85:, a method for bringing down the internet via a distributed denial of service attack on its routing systems. She has also found performance degradation caused by network security software, discovered defects in the
200:
409:
294:
394:
156:
73:
She joined the
University of Michigan faculty in 2004, and as an assistant professor in 2008 was named Morris Wellman Faculty Development Professor.
277:
101:
Mao was the 2016–2017 recipient of the George J. Huebner Jr. Research
Excellence Award of the University of Michigan College of Engineering.
389:
379:
93:
apps secure from each other, and developed techniques by which self-driving vehicles can be tricked into failing to observe obstacles.
223:
399:
384:
258:
374:
59:
202:
Z. Morley Mao elected IEEE fellow for contributions to performance and security of internet routing and mobile systems
241:
108:
in 2022, "for contributions to performance and security of internet routing and mobile systems". She was named as an
62:, where she completed her Ph.D. in electrical engineering and computer science in 2003. Her doctoral dissertation,
185:
162:
404:
86:
90:
369:
47:
295:"Prof. Z. Morley Mao selected to receive CoE George J. Huebner, Jr. Research Excellence award"
46:. She is a professor in the Department of Electrical Engineering and Computer Science at the
129:
112:, in the 2023 class of fellows, "for contributions to internet security and performance".
8:
350:
43:
318:
161:, University of Michigan Electrical Engineering and Computer Science, archived from
39:
35:
31:
23:
64:
Solving the
Interdomain Routing Problem-Understanding Interdomain Routing Dynamics
354:
363:
181:
301:, University of Michigan Computer Science and Engineering, January 27, 2017
205:, University of Michigan Computer Science and Engineering, January 13, 2022
105:
109:
82:
67:
345:
136:, University of Michigan Electrical Engineering and Computer Science
158:
Z. Morley Mao Named Morris
Wellman Faculty Development Professor
278:"Scientists trick lidar units into failing to see pedestrians"
58:
Mao was both an undergraduate and a graduate student at the
410:
2023 fellows of the
Association for Computing Machinery
224:"The cyberweapon that could take down the internet"
259:"Sneak Attack: Android Apps Can Spy on Each Other"
242:"Carriers may be handicapping cell phone networks"
30:) is a computer scientist whose research concerns
361:
195:
193:
311:
240:Reardon, Marguerite (September 15, 2011),
190:
395:University of California, Berkeley alumni
151:
149:
275:
239:
233:
53:
362:
287:
251:
146:
325:, Association for Computing Machinery
276:LaChance, Dave (November 25, 2022),
269:
221:
122:
81:Mao is one of the namesakes of the
13:
390:American women computer scientists
215:
60:University of California, Berkeley
14:
421:
380:Chinese women computer scientists
339:
222:Aron, Jacob (February 11, 2011),
175:
400:University of Michigan faculty
96:
1:
186:Mathematics Genealogy Project
115:
385:American computer scientists
7:
375:Chinese computer scientists
76:
16:American computer scientist
10:
426:
27:
353:publications indexed by
48:University of Michigan
130:"Zhuoqing Morley Mao"
282:Repairer Driven News
104:She was named as an
66:, was supervised by
54:Education and career
405:Fellows of the IEEE
44:distributed systems
20:Zhuoqing Morley Mao
265:, August 21, 2014
32:computer networks
417:
333:
332:
331:
330:
323:Award recipients
315:
309:
308:
307:
306:
291:
285:
284:
273:
267:
266:
255:
249:
248:
237:
231:
230:
219:
213:
212:
211:
210:
197:
188:
179:
173:
172:
171:
170:
153:
144:
143:
142:
141:
126:
40:mobile computing
36:network security
29:
425:
424:
420:
419:
418:
416:
415:
414:
360:
359:
342:
337:
336:
328:
326:
317:
316:
312:
304:
302:
293:
292:
288:
274:
270:
257:
256:
252:
238:
234:
220:
216:
208:
206:
199:
198:
191:
180:
176:
168:
166:
155:
154:
147:
139:
137:
128:
127:
123:
118:
99:
79:
56:
17:
12:
11:
5:
423:
413:
412:
407:
402:
397:
392:
387:
382:
377:
372:
358:
357:
355:Google Scholar
348:
341:
340:External links
338:
335:
334:
319:"Zhuoqing Mao"
310:
286:
268:
250:
232:
214:
189:
174:
145:
120:
119:
117:
114:
98:
95:
78:
75:
55:
52:
15:
9:
6:
4:
3:
2:
422:
411:
408:
406:
403:
401:
398:
396:
393:
391:
388:
386:
383:
381:
378:
376:
373:
371:
370:Living people
368:
367:
365:
356:
352:
351:Z. Morley Mao
349:
347:
344:
343:
324:
320:
314:
300:
296:
290:
283:
279:
272:
264:
260:
254:
247:
243:
236:
229:
225:
218:
204:
203:
196:
194:
187:
183:
182:Z. Morley Mao
178:
165:on 2020-02-17
164:
160:
159:
152:
150:
135:
131:
125:
121:
113:
111:
107:
102:
94:
92:
89:used to keep
88:
84:
74:
71:
69:
65:
61:
51:
49:
45:
41:
37:
33:
25:
21:
327:, retrieved
322:
313:
303:, retrieved
298:
289:
281:
271:
262:
253:
245:
235:
228:NewScientist
227:
217:
207:, retrieved
201:
177:
167:, retrieved
163:the original
157:
138:, retrieved
133:
124:
103:
100:
80:
72:
63:
57:
19:
18:
106:IEEE Fellow
97:Recognition
364:Categories
329:2024-01-24
305:2024-01-24
209:2024-01-24
169:2024-01-24
140:2024-01-24
116:References
110:ACM Fellow
83:ZMW attack
68:Randy Katz
346:Home page
263:NBC News
77:Research
184:at the
91:Android
87:sandbox
24:Chinese
134:People
42:, and
26::
299:News
246:CNET
28:茅斫青
366::
321:,
297:,
280:,
261:,
244:,
226:,
192:^
148:^
132:,
70:.
50:.
38:,
34:,
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.