Biblio

Export 10 results:
Filters: Author is Ben Y. Zhao  [Clear All Filters]
2020
Shan S, Wenger E, Zhang J, Li H, Zheng H, Zhao BY.  2020.  Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 29th USENIX Security Symposium (USENIX Security 20). :1589--1604.
2016
Li Z, Wang W, Xu T, Zhong X, Li X-Y, Liu Y, Wilson C, Zhao BY.  2016.  Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :61--76.
2014
Wang G, Wang T, Zheng H, Zhao BY.  2014.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 23rd USENIX Security Symposium (USENIX Security 14). :239--254.
2013
Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY.  2013.  You Are How You Click: Clickstream Analysis for Sybil Detection. 22nd USENIX Security Symposium (USENIX Security 13). :241--256.
2010
Yang Z, Zhao BY, Xing Y, Ding S, Xiao F, Dai Y.  2010.  AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets. 9th International Workshop on Peer-to-Peer Systems (IPTPS 10).
Wilson C, Sala A, Bonneau J, Zablit R, Zhao BY.  2010.  Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip. 3rd Workshop on Online Social Networks (WOSN 2010).
Yang L, Hou W, Cao L, Zhao BY, Zheng H.  2010.  Supporting Demanding Wireless Applications with Frequency-agile Radios. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
2005
Zhuang L, Zhou F, Zhao BY, Rowstron A.  2005.  Cashmere: Resilient Anonymous Routing . 2nd Symposium on Networked Systems Design & Implementation (NSDI 05).
2004
Yang M, Chen H, Zhao BY, Dai Y, Zhang Z.  2004.  Deployment of a Large-scale Peer-to-Peer Social Network. First Workshop on Real, Large Distributed Systems (WORLDS 04).