Biblio

Export 10 results:
Filters: Author is Haitao Zheng  [Clear All Filters]
2023
Shan S, Cryan J, Wenger E, Zheng H, Hanocka R, Zhao BY.  2023.  Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. 32nd USENIX Security Symposium (USENIX Security 23). :2187--2204.
Yang Z, Chen Y, Sarwar Z, Schwartz H, Zhao BY, Zheng H.  2023.  Towards a General Video-based Keystroke Inference Attack. 32nd USENIX Security Symposium (USENIX Security 23). :141--158.
2022
Li H, Shan S, Wenger E, Zhang J, Zheng H, Zhao BY.  2022.  Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2117--2134.
Shan S, Bhagoji ANitin, Zheng H, Zhao BY.  2022.  Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. 31st USENIX Security Symposium (USENIX Security 22). :3575--3592.
2020
Shan S, Wenger E, Zhang J, Li H, Zheng H, Zhao BY.  2020.  Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 29th USENIX Security Symposium (USENIX Security 20). :1589--1604.
2014
Wang G, Wang T, Zheng H, Zhao BY.  2014.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 23rd USENIX Security Symposium (USENIX Security 14). :239--254.
2013
Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY.  2013.  You Are How You Click: Clickstream Analysis for Sybil Detection. 22nd USENIX Security Symposium (USENIX Security 13). :241--256.
2010
Zhao X, Zheng H.  2010.  Orion: Shortest Path Estimation for Large Social Graphs. 3rd Workshop on Online Social Networks (WOSN 2010).
Yang L, Hou W, Cao L, Zhao BY, Zheng H.  2010.  Supporting Demanding Wireless Applications with Frequency-agile Radios. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10).