♦ | Title: Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics, Authors: Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, and Zhuo Lu, Proc: IEEE Conference on Computer Communications (INFOCOM), May, 2024. Acceptance Rate: 19.6%. PDF BibTex |
♦ | Title: Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information, Authors: Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, and Zhuo Lu, Proc: IEEE Symposium on Security and Privacy (S&P), May 2024. Acceptance Rate: 17.8%. PDF BibTex |
♦ | Title: Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models, Authors: Rui Duan, Zhe Qu, Leah Ding, Yao Liu, and Zhuo Lu, Proc: Network and Distributed System Security Symposium (NDSS), Feb 2024. Acceptance Rate: 15%. PDF Summary Video BibTex |
♦ | Title: Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API, Authors: Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, and Yao Liu, Proc: ACM Conference on Computer and Communications Security (CCS), Nov 2022. Acceptance Rate: 22.3%. PDF BibTex |
♦ | Title: Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception, Authors: Rui Duan, Zhe Qu, Shanqing Zhao, Leah Ding, Yao Liu, and Zhuo Lu, Proc: ACM Conference on Computer and Communications Security (CCS), Nov 2022. Acceptance Rate: 17.90%. PDF Summary Video BibTex |
♦ | Title: Generalized Federated Learning via Sharpness Aware Minimization, Authors: Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang and Zhuo Lu, Proc: International Conference on Machine Learning (ICML), Jul 2022. Acceptance Rate: 21.94%. PDF BibTex |
♦ | Title: DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security, Authors: Shengping Bi, Tao Hou, Tao Wang, Yao Liu, Zhuo Lu, and Qingqi Pei, Proc: ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2022. PDF BibTex |
♦ | Title: MUSTER: Subverting User Selection in MU-MIMO Networks, Authors: Tao Hou, Shengping Bi, Tao Wang, Zhuo Lu, Yao Liu, Satyajayant Misra, and Yalin Saguduyu, Proc: IEEE Conference on Computer Communications (INFOCOM), May, 2022. Acceptance Rate: 19.93%. PDF BibTex |
♦ | Title: Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud, Authors: Junjie Xiong, Mingkui Wei, Zhuo Lu, and Yao Liu, Proc: ACM Conference on Computer and Communications Security (CCS), Nov. 2021. Acceptance Rate: 22.3%. PDF BibTex |
♦ | Title: ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference, Authors: Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu, Proc: IEEE Conference on Computer Communications (INFOCOM), July, 2020. Acceptance Rate: 19.8%. PDF Slides BibTex |
♦ | Title: Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks, Authors: Lixing Chen, Zhuo Lu, Pan Zhou, and Jie Xue, Proc: IEEE Conference on Computer Communications (INFOCOM), July, 2020. Acceptance Rate: 19.8%. PDF Slides BibTex |
♦ | Title: Comb Decoding towards Collision-Free WiFi, Authors: Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu and Yao Liu, Proc: USENIX Symposium on Networked Systems Design and Implementation (NSDI), Feb. 2020. Acceptance Rate: 17.45%. PDF Slides Presentation Video BibTex |
♦ | Title: Entrapment for Wireless Eavesdroppers, Authors: Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2019. Acceptance Rate: 19.7%. PDF Slides BibTex |
♦ | Title: Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks, Authors: Shangqing Zhao, Zhengping Luo, Zhuo Lu, and Yao Liu, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2019. Acceptance Rate: 19.7%. PDF Slides BibTex |
♦ | Title: Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward, Authors: Lixing Chen, Jie Xu, and Zhuo Lu, Proc: Annual Conference on Neural Information Processing Systems (NeurIPS), Dec. 2018. Acceptance Rate: 20.8%. PDF Slides BibTex |
♦ | Title: No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing, Authors: Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, Proc: ACM Conference on Computer and Communications Security (CCS), Oct. 2018. Acceptance Rate: 16.6%. PDF Slides BibTex |
♦ | Title: How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?, Authors: Mingkui Wei, Zhuo Lu, Yufei Tang, and Xiang Lu (The first two authors are co-primary authors), Proc: IEEE Conference on Computer Communications (INFOCOM), Apr., 2018. Acceptance Rate: 19.24%. PDF BibTex |
♦ | Title: Stateful Inter-Packet Signal Processing for Wireless Networking, Authors: Shangqing Zhao, Zhengping Luo, Zhuo Lu, Xiang Lu, and Yao Liu, Proc: ACM International Conference on Mobile Computing and Networking (MobiCom), Oct., 2017. Acceptance Rate: 18.82%. PDF Slides Summary Video BibTex |
♦ | Title: PDF Mirage: Content Masking Attack Against Information-Based Online Services, Authors: Ian Markwood, Dakun Shen, Yao Liu, and Zhuo Lu (The first two authors are co-primary authors), Proc: USENIX Security Symposium (USENIX Security), Aug., 2017. Acceptance Rate: 16.28%. PDF Slides Presentation Video BibTex |
♦ | Title: When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography, Authors: Shangqing Zhao, Zhuo Lu and Cliff Wang, Proc: IEEE International Conference on Distributed Computing Systems (ICDCS), May, 2017. Acceptance Rate: 16.95%. PDF Slides BibTex |
♦ | Title: How They Interact? Understanding Cyber and Physical Interactions against Fault Propagation in Smart Grid, Authors: Zhuo Lu, Mingkui Wei, and Xiang Lu, Proc: IEEE Conference on Computer Communications (INFOCOM), May. 2017. Acceptance Rate: 20.93%. PDF Slides BibTex |
♦ | Title: Network Anti-Inference: A Fundamental Perspective on Proactive Strategies to Counter Flow Inference, Authors: Zhuo Lu and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2015. Acceptance Rate: 19.3%. PDF Slides BibTex |
♦ | Title: Queuing the Trust: Secure Backpressure Algorithm against Insider Threats in Wireless Networks, Authors: Zhuo Lu, Yalin Sagduyu, and Jason Li, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2015. Acceptance Rate: 19.3%. PDF Slides BibTex |
♦ | Title: How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Apr. 2014. Acceptance Rate: 19.4%. PDF Slides BibTex |
♦ | Title: Hiding Traffic with Camouflage: Minimizing Message Delay in the Smart Grid under Jamming, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications, Mini-Conference (INFOCOM), Apr. 2012. Acceptance Rate: 25%. PDF Slides BibTex |
♦ | Title: Reliable and Secure Communication Platforms of FREEDM Systems in Smart Grid, Authors: Xiang Lu, Zhuo Lu, Wenye Wang, and Jianfeng Ma, Proc: ACM International Conference on Mobile Computing and Networking, Demo Session (MobiCom), Sept. 2011. BibTex |
♦ | Title: From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), Aug. 2011. Acceptance Rate: 16%. PDF Slides BibTex |
♦ | Title: On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-Based Wireless Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Proc: IEEE Conference on Computer Communications (INFOCOM), June. 2010. Acceptance Rate: 17.5%. PDF Slides BibTex |
♦ | Title: Bandwidth Allocation for Federated Learning with Wireless Providers and Cost Constraints, Authors: Jiaohao Xue, Zhe Qu, Jie Xu, Yao Liu, and Zhuo Lu, Journal: IEEE Transactions on Mobile Computing, vol. 23, no. 6, pp. 7470-7482, Jun 2024. PDF BibTeX |
♦ | Title: CrossVision: Real-time On-Camera Video Analysis via Common RoI Load Balancing, Authors: Letian Zhang, Zhuo Lu, Linqi, Song, and Jie Xu, Journal: IEEE Transactions on Mobile Computing, vol. 23, no. 5, pp. 5027-5039, May 2024. BibTeX |
♦ | Title: FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation, Authors: Xingyu Li, Zhe Qu, Bo Tang, and Zhuo Lu, Journal: IEEE Transactions on Cybernetics, vol. 54, no. 1, pp. 401-414, Jan 2024. PDF BibTeX |
♦ | Title: On the Convergence of Multi-Server Federated Learning with Overlapping Area, Authors: Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Mobile Computing, vol. 22, no. 11, pp. 6647-6662, Nov 2023. PDF BibTeX |
♦ | Title: Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks, Authors: Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, and Zhuo Lu, Journal: IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 1, pp. 637-649, Jan 2023. PDF BibTeX |
♦ | Title: LoMar: A Local Defense Against Poisoning Attack on Federated Learning, Authors: Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, and Yao Liu (The first two authors are co-primary authors), Journal: IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 1, pp. 437-450, Jan 2023. PDF BibTeX |
♦ | Title: Context-Aware Online Client Selection for Hierarchical Federated Learning, Authors: Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Parallel and Distributed Systems, vol. 22, pp. 4353-4367, Dec 2022. PDF BibTeX |
♦ | Title: Wireless Training-free Keystroke Inference Attack and Defense, Authors: Edwin Yang, Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, and Haojin Zhu, Journal: IEEE/ACM Transactions on Networking, vol. 30, no. 4, pp. 1733-1748, Aug. 2022. PDF BibTeX |
♦ | Title: When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing, Authors: Zhengping Luo, Shangqing Zhao, Zhuo Lu, Jie Xu, and Yalin Sagduyu, Journal: IEEE Transactions on Mobile Computing, vol. 21, no. 5, pp. 1892-1908, May 2022. PDF BibTeX |
♦ | Title: Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation, Authors: Tao Hou, Tao Wang, Zhuo Lu, and Yao Liu, Journal: IEEE/ACM Transactions on Networking, vol. 29, no. 6, pp. 2779-2792, Dec. 2021. PDF BibTeX |
♦ | Title: Measurement Integrity Attacks against Network Tomography: Feasibility and Defense, Authors: Shangqing Zhao, Zhuo Lu, and Cliff Wang, Journal: IEEE Transactions on Dependable and Secure Computing, vol. 18, pp. 2617-2630, Nov. 2021. PDF BibTeX |
♦ | Title: How to Test the Randomness from the Wireless Channel for Security?, Authors: Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, and Yao Liu, Journal: IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3753-3766, June 2021. PDF BibTeX |
♦ | Title: How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks?, Authors: Shangqing Zhao, Zhuo Lu, and Cliff Wang, Journal: IEEE Transactions on Wireless Communications, vol. 19, pp. 7224-7236, Nov, 2020. PDF BibTeX |
♦ | Title: Cyber and Physical Interactions to Combat Failure Propagation in Smart Grid: Characterization, Analysis and Evaluation, Authors: Mingkui Wei, Zhuo Lu, Xiang Lu, and Yufei Tang, Journal: Computer Networks, July 2019. PDF BibTeX |
♦ | Title: Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis and Evaluation, Authors: Zhuo Lu, Yalin Sagduyu, and Yi Shi, Journal: IEEE Transactions on Mobile Computing, vol. 18, no. 1, pp. 111-124, Jan. 2019. PDF BibTeX |
♦ | Title: Cyber Deception: Overview and The Road Ahead, Authors: Cliff Wang and Zhuo Lu, Journal: IEEE Security & Privacy, vol. 16, pp. 80-85, Apr. 2018. PDF BibTeX |
♦ | Title: On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid, Authors: Mingkui Wei, Zhuo Lu, and Wenye Wang, Journal: IEEE Systems Journal, 2018. PDF BibTeX |
♦ | Title: Securing the Backpressure Algorithm for Wireless Networks, Authors: Zhuo Lu, Yalin Sagduyu, and Jason Li, Journal: IEEE Transactions on Mobile Computing, vol. 16, no. 4, pp. 1136-1148, Apr. 2017. PDF BibTeX |
♦ | Title: Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective, Authors: Zhuo Lu and Cliff Wang, Journal: IEEE/ACM Transactions on Networking, vol. 25, no. 1, pp. 43-55, Feb. 2017. PDF BibTeX |
♦ | Title: On the Evolution and Impact of Mobile Botnets in Wireless Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 15, pp. 2304-2316, Sep. 2016. PDF BibTeX |
♦ | Title: On Topology and Resilience of Large-Scale Cognitive Radio Networks under Generic Failures, Authors: Lei Sun, Wenye Wang, and Zhuo Lu, Journal: IEEE Transactions on Wireless Communications, vol. 14, no. 6, pp. 3390-3401, Jun. 2015. PDF BibTeX |
♦ | Title: Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Dependable and Secure Computing, vol. 12, pp. 31-44, Jan. 2015. PDF BibTeX |
♦ | Title: Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 13, pp. 1746-1759, Aug. 2014. PDF BibTeX |
♦ | Title: Cyber Security in the Smart Grid: Survey and Challenges, Authors: Wenye Wang and Zhuo Lu, Journal: Computer Networks, vol. 57, no. 5, pp. 1344-1371, Apr. 2013. PDF BibTeX |
♦ | Title: Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Journal: IEEE Transactions on Mobile Computing, vol. 11, no. 8, pp. 1331-1344, Aug. 2012. PDF BibTeX |
♦ | Title: Understanding the Ineffectiveness of the Transfer Attack in Intrusion Detection System, Authors: Rui Duan, Wenwei Zhao, Zhengping Jay Luo, Ning Wang, Yao Liu, and Zhuo Lu, Publisher: Network Security Empowered by Artificial Intelligence, Springer, 2024. BibTex |
♦ | Title: Adversarial Machine Learning: A New Threat Paradigm for Next-generation Wireless Communications, Authors: Yalin E Sagduyu, Yi Shi, Tugba Erpek, William Headley, Bryse Flowers, George Stantchev, Zhuo Lu, and Brian Jalaian, Publisher: AI, Machine Learning and Deep Learning: A Security Perspective, CRC Press, 2023. BibTex |
♦ | Title: Federated Learning for IoT Applications, Attacks and Defense Methods, Authors: Zhe Qu, Rui Duan, Yao Liu, Zhuo Lu, Publisher: AI Embedded Assurance for Cyber Systems, Springer, 2023. BibTex |
♦ | Title: Cyber Deception for Computer and Network Security: Survey and Challenges, Authors: Zhuo Lu, Cliff Wang, and Shangqing Zhao, Publisher: arXiv:2007.14497, Jul. 2020. PDF BibTex |
♦ | Title: Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis, Authors: Tao Hou, Tao Wang, Dakun Shen, Zhuo Lu, and Yao Liu, Publisher: Autonomous Adaptive Cyber Systems, Springer, 2020. BibTex |
♦ | Title: Proactive and Dynamic Network Defense, Authors: Cliff Wang and Zhuo Lu, Publisher: Advances in Information Security, Springer, 2019. BibTex |
♦ | Title: A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks, Authors: Zhuo Lu, Cliff Wang, and Mingkui Wei, Publisher: Cyber Deception: Building the Scientific Foundation, Springer, 2016. BibTex |
♦ | Title: Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications, Authors: Zhuo Lu, Wenye Wang, and Cliff Wang, Publisher: Springer, 2015. BibTex |
♦ | Title: Cyber Defense and Situational Awareness: Network-Wide Awareness, Authors: Nicholas Evancich, Zhuo Lu, Jason Li, Yi Cheng, Joshua Tuttle, and Peng Xie, Publisher: Advances in Information Security Series, Springer, 2014. BibTex |
Copyright Note: The electronic versions of the published papers are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and conditions invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.