Zhuo Lu

Orcid: 0000-0003-1131-4307

According to our database1, Zhuo Lu authored at least 108 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CrossVision: Real-Time On-Camera Video Analysis via Common RoI Load Balancing.
IEEE Trans. Mob. Comput., May, 2024

FedLGA: Toward System-Heterogeneity of Federated Learning via Local Gradient Approximation.
IEEE Trans. Cybern., January, 2024

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics.
CoRR, 2024

2023
On the Convergence of Multi-Server Federated Learning With Overlapping Area.
IEEE Trans. Mob. Comput., November, 2023

DBH Estimation for Individual Tree: Two-Dimensional Images or Three-Dimensional Point Clouds?
Remote. Sens., August, 2023

Steel Surface Defect Detection via Deformable Convolution and Background Suppression.
IEEE Trans. Instrum. Meas., 2023

LoMar: A Local Defense Against Poisoning Attack on Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Approach for Monitoring Spatiotemporal Changes in Fractional Vegetation Cover Through Unmanned Aerial System-Guided-Satellite Survey: A Case Study in Mining Area.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models.
CoRR, 2023

How Can the Adversary Effectively Identify Cellular IoT Devices Using LSTM Networks?
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

SecDINT: Preventing Data-oriented Attacks via Intel SGX Escorted Data Integrity.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Context-Aware Online Client Selection for Hierarchical Federated Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Wireless Training-Free Keystroke Inference Attack and Defense.
IEEE/ACM Trans. Netw., 2022

When Attackers Meet AI: Learning-Empowered Attacks in Cooperative Spectrum Sensing.
IEEE Trans. Mob. Comput., 2022

An Improved LAI Estimation Method Incorporating with Growth Characteristics of Field-Grown Wheat.
Remote. Sens., 2022

On the Convergence of Multi-Server Federated Learning with Overlapping Area.
CoRR, 2022

Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022

DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

MUSTER: Subverting User Selection in MU-MIMO Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

Stragglers Are Not Disasters: A Hybrid Federated Learning Framework with Delayed Gradients.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Generalized Federated Learning via Sharpness Aware Minimization.
Proceedings of the International Conference on Machine Learning, 2022

When Third-Party JavaScript Meets Cache: Explosively Amplifying Security Risks on the Internet.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation.
IEEE/ACM Trans. Netw., 2021

How to Test the Randomness From the Wireless Channel for Security?
IEEE Trans. Inf. Forensics Secur., 2021

Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense.
IEEE Trans. Dependable Secur. Comput., 2021

Binary Code Similarity Detection through LSTM and Siamese Neural Network.
EAI Endorsed Trans. Security Safety, 2021

FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation.
CoRR, 2021

Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients.
CoRR, 2021

Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

Smartphone Location Spoofing Attack in Wireless Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2021

Warmonger: Inflicting Denial-of-Service via Serverless Functions in the Cloud.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks?
IEEE Trans. Wirel. Commun., 2020

Cyber Deception for Computer and Network Security: Survey and Challenges.
CoRR, 2020

When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions.
CoRR, 2020

Adversarial machine learning based partial-model attack in IoT.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

Comb Decoding towards Collision-Free WiFi.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

Log Analytics in HPC: A Data-driven Reinforcement Learning Framework.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis, and Evaluation.
IEEE Trans. Mob. Comput., 2019

Security of HPC Systems: From a Log-analyzing Perspective.
EAI Endorsed Trans. Security Safety, 2019

Cyber and physical interactions to combat failure propagation in smart grid: Characterization, analysis and evaluation.
Comput. Networks, 2019

Effectiveness of Machine Learning Based Intrusion Detection Systems.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Entrapment for Wireless Eavesdroppers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

On Studying Information Dissemination in Social-Physical Interdependent Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

MTD 2019: The 6th ACM Workshop on Moving Target Defense.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid.
IEEE Syst. J., 2018

Cyber Deception: Overview and the Road Ahead.
IEEE Secur. Priv., 2018

In Vitro and In Vivo Experimental Studies of A Novel MR-Guided Method for Bipolar Radiofrequency Liver Ablation.
IEEE Access, 2018

Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Secure Edge Computing in IoT Systems: Review and Case Studies.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective.
IEEE/ACM Trans. Netw., 2017

Securing the Backpressure Algorithm for Wireless Networks.
IEEE Trans. Mob. Comput., 2017

Security and Privacy in Internet of Things with Crowd-Sensing.
J. Electr. Comput. Eng., 2017

PDF Mirage: Content Masking Attack Against Information-Based Online Services.
Proceedings of the 26th USENIX Security Symposium, 2017

Stateful Inter-Packet Signal Processing for Wireless Networking.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

How they interact? Understanding cyber and physical interactions against fault propagation in smart grid.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

On modeling and understanding vehicle evacuation attacks in VANETs.
Proceedings of the IEEE International Conference on Communications, 2017

2016
On the Evolution and Impact of Mobile Botnets in Wireless Networks.
IEEE Trans. Mob. Comput., 2016

Risk assessment based access control with text and behavior analysis for document management.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Friendships in the air: Integrating social links into wireless network modeling, routing, and analysis.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Dominoes with communications: On characterizing the progress of cascading failures in Smart Grid.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Zero reconciliation secret key extraction in MIMO backscatter wireless systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Defending active learning against adversarial inputs in automated document classification.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23288-1, 2015

On Topology and Resilience of Large-Scale Cognitive Radio Networks Under Generic Failures.
IEEE Trans. Wirel. Commun., 2015

Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming.
IEEE Trans. Dependable Secur. Comput., 2015

On detection and concealment of critical roles in tactical wireless networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Network-Wide Awareness.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.
IEEE Trans. Mob. Comput., 2014

Socio-technological Testbed for Evaluation of Combined Social and Communication Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

How can botnets cause storms? Understanding the evolution and impact of mobile botnets.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Cyber security in the Smart Grid: Survey and challenges.
Comput. Networks, 2013

2012
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks.
IEEE Trans. Mob. Comput., 2012

Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
From security to vulnerability: Data authentication undermines message delivery in smart grid.
Proceedings of the MILCOM 2011, 2011

From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP.
Proceedings of the Global Communications Conference, 2011

2010
Parameter Estimation for Correlated MIMO Channels with Frequency-Selective Fading.
Wirel. Pers. Commun., 2010

Joint Frequency Offset and Channel Estimation for MIMO Systems in the Presence of Timing Error.
Circuits Syst. Signal Process., 2010

On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Joint timing error, frequency offset and channel estimation for MIMO systems.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

2008
Joint Frequency Offset and Channel Estimation for MIMO Systems Based on Particle Swarm Optimization.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Parameter Estimation for MIMO Systems with Multiple Frequency Offsets.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Further Results on the Maximum-Likelihood IFO Estimation for OFDM Systems.
IEEE Trans. Consumer Electron., 2007

Optimal Training Sequences for MIMO Channel Estimation with Spatial Correlation.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Composite Frequency-Offset Estimator for Wireless Communications.
Proceedings of IEEE International Conference on Communications, 2007

Optimal Training Sequences for Frequency-Selective MIMO Correlated Fading Channels.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Carrier-Frequency Offsets Estimation Based on ML and ESPRIT Method for OFDMA Uplink.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Iterative Parameter Estimation in MIMO Flat-fading Channels with Frequency Offsets.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006


  Loading...