Liu, Zhuotao
22  results:
Search for persons X
?
1

Efficient Clustering on Encrypted Data:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Zhang, Mengyu ; Wang, Long ; Zhang, Xiaoping... - p. 213-236 , 2024
 
?
2

martFL: Enabling Utility-Driven Data Marketplace with a Rob..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Li, Qi ; Liu, Zhuotao ; Li, Qi. - p. 1496-1510 , 2023
 
?
3

Robust Multi-tab Website Fingerprinting Attacks in the Wild:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Deng, Xinhao ; Yin, Qilei ; Liu, Zhuotao... - p. 1005-1022 , 2023
 
?
4

Learning from Limited Heterogeneous Training Data: Meta-Lea..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Li, Peiyang ; Wang, Ye ; Li, Qi... - p. 1020-1034 , 2023
 
?
5

Provenance of Training without Training Data: Towards Priva..:

, In: Proceedings of the ACM Web Conference 2023,
Liu, Yunpeng ; Li, Kexin ; Liu, Zhuotao... - p. 1980-1990 , 2023
 
?
6

iSyn: Semi-automated Smart Contract Synthesis from Legal Fi..:

, In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis,
Fang, Pengcheng ; Zou, Zhenhua ; Xiao, Xusheng. - p. 727-739 , 2023
 
?
7

FlowTele : remotely shaping traffic on internet-scale ne..:

, In: Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies,
Chen, Bo-Rong ; Liu, Zhuotao ; Song, Jinhui... - p. 349-368 , 2022
 
?
8

Verifying the Quality of Outsourced Training on Clouds:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Li, Peiyang ; Wang, Ye ; Liu, Zhuotao... - p. 126-144 , 2022
 
?
9

DIP : unifying network layer innovations using shared L3..:

, In: Proceedings of the 21st ACM Workshop on Hot Topics in Networks,
Wang, Ziqiang ; Liu, Zhuotao ; Wang, Xiaoliang.. - p. 60-67 , 2022
 
?
10

Unsupervised Contextual Anomaly Detection for Database Syst..:

, In: Proceedings of the 2022 International Conference on Management of Data,
Li, Sainan ; Yin, Qilei ; Li, Guoliang... - p. 788-802 , 2022
 
?
11

A Hard Label Black-box Adversarial Attack Against Graph Neu..:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
Mu, Jiaming ; Wang, Binghui ; Li, Qi... - p. 108-125 , 2021
 
?
12

Privilege-Escalation Vulnerability Discovery for Large-scal..:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
Liu, Zhuotao ; Zhao, Hao ; Li, Sainan... - p. 565-577 , 2021
 
?
13

On Detecting Growing-Up Behaviors of Malicious Accounts in ..:

, In: Annual Computer Security Applications Conference,
Yang, Zijie ; Wang, Binghui ; Li, Haoran... - p. 297-310 , 2021
 
?
14

HyperService : Interoperability and Programmability Acro..:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
Liu, Zhuotao ; Xiang, Yangxi ; Shi, Jian... - p. 549-566 , 2019
 
?
15

DeepIntent : Deep Icon-Behavior Learning for Detecting I..:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
Xi, Shengqu ; Yang, Shao ; Xiao, Xusheng... - p. 2421-2436 , 2019
 
1-15