Follow
Wenchao Zhou
Wenchao Zhou
Verified email at cs.georgetown.edu
Title
Cited by
Cited by
Year
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 513-530, 2016
7412016
Efficient querying and maintenance of network provenance at internet-scale
W Zhou, M Sherr, T Tao, X Li, BT Loo, Y Mao
Proceedings of the 2010 ACM SIGMOD International Conference on Management of …, 2010
2112010
Secure network provenance
W Zhou, Q Fei, A Narayan, A Haeberlen, BT Loo, M Sherr
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
1742011
Datalog and Recursive Query Processing.
TJ Green, SS Huang, BT Loo, W Zhou
Foundations and Trends in Databases 5 (2), 105-195, 2013
1062013
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS Workshop on Security of Emerging Network …, 2014
992014
Diagnosing missing events in distributed systems with negative provenance
Y Wu, M Zhao, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2014 ACM conference on SIGCOMM, 383-394, 2014
942014
The good, the bad, and the differences: Better network diagnostics with differential provenance
A Chen, Y Wu, A Haeberlen, W Zhou, BT Loo
Proceedings of the 2016 ACM SIGCOMM Conference, 115-128, 2016
812016
Distributed time-aware provenance
W Zhou, S Mapara, Y Ren, Y Li, A Haeberlen, Z Ives, BT Loo, M Sherr
Proceedings of the VLDB Endowment 6 (2), 49-60, 2012
642012
Detecting covert timing channels with time-deterministic replay
A Chen, WB Moore, H Xiao, A Haeberlen, LTX Phan, M Sherr, W Zhou
USENIX Symposium on Operating System Design and Implementation (OSDI), 2014
602014
Private and verifiable interdomain routing decisions
M Zhao, W Zhou, AJT Gurney, A Haeberlen, M Sherr, BT Loo
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012
552012
Cloud-edge topologies
B Chandramouli, SK Nath, W Zhou
US Patent 9,098,344, 2015
532015
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking (ToN) 20 (6), 1814-1827, 2012
522012
DMaC: Distributed Monitoring and Checking
W Zhou, O Sokolsky, BT Loo, I Lee
International Workshop on Runtime Verification, 184-201, 2009
522009
Automated bug removal for software-defined networks
Y Wu, A Chen, A Haeberlen, W Zhou, BT Loo
14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017
472017
Recursive computation of regions and connectivity in networks
M Liu, NE Taylor, W Zhou, ZG Ives, BT Loo
2009 IEEE 25th International Conference on Data Engineering, 1108-1119, 2009
472009
Towards a data-centric view of cloud security
W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao, BT Loo, I Lee
Proceedings of the second international workshop on Cloud data management, 25-32, 2010
432010
Unified declarative platform for secure netwoked information systems
W Zhou, Y Mao, BT Loo, M Abadi
2009 IEEE 25th International Conference on Data Engineering, 150-161, 2009
432009
Veridb: An sgx-based verifiable database
W Zhou, Y Cai, Y Peng, S Wang, K Ma, F Li
Proceedings of the 2021 International Conference on Management of Data, 2182 …, 2021
422021
Ał: An Extensible Platform for Application-Aware Anonymity
M Sherr, A Mao, WR Marczak, W Zhou, BT Loo, MA Blaze
422010
Provenance-aware secure networks
W Zhou, E Cronin, BT Loo
Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International …, 2008
342008
The system can't perform the operation now. Try again later.
Articles 1–20