Zizhan Zheng

Orcid: 0000-0003-4799-1051

According to our database1, Zizhan Zheng authored at least 67 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Belief-Enriched Pessimistic Q-Learning against Adversarial State Perturbations.
CoRR, 2024

Enhancing LLM Safety via Constrained Direct Preference Optimization.
CoRR, 2024

2023
Toward Optimal Tradeoff Between Data Freshness and Update Cost in Information-Update Systems.
IEEE Internet Things J., August, 2023

Placement and Allocation of Virtual Network Functions: Multi-Dimensional Case.
IEEE Trans. Mob. Comput., July, 2023

CoBF: Coordinated Beamforming in Dense mmWave Networks.
Proc. ACM Meas. Anal. Comput. Syst., 2023

A First Order Meta Stackelberg Method for Robust Federated Learning.
CoRR, 2023

A First Order Meta Stackelberg Method for Robust Federated Learning (Technical Report).
CoRR, 2023

Learning to Backdoor Federated Learning.
CoRR, 2023

Pandering in a (flexible) representative democracy.
Proceedings of the Uncertainty in Artificial Intelligence, 2023

Online Learning for Adaptive Probing and Scheduling in Dense WLANs.
Proceedings of the IEEE INFOCOM 2023, 2023

Does Delegating Votes Protect Against Pandering Candidates?
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

2022
Networked beamforming in dense mmWave WLANs.
Proceedings of the HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9, 2022

Learning to Attack Federated Learning: A Model-based Reinforcement Learning Attack Framework.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Robust Moving Target Defense Against Unknown Attacks: A Meta-reinforcement Learning Approach.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

2021
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications.
IEEE Trans. Mob. Comput., 2021

Joint AP Probing and Scheduling: A Contextual Bandit Approach.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

2020
Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis.
IEEE Trans. Control. Netw. Syst., 2020

Robust Sequence Submodular Maximization.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Structure Matters: Towards Generating Transferable Adversarial Images.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Optimal Timing of Moving Target Defense: A Stackelberg Game Model.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Characterizing Interference Mitigation Techniques in Dense 60 GHz mmWave WLANs.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

2018
Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples.
CoRR, 2018

Analysis of Thompson Sampling for Graphical Bandits Without the Graphs.
Proceedings of the Thirty-Fourth Conference on Uncertainty in Artificial Intelligence, 2018

Online Partial Throughput Maximization for Multidimensional Coflow.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

An Online Algorithm for Power-Proportional Data Centers with Switching Cost.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

2017
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications.
IEEE Trans. Control. Netw. Syst., 2017

INSPIRED: Intention-based Privacy-preserving Permission Model.
CoRR, 2017

Concurrent Channel Probing and Data Transmission in Full-duplex MIMO Systems.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

A signaling game model for moving target defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

A Stackelberg Game and Markov Modeling of Moving Target Defense.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

When to Reset Your Keys: Optimal Timing of Security Updates via Learning.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Optimal System Maneuver for Trust Management in Social Networks.
CoRR, 2016

FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Trust exploitation and attention competition: A game theoretical model.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Stealthy attacks with insider information: A game theoretic model with asymmetric feedback.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

VSync: Cloud based video streaming service for mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access on the Go.
IEEE/ACM Trans. Netw., 2015

The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications.
CoRR, 2015

Stealthy attacks meets insider threats: A three-player game model.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Provably delay efficient data retrieving in storage clouds.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

2014
Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2014

Submodular Utility Maximization for Deadline Constrained Data Collection in Sensor Networks.
IEEE Trans. Autom. Control., 2014

Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Online welfare maximization for electric vehicle charging with electricity cost.
Proceedings of the Fifth International Conference on Future Energy Systems, 2014

2013
Maximizing Information in Unreliable Sensor Networks Under Deadline and Energy Constraints.
IEEE Trans. Autom. Control., 2013

Maximizing social welfare in operator-based Cognitive Radio Networks under spectrum uncertainty and sensing inaccuracy.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Sparse WiFi Deployment for Vehicular Internet Access With Bounded Interconnection Gap.
IEEE/ACM Trans. Netw., 2012

Maximizing a submodular utility for deadline constrained data collection in sensor networks.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Maximizing system throughput using cooperative sensing in multi-channel cognitive radio networks.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

On the efficiency-vs-security tradeoff in the smart grid.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Perpetual and fair data collection for environmental energy harvesting sensor networks.
IEEE/ACM Trans. Netw., 2011

2010
Towards automatic tuning of adaptive computations in autonomic middleware.
Proceedings of the 9th Workshop on Adaptive and Reflective Middleware, 2010

Maximizing the Contact Opportunity for Vehicular Internet Access.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Buffer Coding for Reliable Transmissions over Wireless Networks.
Comput. Commun., 2009

An affordable, long-lasting, and autonomous theft detection and tracking system.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Alpha Coverage: Bounding the Interconnection Gap for Vehicular Internet Access.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Steady and fair rate allocation for rechargeable sensors in perpetual sensor networks.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

Distributed roadmap aided routing in sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

2007
XBC: XOR-based buffer coding for reliable transmissions over wireless networks.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

2004
Towards Autonomic Computing Middleware via Reflection.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004


  Loading...