Publications

* Equal Contribution # Corresponding Author

In Submission

  1. Jiahao Xue, Zhe Qu#, Jie Xu, Yao Liu, and Zhuo Lu. “Bandwidth Allocation for Federated Learning under Wireless Providers with Cost Constraints”. # Corresponding Author
  2. Xingyu Li*, Zhe Qu*, Bo Tang, and Zhuo Lu. “FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation”. *Equal contribution

Journal Publications

  1. Zhe Qu, Xingyu Li, Jie Xu, Bo Tang, Zhuo Lu, and Yao Liu. “On the Convergence of Multi-Server Federated Learning with Overlapping Area”. IEEE Transactions on Mobile Computing, 2022 (Early Access). (CCF A)
  2. Zhe Qu, Rui Duan, Lixing Chen, Jie Xu, Zhuo Lu, and Yao Liu. “Context-Aware Online Client Selection for Hierarchical Federated Learning”. IEEE Transactions on Parallel and Distributed Systems, Volume: 33, Issue: 12, 01, pp. 4353 - 4367, December 2022. (CCF A)
  3. Xingyu Li*, Zhe Qu*, Shangqing Zhao, Bo Tang, Zhuo Lu, and Yao Liu. “LoMar: A Local Defense Against Poisoning Attack on Federated Learning”. IEEE Transactions on Dependable and Secure Computing, 2021 (Early Access). (CCF A) *Equal contribution
  4. Zhe Qu, Shangqing Zhao, Jie Xu, Zhuo Lu, and Yao Liu. “How to Test the Randomness From the Wireless Channel for Security?”. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3753-3766, June 2021. (CCF A)
  5. Zhengping Luo, Zhe Qu, Tung Nguyen, Hui Zeng, and Zhuo Lu. “Security of HPC systems: From a log-analyzing perspective”. EAI Endorsed Transactions on Security and Safety, vol. 6, no. 21, e5, 2019.

Conference Publications

  1. Xingyu Li, Zhe Qu, Bo Tang, and Zhuo Lu. “Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients”. In IEEE International Conference on Machine Learning and Applications (ICMLA), 2022.
  2. Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, and Zhuo Lu. “Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception”. In ACM Conference on Computer and Communications Security (CCS), 2022. (CCF A)
  3. Zhe Qu, Xingyu Li, Rui Duan, Yao Liu, Bo Tang and Zhuo Lu. “Generalized Federated Learning via Sharpness Aware Minimization”. In International Conference on Machine Learning (ICML), 2022. (CCF A)
  4. Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, and Yao Liu. “ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference”. In IEEE Conference on Computer Communications (INFOCOM), 2020. (CCF A)
  5. Shangqing Zhao, Zhe Qu, Zhengping Luo, Zhuo Lu and Yao Liu. “Comb Decoding towards Collision-Free WiFi”. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2020. (CCF A)
  6. Shangqing Zhao, Zhe Qu, and Zhuo Lu. “Vulnerability Analysis, Attack Strategies and Countermeasures Design in Network Tomography”. In Annual Computer Security Applications Conference (ACSAC), Poster Session, 2019.
  7. Shangqing Zhao, Zhe Qu, Zhuo Lu, and Tao Wang. “Spectrum Tomography Attacks: Inferring Spectrum Allocation Mechanisms in Multicarrier Systems”. In IEEE Symposium on Dynamic Spectrum Access Networks (DySPAN), Poster Session, 2019.