Shitong Zhu

Orcid: 0009-0000-7034-4202

According to our database1, Shitong Zhu authored at least 19 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

3D-IDS: Doubly Disentangled Dynamic Intrusion Detection.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

2022
Incremental-Compensation based Low-Cost Offline Robust Topology Control for Micro/Nano Satellite Network.
J. Inf. Sci. Eng., 2022

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN.
CoRR, 2022

2021
Understanding and Taming Adversarial Actions Against Internet Content Blockers.
PhD thesis, 2021

Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

Eluding ML-based Adblockers With Actionable Adversarial Examples.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A4 : Evading Learning-based Adblockers.
CoRR, 2020

AdGraph: A Graph-Based Approach to Ad and Tracker Blocking.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency.
Proceedings of the Computer Vision - ECCV 2020, 2020

You do (not) belong here: detecting DPI evasion attacks with context learning.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

2019
ShadowBlock: A Lightweight and Stealthy Adblocking Browser.
Proceedings of the World Wide Web Conference, 2019

2018
AdGraph: A Machine Learning Approach to Automatic and Effective Adblocking.
CoRR, 2018

Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2015
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

On selecting composite network-cloud services: a quality-of-service based approach.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2014
A Defense Model of Reactive Worms Based on Dynamic Time.
J. Softw., 2014


  Loading...