Biblio

Export 14 results:
Filters: Author is Ben Y. Zhao  [Clear All Filters]
2023
Shan S, Cryan J, Wenger E, Zheng H, Hanocka R, Zhao BY.  2023.  Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. 32nd USENIX Security Symposium (USENIX Security 23). :2187--2204.
Yang Z, Chen Y, Sarwar Z, Schwartz H, Zhao BY, Zheng H.  2023.  Towards a General Video-based Keystroke Inference Attack. 32nd USENIX Security Symposium (USENIX Security 23). :141--158.
2022
Li H, Shan S, Wenger E, Zhang J, Zheng H, Zhao BY.  2022.  Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2117--2134.
Shan S, Bhagoji ANitin, Zheng H, Zhao BY.  2022.  Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. 31st USENIX Security Symposium (USENIX Security 22). :3575--3592.
2020
Shan S, Wenger E, Zhang J, Li H, Zheng H, Zhao BY.  2020.  Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 29th USENIX Security Symposium (USENIX Security 20). :1589--1604.
2016
Li Z, Wang W, Xu T, Zhong X, Li X-Y, Liu Y, Wilson C, Zhao BY.  2016.  Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :61--76.
2014
Wang G, Wang T, Zheng H, Zhao BY.  2014.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 23rd USENIX Security Symposium (USENIX Security 14). :239--254.
2013
Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY.  2013.  You Are How You Click: Clickstream Analysis for Sybil Detection. 22nd USENIX Security Symposium (USENIX Security 13). :241--256.
2010
Yang Z, Zhao BY, Xing Y, Ding S, Xiao F, Dai Y.  2010.  AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets. 9th International Workshop on Peer-to-Peer Systems (IPTPS 10).
Wilson C, Sala A, Bonneau J, Zablit R, Zhao BY.  2010.  Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip. 3rd Workshop on Online Social Networks (WOSN 2010).
Yang L, Hou W, Cao L, Zhao BY, Zheng H.  2010.  Supporting Demanding Wireless Applications with Frequency-agile Radios. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).
2005
Zhuang L, Zhou F, Zhao BY, Rowstron A.  2005.  Cashmere: Resilient Anonymous Routing . 2nd Symposium on Networked Systems Design & Implementation (NSDI 05).
2004
Yang M, Chen H, Zhao BY, Dai Y, Zhang Z.  2004.  Deployment of a Large-scale Peer-to-Peer Social Network. First Workshop on Real, Large Distributed Systems (WORLDS 04).