♦ | Title: Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception , Authors: Rui Duan, Zhe Qu, Shanqing Zhao, Leah Ding, Yao Liu, and Zhuo Lu, Proc: ACM Conference on Computer and Communications Security (CCS), Nov 2022. Acceptance Rate: 17.90%. BibTex |
♦ | Title: Generalized Federated Learning via Sharpness Aware Minimization, Authors: Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang and Zhuo Lu, Proc: International Conference on Machine Learning (ICML), Jul 2022. Acceptance Rate: 21.94%. PDF BibTex |
♦ | Title: DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security, Authors: Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei, Proc: ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022. PDF BibTex |
♦ | Title: MUSTER: Subverting User Selection in MU-MIMO Networks, Authors: Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, and Yalin Saguduyu, Proc: IEEE Conference on Computer Communications (INFOCOM), May, 2022. Acceptance Rate: 19.93%. PDF BibTex |
♦ | Title: Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud, Authors: Junjie Xiong, Mingkui Wei, Zhuo Lu, and Yao Liu, Proc: ACM Conference on Computer and Communications Security (CCS), Nov. 2021. Acceptance Rate: 22.3%. PDF BibTex |
♦ | Title: ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference, Authors: Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu, Proc: IEEE Conference on Computer Communications (INFOCOM), July, 2020. Acceptance Rate: 19.8%. PDF Slides BibTex |
♦ | Title: Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks, Authors: Lixing Chen, Zhuo Lu, Pan Zhou, and Jie Xue, Proc: IEEE Conference on Computer Communications (INFOCOM), July, 2020. Acceptance Rate: 19.8%. PDF Slides BibTex |
♦ | Title: Comb Decoding towards Collision-Free WiFi, Authors: Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu and Yao Liu, Proc: USENIX Symposium on Networked Systems Design and Implementation (NSDI), Feb. 2020. Acceptance Rate: 17.45%. PDF Slides Presentation Video BibTex |
♦ | Title: Entrapment for Wireless Eavesdroppers, Authors: Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2019. Acceptance Rate: 19.7%. PDF Slides BibTex |
♦ | Title: Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks, Authors: Shangqing Zhao, Zhengping Luo, Zhuo Lu, and Yao Liu, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2019. Acceptance Rate: 19.7%. PDF Slides BibTex |
♦ | Title: Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward, Authors: Lixing Chen, Jie Xu, and Zhuo Lu, Proc: Annual Conference on Neural Information Processing Systems (NeurIPS), Dec. 2018. Acceptance Rate: 20.8%. PDF Slides BibTex |
♦ | Title: No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing, Authors: Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, Proc: ACM Conference on Computer and Communications Security (CCS), Oct. 2018. Acceptance Rate: 16.6%. PDF Slides BibTex |
♦ | Title: How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?, Authors: Mingkui Wei, Zhuo Lu, Yufei Tang, and Xiang Lu (The first two authors are co-primary authors), Proc: IEEE Conference on Computer Communications (INFOCOM), Apr., 2018. Acceptance Rate: 19.24%. PDF BibTex |
♦ | Title: Stateful Inter-Packet Signal Processing for Wireless Networking, Authors: Shangqing Zhao, Zhengping Luo, Zhuo Lu, Xiang Lu, and Yao Liu, Proc: ACM International Conference on Mobile Computing and Networking (MobiCom), Oct., 2017. Acceptance Rate: 18.82%. PDF Slides Summary Video BibTex |
♦ | Title: PDF Mirage: Content Masking Attack Against Information-Based Online Services, Authors: Ian Markwood, Dakun Shen, Yao Liu, and Zhuo Lu (The first two authors are co-primary authors), Proc: USENIX Security Symposium (USENIX Security), Aug., 2017. Acceptance Rate: 16.28%. PDF Slides Presentation Video BibTex |
♦ | Title: When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography, Authors: Shangqing Zhao, Zhuo Lu and Cliff Wang, Proc: IEEE International Conference on Distributed Computing Systems (ICDCS), May, 2017. Acceptance Rate: 16.95%. PDF Slides BibTex |
♦ | Title: How They Interact? Understanding Cyber and Physical Interactions against Fault Propagation in Smart Grid, Authors: Zhuo Lu, Mingkui Wei, and Xiang Lu, Proc: IEEE Conference on Computer Communications (INFOCOM), May. 2017. Acceptance Rate: 20.93%. PDF Slides BibTex |
♦ | Title: Network Anti-Inference: A Fundamental Perspective on Proactive Strategies to Counter Flow Inference, Authors: Zhuo Lu and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2015. Acceptance Rate: 19.3%. PDF Slides BibTex |
♦ | Title: Queuing the Trust: Secure Backpressure Algorithm against Insider Threats in Wireless Networks, Authors: Zhuo Lu, Yalin Sagduyu, and Jason Li, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2015. Acceptance Rate: 19.3%. PDF Slides BibTex |
♦ | Title: How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2014. Acceptance Rate: 19.4%. PDF Slides BibTex |
♦ | Title: Hiding Traffic with Camouflage: Minimizing Message Delay in the Smart Grid under Jamming, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications, Mini-Conference (INFOCOM), Apr. 2012. Acceptance Rate: 25%. PDF Slides BibTex |
♦ | Title: Reliable and Secure Communication Platforms of FREEDM Systems in Smart Grid, Authors: Xiang Lu, Zhuo Lu, Wenye Wang, and Jianfeng Ma, Proc: ACM International Conference on Mobile Computing and Networking, Demo Session (MobiCom), Sept. 2011. BibTex |
♦ | Title: From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Aug. 2011. Acceptance Rate: 16%. PDF Slides BibTex |
♦ | Title: On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-Based Wireless Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), June. 2010. Acceptance Rate: 17.5%. PDF Slides BibTex |
♦ | Title: Context-Aware Online Client Selection for Hierarchical Federated Learning, Authors: Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Parallel and Distributed Systems, To Appear. BibTeX |
♦ | Title: Wireless Training-free Keystroke Inference Attack and Defense, Authors: Edwin Yang, Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, Journal: IEEE/ACM Transactions on Networking, To Appear. BibTeX |
♦ | Title: Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks, Authors: Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu, Journal: IEEE Transactions on Dependable and Secure Computing, To Appear. BibTeX |
♦ | Title: LoMar: A Local Defense Against Poisoning Attack on Federated Learning, Authors: Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, and Yao Liu (The first two authors are co-primary authors), Journal: IEEE Transactions on Dependable and Secure Computing, To Appear. PDF BibTeX |
♦ | Title: When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing, Authors: Zhengping Luo, Shangqing Zhao, Zhuo Lu, Jie Xu, and Yalin Sagduyu, Journal: IEEE Transactions on Mobile Computing, vol. 21, no. 5, pp. 1892-1908, May 2022. PDF BibTeX |
♦ | Title: Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation, Authors: Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu, Journal: IEEE/ACM Transactions on Networking, vol. 29, no. 6, pp. 2779-2792, Dec. 2021. PDF BibTeX |
♦ | Title: Measurement Integrity Attacks against Network Tomography: Feasibility and Defense, Authors: Shangqing Zhao, Zhuo Lu, and Cliff Wang, Journal: IEEE Transactions on Dependable and Secure Computing, vol. 18, pp. 2617-2630, Nov. 2021. PDF BibTeX |
♦ | Title: How to Test the Randomness from the Wireless Channel for Security?, Authors: Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3753-3766, June 2021. PDF BibTeX |
♦ | Title: How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks?, Authors: Shangqing Zhao, Zhuo Lu, and Cliff Wang, Journal: IEEE Transactions on Wireless Communications, vol. 19, pp. 7224-7236, Nov, 2020. PDF BibTeX |
♦ | Title: Cyber and Physical Interactions to Combat Failure Propagation in Smart Grid: Characterization, Analysis and Evaluation, Authors: Mingkui Wei, Zhuo Lu, Xiang Lu, and Yufei Tang, Journal: Computer Networks, July 2019. PDF BibTeX |
♦ | Title: Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis and Evaluation, Authors: Zhuo Lu, Yalin Sagduyu, and Yi Shi, Journal: IEEE Transactions on Mobile Computing, vol. 18, no. 1, pp. 111-124, Jan. 2019. PDF BibTeX |
♦ | Title: Cyber Deception: Overview and The Road Ahead, Authors: Cliff Wang and Zhuo Lu, Journal: IEEE Security & Privacy, vol. 16, pp. 80-85, Apr. 2018. PDF BibTeX |
♦ | Title: On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid, Authors: Mingkui Wei, Zhuo Lu, and Wenye Wang, Journal: IEEE Systems Journal, 2018. PDF BibTeX |
♦ | Title: Securing the Backpressure Algorithm for Wireless Networks, Authors: Zhuo Lu, Yalin Sagduyu, and Jason Li, Journal: IEEE Transactions on Mobile Computing, vol. 16, no. 4, pp. 1136-1148, Apr. 2017. PDF BibTeX |
♦ | Title: Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective, Authors: Zhuo Lu and Cliff Wang, Journal: IEEE/ACM Transactions on Networking, vol. 25, no. 1, pp. 43-55, Feb. 2017. PDF BibTeX |
♦ | Title: On the Evolution and Impact of Mobile Botnets in Wireless Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 15, pp. 2304-2316, Sep. 2016. PDF BibTeX |
♦ | Title: On Topology and Resilience of Large-Scale Cognitive Radio Networks under Generic Failures, Authors: Lei Sun, Wenye Wang, and Zhuo Lu, Journal: IEEE Transactions on Wireless Communications, vol. 14, no. 6, pp. 3390-3401, Jun. 2015. PDF BibTeX |
♦ | Title: Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Dependable and Secure Computing, vol. 12, pp. 31-44, Jan. 2015. PDF BibTeX |
♦ | Title: Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 13, pp. 1746-1759, Aug. 2014. PDF BibTeX |
♦ | Title: Cyber Security in the Smart Grid: Survey and Challenges, Authors: Wenye Wang and Zhuo Lu, Journal: Computer Networks, vol. 57, no. 5, pp. 1344-1371, Apr. 2013. PDF BibTeX |
♦ | Title: Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 11, no. 8, pp. 1331-1344, Aug. 2012. PDF BibTeX |
♦ | Title: Cyber Deception for Computer and Network Security: Survey and Challenges, Authors: Zhuo Lu, Cliff Wang, and Shangqing Zhao, Publisher: arXiv:2007.14497, Jul. 2020. PDF BibTex |
♦ | Title: Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis, Authors: Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, and Yao Liu, Publisher: Autonomous Adaptive Cyber Systems, Springer, 2020. BibTex |
♦ | Title: Proactive and Dynamic Network Defense, Authors: Cliff Wang and Zhuo Lu, Publisher: Advances in Information Security, Springer, 2019. BibTex |
♦ | Title: A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks, Authors: Zhuo Lu, Cliff Wang, and Mingkui Wei, Publisher: Cyber Deception: Building the Scientific Foundation, Springer, 2016. BibTex |
♦ | Title: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Publisher: Springer, 2015. BibTex |
♦ | Title: Cyber Defense and Situational Awareness: Network-Wide Awareness, Authors: Nicholas Evancich, Zhuo Lu, Jason Li, Yi Cheng, Joshua Tuttle, and Peng Xie, Publisher: Advances in Information Security Series, Springer, 2014. BibTex |
Copyright Note: The electronic versions of the published papers are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and conditions invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.