Shitong Zhu
Shitong Zhu
Research Scientist @ Meta
Verified email at - Homepage
Cited by
Cited by
Adgraph: A graph-based approach to ad and tracker blocking
U Iqbal, P Snyder, S Zhu, B Livshits, Z Qian, Z Shafiq
2020 IEEE Symposium on Security and Privacy (SP), 763-776, 2020
Measuring and disrupting anti-adblockers using differential execution analysis
S Zhu, X Hu, Z Qian, Z Shafiq, H Yin
The Network and Distributed System Security Symposium (NDSS), 2018
SymTCP: Eluding stateful deep packet inspection with automated discrepancy discovery
Z Wang, S Zhu
Network and Distributed System Security Symposium (NDSS), 2020
Connecting the dots: Detecting adversarial perturbations using context inconsistency
S Li, S Zhu, S Paul, A Roy-Chowdhury, C Song, S Krishnamurthy, ...
Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23 …, 2020
Adversarial attacks on black box video classifiers: Leveraging the power of geometric transformations
S Li, A Aich, S Zhu, S Asif, C Song, A Roy-Chowdhury, S Krishnamurthy
Advances in Neural Information Processing Systems 34, 2085-2096, 2021
Shadowblock: A lightweight and stealthy adblocking browser
S Zhu, U Iqbal, Z Wang, Z Qian, Z Shafiq, W Chen
The World Wide Web Conference, 2483-2493, 2019
You do (not) belong here: detecting DPI evasion attacks with context learning
S Zhu, S Li, Z Wang, X Chen, Z Qian, SV Krishnamurthy, KS Chan, ...
Proceedings of the 16th International Conference on emerging Networking …, 2020
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs
J Huang, M Sun, S Zhu, Y Sun, C Xing, Q Duan
Proceedings of the 30th annual ACM symposium on applied computing, 688-694, 2015
Eluding ML-based Adblockers With Actionable Adversarial Examples
S Zhu, Z Wang, X Chen, S Li, K Man, U Iqbal, Z Qian, KS Chan, ...
Annual Computer Security Applications Conference, 541-553, 2021
Generating practical adversarial network traffic flows using NIDSGAN
BE Zolbayar, R Sheatsley, P McDaniel, MJ Weisman, S Zhu, S Zhu, ...
arXiv preprint arXiv:2203.06694, 2022
On selecting composite network-cloud services: a quality-of-service based approach
MM Jalloh, S Zhu, F Fang, J Huang
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
Z Wang, S Zhu, K Man, P Zhu, Y Hao, Z Qian, SV Krishnamurthy, ...
Proceedings of the 8th ACM Workshop on Moving Target Defense, 31-32, 2021
Propagation of Active Worms in P2P Networks: Modeling and Analysis.
H Tang, Y Lu, S Zhou, J Huang
J. Comput. 9 (11), 2514-2524, 2014
A Defense Model of Reactive Worms Based on Dynamic Time.
H Tang, S Zhu, J Huang, H Liu
J. Softw. 9 (11), 2778-2788, 2014
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers
Y Hao, G Li, X Zou, W Chen, S Zhu, Z Qian, AA Sani
2023 IEEE Symposium on Security and Privacy (SP), 3262-3278, 2023
Understanding and Taming Adversarial Actions Against Internet Content Blockers
S Zhu
University of California, Riverside, 2021
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations (Supplementary Material)
S Li, A Aich, S Zhu, MS Asif, C Song, SV Krishnamurthy, ...
The system can't perform the operation now. Try again later.
Articles 1–17