Export 8 results:
Filters: Author is Haitao Zheng  [Clear All Filters]
Li H, Shan S, Wenger E, Zhang J, Zheng H, Zhao BY.  2022.  Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2117--2134.
Shan S, Bhagoji ANitin, Zheng H, Zhao BY.  2022.  Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. 31st USENIX Security Symposium (USENIX Security 22). :3575--3592.
Shan S, Wenger E, Zhang J, Li H, Zheng H, Zhao BY.  2020.  Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 29th USENIX Security Symposium (USENIX Security 20). :1589--1604.
Wang G, Wang T, Zheng H, Zhao BY.  2014.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 23rd USENIX Security Symposium (USENIX Security 14). :239--254.
Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY.  2013.  You Are How You Click: Clickstream Analysis for Sybil Detection. 22nd USENIX Security Symposium (USENIX Security 13). :241--256.
Zhao X, Zheng H.  2010.  Orion: Shortest Path Estimation for Large Social Graphs. 3rd Workshop on Online Social Networks (WOSN 2010).
Yang L, Hou W, Cao L, Zhao BY, Zheng H.  2010.  Supporting Demanding Wireless Applications with Frequency-agile Radios. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).