Wenchao Zhou
Wenchao Zhou
Verified email at cs.georgetown.edu
TitleCited byYear
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016
2592016
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management of†…, 2010
1592010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the Twenty-Third ACM Symposium on Operating Systems†…, 2011
1252011
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS Workshop on Security of Emerging Network†…, 2014
672014
Diagnosing missing events in distributed systems with negative provenance
Y Wu, M Zhao, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2014 ACM conference on SIGCOMM, 383-394, 2014
572014
Datalog and Recursive Query Processing.
TJ Green, SS Huang, BT Loo, W Zhou
Foundations and Trends in Databases 5 (2), 105-195, 2013
512013
DMaC: Distributed Monitoring and Checking
W Zhou, O Sokolsky, BT Loo, I Lee
International Workshop on Runtime Verification, 184-201, 2009
502009
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies†…, 2012
462012
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
432012
Unified declarative platform for secure netwoked information systems
W Zhou, Y Mao, BT Loo, M Abadi
2009 IEEE 25th International Conference on Data Engineering, 150-161, 2009
432009
Recursive computation of regions and connectivity in networks
M Liu, NE Taylor, W Zhou, ZG Ives, BT Loo
2009 IEEE 25th International Conference on Data Engineering, 1108-1119, 2009
422009
The good, the bad, and the differences: Better network diagnostics with differential provenance
A Chen, Y Wu, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2016 ACM SIGCOMM Conference, 115-128, 2016
412016
Detecting covert timing channels with time-deterministic replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
USENIX Symposium on Operating System Design and Implementation (OSDI), 2014
392014
A≥: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
382010
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
372010
Provenance-aware secure networks
W Zhou, E Cronin, BT Loo
Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International†…, 2008
322008
Cloud-edge topologies
B Chandramouli, SK Nath, W Zhou
US Patent 9,098,344, 2015
282015
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking (ToN) 20 (6), 1814-1827, 2012
272012
Maintaining recursive views of regions and connectivity in networks
M Liu, NE Taylor, W Zhou, ZG Ives, BT Loo
IEEE Transactions on Knowledge and Data Engineering 22 (8), 1126-1141, 2010
272010
A batch of PNUTS: Experiences connecting cloud batch and serving systems
AE Silberstein, R Sears, W Zhou, BF Cooper
Proceedings of the 2011 ACM SIGMOD International Conference on Management of†…, 2011
242011
The system can't perform the operation now. Try again later.
Articles 1–20