What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhuotao Liu
Google Scholar
ORCID:
0000-0002-7532-0434
30
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
TrafficFormer: An Efficient Pre-trained Model for Traffic Data.
Guangmeng Zhou
Xiongwen Guo
Zhuotao Liu
Tong Li
Qi Li
Ke Xu
2025
conf/uss
CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis.
Jinzhu Yan
Zhuotao Liu
Yuyang Xie
Shiyu Liang
Lin Liu
Ke Xu
2024
journals/tifs
Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations.
Yuanyuan Qing
Tao Bai
Zhuotao Liu
Pierre Moulin
Bihan Wen
2024
conf/ccs
CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
Zhenhua Zou
Zhuotao Liu
Jinyong Shan
Qi Li
Ke Xu
Mingwei Xu
2024
conf/ccs
Towards Fine-Grained Webpage Fingerprinting at Scale.
Xiyuan Zhao
Xinhao Deng
Qi Li
Yunpeng Liu
Zhuotao Liu
Kun Sun
Ke Xu
2024
conf/uss
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
Yihao Chen
Qilei Yin
Qi Li
Zhuotao Liu
Ke Xu
Yi Xu
Mingwei Xu
Ziqian Liu
Jianping Wu
2024
conf/uss
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
Qi Tan
Qi Li
Yi Zhao
Zhuotao Liu
Xiaobing Guo
Ke Xu
2024
conf/acns
Efficient Clustering on Encrypted Data.
Mengyu Zhang
Long Wang
Xiaoping Zhang
Zhuotao Liu
Yisong Wang
Han Bao
2024
conf/ndss
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Yuqi Qing
Qilei Yin
Xinhao Deng
Yihao Chen
Zhuotao Liu
Kun Sun
Ke Xu
Jia Zhang
Qi Li
2024
conf/ndss
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
Xuanqi Liu
Zhuotao Liu
Qi Li
Ke Xu
Mingwei Xu
2023
conf/ccs
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
Peiyang Li
Ye Wang
Qi Li
Zhuotao Liu
Ke Xu
Ju Ren
Zhiying Liu
Ruilin Lin
2023
conf/ccs
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Qi Li
Zhuotao Liu
Qi Li
Ke Xu
2023
conf/uss
Cross Container Attacks: The Bewildered eBPF on Clouds.
Yi He
Roland Guo
Yunlong Xing
Xijia Che
Kun Sun
Zhuotao Liu
Ke Xu
Qi Li
2023
conf/uss
An Efficient Design of Intelligent Network Data Plane.
Guangmeng Zhou
Zhuotao Liu
Chuanpu Fu
Qi Li
Ke Xu
2023
conf/sp
Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Xinhao Deng
Qilei Yin
Zhuotao Liu
Xiyuan Zhao
Qi Li
Mingwei Xu
Ke Xu
Jianping Wu
2022
journals/compsec
Practical differentially private online advertising.
Jie Sun
Lingchen Zhao
Zhuotao Liu
Qi Li
Xinhao Deng
Qian Wang
Yong Jiang
2022
journals/tifs
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
Qi Li
Xinhao Deng
Zhuotao Liu
Yuan Yang
Xiaoyue Zou
Qian Wang
Mingwei Xu
Jianping Wu
2022
journals/tifs
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
Zijie Yang
Jiahao Cao
Zhuotao Liu
Xiaoli Zhang
Kun Sun
Qi Li
2022
conf/uss
Back-Propagating System Dependency Impact for Attack Investigation.
Pengcheng Fang
Peng Gao
Changlin Liu
Erman Ayday
Kangkook Jee
Ting Wang
Yanfang (Fanny) Ye
Zhuotao Liu
Xusheng Xiao
2022
conf/uss
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Yi He
Zhenhua Zou
Kun Sun
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Zhi Wang
Qi Li
2022
conf/esorics
Verifying the Quality of Outsourced Training on Clouds.
Peiyang Li
Ye Wang
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Qi Li
2021
journals/tifs
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
Qiyang Song
Zhuotao Liu
Jiahao Cao
Kun Sun
Qi Li
Cong Wang
2021
conf/ccs
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
Jiaming Mu
Binghui Wang
Qi Li
Kun Sun
Mingwei Xu
Zhuotao Liu
2021
conf/asiaccs
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Zhuotao Liu
Hao Zhao
Sainan Li
Qi Li
Tao Wei
Yu Wang
2021
conf/acsac
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks.
Zijie Yang
Binghui Wang
Haoran Li
Dong Yuan
Zhuotao Liu
Neil Zhenqiang Gong
Chang Liu
Qi Li
Xiao Liang
Shaofeng Hu
2019
journals/tifs
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services.
Zhuotao Liu
Yuan Cao
Min Zhu
Wei Ge
2019
conf/ccs
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
Zhuotao Liu
Yangxi Xiang
Jian Shi
Peng Gao
Haoyu Wang
Xusheng Xiao
Bihan Wen
Yih-Chun Hu
2019
conf/ccs
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Shengqu Xi
Shao Yang
Xusheng Xiao
Yuan Yao
Yayuan Xiong
Fengyuan Xu
Haoyu Wang
Peng Gao
Zhuotao Liu
Feng Xu
Jian Lu
2016
conf/ccs
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet.
Zhuotao Liu
Hao Jin
Yih-Chun Hu
Michael D. Bailey
2015
conf/cns
Securing wireless medium access control against insider denial-of-service attackers.
Sang-Yoon Chang
Yih-Chun Hu
Zhuotao Liu
Coauthors
Bihan Wen
(2)
Binghui Wang
(2)
Chang Liu
(1)
Changlin Liu
(1)
Chao Shen
(2)
Chuanpu Fu
(1)
Cong Wang
(1)
Dong Yuan
(1)
Erman Ayday
(1)
Feng Xu
(1)
Fengyuan Xu
(1)
Guangmeng Zhou
(2)
Han Bao
(1)
Hao Jin
(1)
Hao Zhao
(1)
Haoran Li
(1)
Haoyu Wang
(2)
Jia Zhang
(1)
Jiahao Cao
(2)
Jiaming Mu
(1)
Jian Lu
(1)
Jian Shi
(1)
Jianping Wu
(3)
Jie Sun
(1)
Jinyong Shan
(1)
Jinzhu Yan
(1)
Ju Ren
(1)
Kangkook Jee
(1)
Ke Xu
(15)
Kun Sun
(7)
Lin Liu
(1)
Lingchen Zhao
(1)
Long Wang
(1)
Mengyu Zhang
(1)
Michael D. Bailey
(1)
Min Zhu
(1)
Mingwei Xu
(6)
Neil Zhenqiang Gong
(1)
Peiyang Li
(2)
Peng Gao
(3)
Pengcheng Fang
(1)
Pierre Moulin
(1)
Qi Li
(1)
Qi Li
(21)
Qi Tan
(1)
Qian Wang
(4)
Qilei Yin
(3)
Qiyang Song
(1)
Roland Guo
(1)
Ruilin Lin
(1)
Sainan Li
(1)
Sang-Yoon Chang
(1)
Shao Yang
(1)
Shaofeng Hu
(1)
Shengqu Xi
(1)
Shiyu Liang
(1)
Tao Bai
(1)
Tao Wei
(1)
Ting Wang
(1)
Tong Li
(1)
Wei Ge
(1)
Xiao Liang
(1)
Xiaobing Guo
(1)
Xiaoli Zhang
(1)
Xiaoping Zhang
(1)
Xiaoyue Zou
(1)
Xijia Che
(1)
Xinhao Deng
(5)
Xiongwen Guo
(1)
Xiyuan Zhao
(2)
Xuanqi Liu
(1)
Xusheng Xiao
(3)
Yanfang (Fanny) Ye
(1)
Yangxi Xiang
(1)
Yayuan Xiong
(1)
Ye Wang
(2)
Yi He
(2)
Yi Xu
(1)
Yi Zhao
(1)
Yih-Chun Hu
(3)
Yihao Chen
(2)
Yisong Wang
(1)
Yong Jiang
(1)
Yu Wang
(1)
Yuan Cao
(1)
Yuan Yang
(1)
Yuan Yao
(1)
Yuanyuan Qing
(1)
Yunlong Xing
(1)
Yunpeng Liu
(1)
Yuqi Qing
(1)
Yuyang Xie
(1)
Zhenhua Zou
(2)
Zhi Wang
(1)
Zhiying Liu
(1)
Zhuotao Liu
(30)
Zijie Yang
(2)
Ziqian Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to