InspiringGroup
Open Menu
Close Menu
Home
Publications
People
News
Awards
Join
Zero-Knowledge Proof
Type
Agent Security
AI Security
Data Security
Datacenter Networking
DDoS Prevention
Encrypted Traffic Analysis
Intelligent Network Architecture
Secure Internet Routing
System Security
Web3 & Block Chain
Date
Before 2020
2026
2025
2024
2023
2022
2021
✉️ indicates corresponding authors. Undererlined students are from my group.
Blind Gods and Broken Screens: Architecting a Secure, Intent-Centric Mobile Agent Operating System
Zhenhua Zou
•
Feb 11, 2026
•
1 min read
Read more
Anonymization-Enhanced Privacy Protection for Mobile GUI Agents: Available but Invisible
Lepeng Zhao
•
Feb 8, 2026
•
1 min read
Read more
A Universal Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems
Zixuan Liu
•
Jan 1, 2026
•
1 min read
Read more
Achieving Interpretable DL-based Web Attack Detection through Malicious Payload Localization
Peiyang Li
•
Jan 1, 2026
•
1 min read
Read more
Enhancing Website Fingerprinting Attacks against Traffic Drift
Xinhao Deng
•
Jan 1, 2026
•
1 min read
Read more
Understanding the Stealthy BGP Hijacking Risk in the ROV Era
Yihao Chen
•
Jan 1, 2026
•
1 min read
Read more
BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability
Zhenhua Zou
•
Sep 21, 2025
•
1 min read
Read more
Agentic Privacy-Preserving Machine Learning
Mengyu Zhang
•
Jul 30, 2025
•
1 min read
Read more
CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis
Jinzhu Yan
•
Jan 1, 2025
•
1 min read
Read more
DiffECN: Differential ECN Marking for Datacenter Networks
Hanlin Huang
•
Jan 1, 2025
•
1 min read
Read more
MM4flow: A Pre-trained Multi-modal Model for Versatile Network Traffic Analysis
Luming Yang
•
Jan 1, 2025
•
1 min read
Read more
Pegasus: A Universal Framework for Scalable Deep Learning Inference on the Dataplane
Yinchao Zhang
•
Jan 1, 2025
•
1 min read
Read more
PRED: Performance-oriented Random Early Detection for Consistently Stable Performance in Datacenters
Xinle Du
•
Jan 1, 2025
•
1 min read
Read more
Revisiting Random Early Detection Tuning for High-Performance Datacenter Networks
Tong Li
•
Jan 1, 2025
•
1 min read
Read more
RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing
Zhenhua Zou
•
Jan 1, 2025
•
1 min read
Read more
TrafficFormer: An Efficient Pre-trained Model for Traffic Data
Guangmeng Zhou
•
Jan 1, 2025
•
1 min read
Read more
Training Robust Classifiers for Classfiying Encrypted Traffic under Dynamic Network Conditions
Yuqi Qing
•
Jan 1, 2025
•
1 min read
Read more
Brain-on-Switch: Towards Advanced Intelligent Network Dataplane via NN-Driven Traffic Analysis at Line-Speed
Jinzhu Yan
•
Jan 1, 2024
•
1 min read
Read more
CoGNN: Towards Secure and Efficient Collaborative Graph Learning
Zhenhua Zou
•
Jan 1, 2024
•
1 min read
Read more
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach
Qi Tan
•
Jan 1, 2024
•
1 min read
Read more
Detection of Adversarial Attacks via Disentangling Natural Images and Perturbations
Yuanyuan Qing
•
Jan 1, 2024
•
1 min read
Read more
Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping
Ziming Zhao
•
Jan 1, 2024
•
1 min read
Read more
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System
Yihao Chen
•
Jan 1, 2024
•
1 min read
Read more
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
Yuqi Qing
•
Jan 1, 2024
•
1 min read
Read more
Pencil: Private and Extensible Collaborative Learning without Non-Colluding Assumption
Xuanqi Liu
•
Jan 1, 2024
•
1 min read
Read more
Towards Fine-Grained Webpage Fingerprinting at Scale
Xiyuan Zhao
•
Jan 1, 2024
•
1 min read
Read more
An Efficient Design of Intelligent Network Data Plane
Guangmeng Zhou
•
Jan 1, 2023
•
1 min read
Read more
Change Management in Physical Network Lifecycle Automation
Mohammad Al-Fares
•
Jan 1, 2023
•
1 min read
Read more
Cross Container Attacks: The Bewildered eBPF on Clouds
Yi He
•
Jan 1, 2023
•
1 min read
Read more
iSyn: Semi-Automated Smart Contract Synthesis from Legal Financial Agreements
Pengcheng Fang
•
Jan 1, 2023
•
1 min read
Read more
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-day Web Attack Detection across Web Domains
Peiyang Li
•
Jan 1, 2023
•
1 min read
Read more
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture
Qi Li
•
Jan 1, 2023
•
1 min read
Read more
Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification
Yunpeng Liu
•
Jan 1, 2023
•
1 min read
Read more
Robust Multi-tab Website Fingerprinting Attacks in the Wild
Xinhao Deng
•
Jan 1, 2023
•
1 min read
Read more
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments
Xiaoliang Wang
•
Jan 1, 2023
•
1 min read
Read more
Threshold-Based Routing-Topology Co-Design for Optical Data Center
Peirui Cao
•
Jan 1, 2023
•
1 min read
Read more
Automated Multi-Tab Website Fingerprinting Attack
Qilei Yin
•
Jan 1, 2022
•
1 min read
Read more
Back-Propagating System Dependency Impact for Attack Investigation
Pengcheng Fang
•
Jan 1, 2022
•
1 min read
Read more
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling
Qi Li
•
Jan 1, 2022
•
1 min read
Read more
FlowTele: Remotely Shaping Traffic on Internet-Scale Networks
Bo-Rong Chen
•
Jan 1, 2022
•
1 min read
Read more
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems
Zijie Yang
•
Jan 1, 2022
•
1 min read
Read more
Make Web3.0 Connected
Zhuotao Liu
•
Jan 1, 2022
•
1 min read
Read more
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
Yi He
•
Jan 1, 2022
•
1 min read
Read more
Unsupervised Contextual Anomaly Detection for Database Systems
Sainan Li
•
Jan 1, 2022
•
1 min read
Read more
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
Jiaming Mu
•
Jan 1, 2021
•
1 min read
Read more
Efficient Forwarding Anomaly Detection in Software-Defined Networks
Qi Li
•
Jan 1, 2021
•
1 min read
Read more
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps
Shengqu Xi
•
Jan 1, 2019
•
1 min read
Read more
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains
Zhuotao Liu
•
Jan 1, 2019
•
1 min read
Read more
Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective
Zhuotao Liu
•
Jan 1, 2019
•
1 min read
Read more
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services
Zhuotao Liu
•
Jan 1, 2019
•
1 min read
Read more
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking
Bo Wu
•
Jan 1, 2018
•
1 min read
Read more
Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding
Zhuotao Liu
•
Jan 1, 2018
•
1 min read
Read more
Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control
Zhuotao Liu
•
Jan 1, 2018
•
1 min read
Read more
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network
Zhuotao Liu
•
Jan 1, 2017
•
1 min read
Read more
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet
Zhuotao Liu
•
Jan 1, 2016
•
1 min read
Read more