Wenchao Zhou

Orcid: 0000-0002-7756-1418

According to our database1, Wenchao Zhou authored at least 74 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SeRF: Segment Graph for Range-Filtering Approximate Nearest Neighbor Search.
Proc. ACM Manag. Data, February, 2024

Robot Tape Manipulation for 3D Printing.
CoRR, 2024

2023
Rethink Query Optimization in HTAP Databases.
Proc. ACM Manag. Data, December, 2023

PolarDB-SCC: A Cloud-Native Database Ensuring Low Latency for Strongly Consistent Reads.
Proc. VLDB Endow., 2023

Eigen: End-to-end Resource Optimization for Large-Scale Databases on the Cloud.
Proc. VLDB Endow., 2023

PolarDB-IMCI: A Cloud-Native HTAP Database System at Alibaba.
Proc. ACM Manag. Data, 2023

Knock Out 2PC with Practicality Intact: a High-performance and General Distributed Transaction Protocol (Technical Report).
CoRR, 2023

Knock Out 2PC with Practicality Intact: a High-performance and General Distributed Transaction Protocol.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Saguaro: An Edge Computing-Enabled Hierarchical Permissioned Blockchain.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

2022
CloudJump: Optimizing Cloud Databases for Cloud Storages.
Proc. VLDB Endow., 2022

<i>LayerLock</i>: Layer-Wise Collision-Free Multi-Robot Additive Manufacturing Using Topologically Interlocked Space-Filling Shapes.
Comput. Aided Des., 2022

ESDB: Processing Extremely Skewed Workloads in Real-time.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

2021
Saguaro: Efficient Processing of Transactions in Wide Area Networks using a Hierarchical Permissioned Blockchain.
CoRR, 2021

VeriDB: An SGX-based Verifiable Database.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

2020
Data-Driven Predictive Modeling of Tensile Behavior of Parts Fabricated by Cooperative 3D Printing.
J. Comput. Inf. Sci. Eng., 2020

A Generative Approach for Scheduling Multi-Robot Cooperative Three-Dimensional Printing.
J. Comput. Inf. Sci. Eng., 2020

A Heuristic Scaling Strategy for Multi-Robot Cooperative Three-Dimensional Printing.
J. Comput. Inf. Sci. Eng., 2020

Provenance for Probabilistic Logic Programs.
Proceedings of the 23rd International Conference on Extending Database Technology, 2020

Ephemeral Exit Bridges for Tor.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Bypassing Tor Exit Blocking with Exit Bridge Onion Services.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A Study on the Dynamic Transmission Law of Spiral Drum Cutting Coal Rock Based on ANSYS/LS-DYNA Simulation.
Complex., 2019

2018
NSF BIGDATA PI Meeting - Domain-Specific Research Directions and Data Sets.
SIGMOD Rec., 2018

Optical Micro/Nanofiber-Based Localized Surface Plasmon Resonance Biosensors: Fiber Diameter Dependence.
Sensors, 2018

Data Center Diagnostics with Network Provenance.
IEEE Data Eng. Bull., 2018

DeDoS: Defusing DoS with Dispersion Oriented Software.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Privacy-preserving Network Provenance.
Proc. VLDB Endow., 2017

Distributed Provenance Compression.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Automated Bug Removal for Software-Defined Networks.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead.
Proceedings of the 8th Biennial Conference on Innovative Data Systems Research, 2017

2016
Private and Verifiable Interdomain Routing Decisions.
IEEE/ACM Trans. Netw., 2016

Data-plane Defenses against Routing Attacks on Tor.
Proc. Priv. Enhancing Technol., 2016

Hidden Voice Commands.
Proceedings of the 25th USENIX Security Symposium, 2016

The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Dispersing Asymmetric DDoS Attacks with SplitStack.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

2015
A Program Logic for Verifying Secure Routing Protocols.
Log. Methods Comput. Sci., 2015

Automated verification of safety properties of declarative networking programs.
Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, 2015

The (surprising) computational power of the SDN data plane.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Automated Network Repair with Meta Provenance.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

Differential Provenance: Better Network Diagnostics with Reference Events.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

2014
The design and implementation of the A<sup>3</sup> application-aware anonymity platform.
Comput. Networks, 2014

Diagnosing missing events in distributed systems with negative provenance.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Detecting Covert Timing Channels with Time-Deterministic Replay.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Software-Defined Networks as Databases.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Proof-based Verification of Software Defined Networks.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Towards a Data-Centric Approach to Attribution in the Cloud.
Proceedings of the Secure Cloud Computing, 2014

2013
Supporting Distributed Feed-Following Apps over Edge Devices.
Proc. VLDB Endow., 2013

Datalog and Recursive Query Processing.
Found. Trends Databases, 2013

Declarative secure distributed information systems.
Comput. Lang. Syst. Struct., 2013

Using substructure mining to identify misbehavior in network provenance graphs.
Proceedings of the First International Workshop on Graph Data Management Experiences and Systems, 2013

Answering why-not queries in software-defined networks with negative provenance.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

Validating web content with senser.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Declarative Networking
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, ISBN: 978-3-031-01886-2, 2012

FSR: formal analysis and implementation toolkit for safe interdomain routing.
IEEE/ACM Trans. Netw., 2012

Distributed Time-aware Provenance.
Proc. VLDB Endow., 2012

RACE: real-time applications over cloud-edge.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

Recent Advances in Declarative Networking.
Proceedings of the Practical Aspects of Declarative Languages, 2012

Reduction-based security analysis of Internet routing protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
TAP: Time-aware Provenance for Distributed Systems.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Secure network provenance.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

NetTrails: a declarative platform for maintaining and querying provenance in distributed systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

A batch of PNUTS: experiences connecting cloud batch and serving systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

FSR: formal analysis and implementation toolkit for safe inter-domain routing.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Having your cake and eating it too: routing security with privacy protections.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

2010
Maintaining Recursive Views of Regions and Connectivity in Networks.
IEEE Trans. Knowl. Data Eng., 2010

Efficient querying and maintenance of network provenance at internet-scale.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

A3: An Extensible Platform for Application-Aware Anonymity.
Proceedings of the Network and Distributed System Security Symposium, 2010

Towards a data-centric view of cloud security.
Proceedings of the Second International CIKM Workshop on Cloud Data Management, 2010

2009
<i>DMaC</i>: Distributed Monitoring and Checking.
Proceedings of the Runtime Verification, 9th International Workshop, 2009

Unified Declarative Platform for Secure Netwoked Information Systems.
Proceedings of the 25th International Conference on Data Engineering, 2009

Recursive Computation of Regions and Connectivity in Networks.
Proceedings of the 25th International Conference on Data Engineering, 2009

Declarative Reconfigurable Trust Management.
Proceedings of the Fourth Biennial Conference on Innovative Data Systems Research, 2009

2008
Provenance-aware secure networks.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008


  Loading...