie Obenberger, Sean Smith, Kurt Steinkraus, Sheng Sun, Edward Thiele, Amin Vahdat:
Change Management in Physical Network Lifecycle Automation. USENIX ATC 2023: 635-653 - [c23]Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li:
Cross Container Attacks: The Bewildered eBPF on Clouds. USENIX Security Symposium 2023: 5971-5988 - [c22]Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu:
An Efficient Design of Intelligent Network Data Plane. USENIX Security Symposium 2023: 6203-6220 - [c21]Yunpeng Liu, Kexin Li, Zhuotao Liu, Bihan Wen, Ke Xu, Weiqiang Wang, Wenbiao Zhao, Qi Li:
Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification. WWW 2023: 1980-1990 - [i14]Xuanqi Liu, Zhuotao Liu:
LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers. CoRR abs/2305.18396 (2023) - [i13]Pengcheng Fang, Peng Gao, Yun Peng, Qingzhao Zhang, Tao Xie, Dawn Song, Prateek Mittal, Sanjeev R. Kulkarni, Zhuotao Liu, Xusheng Xiao:
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts. CoRR abs/2307.08912 (2023) - [i12]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CoRR abs/2309.01098 (2023) - [i11]Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. CoRR abs/2309.03660 (2023) - [i10]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. CoRR abs/2309.04798 (2023) - [i9]Xiaoliang Wang, Zhuotao Liu, Qi Li, Yangfei Guo, Sitong Ling, Jiangou Zhan, Yi Xu, Ke Xu:
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments. CoRR abs/2309.13271 (2023) - 2022
- [j13]Jie Sun, Lingchen Zhao, Zhuotao Liu, Qi Li, Xinhao Deng, Qian Wang, Yong Jiang:
Practical differentially private online advertising. Comput. Secur. 112: 102504 (2022) - [j12]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu:
Make Web3.0 Connected. IEEE Trans. Dependable Secur. Comput. 19(5): 2965-2981 (2022) - [j11]Qilei Yin, Zhuotao Liu, Qi Li, Tao Wang, Qian Wang, Chao Shen, Yixiao Xu:
An Automated Multi-Tab Website Fingerprinting Attack. IEEE Trans. Dependable Secur. Comput. 19(6): 3656-3670 (2022) - [j10]Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Qian Wang, Mingwei Xu, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. IEEE Trans. Inf. Forensics Secur. 17: 486-499 (2022) - [j9]Zijie Yang, Jiahao Cao, Zhuotao Liu, Xiaoli Zhang, Kun Sun, Qi Li:
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems. IEEE Trans. Inf. Forensics Secur. 17: 1069-1082 (2022) - [c20]Bo-Rong Chen, Zhuotao Liu, Jinhui Song, Fanhui Zeng, Zhoushi Zhu, Siva Phani Keshav Bachu, Yih-Chun Hu:
FlowTele: remotely shaping traffic on internet-scale networks. CoNEXT 2022: 349-368 - [c19]Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. ESORICS (2) 2022: 126-144 - [c18]Ziqiang Wang, Zhuotao Liu, Xiaoliang Wang, Songtao Fu, Ke Xu:
DIP: unifying network layer innovations using shared L3 core functions. HotNets 2022: 60-67 - [c17]Sainan Li, Qilei Yin, Guoliang Li, Qi Li, Zhuotao Liu, Jinwei Zhu:
Unsupervised Contextual Anomaly Detection for Database Systems. SIGMOD Conference 2022: 788-802 - [c16]Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. USENIX Security Symposium 2022: 2225-2242 - [c15]Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao:
Back-Propagating System Dependency Impact for Attack Investigation. USENIX Security Symposium 2022: 2461-2478 - 2021
- [j8]Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, Cong Wang:
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 1795-1809 (2021) - [j7]Qi Li, Yunpeng Liu, Zhuotao Liu, Peng Zhang, Chunhui Pang:
Efficient Forwarding Anomaly Detection in Software-Defined Networks. IEEE Trans. Parallel Distributed Syst. 32(11): 2676-2690 (2021) - [c14]Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Zhenqiang Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu:
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks. ACSAC 2021: 297-310 - [c13]Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang:
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. AsiaCCS 2021: 565-577 - [c12]Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. CCS 2021: 108-125 - [i8]Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. CoRR abs/2108.09513 (2021) - 2020
- [j6]Bo Wu, Ke Xu, Qi Li, Shoushou Ren, Zhuotao Liu, Zhichao Zhang:
Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Netw. 34(2): 30-36 (2020) - [i7]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. IACR Cryptol. ePrint Arch. 2020: 578 (2020)
2010 – 2019
- 2019
- [j5]Zhuotao Liu, Yuan Cao, Min Zhu, Wei Ge:
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. IEEE Trans. Inf. Forensics Secur. 14(4): 1098-1108 (2019) - [j4]Zhuotao Liu, Yuan Cao, Xuewu Zhang, Changping Zhu, Fan Zhang:
Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective. IEEE Trans. Parallel Distributed Syst. 30(8): 1816-1825 (2019) - [c11]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CCS 2019: 549-566 - [c10]Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. CCS 2019: 2421-2436 - [c9]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren:
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. ICDCS 2019: 1106-1116 - [i6]Zhuotao Liu, Yuan Cao, Min Zhu, Wei Ge:
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. CoRR abs/1903.07796 (2019) - [i5]Zhuotao Liu, Yuan Cao, Xuewu Zhang:
Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective. CoRR abs/1903.09465 (2019) - [i4]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CoRR abs/1908.09343 (2019) - 2018
- [j3]Yuan Cao, Yuan Gao, Rongjun Tan, Qingbang Han, Zhuotao Liu:
Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives. IEEE Access 6: 66641-66648 (2018) - [j2]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control. IEEE/ACM Trans. Netw. 26(4): 1948-1961 (2018) - [c8]Zhuotao Liu, Kai Chen, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, Gong Zhang:
Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding. INFOCOM 2018: 1-9 - [c7]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang:
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. IWQoS 2018: 1-10 - [c6]Bo Wu, Qi Li, Ke Xu, Ruoyu Li, Zhuotao Liu:
SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection. MASS 2018: 308-316 - 2017
- [b1]Zhuotao Liu:
Minimal deployable endpoint-driven network forwarding: principle, designs and applications. University of Illinois Urbana-Champaign, USA, 2017 - [c5]Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu:
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network. ICNP 2017: 1-10 - [i3]Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu:
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems. CoRR abs/1708.08162 (2017) - [i2]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
MiddlePolice: Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation. CoRR abs/1709.05710 (2017) - [i1]Zhuotao Liu, Kai Chen, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, Gong Zhang:
Enabling Work-conserving Bandwidth Guarantees for Multi-tenant Datacenters via Dynamic Tenant- eue Binding. CoRR abs/1712.06766 (2017) - 2016
- [c4]Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet. CCS 2016: 1268-1279 - 2015
- [j1]Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang:
On Multicast Capacity and Delay in Cognitive Radio Mobile Ad Hoc Networks. IEEE Trans. Wirel. Commun. 14(10): 5274-5286 (2015) - [c3]Sang-Yoon Chang, Yih-Chun Hu, Zhuotao Liu:
Securing wireless medium access control against insider denial-of-service attackers. CNS 2015: 370-378 - 2012
- [c2]Luoyi Fu, Zhuotao Liu, Ding Nie, Xinbing Wang:
K-connectivity of cognitive radio networks. ICC 2012: 83-87 - [c1]Zhuotao Liu, Xinbing Wang, Wentao Luan, Songwu Lu:
Transmission delay in large scale ad hoc cognitive radio networks. MobiHoc 2012: 185-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint