Export 10 results:
Filters: Author is Ben Y. Zhao  [Clear All Filters]
Shan S, Wenger E, Zhang J, Li H, Zheng H, Zhao BY.  2020.  Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 29th {USENIX} Security Symposium ({USENIX} Security 20). :1589--1604.
Li Z, Wang W, Xu T, Zhong X, Li X-Y, Liu Y, Wilson C, Zhao BY.  2016.  Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard. 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). :61--76.
Wang G, Wang T, Zheng H, Zhao BY.  2014.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :239--254.
Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY.  2013.  You Are How You Click: Clickstream Analysis for Sybil Detection. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :241--256.
Yang Z, Zhao BY, Xing Y, Ding S, Xiao F, Dai Y.  2010.  AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets. 9th International Workshop on Peer-to-Peer Systems ({IPTPS} 10).
Wilson C, Sala A, Bonneau J, Zablit R, Zhao BY.  2010.  Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip. 3rd Workshop on Online Social Networks ({WOSN} 2010).
Yang L, Hou W, Cao L, Zhao BY, Zheng H.  2010.  Supporting Demanding Wireless Applications with Frequency-agile Radios. 7th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 10).
Zhuang L, Zhou F, Zhao BY, Rowstron A.  2005.  Cashmere: Resilient Anonymous Routing . 2nd Symposium on Networked Systems Design & Implementation ({NSDI} 05).
Yang M, Chen H, Zhao BY, Dai Y, Zhang Z.  2004.  Deployment of a Large-scale Peer-to-Peer Social Network. First Workshop on Real, Large Distributed Systems ({WORLDS} 04).