Wenchao Zhou

According to our database1, Wenchao Zhou authored at least 53 papers between 2008 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Data Center Diagnostics with Network Provenance.
IEEE Data Eng. Bull., 2018

2017
Privacy-preserving Network Provenance.
PVLDB, 2017

Distributed Provenance Compression.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Automated Bug Removal for Software-Defined Networks.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead.
Proceedings of the CIDR 2017, 2017

2016
Private and Verifiable Interdomain Routing Decisions.
IEEE/ACM Trans. Netw., 2016

Data-plane Defenses against Routing Attacks on Tor.
PoPETs, 2016

Hidden Voice Commands.
Proceedings of the 25th USENIX Security Symposium, 2016

The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Dispersing Asymmetric DDoS Attacks with SplitStack.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

2015
A Program Logic for Verifying Secure Routing Protocols.
Logical Methods in Computer Science, 2015

Automated verification of safety properties of declarative networking programs.
Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, 2015

The (surprising) computational power of the SDN data plane.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Automated Network Repair with Meta Provenance.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

Differential Provenance: Better Network Diagnostics with Reference Events.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

2014
The design and implementation of the A3 application-aware anonymity platform.
Computer Networks, 2014

Diagnosing missing events in distributed systems with negative provenance.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Detecting Covert Timing Channels with Time-Deterministic Replay.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Software-Defined Networks as Databases.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Proof-based Verification of Software Defined Networks.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

A Program Logic for Verifying Secure Routing Protocols.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2014

Towards a Data-Centric Approach to Attribution in the Cloud.
Proceedings of the Secure Cloud Computing, 2014

2013
Supporting Distributed Feed-Following Apps over Edge Devices.
PVLDB, 2013

Datalog and Recursive Query Processing.
Foundations and Trends in Databases, 2013

Declarative secure distributed information systems.
Computer Languages, Systems & Structures, 2013

Using substructure mining to identify misbehavior in network provenance graphs.
Proceedings of the First International Workshop on Graph Data Management Experiences and Systems, 2013

Answering why-not queries in software-defined networks with negative provenance.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

Validating web content with senser.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Declarative Networking
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, 2012

FSR: formal analysis and implementation toolkit for safe interdomain routing.
IEEE/ACM Trans. Netw., 2012

Distributed Time-aware Provenance.
PVLDB, 2012

RACE: real-time applications over cloud-edge.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

Private and verifiable interdomain routing decisions.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Recent Advances in Declarative Networking.
Proceedings of the Practical Aspects of Declarative Languages, 2012

Reduction-based security analysis of Internet routing protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
TAP: Time-aware Provenance for Distributed Systems.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Secure network provenance.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

NetTrails: a declarative platform for maintaining and querying provenance in distributed systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

A batch of PNUTS: experiences connecting cloud batch and serving systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

FSR: formal analysis and implementation toolkit for safe inter-domain routing.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Having your cake and eating it too: routing security with privacy protections.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

2010
Maintaining Recursive Views of Regions and Connectivity in Networks.
IEEE Trans. Knowl. Data Eng., 2010

Efficient querying and maintenance of network provenance at internet-scale.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

A3: An Extensible Platform for Application-Aware Anonymity.
Proceedings of the Network and Distributed System Security Symposium, 2010

Towards a data-centric view of cloud security.
Proceedings of the Second International CIKM Workshop on Cloud Data Management, 2010

2009
Declarative Reconfigurable Trust Management
CoRR, 2009

DMaC: Distributed Monitoring and Checking.
Proceedings of the Runtime Verification, 9th International Workshop, 2009

Unified Declarative Platform for Secure Netwoked Information Systems.
Proceedings of the 25th International Conference on Data Engineering, 2009

Recursive Computation of Regions and Connectivity in Networks.
Proceedings of the 25th International Conference on Data Engineering, 2009

Declarative Reconfigurable Trust Management.
Proceedings of the CIDR 2009, 2009

2008
Provenance-aware secure networks.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008


  Loading...