Articles with public access mandates - Wenchao ZhouLearn more
Available somewhere: 17
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016
Mandates: US National Science Foundation
The good, the bad, and the differences: Better network diagnostics with differential provenance
A Chen, Y Wu, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2016 ACM SIGCOMM Conference, 115-128, 2016
Mandates: US National Science Foundation
Automated bug removal for software-defined networks
Y Wu, A Chen, A Haeberlen, W Zhou, BT Loo
14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017
Mandates: US National Science Foundation, US Department of Defense
Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead.
A Chen, Y Wu, A Haeberlen, BT Loo, W Zhou
CIDR, 2017
Mandates: US National Science Foundation
Distributed Provenance Compression
C Chen, HT Lehri, L Kuan Loh, A Alur, L Jia, BT Loo, W Zhou
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
Mandates: US National Science Foundation
One primitive to diagnose them all: Architectural support for Internet diagnostics
A Chen, A Haeberlen, W Zhou, BT Loo
Proceedings of the Twelfth European Conference on Computer Systems, 374-388, 2017
Mandates: US National Science Foundation
Dispersing asymmetric DDOS attacks with splitstack
A Chen, A Sriraman, T Vaidya, Y Zhang, A Haeberlen, BT Loo, LTX Phan, ...
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 197-203, 2016
Mandates: US National Science Foundation
Data-plane defenses against routing attacks on Tor
H Tan, M Sherr, W Zhou
Proceedings on Privacy Enhancing Technologies 2016 (4), 276-293, 2016
Mandates: US National Science Foundation
Saguaro: An edge computing-enabled hierarchical permissioned blockchain
MJ Amiri, Z Lai, L Patel, BT Loo, E Lo, W Zhou
2023 IEEE 39th International Conference on Data Engineering (ICDE), 259-272, 2023
Mandates: US National Science Foundation, US Department of Defense, Research Grants …
DeDoS: Defusing DoS with Dispersion Oriented Software
HM Demoulin, T Vaidya, I Pedisich, B DiMaiolo, J Qian, C Shah, Y Zhang, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
Mandates: US National Science Foundation, US Department of Defense
Bypassing tor exit blocking with exit bridge onion services
Z Zhang, W Zhou, M Sherr
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Mandates: US National Science Foundation, US Department of Defense
Ephemeral exit bridges for tor
Z Zhang, T Vaidya, K Subramanian, W Zhou, M Sherr
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
Mandates: US National Science Foundation, US Department of Defense
NSF BIGDATA PI Meeting-Domain-Specific Research Directions and Data Sets
L Singh, A Deshpande, W Zhou, A Banerjee, A Bowers, S Friedler, ...
ACM SIGMOD Record 47 (3), 32-35, 2019
Mandates: US National Science Foundation
Knock out 2PC with practicality intact: a high-performance and general distributed transaction protocol
Z Lai, H Fan, W Zhou, Z Ma, X Peng, F Li, E Lo
2023 IEEE 39th International Conference on Data Engineering (ICDE), 2317-2331, 2023
Mandates: Research Grants Council, Hong Kong
A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers
HM Demoulin, T Vaidya, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ...
Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017
Mandates: US National Science Foundation, US Department of Defense
Provenance for probabilistic logic programs
S Wang, H Lyu, J Zhang, C Wu, X Chen, W Zhou, BT Loo, SB Davidson, ...
International Conference on Extending Database Technology (EDBT), 2020
Mandates: US National Science Foundation, US Department of Defense
Provably Correct Distributed Provenance Compression
C Chen, HT Lehri, LK Loh, A Alur, L Jia, B Loo, W Zhou
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program