Wenchao Zhou
Wenchao Zhou
Verified email at cs.georgetown.edu
Title
Cited by
Cited by
Year
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016
3722016
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management ofá…, 2010
1732010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the Twenty-Third ACM Symposium on Operating Systemsá…, 2011
1352011
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS Workshop on Security of Emerging Networká…, 2014
742014
Diagnosing missing events in distributed systems with negative provenance
Y Wu, M Zhao, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2014 ACM conference on SIGCOMM, 383-394, 2014
712014
Datalog and Recursive Query Processing.
TJ Green, SS Huang, BT Loo, W Zhou
Foundations and Trends in Databases 5 (2), 105-195, 2013
572013
The good, the bad, and the differences: Better network diagnostics with differential provenance
A Chen, Y Wu, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2016 ACM SIGCOMM Conference, 115-128, 2016
512016
DMaC: Distributed Monitoring and Checking
W Zhou, O Sokolsky, BT Loo, I Lee
International Workshop on Runtime Verification, 184-201, 2009
502009
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologiesá…, 2012
472012
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
462012
Detecting covert timing channels with time-deterministic replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
USENIX Symposium on Operating System Design and Implementation (OSDI), 2014
452014
Unified declarative platform for secure netwoked information systems
W Zhou, Y Mao, BT Loo, M Abadi
2009 IEEE 25th International Conference on Data Engineering, 150-161, 2009
442009
Recursive computation of regions and connectivity in networks
M Liu, NE Taylor, W Zhou, ZG Ives, BT Loo
2009 IEEE 25th International Conference on Data Engineering, 1108-1119, 2009
422009
A│: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
402010
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
392010
Cloud-edge topologies
B Chandramouli, SK Nath, W Zhou
US Patent 9,098,344, 2015
342015
Provenance-aware secure networks
W Zhou, E Cronin, BT Loo
Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th Internationalá…, 2008
332008
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking (ToN) 20 (6), 1814-1827, 2012
322012
Automated bug removal for software-defined networks
Y Wu, A Chen, A Haeberlen, W Zhou, BT Loo
14th {USENIX} Symposium on Networked Systems Design and Implementationá…, 2017
302017
Maintaining recursive views of regions and connectivity in networks
M Liu, NE Taylor, W Zhou, ZG Ives, BT Loo
IEEE Transactions on Knowledge and Data Engineering 22 (8), 1126-1141, 2010
282010
The system can't perform the operation now. Try again later.
Articles 1–20