关注
Shangqing Zhao
标题
引用次数
引用次数
年份
Lomar: A local defense against poisoning attack on federated learning
X Li, Z Qu, S Zhao, B Tang, Z Lu, Y Liu
IEEE Transactions on Dependable and Secure Computing 20 (1), 437-450, 2021
812021
When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing
Z Luo, S Zhao, Z Lu, J Xu, YE Sagduyu
IEEE Transactions on Mobile Computing 21 (5), 1892-1908, 2020
622020
Adversarial machine learning based partial-model attack in IoT
Z Luo, S Zhao, Z Lu, YE Sagduyu, J Xu
Proceedings of the 2nd ACM workshop on wireless security and machine …, 2020
572020
No training hurdles: Fast training-agnostic attacks to infer your typing
S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
452018
Cyber deception for computer and network security: Survey and challenges
Z Lu, C Wang, S Zhao
arXiv preprint arXiv:2007.14497, 2020
232020
When seeing isn't believing: On feasibility and detectability of scapegoating in network tomography
S Zhao, Z Lu, C Wang
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
152017
Entrapment for wireless eavesdroppers
S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2530-2538, 2019
122019
Wireless training-free keystroke inference attack and defense
E Yang, S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu
IEEE/ACM Transactions on Networking 30 (4), 1733-1748, 2022
112022
Low-cost influence-limiting defense against adversarial machine learning attacks in cooperative spectrum sensing
Z Luo, S Zhao, R Duan, Z Lu, YE Sagduyu, J Xu
Proceedings of the 3rd ACM Workshop on Wireless Security and Machine …, 2021
112021
Energy-efficeent Uneven Clustering Algorithm
CS Zhang, J Xing, SQ Zhao
Computer Engineering and Applications 52 (7), 106-109, 2016
112016
Orthogonality-sabotaging attacks against OFDMA-based wireless networks
S Zhao, Z Lu, Z Luo, Y Liu
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 1603-1611, 2019
102019
Perception-aware attack: Creating adversarial music via reverse-engineering human perception
R Duan, Z Qu, S Zhao, L Ding, Y Liu, Z Lu
Proceedings of the 2022 ACM SIGSAC conference on computer and communications …, 2022
92022
Proactive anti-eavesdropping with trap deployment in wireless networks
Q He, S Fang, T Wang, Y Liu, S Zhao, Z Lu
IEEE Transactions on Dependable and Secure Computing 20 (1), 637-649, 2022
92022
How to test the randomness from the wireless channel for security?
Z Qu, S Zhao, J Xu, Z Lu, Y Liu
IEEE Transactions on Information Forensics and Security 16, 3753-3766, 2021
92021
Performance Analysis of IQI Impaired Cooperative NOMA for 5G‐Enabled Internet of Things
H Guo, X Guo, C Deng, S Zhao
Wireless Communications and Mobile Computing 2020 (1), 3812826, 2020
82020
Measurement integrity attacks against network tomography: Feasibility and defense
S Zhao, Z Lu, C Wang
IEEE Transactions on Dependable and Secure Computing 18 (6), 2617-2630, 2019
82019
How can randomized routing protocols hide flow information in wireless networks?
S Zhao, Z Lu, C Wang
IEEE Transactions on Wireless Communications 19 (11), 7224-7236, 2020
62020
Comb Decoding towards {Collision-Free}{WiFi}
S Zhao, Z Qu, Z Luo, Z Lu, Y Liu
17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020
52020
Smartphone location spoofing attack in wireless networks
C Hu, Y Liu, Z Lu, S Zhao, X Han, J Xiong
Security and Privacy in Communication Networks: 17th EAI International …, 2021
42021
HoneyBreath: An Ambush Tactic Against Wireless Breath Inference
Q He, E Yang, S Fang, S Zhao
International Conference on Mobile and Ubiquitous Systems: Computing …, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20