InspiringGroup
Open Menu
Close Menu
Home
Publications
People
News
Awards
Join
Web3.0 Infra and Application
Type
Agent Security
AI Security
Data Security
Datacenter Networking
DDoS Prevention
Encrypted Traffic Analysis
Intelligent Network Architecture
Secure Internet Routing
System Security
Web3 & Block Chain
Date
Before 2020
2026
2025
2024
2023
2022
2021
✉️ indicates corresponding authors. Undererlined students are from my group.
Blind Gods and Broken Screens: Architecting a Secure, Intent-Centric Mobile Agent Operating System
Zhenhua Zou
•
Feb 11, 2026
•
1 min read
Read more
Anonymization-Enhanced Privacy Protection for Mobile GUI Agents: Available but Invisible
Lepeng Zhao
•
Feb 8, 2026
•
1 min read
Read more
A Universal Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems
Zixuan Liu
•
Jan 1, 2026
•
1 min read
Read more
Achieving Interpretable DL-based Web Attack Detection through Malicious Payload Localization
Peiyang Li
•
Jan 1, 2026
•
1 min read
Read more
Enhancing Website Fingerprinting Attacks against Traffic Drift
Xinhao Deng
•
Jan 1, 2026
•
1 min read
Read more
Understanding the Stealthy BGP Hijacking Risk in the ROV Era
Yihao Chen
•
Jan 1, 2026
•
1 min read
Read more
BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability
Zhenhua Zou
•
Sep 21, 2025
•
1 min read
Read more
Agentic Privacy-Preserving Machine Learning
Mengyu Zhang
•
Jul 30, 2025
•
1 min read
Read more
CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis
Jinzhu Yan
•
Jan 1, 2025
•
1 min read
Read more
DiffECN: Differential ECN Marking for Datacenter Networks
Hanlin Huang
•
Jan 1, 2025
•
1 min read
Read more
MM4flow: A Pre-trained Multi-modal Model for Versatile Network Traffic Analysis
Luming Yang
•
Jan 1, 2025
•
1 min read
Read more
Pegasus: A Universal Framework for Scalable Deep Learning Inference on the Dataplane
Yinchao Zhang
•
Jan 1, 2025
•
1 min read
Read more
PRED: Performance-oriented Random Early Detection for Consistently Stable Performance in Datacenters
Xinle Du
•
Jan 1, 2025
•
1 min read
Read more
Revisiting Random Early Detection Tuning for High-Performance Datacenter Networks
Tong Li
•
Jan 1, 2025
•
1 min read
Read more
RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing
Zhenhua Zou
•
Jan 1, 2025
•
1 min read
Read more
TrafficFormer: An Efficient Pre-trained Model for Traffic Data
Guangmeng Zhou
•
Jan 1, 2025
•
1 min read
Read more
Training Robust Classifiers for Classfiying Encrypted Traffic under Dynamic Network Conditions
Yuqi Qing
•
Jan 1, 2025
•
1 min read
Read more
Brain-on-Switch: Towards Advanced Intelligent Network Dataplane via NN-Driven Traffic Analysis at Line-Speed
Jinzhu Yan
•
Jan 1, 2024
•
1 min read
Read more
CoGNN: Towards Secure and Efficient Collaborative Graph Learning
Zhenhua Zou
•
Jan 1, 2024
•
1 min read
Read more
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach
Qi Tan
•
Jan 1, 2024
•
1 min read
Read more
Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations
Yuanyuan Qing
•
Jan 1, 2024
•
1 min read
Read more
Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping
Ziming Zhao
•
Jan 1, 2024
•
1 min read
Read more
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System
Yihao Chen
•
Jan 1, 2024
•
1 min read
Read more
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
Yuqi Qing
•
Jan 1, 2024
•
1 min read
Read more
Pencil: Private and Extensible Collaborative Learning without Non-Colluding Assumption
Xuanqi Liu
•
Jan 1, 2024
•
1 min read
Read more
Towards Fine-Grained Webpage Fingerprinting at Scale
Xiyuan Zhao
•
Jan 1, 2024
•
1 min read
Read more
An Efficient Design of Intelligent Network Data Plane
Guangmeng Zhou
•
Jan 1, 2023
•
1 min read
Read more
Change Management in Physical Network Lifecycle Automation
Mohammad Al-Fares
•
Jan 1, 2023
•
1 min read
Read more
Cross Container Attacks: The Bewildered eBPF on Clouds
Yi He
•
Jan 1, 2023
•
1 min read
Read more
iSyn: Semi-Automated Smart Contract Synthesis from Legal Financial Agreements
Pengcheng Fang
•
Jan 1, 2023
•
1 min read
Read more
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-day Web Attack Detection across Web Domains
Peiyang Li
•
Jan 1, 2023
•
1 min read
Read more
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture
Qi Li
•
Jan 1, 2023
•
1 min read
Read more
Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification
Yunpeng Liu
•
Jan 1, 2023
•
1 min read
Read more
Robust Multi-tab Website Fingerprinting Attacks in the Wild
Xinhao Deng
•
Jan 1, 2023
•
1 min read
Read more
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments
Xiaoliang Wang
•
Jan 1, 2023
•
1 min read
Read more
Threshold-Based Routing-Topology Co-Design for Optical Data Center
Peirui Cao
•
Jan 1, 2023
•
1 min read
Read more
Automated Multi-Tab Website Fingerprinting Attack
Qilei Yin
•
Jan 1, 2022
•
1 min read
Read more
Back-Propagating System Dependency Impact for Attack Investigation
Pengcheng Fang
•
Jan 1, 2022
•
1 min read
Read more
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling
Qi Li
•
Jan 1, 2022
•
1 min read
Read more
FlowTele: Remotely Shaping Traffic on Internet-Scale Networks
Bo-Rong Chen
•
Jan 1, 2022
•
1 min read
Read more
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems
Zijie Yang
•
Jan 1, 2022
•
1 min read
Read more
Make Web3.0 Connected
Zhuotao Liu
•
Jan 1, 2022
•
1 min read
Read more
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
Yi He
•
Jan 1, 2022
•
1 min read
Read more
Unsupervised Contextual Anomaly Detection for Database Systems
Sainan Li
•
Jan 1, 2022
•
1 min read
Read more
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
Jiaming Mu
•
Jan 1, 2021
•
1 min read
Read more
Efficient Forwarding Anomaly Detection in Software-Defined Networks
Qi Li
•
Jan 1, 2021
•
1 min read
Read more
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps
Shengqu Xi
•
Jan 1, 2019
•
1 min read
Read more
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu
•
Jan 1, 2019
•
1 min read
Read more
Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective
Zhuotao Liu
•
Jan 1, 2019
•
1 min read
Read more
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services
Zhuotao Liu
•
Jan 1, 2019
•
1 min read
Read more
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking
Bo Wu
•
Jan 1, 2018
•
1 min read
Read more
Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding
Zhuotao Liu
•
Jan 1, 2018
•
1 min read
Read more
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control
Zhuotao Liu
•
Jan 1, 2018
•
1 min read
Read more
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Zhuotao Liu
•
Jan 1, 2017
•
1 min read
Read more
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet
Zhuotao Liu
•
Jan 1, 2016
•
1 min read
Read more