When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing Z Luo, S Zhao, Z Lu, J Xu, YE Sagduyu IEEE Transactions on Mobile Computing 21 (5), 1892-1908, 2020 | 67 | 2020 |
Adversarial machine learning based partial-model attack in IoT Z Luo, S Zhao, Z Lu, YE Sagduyu, J Xu Proceedings of the 2nd ACM workshop on wireless security and machine …, 2020 | 58 | 2020 |
Gait optical flow image decomposition for human recognition Z Luo, T Yang, Y Liu 2016 IEEE Information Technology, Networking, Electronic and Automation …, 2016 | 15 | 2016 |
Orthogonality-sabotaging attacks against OFDMA-based wireless networks S Zhao, Z Lu, Z Luo, Y Liu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 1603-1611, 2019 | 13 | 2019 |
Low-cost influence-limiting defense against adversarial machine learning attacks in cooperative spectrum sensing Z Luo, S Zhao, R Duan, Z Lu, YE Sagduyu, J Xu Proceedings of the 3rd ACM Workshop on Wireless Security and Machine …, 2021 | 11 | 2021 |
Security of HPC systems: From a log-analyzing perspective Z Luo, Z Qu, TT Nguyen, H Zeng, Z Lu EAI Endorsed Transactions on Security and Safety 6 (21), e5-e5, 2019 | 9 | 2019 |
Log analytics in HPC: A data-driven reinforcement learning framework Z Luo, T Hou, TT Nguyen, H Zeng, Z Lu IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 7 | 2020 |
Demystifying the RSA Algorithm: An Intuitive Introduction for Novices in Cybersecurity ZJ Luo, R Liu, A Mehta, ML Ali arXiv preprint arXiv:2308.02785, 2023 | 5* | 2023 |
Binary code similarity detection through LSTM and Siamese neural network Z Luo, T Hou, X Zhou, H Zeng, Z Lu EAI Endorsed Transactions on Security and Safety 8 (29), 2021 | 5 | 2021 |
Comb Decoding towards {Collision-Free}{WiFi} S Zhao, Z Qu, Z Luo, Z Lu, Y Liu 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020 | 5 | 2020 |
Stateful Inter-Packet Signal Processing for Wireless Networking S Zhao, Z Luo, Z Lu, X Lu, Y Liu Proceedings of the 23rd Annual International Conference on Mobile Computing …, 2017 | 3 | 2017 |
光流分量分解的步态识别 (Gait Recognition Based on Decomposition of Optical Flow Components). Z Luo, Y Liu, T Yang 计算机科学 43 (9), 295-300, 2016 | 3 | 2016 |
能量图空间分解法和 DSW 相结合的步态识别 李玲, 罗正平, 杨天奇 计算机工程与应用 52 (3), 127-132, 2016 | 1 | 2016 |
光流分量分解的步态识别 罗正平, 刘延钧, 杨天奇 计算机科学 43 (9), 295-300, 2016 | 1 | 2016 |
Quantum Machine Learning: Performance and Security Implications in Real-World Applications ZJ Luo, T Stewart, M Narasareddygari, R Duan, S Zhao arXiv preprint arXiv:2408.04543, 2024 | | 2024 |
Understanding the Ineffectiveness of the Transfer Attack in Intrusion Detection System R Duan, W Zhao, ZJ Luo, N Wang, Y Liu, Z Lu Network Security Empowered by Artificial Intelligence, 99-119, 2024 | | 2024 |
MMP: A Dynamic Routing Protocol Design to Proactively Defend against Wireless Network Inference Attacks J Chen, ZJ Luo, Y Liu, S Zhao Proceedings of the 10th ACM Workshop on Moving Target Defense, 1-11, 2023 | | 2023 |
How Can the Adversary Effectively Identify Cellular IoT Devices Using LSTM Networks? ZJ Luo, WA Pitera, S Zhao, Z Lu, YE Sagduyu Proceedings of the 2023 ACM Workshop on Wireless Security and Machine …, 2023 | | 2023 |
Security Attacks and Defenses in Cyber Systems: From an AI Perspective Z Luo University of South Florida, 2021 | | 2021 |