Follow
Wenchao Zhou
Wenchao Zhou
Verified email at cs.georgetown.edu
Title
Cited by
Cited by
Year
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016
5712016
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management ofá…, 2010
1952010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the Twenty-Third ACM Symposium on Operating Systemsá…, 2011
1592011
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS Workshop on Security of Emerging Networká…, 2014
1022014
Diagnosing missing events in distributed systems with negative provenance
Y Wu, M Zhao, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2014 ACM conference on SIGCOMM, 383-394, 2014
812014
Datalog and Recursive Query Processing.
TJ Green, SS Huang, BT Loo, W Zhou
Foundations and Trends in Databases 5 (2), 105-195, 2013
792013
The good, the bad, and the differences: Better network diagnostics with differential provenance
A Chen, Y Wu, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2016 ACM SIGCOMM Conference, 115-128, 2016
662016
Detecting covert timing channels with time-deterministic replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
USENIX Symposium on Operating System Design and Implementation (OSDI), 2014
622014
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
572012
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologiesá…, 2012
532012
DMaC: Distributed Monitoring and Checking
W Zhou, O Sokolsky, BT Loo, I Lee
International Workshop on Runtime Verification, 184-201, 2009
532009
Cloud-edge topologies
B Chandramouli, SK Nath, W Zhou
US Patent 9,098,344, 2015
452015
Recursive computation of regions and connectivity in networks
M Liu, NE Taylor, W Zhou, ZG Ives, BT Loo
2009 IEEE 25th International Conference on Data Engineering, 1108-1119, 2009
452009
Unified declarative platform for secure netwoked information systems
W Zhou, Y Mao, BT Loo, M Abadi
2009 IEEE 25th International Conference on Data Engineering, 150-161, 2009
452009
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking (ToN) 20 (6), 1814-1827, 2012
442012
Automated bug removal for software-defined networks
Y Wu, A Chen, A Haeberlen, W Zhou, BT Loo
14th {USENIX} Symposium on Networked Systems Design and Implementationá…, 2017
432017
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
432010
A│: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
402010
Provenance-aware secure networks
W Zhou, E Cronin, BT Loo
Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th Internationalá…, 2008
352008
Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead.
A Chen, Y Wu, A Haeberlen, BT Loo, W Zhou
CIDR, 2017
282017
The system can't perform the operation now. Try again later.
Articles 1–20