Liu, Zhuotao
83  results:
Search for persons X
?
1

Detection of Adversarial Attacks via Disentangling Natural ..:

Qing, Yuanyuan ; Bai, Tao ; Liu, Zhuotao..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 2814-2825 , 2024
 
?
2

Effective DDoS Mitigation via ML-Driven In-network Traffic ..:

Zhao, Ziming ; Liu, Zhuotao ; Chen, Huan...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
3

Efficient Clustering on Encrypted Data:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Zhang, Mengyu ; Wang, Long ; Zhang, Xiaoping... - p. 213-236 , 2024
 
?
5

UAV-Enabled Federated Learning in Dynamic Environments: Eff..:

Fan, Xiaokun ; Chen, Yali ; Liu, Min...
IEEE Transactions on Vehicular Technology.  73 (2024)  5 - p. 6993-7006 , 2024
 
?
6

Threshold-Based Routing-Topology Co-Design for Optical Data..:

Cao, Peirui ; Zhao, Shizhen ; Zhang, Dai...
IEEE/ACM Transactions on Networking.  31 (2023)  6 - p. 2870-2885 , 2023
 
?
7

Species associations and conservation of Giant Pandas:

Liu, Zhuotao ; Shen, Limin ; Li, Zhaoyuan...
Global Ecology and Conservation.  43 (2023)  - p. e02428 , 2023
 
?
8

Learning from Limited Heterogeneous Training Data: Meta-Lea..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Li, Peiyang ; Wang, Ye ; Li, Qi... - p. 1020-1034 , 2023
 
?
9

iSyn: Semi-automated Smart Contract Synthesis from Legal Fi..:

, In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis,
Fang, Pengcheng ; Zou, Zhenhua ; Xiao, Xusheng. - p. 727-739 , 2023
 
?
10

Provenance of Training without Training Data: Towards Priva..:

, In: Proceedings of the ACM Web Conference 2023,
Liu, Yunpeng ; Li, Kexin ; Liu, Zhuotao... - p. 1980-1990 , 2023
 
?
11

Robust Multi-tab Website Fingerprinting Attacks in the Wild:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Deng, Xinhao ; Yin, Qilei ; Liu, Zhuotao... - p. 1005-1022 , 2023
 
?
12

martFL: Enabling Utility-Driven Data Marketplace with a Rob..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Li, Qi ; Liu, Zhuotao ; Li, Qi. - p. 1496-1510 , 2023
 
?
13

Verifying the Quality of Outsourced Training on Clouds:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Li, Peiyang ; Wang, Ye ; Liu, Zhuotao... - p. 126-144 , 2022
 
?
14

Good Learning, Bad Performance: A Novel Attack Against RL-B..:

Yang, Zijie ; Cao, Jiahao ; Liu, Zhuotao...
IEEE Transactions on Information Forensics and Security.  17 (2022)  - p. 1069-1082 , 2022
 
?
15

Make Web3.0 Connected:

Liu, Zhuotao ; Xiang, Yangxi ; Shi, Jian...
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  5 - p. 2965-2981 , 2022
 
1-15