Zhuo Lu

According to our database1, Zhuo Lu authored at least 71 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Cyber Deception for Computer and Network Security: Survey and Challenges.
CoRR, 2020

When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions.
CoRR, 2020

Adversarial machine learning based partial-model attack in IoT.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

Comb Decoding towards Collision-Free WiFi.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

Log Analytics in HPC: A Data-driven Reinforcement Learning Framework.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Integrating Social Links into Wireless Networks: Modeling, Routing, Analysis, and Evaluation.
IEEE Trans. Mob. Comput., 2019

Security of HPC Systems: From a Log-analyzing Perspective.
EAI Endorsed Trans. Security Safety, 2019

When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing.
CoRR, 2019

Cyber and physical interactions to combat failure propagation in smart grid: Characterization, analysis and evaluation.
Comput. Networks, 2019

Effectiveness of Machine Learning Based Intrusion Detection Systems.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Entrapment for Wireless Eavesdroppers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

On Studying Information Dissemination in Social-Physical Interdependent Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Smart Spying via Deep Learning: Inferring Your Activities from Encrypted Wireless Traffic.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

MTD 2019: The 6th ACM Workshop on Moving Target Defense.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid.
IEEE Syst. J., 2018

Cyber Deception: Overview and the Road Ahead.
IEEE Secur. Priv., 2018

In Vitro and In Vivo Experimental Studies of A Novel MR-Guided Method for Bipolar Radiofrequency Liver Ablation.
IEEE Access, 2018

Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Secure Edge Computing in IoT Systems: Review and Case Studies.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective.
IEEE/ACM Trans. Netw., 2017

Securing the Backpressure Algorithm for Wireless Networks.
IEEE Trans. Mob. Comput., 2017

Security and Privacy in Internet of Things with Crowd-Sensing.
J. Electr. Comput. Eng., 2017

PDF Mirage: Content Masking Attack Against Information-Based Online Services.
Proceedings of the 26th USENIX Security Symposium, 2017

Stateful Inter-Packet Signal Processing for Wireless Networking.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

How they interact? Understanding cyber and physical interactions against fault propagation in smart grid.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

On modeling and understanding vehicle evacuation attacks in VANETs.
Proceedings of the IEEE International Conference on Communications, 2017

2016
On the Evolution and Impact of Mobile Botnets in Wireless Networks.
IEEE Trans. Mob. Comput., 2016

Risk assessment based access control with text and behavior analysis for document management.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Friendships in the air: Integrating social links into wireless network modeling, routing, and analysis.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Dominoes with communications: On characterizing the progress of cascading failures in Smart Grid.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Zero reconciliation secret key extraction in MIMO backscatter wireless systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Defending active learning against adversarial inputs in automated document classification.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23288-1, 2015

On Topology and Resilience of Large-Scale Cognitive Radio Networks Under Generic Failures.
IEEE Trans. Wirel. Commun., 2015

Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming.
IEEE Trans. Dependable Secur. Comput., 2015

On detection and concealment of critical roles in tactical wireless networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Network-Wide Awareness.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.
IEEE Trans. Mob. Comput., 2014

How can botnets cause storms? Understanding the evolution and impact of mobile botnets.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Cyber security in the Smart Grid: Survey and challenges.
Comput. Networks, 2013

2012
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks.
IEEE Trans. Mob. Comput., 2012

Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
From security to vulnerability: Data authentication undermines message delivery in smart grid.
Proceedings of the MILCOM 2011, 2011

From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP.
Proceedings of the Global Communications Conference, 2011

2010
Parameter Estimation for Correlated MIMO Channels with Frequency-Selective Fading.
Wirel. Pers. Commun., 2010

Joint Frequency Offset and Channel Estimation for MIMO Systems in the Presence of Timing Error.
Circuits Syst. Signal Process., 2010

On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Joint timing error, frequency offset and channel estimation for MIMO systems.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

2008
Joint Frequency Offset and Channel Estimation for MIMO Systems Based on Particle Swarm Optimization.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Parameter Estimation for MIMO Systems with Multiple Frequency Offsets.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Further Results on the Maximum-Likelihood IFO Estimation for OFDM Systems.
IEEE Trans. Consumer Electron., 2007

Optimal Training Sequences for MIMO Channel Estimation with Spatial Correlation.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Composite Frequency-Offset Estimator for Wireless Communications.
Proceedings of IEEE International Conference on Communications, 2007

Optimal Training Sequences for Frequency-Selective MIMO Correlated Fading Channels.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Carrier-Frequency Offsets Estimation Based on ML and ESPRIT Method for OFDMA Uplink.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Iterative Parameter Estimation in MIMO Flat-fading Channels with Frequency Offsets.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006


  Loading...