69. | Title: Shared Resource Entanglement Attacks against Serverless Computing, Authors: Yuwen Cui, Mingkui Wei, Zhuo Lu and Yao Liu, Proc: IEEE Conference on Communication and Network Security (CNS), Sep, 2024. Acceptance Rate: 28.6%. PDF BibTex |
68. | Title: Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics, Authors: Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, and Zhuo Lu, Proc: IEEE Conference on Computer Communications (INFOCOM), May, 2024. Acceptance Rate: 19.6%. PDF BibTex |
67. | Title: Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information, Authors: Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, and Zhuo Lu, Proc: IEEE Symposium on Security and Privacy (S&P), May 2024. Acceptance Rate: 17.8%. PDF BibTex |
66. | Title: Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models, Authors: Rui Duan, Zhe Qu, Leah Ding, Yao Liu, and Zhuo Lu, Proc: Network and Distributed System Security Symposium (NDSS), Feb 2024. Acceptance Rate: 15%. PDF Summary Video BibTex |
65. | Title: SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity, Authors: Dakun Shen, Tao Hou, Zhuo Lu, Yao Liu and Tao Wang, Proc: IEEE Conference on Communications and Network Security (CNS), Oct, 2023. Acceptance Rate: 28.6%. PDF BibTex |
64. | Title: Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security (Invited Paper), Authors: Jiahao Xue, Zhe Qu, Shangqing Zhao, Yao Liu and Zhuo Lu, Proc: IEEE Conference on Computer Communications and Networks (ICCCN), Jul, 2023. PDF BibTex |
63. | Title: How Can the Adversary Effectively Identify Cellular IoT Devices Using LSTM Networks?, Authors: Zhengping Luo, Will A. Pitera, Shangqing Zhao, Zhuo Lu and Yalin Sagduyu, Proc: ACM Workshop on Wireless Security and Machine Learning (WiseML), May, 2023. PDF BibTex |
62. | Title: Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients, Authors: Xingyu Li, Zhe Qu, Bo Tang, and Zhuo Lu, Proc: IEEE International Conference on Machine Learning and Applications (ICMLA), Dec 2022. PDF BibTex |
61. | Title: Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API, Authors: Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, and Yao Liu, Proc: ACM Conference on Computer and Communications Security (CCS), Nov 2022. Acceptance Rate: 22.3%. PDF BibTex |
60. | Title: Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception, Authors: Rui Duan, Zhe Qu, Shanqing Zhao, Leah Ding, Yao Liu, and Zhuo Lu, Proc: ACM Conference on Computer and Communications Security (CCS), Nov 2022. Acceptance Rate: 17.90%. PDF Summary Video BibTex |
59. | Title: When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet, Authors: Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu, Proc: IEEE Conference on Communication Network Security (CNS), Oct 2022. PDF BibTex |
58. | Title: Generalized Federated Learning via Sharpness Aware Minimization, Authors: Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang and Zhuo Lu, Proc: International Conference on Machine Learning (ICML), Jul 2022. Acceptance Rate: 21.94%. PDF BibTex |
57. | Title: DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security, Authors: Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei, Proc: ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022. PDF BibTex |
56. | Title: Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication, Authors: Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, and Yalin Sagduyu, Proc: ACM Workshop on Wireless Security and Machine Learning (WiseML), May, 2022. PDF BibTex |
55. | Title: MUSTER: Subverting User Selection in MU-MIMO Networks, Authors: Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, and Yalin Saguduyu, Proc: IEEE Conference on Computer Communications (INFOCOM), May, 2022. Acceptance Rate: 19.93%. PDF BibTex |
54. | Title: IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification, Authors: Tao Hou, Tao Wang, Zhuo Lu, Yao Liu and Yalin Sagduyu, Proc: IEEE Symposium on Dynamic Spectrum Access Networks (DySPAN), Dec. 2021. PDF BibTex |
53. | Title: Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud, Authors: Junjie Xiong, Mingkui Wei, Zhuo Lu, and Yao Liu, Proc: ACM Conference on Computer and Communications Security (CCS), Nov. 2021. Acceptance Rate: 22.3%. PDF BibTex |
52. | Title: Smartphone Location Spoofing Attack in Wireless Networks, Authors: Chengbin Hu, Yao Liu, Zhuo Lu, Shangqing Zhao, Xiao Han and Junjie Xiong, Proc: EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Sept, 2021. PDF BibTex |
51. | Title: Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing, Authors: Zhengping Luo, Shangqing Zhao, Rui Duan, Zhuo Lu, Yalin E. Sagduyu, and Jie Xu, Proc: ACM Workshop on Wireless Security and Machine Learning (WiseML), July, 2021. PDF BibTex |
50. | Title: Adversarial Machine Learning based Partial-model Attack in IoT, Authors: Zhengping Luo, Shangqing Zhao, Zhuo Lu, Yalin E. Sagduyu, and Jie Xu, Proc: ACM Workshop on Wireless Security and Machine Learning (WiseML), July, 2020. PDF BibTex |
49. | Title: ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference, Authors: Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu, Proc: IEEE Conference on Computer Communications (INFOCOM), July, 2020. Acceptance Rate: 19.8%. PDF Slides BibTex |
48. | Title: Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks, Authors: Lixing Chen, Zhuo Lu, Pan Zhou, and Jie Xue, Proc: IEEE Conference on Computer Communications (INFOCOM), July, 2020. Acceptance Rate: 19.8%. PDF Slides BibTex |
47. | Title: Log Analytics in HPC: A Data-driven Reinforcement Learning Framework, Authors: Zhengping Luo, Tao Hou, Tung Thanh Nguyen, Hui Zeng and Zhuo Lu, Proc: IEEE Workshop on Data Driven Intelligence for Networks and Systems (INFOCOM-DDINS), Jul., 2020. PDF Slides BibTex |
46. | Title: Comb Decoding towards Collision-Free WiFi, Authors: Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu and Yao Liu, Proc: USENIX Symposium on Networked Systems Design and Implementation (NSDI), Feb. 2020. Acceptance Rate: 17.45%. PDF Slides Presentation Video BibTex |
45. | Title: I Know Your Activities Even When Data Is Encrypted: Smart Traffic Analysis via Fusion Deep Neural Network, Authors: Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu, Proc: Annual Computer Security Applications Conference, Poster Session (ACSAC), Dec. 2019. PDF Slides BibTex |
44. | Title: Vulnerability Analysis, Attack Strategies and Countermeasures Design in Network Tomography, Authors: Shangqing Zhao, Zhe Qu, and Zhuo Lu, Proc: Annual Computer Security Applications Conference, Poster Session (ACSAC), Dec. 2019. PDF Slides BibTex |
43. | Title: Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems, Authors: Shangqing Zhao, Zhe Qu, Zhuo Lu, and Tao Wang, Proc: IEEE Symposium on Dynamic Spectrum Access Networks, Poster Session (DySPAN), Nov. 2019. PDF Slides BibTex |
42. | Title: Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic (Best Paper Award), Authors: Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu, Proc: IEEE Global Conference on Signal and Information Processing (GlobalSIP), Nov. 2019. PDF Slides BibTex |
41. | Title: Effectiveness of Machine Learning based Intrusion Detection Systems, Authors: Mohammed Alrowaily, Freeh Alenezi, and Zhuo Lu, Proc: International Conference on Security, Privacy and Anonymity in Comp., Commun. and Storage (SpaCCS), July 2019. PDF BibTex |
40. | Title: On Studying Information Dissemination in Social-Physical Interdependent Networks, Authors: Mingkui Wei, Jie Wang, Zhuo Lu, and Wenye Wang, Proc: IEEE Conference on Communications (ICC), May 2019. PDF Slides BibTex |
39. | Title: Entrapment for Wireless Eavesdroppers, Authors: Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2019. Acceptance Rate: 19.7%. PDF Slides BibTex |
38. | Title: Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks, Authors: Shangqing Zhao, Zhengping Luo, Zhuo Lu, and Yao Liu, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2019. Acceptance Rate: 19.7%. PDF Slides BibTex |
37. | Title: Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward, Authors: Lixing Chen, Jie Xu, and Zhuo Lu, Proc: Annual Conference on Neural Information Processing Systems (NeurIPS), Dec. 2018. Acceptance Rate: 20.8%. PDF Slides BibTex |
36. | Title: Secure Edge Computing in IoT Systems: Review and Case Studies, Authors: Mohammed Alrowaily and Zhuo Lu, Proc: ACM/IEEE Workshop on Security and Privacy in Edge Computing (SEC-EdgeSP), Oct. 2018. PDF Slides BibTex |
35. | Title: No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing, Authors: Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, Proc: ACM Conference on Computer and Communications Security (CCS), Oct. 2018. Acceptance Rate: 16.6%. PDF Slides BibTex |
34. | Title: Deep Learning-Aided Cyber-Attack Detection in Power Transmission Systems, Authors: David Wilson, Yufei Tang, Jun Yang and Zhuo Lu, Proc: IEEE PES General Meeting (PESGM), Aug., 2018. PDF BibTex |
33. | Title: Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies, Authors: Yi Shi, Yalin E Sagduyu, Tugba Erpek, Kemal Davaslioglu, Zhuo Lu, and Jason Li, Proc: IEEE Workshop on Promises and Challenges of Machine Learning in Communication Networks (ML4COM), June, 2018. PDF BibTex |
32. | Title: How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?, Authors: Mingkui Wei, Zhuo Lu, Yufei Tang, and Xiang Lu (The first two authors are co-primary authors), Proc: IEEE Conference on Computer Communications (INFOCOM), Apr., 2018. Acceptance Rate: 19.24%. PDF BibTex |
31. | Title: Stateful Inter-Packet Signal Processing for Wireless Networking, Authors: Shangqing Zhao, Zhengping Luo, Zhuo Lu, Xiang Lu, and Yao Liu, Proc: ACM International Conference on Mobile Computing and Networking (MobiCom), Oct., 2017. Acceptance Rate: 18.82%. PDF Slides Summary Video BibTex |
30. | Title: PDF Mirage: Content Masking Attack Against Information-Based Online Services, Authors: Ian Markwood, Dakun Shen, Yao Liu, and Zhuo Lu (The first two authors are co-primary authors), Proc: USENIX Security Symposium (USENIX Security), Aug., 2017. Acceptance Rate: 16.28%. PDF Slides Presentation Video BibTex |
29. | Title: When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography, Authors: Shangqing Zhao, Zhuo Lu and Cliff Wang, Proc: IEEE International Conference on Distributed Computing Systems (ICDCS), May, 2017. Acceptance Rate: 16.95%. PDF Slides BibTex |
28. | Title: On Modeling and Understanding Vehicle Evacuation Attacks in VANETs, Authors: Mingkui Wei, Zhuo Lu and Wenye Wang, Proc: IEEE International Conference on Communications (ICC), May. 2017. PDF Slides BibTex |
27. | Title: How They Interact? Understanding Cyber and Physical Interactions against Fault Propagation in Smart Grid, Authors: Zhuo Lu, Mingkui Wei, and Xiang Lu, Proc: IEEE Conference on Computer Communications (INFOCOM), May. 2017. Acceptance Rate: 20.93%. PDF Slides BibTex |
26. | Title: Defending Active Learning against Adversarial Inputs in Automated Document Classification, Authors: Lei Pi, Zhuo Lu, Yalin Sagduyu, and Su Chen, Proc: IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec. 2016. PDF Slides BibTex |
25. | Title: Risk Assessment Based Access Control with Text and Behavior Analysis for Document Management, Authors: Zhuo Lu and Yalin Sagduyu, Proc: IEEE Military Communications Conference (MILCOM), Nov. 2016. PDF Slides BibTex |
24. | Title: Dominoes with Communications: On Characterizing the Progress of Cascading Failures in Smart Grid, Authors: Mingkui Wei, Zhuo Lu, and Wenye Wang, Proc: IEEE Conference on Communications (ICC), May 2016. PDF BibTex |
23. | Title: Zero Reconciliation Secret Key Extraction in MIMO Backscatter Wireless Systems, Authors: Shi-Chao Lv, Xiang Lu, Zhuo Lu, Xiaoshan Wang, Ning Wang and Limin Sun, Proc: IEEE Conference on Communications (ICC), May 2016. PDF BibTex |
22. | Title: Friendships in the Air: Integrating Social Links into Wireless Network Modeling, Routing, and Analysis, Authors: Zhuo Lu, Yalin Sagduyu, and Yi Shi, Proc: IEEE Workshop on Network Science for Communication Networks (INFOCOM-NetSciCom), Apr. 2016. Acceptance Rate: 24%. PDF Slides BibTex |
21. | Title: To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs, Authors: Zhuo Lu, Lisa Marvel, and Cliff Wang, Proc: ACM Workshop on Moving Target Defense (CCS-MTD), Oct. 2015. PDF Slides BibTex |
20. | Title: On Detection and Concealment of Critical Roles in Tactical Wireless Networks, Authors: Zhuo Lu, Cliff Wang, and Mingkui Wei, Proc: IEEE Military Communications Conference (MILCOM), Oct. 2015. PDF Slides BibTex |
19. | Title: Network Anti-Inference: A Fundamental Perspective on Proactive Strategies to Counter Flow Inference, Authors: Zhuo Lu and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2015. Acceptance Rate: 19.3%. PDF Slides BibTex |
18. | Title: Queuing the Trust: Secure Backpressure Algorithm against Insider Threats in Wireless Networks, Authors: Zhuo Lu, Yalin Sagduyu, and Jason Li, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2015. Acceptance Rate: 19.3%. PDF Slides BibTex |
17. | Title: Socio-Technological Communication Testbed for Mobile Social Networks, Authors: Zhuo Lu, Yalin Sagduyu, and Yi Shi, Proc: IEEE Military Communications Conference (MILCOM), Oct. 2014. PDF Slides BibTex |
16. | Title: How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2014. Acceptance Rate: 19.4%. PDF Slides BibTex |
15. | Title: Hiding Traffic with Camouflage: Minimizing Message Delay in the Smart Grid under Jamming, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications, Mini-Conference (INFOCOM), Apr. 2012. Acceptance Rate: 25%. PDF Slides BibTex |
14. | Title: On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP, Authors: Xiang Lu, Zhuo Lu, Wenye Wang, and Jianfeng Ma, Proc: IEEE Global Communications Conference (GLOBECOM), Dec. 2011. PDF BibTex |
13. | Title: From Security to Vulnerability: Data Authentication undermines Message Delivery in Smart Grid, Authors: Xiang Lu, Wenye Wang, Zhuo Lu, and Jianfeng Ma, Proc: IEEE Military Communications Conference (MILCOM), Nov. 2011. PDF BibTex |
12. | Title: Reliable and Secure Communication Platforms of FREEDM Systems in Smart Grid, Authors: Xiang Lu, Zhuo Lu, Wenye Wang, and Jianfeng Ma, Proc: ACM International Conference on Mobile Computing and Networking, Demo Session (MobiCom), Sept. 2011. BibTex |
11. | Title: From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Aug. 2011. Acceptance Rate: 16%. PDF Slides BibTex |
10. | Title: Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid, Authors: Zhuo Lu, Xiang Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Military Communications Conference (MILCOM), Oct. 2010. PDF Slides BibTex |
9. | Title: On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks, Authors: Zhuo Lu, Cliff Wang, and Wenye Wang, Proc: IEEE Conference on Communications (ICC), June 2011. PDF Slides BibTex |
8. | Title: On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-Based Wireless Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), June. 2010. Acceptance Rate: 17.5%. PDF Slides BibTex |
7. | Title: Joint Timing Error, Frequency Offset and Channel Estimation for MIMO Systems, Authors: Wei Dong, Jiandong Li, and Zhuo Lu, Proc: International Wireless Communications and Mobile Computing Conference (IWCMC), 2009. BibTex |
6. | Title: Parameter Estimation for MIMO Systems with Multiple Frequency Offsets, Authors: Wei Dong, Jiandong Li, and Zhuo Lu, Proc: International Conference on Advanced Information Networking and Applications (AINA), 2008. BibTex |
5. | Title: Joint Frequency Offset and Channel Estimation for MIMO Systems Based on Particle Swarm Optimization, Authors: Wei Dong, Jiandong Li, and Zhuo Lu, Proc: IEEE Vehicular Technology Conference (VTC), 2008. BibTex |
4. | Title: Optimal Training Sequences for MIMO Channel Estimation with Spatial Correlation, Authors: Jiyong Pang, Jiandong Li, Linjing Zhao, and Zhuo Lu, Proc: IEEE Vehicular Technology Conference (VTC), 2007. BibTex |
3. | Title: Composite Frequency-Offset Estimator for Wireless Communications, Authors: Zhuo Lu, Jiandong Li, Linjing Zhao, and Yao Liu, Proc: IEEE Conference on Communications (ICC), June 2007. BibTex |
2. | Title: Iterative Parameter Estimation in MIMO Flat-Fading Channels with Frequency Offsets, Authors: Zhuo Lu, Jiandong Li, Linjing Zhao, and Jiyong Pang, Proc: International Conference on Advanced Information Networking and Applications (AINA), Apr. 2006. BibTex |
1. | Title: Carrier-Frequency Offsets Estimation Based on ML and ESPRIT Method for OFDMA Uplink, Authors: Linjing Zhao, Jiandong Li, Zhuo Lu, and Jiyong Pang, Proc: International Conference on Advanced Information Networking and Applications (AINA), Apr. 2006. BibTex |
33. | Title: Warmonger attack: A Novel Attack Vector in Serverless Computing, Authors: Junjie Xiong, Mingkui Wei, Zhuo Lu, and Yao Liu, Journal: IEEE/ACM Transactions on Networking, To Appear. BibTeX |
32. | Title: The Perils of Wi-Fi Spoofing Attack Via Geolocation API and its Defense, Authors: Xiao Han, Junjie Xiong, Wenbo Shen, Mingkui Wei, Shangqing Zhao, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Dependable and Secure Computing, To Appear. BibTeX |
31. | Title: Bandwidth Allocation for Federated Learning with Wireless Providers and Cost Constraints, Authors: Jiaohao Xue, Zhe Qu, Jie Xu, Yao Liu, and Zhuo Lu, Journal: IEEE Transactions on Mobile Computing, vol. 23, no. 6, pp. 7470-7482, Jun 2024. PDF BibTeX |
30. | Title: CrossVision: Real-time On-Camera Video Analysis via Common RoI Load Balancing, Authors: Letian Zhang, Zhuo Lu, Linqi, Song, and Jie Xu, Journal: IEEE Transactions on Mobile Computing, vol. 23, no. 5, pp. 5027-5039, May 2024. BibTeX |
29. | Title: FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation, Authors: Xingyu Li, Zhe Qu, Bo Tang, and Zhuo Lu, Journal: IEEE Transactions on Cybernetics, vol. 54, no. 1, pp. 401-414, Jan 2024. PDF BibTeX |
28. | Title: On the Convergence of Multi-Server Federated Learning with Overlapping Area, Authors: Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Mobile Computing, vol. 22, no. 11, pp. 6647-6662, Nov 2023. PDF BibTeX |
27. | Title: Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks, Authors: Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu, Journal: IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 1, pp. 637-649, Jan 2023. PDF BibTeX |
26. | Title: LoMar: A Local Defense Against Poisoning Attack on Federated Learning, Authors: Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, and Yao Liu (The first two authors are co-primary authors), Journal: IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 1, pp. 437-450, Jan 2023. PDF BibTeX |
25. | Title: Context-Aware Online Client Selection for Hierarchical Federated Learning, Authors: Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Parallel and Distributed Systems, vol. 22, pp. 4353-4367, Dec 2022. PDF BibTeX |
24. | Title: Wireless Training-free Keystroke Inference Attack and Defense, Authors: Edwin Yang, Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, Journal: IEEE/ACM Transactions on Networking, vol. 30, no. 4, pp. 1733-1748, Aug. 2022. PDF BibTeX |
23. | Title: When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing, Authors: Zhengping Luo, Shangqing Zhao, Zhuo Lu, Jie Xu, and Yalin Sagduyu, Journal: IEEE Transactions on Mobile Computing, vol. 21, no. 5, pp. 1892-1908, May 2022. PDF BibTeX |
22. | Title: Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation, Authors: Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu, Journal: IEEE/ACM Transactions on Networking, vol. 29, no. 6, pp. 2779-2792, Dec. 2021. PDF BibTeX |
21. | Title: Measurement Integrity Attacks against Network Tomography: Feasibility and Defense, Authors: Shangqing Zhao, Zhuo Lu, and Cliff Wang, Journal: IEEE Transactions on Dependable and Secure Computing, vol. 18, pp. 2617-2630, Nov. 2021. PDF BibTeX |
20. | Title: Binary Code Similarity Detection through LSTM and Siamese Neural Network, Authors: Zhengping Luo, Tao Hou, Xiangrong Zhou, Hui Zeng, and Zhuo Lu, Journal: EAI Transactions on Security and Safety, Sep. 2021. PDF BibTeX |
19. | Title: How to Test the Randomness from the Wireless Channel for Security?, Authors: Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3753-3766, June 2021. PDF BibTeX |
18. | Title: How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks?, Authors: Shangqing Zhao, Zhuo Lu, and Cliff Wang, Journal: IEEE Transactions on Wireless Communications, vol. 19, pp. 7224-7236, Nov, 2020. PDF BibTeX |
17. | Title: Security of HPC Systems: From a Log-analyzing Perspective, Authors: Zhengping Luo, Zhe Qu, Tung Nguyen, Hui Zeng, Zhuo Lu, Journal: EAI Transactions on Security and Safety, Aug. 2019. PDF BibTeX |
16. | Title: Cyber and Physical Interactions to Combat Failure Propagation in Smart Grid: Characterization, Analysis and Evaluation, Authors: Mingkui Wei, Zhuo Lu, Xiang Lu, and Yufei Tang, Journal: Computer Networks, July 2019. PDF BibTeX |
15. | Title: Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis and Evaluation, Authors: Zhuo Lu, Yalin Sagduyu, and Yi Shi, Journal: IEEE Transactions on Mobile Computing, vol. 18, no. 1, pp. 111-124, Jan. 2019. PDF BibTeX |
14. | Title: Cyber Deception: Overview and The Road Ahead, Authors: Cliff Wang and Zhuo Lu, Journal: IEEE Security & Privacy, vol. 16, pp. 80-85, Apr. 2018. PDF BibTeX |
13. | Title: On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid, Authors: Mingkui Wei, Zhuo Lu, and Wenye Wang, Journal: IEEE Systems Journal, 2018. PDF BibTeX |
12. | Title: Securing the Backpressure Algorithm for Wireless Networks, Authors: Zhuo Lu, Yalin Sagduyu, and Jason Li, Journal: IEEE Transactions on Mobile Computing, vol. 16, no. 4, pp. 1136-1148, Apr. 2017. PDF BibTeX |
11. | Title: Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective, Authors: Zhuo Lu and Cliff Wang, Journal: IEEE/ACM Transactions on Networking, vol. 25, no. 1, pp. 43-55, Feb. 2017. PDF BibTeX |
10. | Title: On the Evolution and Impact of Mobile Botnets in Wireless Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 15, pp. 2304-2316, Sep. 2016. PDF BibTeX |
9. | Title: On Topology and Resilience of Large-Scale Cognitive Radio Networks under Generic Failures, Authors: Lei Sun, Wenye Wang, and Zhuo Lu, Journal: IEEE Transactions on Wireless Communications, vol. 14, no. 6, pp. 3390-3401, Jun. 2015. PDF BibTeX |
8. | Title: Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Dependable and Secure Computing, vol. 12, pp. 31-44, Jan. 2015. PDF BibTeX |
7. | Title: Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 13, pp. 1746-1759, Aug. 2014. PDF BibTeX |
6. | Title: Cyber Security in the Smart Grid: Survey and Challenges, Authors: Wenye Wang and Zhuo Lu, Journal: Computer Networks, vol. 57, no. 5, pp. 1344-1371, Apr. 2013. PDF BibTeX |
5. | Title: Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 11, no. 8, pp. 1331-1344, Aug. 2012. PDF BibTeX |
4. | Title: Parameter Estimation for Correlated MIMO Channels with Frequency-Selective Fading, Authors: Wei Dong, Jiandong Li, and Zhuo Lu, Journal: Wireless Personal Communications, vol. 52, no. 4, pp. 813-828, 2010. BibTeX |
3. | Title: Joint Frequency Offset and Channel Estimation for MIMO systems in the Presence of Timing Error, Authors: Wei Dong, Jiandong Li, Zhuo Lu, and Wen Zhang, Journal: Circuits, Systems and Signal Processing, vol. 29, no. 2, pp. 275-293, 2010. BibTeX |
2. | Title: Design of the Periodic Training Sequence for Joint Channel and Frequency Estimation in MIMO Frequency-Selective Channels, Authors: Zhuo Lu, Jiandong Li, Linjing Zhao, and Liang Chen, Journal: Circuits, Systems and Signal Processing, vol. 26, no. 3, Jun. 2007. BibTeX |
1. | Title: Further Results on the ML IFO Estimation for OFDM Systems, Authors: Zhuo Lu, Linjing Zhao, and Jiandong Li, Journal: IEEE Transactions on Consumer Electron., vol. 34, no. 2, May 2007. BibTeX |
8. | Title: Adversarial Machine Learning: A New Threat Paradigm for Next-generation Wireless Communications, Authors: Yalin E Sagduyu, Yi Shi, Tugba Erpek, William Headley, Bryse Flowers, George Stantchev, Zhuo Lu, and Brian Jalaian, Publisher: AI, Machine Learning and Deep Learning: A Security Perspective, CRC Press, 2023. BibTex |
7. | Title: Federated Learning for IoT Applications, Attacks and Defense Methods, Authors: Zhe Qu, Rui Duan, Yao Liu, Zhuo Lu, Publisher: AI Embedded Assurance for Cyber Systems, Springer, 2023. BibTex |
6. | Title: Cyber Deception for Computer and Network Security: Survey and Challenges, Authors: Zhuo Lu, Cliff Wang, and Shangqing Zhao, Publisher: arXiv:2007.14497, Jul. 2020. PDF BibTex |
5. | Title: Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis, Authors: Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, and Yao Liu, Publisher: Autonomous Adaptive Cyber Systems, Springer, 2020. BibTex |
4. | Title: Proactive and Dynamic Network Defense, Authors: Cliff Wang and Zhuo Lu, Publisher: Advances in Information Security, Springer, 2019. BibTex |
3. | Title: A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks, Authors: Zhuo Lu, Cliff Wang, and Mingkui Wei, Publisher: Cyber Deception: Building the Scientific Foundation, Springer, 2016. BibTex |
2. | Title: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Publisher: Springer, 2015. BibTex |
1. | Title: Cyber Defense and Situational Awareness: Network-Wide Awareness, Authors: Nicholas Evancich, Zhuo Lu, Jason Li, Yi Cheng, Joshua Tuttle, and Peng Xie, Publisher: Advances in Information Security Series, Springer, 2014. BibTex |
Copyright Note: The electronic versions of the published papers are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and conditions invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.