USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is Haitao Zheng [Clear All Filters]
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. 32nd USENIX Security Symposium (USENIX Security 23). :2187--2204.
.
2023. Towards a General Video-based Keystroke Inference Attack. 32nd USENIX Security Symposium (USENIX Security 23). :141--158.
.
2023. Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2117--2134.
.
2022. Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. 31st USENIX Security Symposium (USENIX Security 22). :3575--3592.
.
2022. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 29th USENIX Security Symposium (USENIX Security 20). :1589--1604.
.
2020. With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. 27th USENIX Security Symposium (USENIX Security 18). :1281--1297.
.
2018. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 23rd USENIX Security Symposium (USENIX Security 14). :239--254.
.
2014. You Are How You Click: Clickstream Analysis for Sybil Detection. 22nd USENIX Security Symposium (USENIX Security 13). :241--256.
.
2013. Orion: Shortest Path Estimation for Large Social Graphs. 3rd Workshop on Online Social Networks (WOSN 2010).
.
2010. Supporting Demanding Wireless Applications with Frequency-agile Radios. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
.
2010.