default search action
BibTeX records: Ben Y. Zhao
@article{DBLP:journals/popets/WengerLZS24, author = {Emily Wenger and Xiuyu Li and Ben Y. Zhao and Vitaly Shmatikov}, title = {Data Isotopes for Data Provenance in DNNs}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {413--429}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0024}, doi = {10.56553/POPETS-2024-0024}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/WengerLZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/satml/DingBZ024, author = {Wenxin Ding and Arjun Nitin Bhagoji and Ben Y. Zhao and Haitao Zheng}, title = {Towards Scalable and Robust Model Versioning}, booktitle = {{IEEE} Conference on Secure and Trustworthy Machine Learning, SaTML 2024, Toronto, ON, Canada, April 9-11, 2024}, pages = {592--611}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SaTML59370.2024.00036}, doi = {10.1109/SATML59370.2024.00036}, timestamp = {Wed, 15 May 2024 16:13:31 +0200}, biburl = {https://dblp.org/rec/conf/satml/DingBZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShanDPWZZ24, author = {Shawn Shan and Wenxin Ding and Josephine Passananti and Stanley Wu and Haitao Zheng and Ben Y. Zhao}, title = {Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2024, San Francisco, CA, USA, May 19-23, 2024}, pages = {807--825}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SP54263.2024.00207}, doi = {10.1109/SP54263.2024.00207}, timestamp = {Sat, 21 Sep 2024 14:24:56 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShanDPWZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YangSHBZ024, author = {Zhuolin Yang and Zain Sarwar and Iris Hwang and Ronik Bhaskar and Ben Y. Zhao and Haitao Zheng}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Can Virtual Reality Protect Users from Keystroke Inference Attacks?}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/yang-zhuolin}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/YangSHBZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-09574, author = {Wenxin Ding and Arjun Nitin Bhagoji and Ben Y. Zhao and Haitao Zheng}, title = {Towards Scalable and Robust Model Versioning}, journal = {CoRR}, volume = {abs/2401.09574}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.09574}, doi = {10.48550/ARXIV.2401.09574}, eprinttype = {arXiv}, eprint = {2401.09574}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-09574.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03214, author = {Anna Yoo Jeong Ha and Josephine Passananti and Ronik Bhaskar and Shawn Shan and Reid Southen and Haitao Zheng and Ben Y. Zhao}, title = {Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?}, journal = {CoRR}, volume = {abs/2402.03214}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03214}, doi = {10.48550/ARXIV.2402.03214}, eprinttype = {arXiv}, eprint = {2402.03214}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-05721, author = {Zhuolin Yang and Cathy Yuanchen Li and Arman Bhalla and Ben Y. Zhao and Haitao Zheng}, title = {Inception Attacks: Immersive Hijacking in Virtual Reality Systems}, journal = {CoRR}, volume = {abs/2403.05721}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.05721}, doi = {10.48550/ARXIV.2403.05721}, eprinttype = {arXiv}, eprint = {2403.05721}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-05721.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-06865, author = {Josephine Passananti and Stanley Wu and Shawn Shan and Haitao Zheng and Ben Y. Zhao}, title = {Disrupting Style Mimicry Attacks on Video Imagery}, journal = {CoRR}, volume = {abs/2405.06865}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.06865}, doi = {10.48550/ARXIV.2405.06865}, eprinttype = {arXiv}, eprint = {2405.06865}, timestamp = {Sat, 15 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-06865.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/XiaoCYCSSZZ23, author = {Zhujun Xiao and Jenna Cryan and Yuanshun Yao and Yi Hong Gordon Cheo and Yuanchao Shu and Stefan Saroiu and Ben Y. Zhao and Haitao Zheng}, title = {"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {3}, pages = {252--267}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0080}, doi = {10.56553/POPETS-2023-0080}, timestamp = {Sat, 24 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/XiaoCYCSSZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/XieGHCWZZ23, author = {Qinge Xie and Qingyuan Gong and Xinlei He and Yang Chen and Xin Wang and Haitao Zheng and Ben Y. Zhao}, title = {Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {1}, pages = {556--573}, year = {2023}, url = {https://doi.org/10.1109/TMC.2021.3088121}, doi = {10.1109/TMC.2021.3088121}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/XieGHCWZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WengerSZZ23, author = {Emily Wenger and Shawn Shan and Haitao Zheng and Ben Y. Zhao}, title = {SoK: Anti-Facial Recognition Technology}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {864--881}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179445}, doi = {10.1109/SP46215.2023.10179445}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/WengerSZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Yang0SSZ023, author = {Zhuolin Yang and Yuxin Chen and Zain Sarwar and Hadleigh Schwartz and Ben Y. Zhao and Haitao Zheng}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Towards a General Video-based Keystroke Inference Attack}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {141--158}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/yang-zhuolin}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Yang0SSZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShanCW0HZ23, author = {Shawn Shan and Jenna Cryan and Emily Wenger and Haitao Zheng and Rana Hanocka and Ben Y. Zhao}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2187--2204}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/shan}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShanCW0HZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-04222, author = {Shawn Shan and Jenna Cryan and Emily Wenger and Haitao Zheng and Rana Hanocka and Ben Y. Zhao}, title = {{GLAZE:} Protecting Artists from Style Mimicry by Text-to-Image Models}, journal = {CoRR}, volume = {abs/2302.04222}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.04222}, doi = {10.48550/ARXIV.2302.04222}, eprinttype = {arXiv}, eprint = {2302.04222}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-04222.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-10722, author = {Sihui Dai and Wenxin Ding and Arjun Nitin Bhagoji and Daniel Cullina and Ben Y. Zhao and Haitao Zheng and Prateek Mittal}, title = {Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker}, journal = {CoRR}, volume = {abs/2302.10722}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.10722}, doi = {10.48550/ARXIV.2302.10722}, eprinttype = {arXiv}, eprint = {2302.10722}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-10722.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-13828, author = {Shawn Shan and Wenxin Ding and Josephine Passananti and Haitao Zheng and Ben Y. Zhao}, title = {Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models}, journal = {CoRR}, volume = {abs/2310.13828}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.13828}, doi = {10.48550/ARXIV.2310.13828}, eprinttype = {arXiv}, eprint = {2310.13828}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-13828.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-16191, author = {Zhuolin Yang and Zain Sarwar and Iris Hwang and Ronik Bhaskar and Ben Y. Zhao and Haitao Zheng}, title = {Can Virtual Reality Protect Users from Keystroke Inference Attacks?}, journal = {CoRR}, volume = {abs/2310.16191}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.16191}, doi = {10.48550/ARXIV.2310.16191}, eprinttype = {arXiv}, eprint = {2310.16191}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-16191.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-07731, author = {Shawn Shan and Stanley Wu and Haitao Zheng and Ben Y. Zhao}, title = {A Response to Glaze Purification via {IMPRESS}}, journal = {CoRR}, volume = {abs/2312.07731}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.07731}, doi = {10.48550/ARXIV.2312.07731}, eprinttype = {arXiv}, eprint = {2312.07731}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-07731.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShanDW0Z22, author = {Shawn Shan and Wenxin Ding and Emily Wenger and Haitao Zheng and Ben Y. Zhao}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked {DNN} Models}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2611--2625}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560561}, doi = {10.1145/3548606.3560561}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShanDW0Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/CianfaraniBSZZM22, author = {Christian Cianfarani and Arjun Nitin Bhagoji and Vikash Sehwag and Ben Y. Zhao and Heather Zheng and Prateek Mittal}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Understanding Robust Learning through the Lens of Representation Similarities}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/e1fa017a312368906411501bbd27a1d6-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/CianfaraniBSZZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WengerBBPAZZ22, author = {Emily Wenger and Roma Bhattacharjee and Arjun Nitin Bhagoji and Josephine Passananti and Emilio Andere and Heather Zheng and Ben Y. Zhao}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Finding Naturally Occurring Physical Backdoors in Image Datasets}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/8af749935131cc8ea5dae4f6d8cdb304-Abstract-Datasets\_and\_Benchmarks.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WengerBBPAZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiSWZ0Z22, author = {Huiying Li and Shawn Shan and Emily Wenger and Jiayun Zhang and Haitao Zheng and Ben Y. Zhao}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2117--2134}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/li-huiying}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/LiSWZ0Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShanB0Z22, author = {Shawn Shan and Arjun Nitin Bhagoji and Haitao Zheng and Ben Y. Zhao}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3575--3592}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/shan}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShanB0Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-05760, author = {Emily Wenger and Francesca Falzon and Josephine Passananti and Haitao Zheng and Ben Y. Zhao}, title = {Assessing Privacy Risks from Feature Vector Reconstruction Attacks}, journal = {CoRR}, volume = {abs/2202.05760}, year = {2022}, url = {https://arxiv.org/abs/2202.05760}, eprinttype = {arXiv}, eprint = {2202.05760}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-05760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-10686, author = {Shawn Shan and Wenxin Ding and Emily Wenger and Haitao Zheng and Ben Y. Zhao}, title = {Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked {DNN} Models}, journal = {CoRR}, volume = {abs/2205.10686}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.10686}, doi = {10.48550/ARXIV.2205.10686}, eprinttype = {arXiv}, eprint = {2205.10686}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-10686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-04677, author = {Huiying Li and Arjun Nitin Bhagoji and Ben Y. Zhao and Haitao Zheng}, title = {Can Backdoor Attacks Survive Time-Varying Models?}, journal = {CoRR}, volume = {abs/2206.04677}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.04677}, doi = {10.48550/ARXIV.2206.04677}, eprinttype = {arXiv}, eprint = {2206.04677}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-04677.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-09868, author = {Christian Cianfarani and Arjun Nitin Bhagoji and Vikash Sehwag and Ben Y. Zhao and Prateek Mittal}, title = {Understanding Robust Learning through the Lens of Representation Similarities}, journal = {CoRR}, volume = {abs/2206.09868}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.09868}, doi = {10.48550/ARXIV.2206.09868}, eprinttype = {arXiv}, eprint = {2206.09868}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-09868.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-10673, author = {Emily Wenger and Roma Bhattacharjee and Arjun Nitin Bhagoji and Josephine Passananti and Emilio Andere and Haitao Zheng and Ben Y. Zhao}, title = {Natural Backdoor Datasets}, journal = {CoRR}, volume = {abs/2206.10673}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.10673}, doi = {10.48550/ARXIV.2206.10673}, eprinttype = {arXiv}, eprint = {2206.10673}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-10673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-13893, author = {Emily Wenger and Xiuyu Li and Ben Y. Zhao and Vitaly Shmatikov}, title = {Data Isotopes for Data Provenance in DNNs}, journal = {CoRR}, volume = {abs/2208.13893}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.13893}, doi = {10.48550/ARXIV.2208.13893}, eprinttype = {arXiv}, eprint = {2208.13893}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-13893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/YanFLLWZJZ21, author = {Huan Yan and Haohao Fu and Yong Li and Tzu{-}Heng Lin and Gang Wang and Haitao Zheng and Depeng Jin and Ben Y. Zhao}, title = {On Migratory Behavior in Video Consumption}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {2}, pages = {1775--1788}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2020.3043467}, doi = {10.1109/TNSM.2020.3043467}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/YanFLLWZJZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShanB0Z21, author = {Shawn Shan and Arjun Nitin Bhagoji and Haitao Zheng and Ben Y. Zhao}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {Patch-based Defenses against Web Fingerprinting Attacks}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {97--109}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486875}, doi = {10.1145/3474369.3486875}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShanB0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WengerBCCS0Z21, author = {Emily Wenger and Max Bronckers and Christian Cianfarani and Jenna Cryan and Angela Sha and Haitao Zheng and Ben Y. Zhao}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {235--251}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484742}, doi = {10.1145/3460120.3484742}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WengerBCCS0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ChenYA0ZZ21, author = {Yuxin Chen and Zhuolin Yang and Ruben Abbou and Pedro Lopes and Ben Y. Zhao and Haitao Zheng}, editor = {Yoshifumi Kitamura and Aaron Quigley and Katherine Isbister and Takeo Igarashi and Pernille Bj{\o}rn and Steven Mark Drucker}, title = {User Authentication via Electrical Muscle Stimulation}, booktitle = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems, Virtual Event / Yokohama, Japan, May 8-13, 2021}, pages = {6:1--6:15}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3411764.3445441}, doi = {10.1145/3411764.3445441}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/ChenYA0ZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ChenYA0Z021, author = {Yuxin Chen and Zhuolin Yang and Ruben Abbou and Pedro Lopes and Ben Y. Zhao and Haitao Zheng}, editor = {Yoshifumi Kitamura and Aaron Quigley and Katherine Isbister and Takeo Igarashi}, title = {Demonstrating User Authentication via Electrical Muscle Stimulation}, booktitle = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems, Virtual Event / Yokohama Japan, May 8-13, 2021, Extended Abstracts}, pages = {191:1--191:5}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3411763.3451563}, doi = {10.1145/3411763.3451563}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/ChenYA0Z021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/WengerPBY0Z21, author = {Emily Wenger and Josephine Passananti and Arjun Nitin Bhagoji and Yuanshun Yao and Haitao Zheng and Ben Y. Zhao}, title = {Backdoor Attacks Against Deep Learning Systems in the Physical World}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {6206--6215}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Wenger\_Backdoor\_Attacks\_Against\_Deep\_Learning\_Systems\_in\_the\_Physical\_World\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.00614}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/WengerPBY0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeesec/XiaoXZZJ21, author = {Zhujun Xiao and Zhengxu Xia and Haitao Zheng and Ben Y. Zhao and Junchen Jiang}, title = {Towards Performance Clarity of Edge Video Analytics}, booktitle = {6th {IEEE/ACM} Symposium on Edge Computing, {SEC} 2021, San Jose, CA, USA, December 14-17, 2021}, pages = {148--164}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1145/3453142.3491272}, doi = {10.1145/3453142.3491272}, timestamp = {Tue, 22 Feb 2022 17:23:29 +0100}, biburl = {https://dblp.org/rec/conf/ieeesec/XiaoXZZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-04291, author = {Shawn Shan and Arjun Nitin Bhagoji and Haitao Zheng and Ben Y. Zhao}, title = {A Real-time Defense against Website Fingerprinting Attacks}, journal = {CoRR}, volume = {abs/2102.04291}, year = {2021}, url = {https://arxiv.org/abs/2102.04291}, eprinttype = {arXiv}, eprint = {2102.04291}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-04291.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-08694, author = {Zhujun Xiao and Zhengxu Xia and Haitao Zheng and Ben Y. Zhao and Junchen Jiang}, title = {Towards Performance Clarity of Edge Video Analytics}, journal = {CoRR}, volume = {abs/2105.08694}, year = {2021}, url = {https://arxiv.org/abs/2105.08694}, eprinttype = {arXiv}, eprint = {2105.08694}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-08694.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-09598, author = {Emily Wenger and Max Bronckers and Christian Cianfarani and Jenna Cryan and Angela Sha and Haitao Zheng and Ben Y. Zhao}, title = {"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World}, journal = {CoRR}, volume = {abs/2109.09598}, year = {2021}, url = {https://arxiv.org/abs/2109.09598}, eprinttype = {arXiv}, eprint = {2109.09598}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-09598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-06904, author = {Shawn Shan and Arjun Nitin Bhagoji and Haitao Zheng and Ben Y. Zhao}, title = {Traceback of Data Poisoning Attacks in Neural Networks}, journal = {CoRR}, volume = {abs/2110.06904}, year = {2021}, url = {https://arxiv.org/abs/2110.06904}, eprinttype = {arXiv}, eprint = {2110.06904}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-06904.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-04558, author = {Emily Wenger and Shawn Shan and Haitao Zheng and Ben Y. Zhao}, title = {SoK: Anti-Facial Recognition Technology}, journal = {CoRR}, volume = {abs/2112.04558}, year = {2021}, url = {https://arxiv.org/abs/2112.04558}, eprinttype = {arXiv}, eprint = {2112.04558}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-04558.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShanWW00Z20, author = {Shawn Shan and Emily Wenger and Bolun Wang and Bo Li and Haitao Zheng and Ben Y. Zhao}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {67--83}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417231}, doi = {10.1145/3372297.3417231}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShanWW00Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ChenLTNLLZ020, author = {Yuxin Chen and Huiying Li and Shan{-}Yuan Teng and Steven Nagels and Zhijing Li and Pedro Lopes and Ben Y. Zhao and Haitao Zheng}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Wearable Microphone Jamming}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376304}, doi = {10.1145/3313831.3376304}, timestamp = {Wed, 12 Jun 2024 07:39:18 +0200}, biburl = {https://dblp.org/rec/conf/chi/ChenLTNLLZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ChenLTNLLZZ20, author = {Yuxin Chen and Huiying Li and Shan{-}Yuan Teng and Steven Nagels and Zhijing Li and Pedro Lopes and Haitao Zheng and Ben Y. Zhao}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Demonstrating Wearable Microphone Jamming}, booktitle = {Extended Abstracts of the 2020 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2020, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--4}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3334480.3383171}, doi = {10.1145/3334480.3383171}, timestamp = {Wed, 12 Jun 2024 07:39:18 +0200}, biburl = {https://dblp.org/rec/conf/chi/ChenLTNLLZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/CryanTZMZZ20, author = {Jenna Cryan and Shiliang Tang and Xinyi Zhang and Miriam J. Metzger and Haitao Zheng and Ben Y. Zhao}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--11}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376488}, doi = {10.1145/3313831.3376488}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/CryanTZMZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/XieG0X0Z20, author = {Qinge Xie and Tiancheng Guo and Yang Chen and Yu Xiao and Xin Wang and Ben Y. Zhao}, editor = {Mathieu d'Aquin and Stefan Dietze and Claudia Hauff and Edward Curry and Philippe Cudr{\'{e}}{-}Mauroux}, title = {Deep Graph Convolutional Networks for Incident-Driven Traffic Speed Prediction}, booktitle = {{CIKM} '20: The 29th {ACM} International Conference on Information and Knowledge Management, Virtual Event, Ireland, October 19-23, 2020}, pages = {1665--1674}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3340531.3411873}, doi = {10.1145/3340531.3411873}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/XieG0X0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhuXCLLZZ20, author = {Yanzi Zhu and Zhujun Xiao and Yuxin Chen and Zhijing Li and Max Liu and Ben Y. Zhao and Heather Zheng}, title = {Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/et-tu-alexa-when-commodity-wifi-devices-turn-into-adversarial-motion-sensors/}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZhuXCLLZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShanWZLZZ20, author = {Shawn Shan and Emily Wenger and Jiayun Zhang and Huiying Li and Haitao Zheng and Ben Y. Zhao}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Fawkes: Protecting Privacy against Unauthorized Deep Learning Models}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1589--1604}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/shan}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShanWZLZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hotnets/2020, editor = {Ben Y. Zhao and Heather Zheng and Harsha V. Madhyastha and Venkat N. Padmanabhan}, title = {HotNets '20: The 19th {ACM} Workshop on Hot Topics in Networks, Virtual Event, USA, November 4-6, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3422604}, doi = {10.1145/3422604}, isbn = {978-1-4503-8145-1}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotnets/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-08327, author = {Shawn Shan and Emily Wenger and Jiayun Zhang and Huiying Li and Haitao Zheng and Ben Y. Zhao}, title = {Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models}, journal = {CoRR}, volume = {abs/2002.08327}, year = {2020}, url = {https://arxiv.org/abs/2002.08327}, eprinttype = {arXiv}, eprint = {2002.08327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-08327.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14042, author = {Huiying Li and Shawn Shan and Emily Wenger and Jiayun Zhang and Haitao Zheng and Ben Y. Zhao}, title = {Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks}, journal = {CoRR}, volume = {abs/2006.14042}, year = {2020}, url = {https://arxiv.org/abs/2006.14042}, eprinttype = {arXiv}, eprint = {2006.14042}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14580, author = {Emily Wenger and Josephine Passananti and Yuanshun Yao and Haitao Zheng and Ben Y. Zhao}, title = {Backdoor Attacks on Facial Recognition in the Physical World}, journal = {CoRR}, volume = {abs/2006.14580}, year = {2020}, url = {https://arxiv.org/abs/2006.14580}, eprinttype = {arXiv}, eprint = {2006.14580}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14580.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoLZZ19, author = {Yuanshun Yao and Huiying Li and Haitao Zheng and Ben Y. Zhao}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Latent Backdoor Attacks on Deep Neural Networks}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2041--2055}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354209}, doi = {10.1145/3319535.3354209}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YaoLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/TangWZWMZZ19, author = {Shiliang Tang and Ziming Wu and Xinyi Zhang and Gang Wang and Xiaojuan Ma and Haitao Zheng and Ben Y. Zhao}, editor = {Tung Bui}, title = {Towards Understanding the Adoption and Social Experience of Digital Wallet Systems}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/59946}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/TangWZWMZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/LiXWZZ19, author = {Zhijing Li and Zhujun Xiao and Bolun Wang and Ben Y. Zhao and Haitao Zheng}, title = {Scaling Deep Learning Models for Spectrum Anomaly Detection}, booktitle = {Proceedings of the Twentieth {ACM} International Symposium on Mobile Ad Hoc Networking and Computing, Mobihoc 2019, Catania, Italy, July 2-5, 2019}, pages = {291--300}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3323679.3326527}, doi = {10.1145/3323679.3326527}, timestamp = {Tue, 18 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/LiXWZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/TianZZLYWWJSZYT19, author = {Bingchuan Tian and Xinyi Zhang and Ennan Zhai and Hongqiang Harry Liu and Qiaobo Ye and Chunsheng Wang and Xin Wu and Zhiming Ji and Yihong Sang and Ming Zhang and Da Yu and Chen Tian and Haitao Zheng and Ben Y. Zhao}, editor = {Jianping Wu and Wendy Hall}, title = {Safely and automatically updating in-network {ACL} configurations with intent language}, booktitle = {Proceedings of the {ACM} Special Interest Group on Data Communication, {SIGCOMM} 2019, Beijing, China, August 19-23, 2019}, pages = {214--226}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3341302.3342088}, doi = {10.1145/3341302.3342088}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/TianZZLYWWJSZYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangYSLVZZ19, author = {Bolun Wang and Yuanshun Yao and Shawn Shan and Huiying Li and Bimal Viswanath and Haitao Zheng and Ben Y. Zhao}, title = {Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {707--723}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00031}, doi = {10.1109/SP.2019.00031}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/WangYSLVZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-08490, author = {Yuxin Chen and Huiying Li and Steven Nagels and Zhijing Li and Pedro Lopes and Ben Y. Zhao and Haitao Zheng}, title = {Understanding the Effectiveness of Ultrasonic Microphone Jammer}, journal = {CoRR}, volume = {abs/1904.08490}, year = {2019}, url = {http://arxiv.org/abs/1904.08490}, eprinttype = {arXiv}, eprint = {1904.08490}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-08490.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-08554, author = {Shawn Shan and Emily Willson and Bolun Wang and Bo Li and Haitao Zheng and Ben Y. Zhao}, title = {Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks}, journal = {CoRR}, volume = {abs/1904.08554}, year = {2019}, url = {http://arxiv.org/abs/1904.08554}, eprinttype = {arXiv}, eprint = {1904.08554}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-08554.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-10447, author = {Yuanshun Yao and Huiying Li and Haitao Zheng and Ben Y. Zhao}, title = {Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks}, journal = {CoRR}, volume = {abs/1905.10447}, year = {2019}, url = {http://arxiv.org/abs/1905.10447}, eprinttype = {arXiv}, eprint = {1905.10447}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-10447.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-01226, author = {Huiying Li and Emily Willson and Haitao Zheng and Ben Y. Zhao}, title = {Persistent and Unforgeable Watermarks for Deep Neural Networks}, journal = {CoRR}, volume = {abs/1910.01226}, year = {2019}, url = {http://arxiv.org/abs/1910.01226}, eprinttype = {arXiv}, eprint = {1910.01226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-01226.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-01242, author = {Qinge Xie and Tiancheng Guo and Yang Chen and Yu Xiao and Xin Wang and Ben Y. Zhao}, title = {"How do urban incidents affect traffic speed?" {A} Deep Graph Convolutional Network for Incident-driven Traffic Speed Prediction}, journal = {CoRR}, volume = {abs/1912.01242}, year = {2019}, url = {http://arxiv.org/abs/1912.01242}, eprinttype = {arXiv}, eprint = {1912.01242}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-01242.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-01328, author = {Qinge Xie and Qingyuan Gong and Xinlei He and Yang Chen and Xin Wang and Haitao Zheng and Ben Y. Zhao}, title = {Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions}, journal = {CoRR}, volume = {abs/1912.01328}, year = {2019}, url = {http://arxiv.org/abs/1912.01328}, eprinttype = {arXiv}, eprint = {1912.01328}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-01328.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmc/MetzgerWZ18, author = {Miriam J. Metzger and Christo Wilson and Ben Y. Zhao}, title = {Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites}, journal = {J. Comput. Mediat. Commun.}, volume = {23}, number = {2}, pages = {72--89}, year = {2018}, url = {https://doi.org/10.1093/jcmc/zmx004}, doi = {10.1093/JCMC/ZMX004}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmc/MetzgerWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/XuZCH0YZM18, author = {Fengli Xu and Guozhen Zhang and Zhilong Chen and Jiaxin Huang and Yong Li and Diyi Yang and Ben Y. Zhao and Fanchao Meng}, title = {Understanding Motivations behind Inaccurate Check-ins}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {2}, number = {{CSCW}}, pages = {188:1--188:22}, year = {2018}, url = {https://doi.org/10.1145/3274457}, doi = {10.1145/3274457}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/XuZCH0YZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangWWNZZ18, author = {Gang Wang and Bolun Wang and Tianyi Wang and Ana Nika and Haitao Zheng and Ben Y. Zhao}, title = {Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {26}, number = {3}, pages = {1123--1136}, year = {2018}, url = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2818073}, doi = {10.1109/TNET.2018.2818073}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/WangWWNZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ht/Zhao18, author = {Ben Y. Zhao}, editor = {Dongwon Lee and Nishanth Sastry and Ingmar Weber}, title = {Insecure Machine Learning Systems and Their Impact on the Web}, booktitle = {Proceedings of the 29th on Hypertext and Social Media, {HT} 2018, Baltimore, MD, USA, July 09-12, 2018}, pages = {63}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3209542.3209544}, doi = {10.1145/3209542.3209544}, timestamp = {Thu, 21 Jan 2021 17:36:52 +0100}, biburl = {https://dblp.org/rec/conf/ht/Zhao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ht/ZhangSTZZ18, author = {Xinyi Zhang and Shawn Shan and Shiliang Tang and Haitao Zheng and Ben Y. Zhao}, editor = {Dongwon Lee and Nishanth Sastry and Ingmar Weber}, title = {Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash}, booktitle = {Proceedings of the 29th on Hypertext and Social Media, {HT} 2018, Baltimore, MD, USA, July 09-12, 2018}, pages = {123--127}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3209542.3209576}, doi = {10.1145/3209542.3209576}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ht/ZhangSTZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/YangZGZD18, author = {Zhi Yang and Yusi Zhang and Binghui Guo and Ben Y. Zhao and Yafei Dai}, title = {DeepCredit: Exploiting User Cickstream for Loan Risk Prediction in {P2P} Lending}, booktitle = {Proceedings of the Twelfth International Conference on Web and Social Media, {ICWSM} 2018, Stanford, California, USA, June 25-28, 2018}, pages = {444--453}, publisher = {{AAAI} Press}, year = {2018}, url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM18/paper/view/17808}, timestamp = {Fri, 05 Feb 2021 11:07:47 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/YangZGZD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LiGMWZZEO18, author = {Zhijing Li and Zihui Ge and Ajay Mahimkar and Jia Wang and Ben Y. Zhao and Haitao Zheng and Joanne Emmons and Laura Ogden}, title = {Predictive Analysis in Network Function Virtualization}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {161--167}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278547}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/LiGMWZZEO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangYVZZ18, author = {Bolun Wang and Yuanshun Yao and Bimal Viswanath and Haitao Zheng and Ben Y. Zhao}, editor = {William Enck and Adrienne Porter Felt}, title = {With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1281--1297}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/wang-bolun}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangYVZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/LiXZPZZ18, author = {Zhijing Li and Zhujun Xiao and Yanzi Zhu and Irene Pattarachanyakul and Ben Y. Zhao and Haitao Zheng}, editor = {Minkyong Kim and Aruna Balasubramanian}, title = {Adversarial Localization against Wireless Cameras}, booktitle = {Proceedings of the 19th International Workshop on Mobile Computing Systems {\&} Applications, HotMobile 2018, Tempe, AZ, USA, February 12-13, 2018}, pages = {87--92}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3177102.3177106}, doi = {10.1145/3177102.3177106}, timestamp = {Tue, 18 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wmcsa/LiXZPZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-10242, author = {Zhujun Xiao and Yanzi Zhu and Yuxin Chen and Ben Y. Zhao and Junchen Jiang and Haitao Zheng}, title = {Seeding Deep Learning using Wireless Localization}, journal = {CoRR}, volume = {abs/1809.10242}, year = {2018}, url = {http://arxiv.org/abs/1809.10242}, eprinttype = {arXiv}, eprint = {1809.10242}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-10242.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-10109, author = {Yanzi Zhu and Zhujun Xiao and Yuxin Chen and Zhijing Li and Max Liu and Ben Y. Zhao and Haitao Zheng}, title = {Adversarial WiFi Sensing}, journal = {CoRR}, volume = {abs/1810.10109}, year = {2018}, url = {http://arxiv.org/abs/1810.10109}, eprinttype = {arXiv}, eprint = {1810.10109}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-10109.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-10157, author = {Yanzi Zhu and Ying Ju and Bolun Wang and Jenna Cryan and Ben Y. Zhao and Haitao Zheng}, title = {Wireless Side-Lobe Eavesdropping Attacks}, journal = {CoRR}, volume = {abs/1810.10157}, year = {2018}, url = {http://arxiv.org/abs/1810.10157}, eprinttype = {arXiv}, eprint = {1810.10157}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-10157.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/TangZCMZZ17, author = {Shiliang Tang and Xinyi Zhang and Jenna Cryan and Miriam J. Metzger and Haitao Zheng and Ben Y. Zhao}, title = {Gender Bias in the Job Market: {A} Longitudinal Analysis}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {1}, number = {{CSCW}}, pages = {99:1--99:19}, year = {2017}, url = {https://doi.org/10.1145/3134734}, doi = {10.1145/3134734}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/TangZCMZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tccn/NikaZZZ17, author = {Ana Nika and Zengbin Zhang and Ben Y. Zhao and Haitao Zheng}, title = {Toward Practical Spectrum Permits}, journal = {{IEEE} Trans. Cogn. Commun. Netw.}, volume = {3}, number = {1}, pages = {112--122}, year = {2017}, url = {https://doi.org/10.1109/TCCN.2017.2656127}, doi = {10.1109/TCCN.2017.2656127}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tccn/NikaZZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/WangWWSZLZZ17, author = {Tianyi Wang and Gang Wang and Bolun Wang and Divya Sambasivan and Zengbin Zhang and Xing Li and Haitao Zheng and Ben Y. Zhao}, title = {Value and Misinformation in Collaborative Investing Platforms}, journal = {{ACM} Trans. Web}, volume = {11}, number = {2}, pages = {8:1--8:32}, year = {2017}, url = {https://doi.org/10.1145/3027487}, doi = {10.1145/3027487}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tweb/WangWWSZLZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/WangZTWZZ17, author = {Gang Wang and Xinyi Zhang and Shiliang Tang and Christo Wilson and Haitao Zheng and Ben Y. Zhao}, title = {Clickstream User Behavior Models}, journal = {{ACM} Trans. Web}, volume = {11}, number = {4}, pages = {21:1--21:37}, year = {2017}, url = {https://doi.org/10.1145/3068332}, doi = {10.1145/3068332}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/WangZTWZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoVCZZ17, author = {Yuanshun Yao and Bimal Viswanath and Jenna Cryan and Haitao Zheng and Ben Y. Zhao}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Automated Crowdturfing Attacks and Defenses in Online Review Systems}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1143--1158}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133990}, doi = {10.1145/3133956.3133990}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YaoVCZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/YanLWLZJZ17, author = {Huan Yan and Tzu{-}Heng Lin and Gang Wang and Yong Li and Haitao Zheng and Depeng Jin and Ben Y. Zhao}, editor = {Ee{-}Peng Lim and Marianne Winslett and Mark Sanderson and Ada Wai{-}Chee Fu and Jimeng Sun and J. Shane Culpepper and Eric Lo and Joyce C. Ho and Debora Donato and Rakesh Agrawal and Yu Zheng and Carlos Castillo and Aixin Sun and Vincent S. Tseng and Chenliang Li}, title = {On Migratory Behavior in Video Consumption}, booktitle = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge Management, {CIKM} 2017, Singapore, November 06 - 10, 2017}, pages = {1109--1118}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3132847.3132884}, doi = {10.1145/3132847.3132884}, timestamp = {Tue, 29 Aug 2023 16:24:43 +0200}, biburl = {https://dblp.org/rec/conf/cikm/YanLWLZJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/TangLMCJZZ17, author = {Shiliang Tang and Qingyun Liu and Megan McQueen and Scott Counts and Apurv Jain and Haitao Zheng and Ben Y. Zhao}, title = {Echo Chambers in Investment Discussion Boards}, booktitle = {Proceedings of the Eleventh International Conference on Web and Social Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 15-18, 2017}, pages = {240--249}, publisher = {{AAAI} Press}, year = {2017}, url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15596}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/TangLMCJZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/ZhangTZWZZ17, author = {Xinyi Zhang and Shiliang Tang and Yun Zhao and Gang Wang and Haitao Zheng and Ben Y. Zhao}, title = {Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System}, booktitle = {Proceedings of the Eleventh International Conference on Web and Social Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 15-18, 2017}, pages = {387--396}, publisher = {{AAAI} Press}, year = {2017}, url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15589}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/ZhangTZWZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/YanLW0ZJZ17, author = {Huan Yan and Tzu{-}Heng Lin and Gang Wang and Yong Li and Haitao Zheng and Depeng Jin and Ben Y. Zhao}, title = {A First Look at User Switching Behaviors Over Multiple Video Content Providers}, booktitle = {Proceedings of the Eleventh International Conference on Web and Social Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 15-18, 2017}, pages = {700--703}, publisher = {{AAAI} Press}, year = {2017}, url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15646}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/YanLW0ZJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/YaoXWVZZ17, author = {Yuanshun Yao and Zhujun Xiao and Bolun Wang and Bimal Viswanath and Haitao Zheng and Ben Y. Zhao}, editor = {Steve Uhlig and Olaf Maennel}, title = {Complexity vs. performance: empirical analysis of machine learning as a service}, booktitle = {Proceedings of the 2017 Internet Measurement Conference, {IMC} 2017, London, United Kingdom, November 1-3, 2017}, pages = {384--397}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3131365.3131372}, doi = {10.1145/3131365.3131372}, timestamp = {Fri, 25 Oct 2019 09:51:18 +0200}, biburl = {https://dblp.org/rec/conf/imc/YaoXWVZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/ZhuYZZ17, author = {Yanzi Zhu and Yuanshun Yao and Ben Y. Zhao and Haitao Zheng}, editor = {Tanzeem Choudhury and Steven Y. Ko and Andrew Campbell and Deepak Ganesan}, title = {Object Recognition and Navigation using a Single Networking Device}, booktitle = {Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys'17, Niagara Falls, NY, USA, June 19-23, 2017}, pages = {265--277}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3081333.3081339}, doi = {10.1145/3081333.3081339}, timestamp = {Fri, 10 Dec 2021 17:15:01 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/ZhuYZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NekrasovIMZB17, author = {Michael Nekrasov and Daniel Iland and Miriam J. Metzger and Ben Y. Zhao and Elizabeth M. Belding}, editor = {Jon Penney and Nicholas Weaver}, title = {SecurePost: Verified Group-Anonymity on Social Media}, booktitle = {7th {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} 2017, Vancouver, BC, Canada, August 14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/foci17/workshop-program/presentation/nekrasov}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/NekrasovIMZB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiNZZYZZ17, author = {Zhijing Li and Ana Nika and Xinyi Zhang and Yanzi Zhu and Yuanshun Yao and Ben Y. Zhao and Haitao Zheng}, editor = {Rick Barrett and Rick Cummings and Eugene Agichtein and Evgeniy Gabrilovich}, title = {Identifying Value in Crowdsourced Wireless Signal Measurements}, booktitle = {Proceedings of the 26th International Conference on World Wide Web, {WWW} 2017, Perth, Australia, April 3-7, 2017}, pages = {607--616}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3038912.3052563}, doi = {10.1145/3038912.3052563}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/LiNZZYZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-08151, author = {Yuanshun Yao and Bimal Viswanath and Jenna Cryan and Haitao Zheng and Ben Y. Zhao}, title = {Automated Crowdturfing Attacks and Defenses in Online Review Systems}, journal = {CoRR}, volume = {abs/1708.08151}, year = {2017}, url = {http://arxiv.org/abs/1708.08151}, eprinttype = {arXiv}, eprint = {1708.08151}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-08151.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangCWWWLZZ16, author = {Tianyi Wang and Yang Chen and Yi Wang and Bolun Wang and Gang Wang and Xing Li and Haitao Zheng and Ben Y. Zhao}, title = {The power of comments: fostering social interactions in microblog networks}, journal = {Frontiers Comput. Sci.}, volume = {10}, number = {5}, pages = {889--907}, year = {2016}, url = {https://doi.org/10.1007/s11704-016-5198-y}, doi = {10.1007/S11704-016-5198-Y}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/WangCWWWLZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/NikaIZG0Z16, author = {Ana Nika and Asad Ismail and Ben Y. Zhao and Sabrina Gaito and Gian Paolo Rossi and Haitao Zheng}, title = {Understanding and Predicting Data Hotspots in Cellular Networks}, journal = {Mob. Networks Appl.}, volume = {21}, number = {3}, pages = {402--413}, year = {2016}, url = {https://doi.org/10.1007/s11036-015-0648-6}, doi = {10.1007/S11036-015-0648-6}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/NikaIZG0Z16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tompecs/LiuZWWZZ16, author = {Qingyun Liu and Xiaohan Zhao and Walter Willinger and Xiao Wang and Ben Y. Zhao and Haitao Zheng}, title = {Self-Similarity in Social Network Dynamics}, journal = {{ACM} Trans. Model. Perform. Evaluation Comput. Syst.}, volume = {2}, number = {1}, pages = {5:1--5:26}, year = {2016}, url = {https://doi.org/10.1145/2994142}, doi = {10.1145/2994142}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tompecs/LiuZWWZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WangZTZZ16, author = {Gang Wang and Xinyi Zhang and Shiliang Tang and Haitao Zheng and Ben Y. Zhao}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Unsupervised Clickstream Clustering for User Behavior Analysis}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {225--236}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858107}, doi = {10.1145/2858036.2858107}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WangZTZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/ZhuZNZZ16, author = {Yanzi Zhu and Yibo Zhu and Ana Nika and Ben Y. Zhao and Haitao Zheng}, editor = {Bryan Ford and Alex C. Snoeren and Ellen W. Zegura}, title = {Trimming the Smartphone Network Stack}, booktitle = {Proceedings of the 15th {ACM} Workshop on Hot Topics in Networks, HotNets 2016, Atlanta, GA, USA, November 9-10, 2016}, pages = {176--182}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3005745.3005759}, doi = {10.1145/3005745.3005759}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotnets/ZhuZNZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/WangSZZ16, author = {Gang Wang and Sarita Yardi Schoenebeck and Haitao Zheng and Ben Y. Zhao}, title = {"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks}, booktitle = {Proceedings of the Tenth International Conference on Web and Social Media, Cologne, Germany, May 17-20, 2016}, pages = {417--426}, publisher = {{AAAI} Press}, year = {2016}, url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13027}, timestamp = {Fri, 05 Feb 2021 11:07:46 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/WangSZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/LiuTZZZZ16, author = {Qingyun Liu and Shiliang Tang and Xinyi Zhang and Xiaohan Zhao and Ben Y. Zhao and Haitao Zheng}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {Network Growth and Link Prediction Through an Empirical Lens}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {1--15}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987452}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/LiuTZZZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/WangZWZZ16, author = {Bolun Wang and Xinyi Zhang and Gang Wang and Haitao Zheng and Ben Y. Zhao}, editor = {Phillipa Gill and John S. Heidemann and John W. Byers and Ramesh Govindan}, title = {Anatomy of a Personalized Livestreaming System}, booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference, {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016}, pages = {485--498}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2987453}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/WangZWZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/WuLTHZLZJ16, author = {Guangyuan Wu and Fangming Liu and Haowen Tang and Keke Huang and Qixia Zhang and Zhenhua Li and Ben Y. Zhao and Hai Jin}, title = {On the performance of cloud storage applications with global measurement}, booktitle = {24th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2016, Beijing, China, June 20-21, 2016}, pages = {1--10}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IWQoS.2016.7590449}, doi = {10.1109/IWQOS.2016.7590449}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/WuLTHZLZJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/WangWWNZZ16a, author = {Gang Wang and Bolun Wang and Tianyi Wang and Ana Nika and Haitao Zheng and Ben Y. Zhao}, editor = {Rajesh Krishna Balan and Archan Misra and Landon P. Cox and Yutaka Arakawa and Xia Zhou and Robert LiKamWa}, title = {Poster: Defending against Sybil Devices in Crowdsourced Mapping Services}, booktitle = {Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion, Singapore, Singapore, June 25-30, 2016}, pages = {146}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2938559.2938610}, doi = {10.1145/2938559.2938610}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/WangWWNZZ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/WangWWNZZ16, author = {Gang Wang and Bolun Wang and Tianyi Wang and Ana Nika and Haitao Zheng and Ben Y. Zhao}, editor = {Rajesh Krishna Balan and Archan Misra and Sharad Agarwal and Cecilia Mascolo}, title = {Defending against Sybil Devices in Crowdsourced Mapping Services}, booktitle = {Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, June 26-30, 2016}, pages = {179--191}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2906388.2906420}, doi = {10.1145/2906388.2906420}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/WangWWNZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/LiWXZLLWZ16, author = {Zhenhua Li and Weiwei Wang and Tianyin Xu and Xin Zhong and Xiang{-}Yang Li and Yunhao Liu and Christo Wilson and Ben Y. Zhao}, editor = {Katerina J. Argyraki and Rebecca Isaacs}, title = {Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard}, booktitle = {13th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2016, Santa Clara, CA, USA, March 16-18, 2016}, pages = {61--76}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/li-zhenhua}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/LiWXZLLWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/NikaLZZZZZ16, author = {Ana Nika and Zhijing Li and Yanzi Zhu and Yibo Zhu and Ben Y. Zhao and Xia Zhou and Haitao Zheng}, editor = {Philip Alexander Levis and Steve Eglash and Lama Nachman and Anthony Rowe}, title = {Empirical Validation of Commodity Spectrum Monitoring}, booktitle = {Proceedings of the 14th {ACM} Conference on Embedded Network Sensor Systems, SenSys 2016, Stanford, CA, USA, November 14-16, 2016}, pages = {96--108}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994551.2994557}, doi = {10.1145/2994551.2994557}, timestamp = {Tue, 23 May 2023 07:16:12 +0200}, biburl = {https://dblp.org/rec/conf/sensys/NikaLZZZZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/www/2016, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11 - 15, 2016}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2872427}, isbn = {978-1-4503-4143-1}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/www/2016c, editor = {Jacqueline Bourdeau and Jim Hendler and Roger Nkambou and Ian Horrocks and Ben Y. Zhao}, title = {Proceedings of the 25th International Conference on World Wide Web, {WWW} 2016, Montreal, Canada, April 11-15, 2016, Companion Volume}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2872518}, isbn = {978-1-4503-4144-8}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/2016c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ZhouZWYZZ15, author = {Xia Zhou and Zengbin Zhang and Gang Wang and Xiaoxiao Yu and Ben Y. Zhao and Haitao Zheng}, title = {Practical Conflict Graphs in the Wild}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {23}, number = {3}, pages = {824--835}, year = {2015}, url = {https://doi.org/10.1109/TNET.2014.2306416}, doi = {10.1109/TNET.2014.2306416}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ZhouZWYZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosn/ZhaoLZZ15, author = {Xiaohan Zhao and Qingyun Liu and Haitao Zheng and Ben Y. Zhao}, editor = {Aneesh Sharma and Rakesh Agrawal and Matthias Grossglauser}, title = {Towards Graph Watermarks}, booktitle = {Proceedings of the 2015 {ACM} on Conference on Online Social Networks, {COSN} 2015, Palo Alto, California, USA, November 2-3, 2015}, pages = {101--112}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2817946.2817956}, doi = {10.1145/2817946.2817956}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosn/ZhaoLZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosn/YangXWZD15, author = {Zhi Yang and Jilong Xue and Christo Wilson and Ben Y. Zhao and Yafei Dai}, editor = {Aneesh Sharma and Rakesh Agrawal and Matthias Grossglauser}, title = {Process-driven Analysis of Dynamics in Online Social Interactions}, booktitle = {Proceedings of the 2015 {ACM} on Conference on Online Social Networks, {COSN} 2015, Palo Alto, California, USA, November 2-3, 2015}, pages = {139--149}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2817946.2817952}, doi = {10.1145/2817946.2817952}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosn/YangXWZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/WangWWSZZZ15, author = {Gang Wang and Tianyi Wang and Bolun Wang and Divya Sambasivan and Zengbin Zhang and Haitao Zheng and Ben Y. Zhao}, editor = {Dan Cosley and Andrea Forte and Luigina Ciolfi and David McDonald}, title = {Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer Supported Cooperative Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada, March 14 - 18, 2015}, pages = {17--30}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2675133.2675144}, doi = {10.1145/2675133.2675144}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscw/WangWWSZZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/YangXWZD15, author = {Zhi Yang and Jilong Xue and Christo Wilson and Ben Y. Zhao and Yafei Dai}, editor = {Meeyoung Cha and Cecilia Mascolo and Christian Sandvig}, title = {Uncovering User Interaction Dynamics in Online Social Networks}, booktitle = {Proceedings of the Ninth International Conference on Web and Social Media, {ICWSM} 2015, University of Oxford, Oxford, UK, May 26-29, 2015}, pages = {698--701}, publisher = {{AAAI} Press}, year = {2015}, url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10536}, timestamp = {Fri, 05 Feb 2021 11:07:20 +0100}, biburl = {https://dblp.org/rec/conf/icwsm/YangXWZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/ZhuZZZ15, author = {Yanzi Zhu and Yibo Zhu and Ben Y. Zhao and Haitao Zheng}, editor = {Serge Fdida and Giovanni Pau and Sneha Kumar Kasera and Heather Zheng}, title = {Reusing 60GHz Radios for Mobile Radar Imaging}, booktitle = {Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom 2015, Paris, France, September 7-11, 2015}, pages = {103--116}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2789168.2790112}, doi = {10.1145/2789168.2790112}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/ZhuZZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ZhuKCGLMMYZZZ15, author = {Yibo Zhu and Nanxi Kang and Jiaxin Cao and Albert G. Greenberg and Guohan Lu and Ratul Mahajan and David A. Maltz and Lihua Yuan and Ming Zhang and Ben Y. Zhao and Haitao Zheng}, editor = {Steve Uhlig and Olaf Maennel and Brad Karp and Jitendra Padhye}, title = {Packet-Level Telemetry in Large Datacenter Networks}, booktitle = {Proceedings of the 2015 {ACM} Conference on Special Interest Group on Data Communication, {SIGCOMM} 2015, London, United Kingdom, August 17-21, 2015}, pages = {479--491}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2785956.2787483}, doi = {10.1145/2785956.2787483}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/ZhuKCGLMMYZZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/ZhuZZZZ15, author = {Yibo Zhu and Yanzi Zhu and Zengbin Zhang and Ben Y. Zhao and Haitao Zheng}, editor = {Justin Manweiler and Romit Roy Choudhury}, title = {60GHz Mobile Imaging Radar}, booktitle = {Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, HotMobile 2015, Santa Fe, NM, USA, February 12-13, 2015}, pages = {75--80}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699343.2699363}, doi = {10.1145/2699343.2699363}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wmcsa/ZhuZZZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/NikaZDJHZZZ15, author = {Ana Nika and Yibo Zhu and Ning Ding and Abhilash Jindal and Y. Charlie Hu and Xia Zhou and Ben Y. Zhao and Haitao Zheng}, editor = {Aldo Gangemi and Stefano Leonardi and Alessandro Panconesi}, title = {Energy and Performance of Smartphone Radio Bundling in Outdoor Environments}, booktitle = {Proceedings of the 24th International Conference on World Wide Web, {WWW} 2015, Florence, Italy, May 18-22, 2015}, pages = {809--819}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2736277.2741635}, doi = {10.1145/2736277.2741635}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/NikaZDJHZZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhaoLZZZ15, author = {Xiaohan Zhao and Qingyun Liu and Lin Zhou and Haitao Zheng and Ben Y. Zhao}, title = {Graph Watermarks}, journal = {CoRR}, volume = {abs/1506.00022}, year = {2015}, url = {http://arxiv.org/abs/1506.00022}, eprinttype = {arXiv}, eprint = {1506.00022}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhaoLZZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangWWNLZZ15, author = {Gang Wang and Bolun Wang and Tianyi Wang and Ana Nika and Bingzhe Liu and Haitao Zheng and Ben Y. Zhao}, title = {Attacks and Defenses in Crowdsourced Mapping Services}, journal = {CoRR}, volume = {abs/1508.00837}, year = {2015}, url = {http://arxiv.org/abs/1508.00837}, eprinttype = {arXiv}, eprint = {1508.00837}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/WangWWNLZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkdd/YangWWGZD14, author = {Zhi Yang and Christo Wilson and Xiao Wang and Tingting Gao and Ben Y. Zhao and Yafei Dai}, title = {Uncovering social network Sybils in the wild}, journal = {{ACM} Trans. Knowl. Discov. Data}, volume = {8}, number = {1}, pages = {2:1--2:29}, year = {2014}, url = {https://doi.org/10.1145/2556609}, doi = {10.1145/2556609}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkdd/YangWWGZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/PuttaswamyWSAAKZ14, author = {Krishna P. N. Puttaswamy and Shiyuan Wang and Troy Steinbauer and Divyakant Agrawal and Amr El Abbadi and Christopher Kruegel and Ben Y. Zhao}, title = {Preserving Location Privacy in Geosocial Applications}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {13}, number = {1}, pages = {159--173}, year = {2014}, url = {https://doi.org/10.1109/TMC.2012.247}, doi = {10.1109/TMC.2012.247}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/PuttaswamyWSAAKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwsm/ZignaniGRZZZ14, author = {Matteo Zignani and Sabrina Gaito and Gian Paolo Rossi and Xiaohan Zhao and Haitao Zheng and Ben Y. Zhao}, editor = {Eytan Adar and Paul Resnick and Munmun De Choudhury and Bernie Hogan and Alice Oh}, title = {Link and Triadic Closure Delay: Temporal Metrics for Social Network Dynamics}, booktitle = {Proceedings of the Eighth International Conference on Weblogs and Social Media, {ICWSM} 2014, Ann Arbor, Michigan, USA, June 1-4, 2014}, publisher = {The {AAAI} Press}, year = {2014}, url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/view/8042}, timestamp = {Tue, 26 Apr 2022 13:37:31 +0200}, biburl = {https://dblp.org/rec/conf/icwsm/ZignaniGRZZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/WangWWNZZ14, author = {Gang Wang and Bolun Wang and Tianyi Wang and Ana Nika and Haitao Zheng and Ben Y. Zhao}, editor = {Carey Williamson and Aditya Akella and Nina Taft}, title = {Whispers in the dark: analysis of an anonymous social network}, booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014, Vancouver, BC, Canada, November 5-7, 2014}, pages = {137--150}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663716.2663728}, doi = {10.1145/2663716.2663728}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/WangWWNZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/ZhuZMNMZZ14, author = {Yibo Zhu and Zengbin Zhang and Zhinus Marzi and Chris Nelson and Upamanyu Madhow and Ben Y. Zhao and Haitao Zheng}, editor = {Sung{-}Ju Lee and Ashutosh Sabharwal and Prasun Sinha}, title = {Demystifying 60GHz outdoor picocells}, booktitle = {The 20th Annual International Conference on Mobile Computing and Networking, MobiCom'14, Maui, HI, USA, September 7-11, 2014}, pages = {5--16}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2639108.2639121}, doi = {10.1145/2639108.2639121}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/ZhuZMNMZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/NikaZZZZ14, author = {Ana Nika and Zengbin Zhang and Xia Zhou and Ben Y. Zhao and Haitao Zheng}, editor = {Shyamnath Gollakota and Deepak Ganesan}, title = {Towards commoditized real-time spectrum monitoring}, booktitle = {Proceedings of the 1st {ACM} workshop on Hot topics in wireless, HotWireless 2014, Maui, HI, USA, September 11, 2014}, pages = {25--30}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2643614.2643615}, doi = {10.1145/2643614.2643615}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/NikaZZZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/ZhuZZZVZZ14, author = {Yibo Zhu and Xia Zhou and Zengbin Zhang and Lin Zhou and Amin Vahdat and Ben Y. Zhao and Haitao Zheng}, editor = {Sung{-}Ju Lee and Ashutosh Sabharwal and Prasun Sinha}, title = {Cutting the cord: a robust wireless facilities network for data centers}, booktitle = {The 20th Annual International Conference on Mobile Computing and Networking, MobiCom'14, Maui, HI, USA, September 7-11, 2014}, pages = {581--592}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2639108.2639140}, doi = {10.1145/2639108.2639140}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/ZhuZZZVZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/NikaIZGRZ14, author = {Ana Nika and Asad Ismail and Ben Y. Zhao and Sabrina Gaito and Gian Paolo Rossi and Haitao Zheng}, title = {Understanding data hotspots in cellular networks}, booktitle = {10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2014, Rhodes, Greece, August 18-20, 2014}, pages = {70--76}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/QSHINE.2014.6928662}, doi = {10.1109/QSHINE.2014.6928662}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/qshine/NikaIZGRZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangWZZ14, author = {Gang Wang and Tianyi Wang and Haitao Zheng and Ben Y. Zhao}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {239--254}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wang}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangWZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangWWSZZZ14, author = {Gang Wang and Tianyi Wang and Bolun Wang and Divya Sambasivan and Zengbin Zhang and Haitao Zheng and Ben Y. Zhao}, title = {Crowds on Wall Street: Extracting Value from Social Investing Platforms}, journal = {CoRR}, volume = {abs/1406.1137}, year = {2014}, url = {http://arxiv.org/abs/1406.1137}, eprinttype = {arXiv}, eprint = {1406.1137}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/WangWWSZZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/ZhaoCSZZ13, author = {Xiaohan Zhao and Adelbert Chang and Atish Das Sarma and Haitao Zheng and Ben Y. Zhao}, title = {On the Embeddability of Random Walk Distances}, journal = {Proc. {VLDB} Endow.}, volume = {6}, number = {14}, pages = {1690--1701}, year = {2013}, url = {http://www.vldb.org/pvldb/vol6/p1690-zhao.pdf}, doi = {10.14778/2556549.2556554}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/ZhaoCSZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/KoneZROZ13, author = {Vinod Kone and Haitao Zheng and Antony I. T. Rowstron and Greg O'Shea and Ben Y. Zhao}, title = {Measurement-Based Design of Roadside Content Delivery Systems}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {12}, number = {6}, pages = {1160--1173}, year = {2013}, url = {https://doi.org/10.1109/TMC.2012.90}, doi = {10.1109/TMC.2012.90}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/KoneZROZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/JiangWWSHDZ13, author = {Jing Jiang and Christo Wilson and Xiao Wang and Wenpeng Sha and Peng Huang and Yafei Dai and Ben Y. Zhao}, title = {Understanding latent interactions in online social networks}, journal = {{ACM} Trans. Web}, volume = {7}, number = {4}, pages = {18:1--18:39}, year = {2013}, url = {https://doi.org/10.1145/2517040}, doi = {10.1145/2517040}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/JiangWWSHDZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/ZhangZZWSMZZ13, author = {Zengbin Zhang and Lin Zhou and Xiaohan Zhao and Gang Wang and Yu Su and Miriam J. Metzger and Haitao Zheng and Ben Y. Zhao}, editor = {Dave Levine and Sachin Katti and Dave Oran}, title = {On the validity of geosocial mobility traces}, booktitle = {Twelfth {ACM} Workshop on Hot Topics in Networks, HotNets-XII, College Park, MD, USA, November 21-22, 2013}, pages = {11:1--11:7}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2535771.2535786}, doi = {10.1145/2535771.2535786}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotnets/ZhangZZWSMZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/StringhiniWEKVZZ13, author = {Gianluca Stringhini and Gang Wang and Manuel Egele and Christopher Kruegel and Giovanni Vigna and Haitao Zheng and Ben Y. Zhao}, editor = {Konstantina Papagiannaki and P. Krishna Gummadi and Craig Partridge}, title = {Follow the green: growth and dynamics in twitter follower markets}, booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013, Barcelona, Spain, October 23-25, 2013}, pages = {163--176}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2504730.2504731}, doi = {10.1145/2504730.2504731}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/StringhiniWEKVZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/LiWJLZJZD13, author = {Zhenhua Li and Christo Wilson and Zhefu Jiang and Yao Liu and Ben Y. Zhao and Cheng Jin and Zhi{-}Li Zhang and Yafei Dai}, editor = {David M. Eyers and Karsten Schwan}, title = {Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services}, booktitle = {Middleware 2013 - {ACM/IFIP/USENIX} 14th International Middleware Conference, Beijing, China, December 9-13, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8275}, pages = {307--327}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45065-5\_16}, doi = {10.1007/978-3-642-45065-5\_16}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/LiWJLZJZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangMWWMZZ13, author = {Gang Wang and Manish Mohanlal and Christo Wilson and Xiao Wang and Miriam J. Metzger and Haitao Zheng and Ben Y. Zhao}, title = {Social Turing Tests: Crowdsourcing Sybil Detection}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/social-turing-tests-crowdsourcing-sybil-detection}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangMWWMZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WangWLZZ13, author = {Tianyi Wang and Gang Wang and Xing Li and Haitao Zheng and Ben Y. Zhao}, editor = {Dah Ming Chiu and Jia Wang and Paul Barford and Srinivasan Seshan}, title = {Characterizing and detecting malicious crowdsourcing}, booktitle = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August 12-16, 2013}, pages = {537--538}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2486001.2491719}, doi = {10.1145/2486001.2491719}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WangWLZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/ZhouZWYZZ13, author = {Xia Zhou and Zengbin Zhang and Gang Wang and Xiaoxiao Yu and Ben Y. Zhao and Haitao Zheng}, editor = {Mor Harchol{-}Balter and John R. Douceur and Jun Xu}, title = {Practical conflict graphs for dynamic spectrum distribution}, booktitle = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21, 2013}, pages = {5--16}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465529.2465545}, doi = {10.1145/2465529.2465545}, timestamp = {Fri, 30 Jul 2021 16:13:32 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/ZhouZWYZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangKWWZZ13, author = {Gang Wang and Tristan Konolige and Christo Wilson and Xiao Wang and Haitao Zheng and Ben Y. Zhao}, editor = {Samuel T. King}, title = {You Are How You Click: Clickstream Analysis for Sybil Detection}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {241--256}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangKWWZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/YangXZWZD13, author = {Zhi Yang and Jilong Xue and Han Xiao Zhao and Xiao Wang and Ben Y. Zhao and Yafei Dai}, editor = {Leslie Carr and Alberto H. F. Laender and Bernadette Farias L{\'{o}}scio and Irwin King and Marcus Fontoura and Denny Vrandecic and Lora Aroyo and Jos{\'{e}} Palazzo M. de Oliveira and Fernanda Lima and Erik Wilde}, title = {Unfolding dynamics in a social network: co-evolution oflink formation and user interaction}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013, Companion Volume}, pages = {67--68}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487788.2487815}, doi = {10.1145/2487788.2487815}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/YangXZWZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WangGMZZ13, author = {Gang Wang and Konark Gill and Manish Mohanlal and Haitao Zheng and Ben Y. Zhao}, editor = {Daniel Schwabe and Virg{\'{\i}}lio A. F. Almeida and Hartmut Glaser and Ricardo Baeza{-}Yates and Sue B. Moon}, title = {Wisdom in the social crowd: an analysis of quora}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013}, pages = {1341--1352}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488388.2488506}, doi = {10.1145/2488388.2488506}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/WangGMZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0001CGZ13, author = {Rachit Agarwal and Matthew Caesar and Brighten Godfrey and Ben Y. Zhao}, title = {Shortest Paths in Microseconds}, journal = {CoRR}, volume = {abs/1309.0874}, year = {2013}, url = {http://arxiv.org/abs/1309.0874}, eprinttype = {arXiv}, eprint = {1309.0874}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0001CGZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/KoneYYZZ12, author = {Vinod Kone and Lei Yang and Xue Yang and Ben Y. Zhao and Haitao Zheng}, title = {The effectiveness of opportunistic spectrum access: a measurement study}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {20}, number = {6}, pages = {2005--2016}, year = {2012}, url = {https://doi.org/10.1109/TNET.2012.2191571}, doi = {10.1109/TNET.2012.2191571}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/KoneYYZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/WilsonSPZ12, author = {Christo Wilson and Alessandra Sala and Krishna P. N. Puttaswamy and Ben Y. Zhao}, title = {Beyond Social Graphs: User Interactions in Online Social Networks and their Implications}, journal = {{ACM} Trans. Web}, volume = {6}, number = {4}, pages = {17:1--17:31}, year = {2012}, url = {https://doi.org/10.1145/2382616.2382620}, doi = {10.1145/2382616.2382620}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/WilsonSPZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dyspan/ZhangYZZZ12, author = {Zengbin Zhang and Lei Yang and Yibo Zhu and Ben Y. Zhao and Haitao Zheng}, title = {Enforcing dynamic spectrum access with spectrum permits}, booktitle = {{IEEE} International Symposium on Dynamic Spectrum Access Networks, DySPAN 2012, Bellevue, WA, USA, October 16-19, 2012}, pages = {278--279}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/DYSPAN.2012.6478143}, doi = {10.1109/DYSPAN.2012.6478143}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dyspan/ZhangYZZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dyspan/ZhouZWYZZ12, author = {Xia Zhou and Zengbin Zhang and Gang Wang and Xiaoxiao Yu and Ben Y. Zhao and Haitao Zheng}, title = {Measurement-calibrated conflict graphs for dynamic spectrum distribution}, booktitle = {{IEEE} International Symposium on Dynamic Spectrum Access Networks, DySPAN 2012, Bellevue, WA, USA, October 16-19, 2012}, pages = {287}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/DYSPAN.2012.6478150}, doi = {10.1109/DYSPAN.2012.6478150}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dyspan/ZhouZWYZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/ZhaoSWWGZZ12, author = {Xiaohan Zhao and Alessandra Sala and Christo Wilson and Xiao Wang and Sabrina Gaito and Haitao Zheng and Ben Y. Zhao}, editor = {John W. Byers and Jim Kurose and Ratul Mahajan and Alex C. Snoeren}, title = {Multi-scale dynamics in a massive online social network}, booktitle = {Proceedings of the 12th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '12, Boston, MA, USA, November 14-16, 2012}, pages = {171--184}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2398776.2398795}, doi = {10.1145/2398776.2398795}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/ZhaoSWWGZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/YangZZKZ12, author = {Lei Yang and Zengbin Zhang and Ben Y. Zhao and Christopher Kruegel and Haitao Zheng}, editor = {Asis Nasipuri and Yih{-}Chun Hu and Sanjay Shakkottai}, title = {Enforcing dynamic spectrum access with spectrum permits}, booktitle = {The Thirteenth {ACM} International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc '12, Hilton Head, SC, USA, June 11-14, 2012}, pages = {195--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2248371.2248400}, doi = {10.1145/2248371.2248400}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/YangZZKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/ZhouZZLKVZZ12, author = {Xia Zhou and Zengbin Zhang and Yibo Zhu and Yubo Li and Saipriya Kumar and Amin Vahdat and Ben Y. Zhao and Haitao Zheng}, editor = {Lars Eggert and J{\"{o}}rg Ott and Venkata N. Padmanabhan and George Varghese}, title = {Mirror mirror on the ceiling: flexible wireless links for data centers}, booktitle = {{ACM} {SIGCOMM} 2012 Conference, {SIGCOMM} '12, Helsinki, Finland - August 13 - 17, 2012}, pages = {443--454}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342356.2342440}, doi = {10.1145/2342356.2342440}, timestamp = {Mon, 22 Mar 2021 16:55:03 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/ZhouZZLKVZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosn/0001CGZ12, author = {Rachit Agarwal and Matthew Caesar and Philip Brighten Godfrey and Ben Y. Zhao}, editor = {Balachander Krishnamurthy and Stefan Saroiu and Ben Y. Zhao}, title = {Shortest paths in less than a millisecond}, booktitle = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012}, pages = {37--42}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342549.2342559}, doi = {10.1145/2342549.2342559}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wosn/0001CGZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WangWZZMZZ12, author = {Gang Wang and Christo Wilson and Xiaohan Zhao and Yibo Zhu and Manish Mohanlal and Haitao Zheng and Ben Y. Zhao}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {Serf and turf: crowdturfing for fun and profit}, booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012, Lyon, France, April 16-20, 2012}, pages = {679--688}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187836.2187928}, doi = {10.1145/2187836.2187928}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/WangWZZMZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wosn/2012, editor = {Balachander Krishnamurthy and Stefan Saroiu and Ben Y. Zhao}, title = {Proceedings of the 2012 {ACM} workshop on Workshop on Online Social Networks, {WOSN} 2012, Helsinki, Finland, August 17, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2342549}, isbn = {978-1-4503-1480-0}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wosn/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-6744, author = {Sabrina Gaito and Matteo Zignani and Gian Paolo Rossi and Alessandra Sala and Xiao Wang and Haitao Zheng and Ben Y. Zhao}, title = {On the Bursty Evolution of Online Social Networks}, journal = {CoRR}, volume = {abs/1203.6744}, year = {2012}, url = {http://arxiv.org/abs/1203.6744}, eprinttype = {arXiv}, eprint = {1203.6744}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-6744.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-3856, author = {Gang Wang and Manish Mohanlal and Christo Wilson and Xiao Wang and Miriam J. Metzger and Haitao Zheng and Ben Y. Zhao}, title = {Social Turing Tests: Crowdsourcing Sybil Detection}, journal = {CoRR}, volume = {abs/1205.3856}, year = {2012}, url = {http://arxiv.org/abs/1205.3856}, eprinttype = {arXiv}, eprint = {1205.3856}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-3856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-4013, author = {Xiaohan Zhao and Alessandra Sala and Christo Wilson and Xiao Wang and Sabrina Gaito and Haitao Zheng and Ben Y. Zhao}, title = {Multi-scale Dynamics in a Massive Online Social Network}, journal = {CoRR}, volume = {abs/1205.4013}, year = {2012}, url = {http://arxiv.org/abs/1205.4013}, eprinttype = {arXiv}, eprint = {1205.4013}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-4013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1206-1134, author = {Rachit Agarwal and Matthew Caesar and Brighten Godfrey and Ben Y. Zhao}, title = {Shortest Paths in Less Than a Millisecond}, journal = {CoRR}, volume = {abs/1206.1134}, year = {2012}, url = {http://arxiv.org/abs/1206.1134}, eprinttype = {arXiv}, eprint = {1206.1134}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1206-1134.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/YangZHZZ11, author = {Lei Yang and Zengbin Zhang and Wei Hou and Ben Y. Zhao and Haitao Zheng}, title = {Papyrus: a software platform for distributed dynamic spectrum sharing using SDRs}, journal = {Comput. Commun. Rev.}, volume = {41}, number = {1}, pages = {31--37}, year = {2011}, url = {https://doi.org/10.1145/1925861.1925866}, doi = {10.1145/1925861.1925866}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/YangZHZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/KoneZWZBZA11, author = {Vinod Kone and Mariya Zheleva and Mike P. Wittie and Ben Y. Zhao and Elizabeth M. Belding and Haitao Zheng and Kevin C. Almeroth}, title = {AirLab: consistency, fidelity and privacy in wireless measurements}, journal = {Comput. Commun. Rev.}, volume = {41}, number = {1}, pages = {60--65}, year = {2011}, url = {https://doi.org/10.1145/1925861.1925872}, doi = {10.1145/1925861.1925872}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/KoneZWZBZA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/KoneZRZ11, author = {Vinod Kone and Haitao Zheng and Antony I. T. Rowstron and Ben Y. Zhao}, title = {The Impact of Infostation Density on Vehicular Data Dissemination}, journal = {Mob. Networks Appl.}, volume = {16}, number = {6}, pages = {807--819}, year = {2011}, url = {https://doi.org/10.1007/s11036-010-0277-z}, doi = {10.1007/S11036-010-0277-Z}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/KoneZRZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YangTZCD11, author = {Zhi Yang and Jing Tian and Ben Y. Zhao and Wei Chen and Yafei Dai}, title = {Protector: {A} Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {22}, number = {9}, pages = {1514--1527}, year = {2011}, url = {https://doi.org/10.1109/TPDS.2010.205}, doi = {10.1109/TPDS.2010.205}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/YangTZCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/PuttaswamyKZ11, author = {Krishna P. N. Puttaswamy and Christopher Kruegel and Ben Y. Zhao}, editor = {Jeffrey S. Chase and Amr El Abbadi}, title = {Silverline: toward data confidentiality in storage-intensive cloud applications}, booktitle = {{ACM} Symposium on Cloud Computing in conjunction with {SOSP} 2011, {SOCC} '11, Cascais, Portugal, October 26-28, 2011}, pages = {10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2038916.2038926}, doi = {10.1145/2038916.2038926}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloud/PuttaswamyKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZhaoSZZ11, author = {Xiaohan Zhao and Alessandra Sala and Haitao Zheng and Ben Y. Zhao}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {Efficient shortest paths on massive social graphs}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {77--86}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247162}, doi = {10.4108/ICST.COLLABORATECOM.2011.247162}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ZhaoSZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/ZhangZYZZZ11, author = {Weile Zhang and Xia Zhou and Lei Yang and Zengbin Zhang and Ben Y. Zhao and Haitao Zheng}, editor = {Hari Balakrishnan and Dina Katabi and Aditya Akella and Ion Stoica}, title = {3D beamforming for wireless data centers}, booktitle = {Tenth {ACM} Workshop on Hot Topics in Networks (HotNets-X), {HOTNETS} '11, Cambridge, MA, {USA} - November 14 - 15, 2011}, pages = {4}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2070562.2070566}, doi = {10.1145/2070562.2070566}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotnets/ZhangZYZZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/SzydlowskiZKK11, author = {Martin Szydlowski and Ben Y. Zhao and Engin Kirda and Christopher Kruegel}, editor = {Haohong Wang and Jin Li and George N. Rouskas and Xiaobo Zhou}, title = {BTLab: {A} System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients}, booktitle = {Proceedings of 20th International Conference on Computer Communications and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICCCN.2011.6005925}, doi = {10.1109/ICCCN.2011.6005925}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/SzydlowskiZKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/SalaZWZZ11, author = {Alessandra Sala and Xiaohan Zhao and Christo Wilson and Haitao Zheng and Ben Y. Zhao}, editor = {Patrick Thiran and Walter Willinger}, title = {Sharing graphs using differentially private graph models}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {81--98}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068825}, doi = {10.1145/2068816.2068825}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/SalaZWZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/YangWWGZD11, author = {Zhi Yang and Christo Wilson and Xiao Wang and Tingting Gao and Ben Y. Zhao and Yafei Dai}, editor = {Patrick Thiran and Walter Willinger}, title = {Uncovering social network sybils in the wild}, booktitle = {Proceedings of the 11th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} '11, Berlin, Germany, November 2-, 2011}, pages = {259--268}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2068816.2068841}, doi = {10.1145/2068816.2068841}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/YangWWGZD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/XuCJZHF11, author = {Tianyin Xu and Yang Chen and Lei Jiao and Ben Y. Zhao and Pan Hui and Xiaoming Fu}, editor = {Fabio Kon and Anne{-}Marie Kermarrec}, title = {Scaling Microblogging Services with Divergent Traffic Demands}, booktitle = {Middleware 2011 - {ACM/IFIP/USENIX} 12th International Middleware Conference, Lisbon, Portugal, December 12-16, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7049}, pages = {20--40}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25821-3\_2}, doi = {10.1007/978-3-642-25821-3\_2}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/middleware/XuCJZHF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/ZhangZZZWZZ11, author = {Zengbin Zhang and Xia Zhou and Weile Zhang and Yuanyang Zhang and Gang Wang and Ben Y. Zhao and Haitao Zheng}, editor = {Parmesh Ramanathan and Thyaga Nandagopal and Brian Neil Levine}, title = {I am the antenna: accurate outdoor {AP} location using smartphones}, booktitle = {Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, {MOBICOM} 2011, Las Vegas, Nevada, USA, September 19-23, 2011}, pages = {109--120}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2030613.2030626}, doi = {10.1145/2030613.2030626}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/ZhangZZZWZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/WilsonSWSZZ11, author = {Christo Wilson and Troy Steinbauer and Gang Wang and Alessandra Sala and Haitao Zheng and Ben Y. Zhao}, editor = {Anthony LaMarca and Landon P. Cox}, title = {Privacy, availability and economics in the Polaris mobile social network}, booktitle = {12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, Phoenix, AZ, USA, March 1-3, 2011}, pages = {42--47}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2184489.2184499}, doi = {10.1145/2184489.2184499}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wmcsa/WilsonSWSZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-5321, author = {Zhi Yang and Christo Wilson and Xiao Wang and Tingting Gao and Ben Y. Zhao and Yafei Dai}, title = {Uncovering Social Network Sybils in the Wild}, journal = {CoRR}, volume = {abs/1106.5321}, year = {2011}, url = {http://arxiv.org/abs/1106.5321}, eprinttype = {arXiv}, eprint = {1106.5321}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-5321.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-5114, author = {Xiaohan Zhao and Alessandra Sala and Haitao Zheng and Ben Y. Zhao}, title = {Fast and Scalable Analysis of Massive Social Graphs}, journal = {CoRR}, volume = {abs/1107.5114}, year = {2011}, url = {http://arxiv.org/abs/1107.5114}, eprinttype = {arXiv}, eprint = {1107.5114}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-5114.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1108-0027, author = {Alessandra Sala and Sabrina Gaito and Gian Paolo Rossi and Haitao Zheng and Ben Y. Zhao}, title = {Revisiting Degree Distribution Models for Social Graph Analysis}, journal = {CoRR}, volume = {abs/1108.0027}, year = {2011}, url = {http://arxiv.org/abs/1108.0027}, eprinttype = {arXiv}, eprint = {1108.0027}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1108-0027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-5654, author = {Gang Wang and Christo Wilson and Xiaohan Zhao and Yibo Zhu and Manish Mohanlal and Haitao Zheng and Ben Y. Zhao}, title = {Serf and Turf: Crowdturfing for Fun and Profit}, journal = {CoRR}, volume = {abs/1111.5654}, year = {2011}, url = {http://arxiv.org/abs/1111.5654}, eprinttype = {arXiv}, eprint = {1111.5654}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-5654.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/SwamynathanAZ10, author = {Gayatri Swamynathan and Kevin C. Almeroth and Ben Y. Zhao}, title = {The design of a reliable reputation system}, journal = {Electron. Commer. Res.}, volume = {10}, number = {3-4}, pages = {239--270}, year = {2010}, url = {https://doi.org/10.1007/s10660-010-9064-y}, doi = {10.1007/S10660-010-9064-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecr/SwamynathanAZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoHWLCZ10, author = {Hongyu Gao and Jun Hu and Christo Wilson and Zhichun Li and Yan Chen and Ben Y. Zhao}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Detecting and characterizing social spam campaigns}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {681--683}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866396}, doi = {10.1145/1866307.1866396}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaoHWLCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/WittiePDAZ10, author = {Mike P. Wittie and Veljko Pejovic and Lara B. Deek and Kevin C. Almeroth and Ben Y. Zhao}, editor = {Jaudelice Cavalcante de Oliveira and Maximilian Ott and Timothy G. Griffin and Muriel M{\'{e}}dard}, title = {Exploiting locality of interest in online social networks}, booktitle = {Proceedings of the 2010 {ACM} Conference on Emerging Networking Experiments and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 - December 03, 2010}, pages = {25}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1921168.1921201}, doi = {10.1145/1921168.1921201}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/WittiePDAZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/GaoHWLCZ10, author = {Hongyu Gao and Jun Hu and Christo Wilson and Zhichun Li and Yan Chen and Ben Y. Zhao}, editor = {Mark Allman}, title = {Detecting and characterizing social spam campaigns}, booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2010, Melbourne, Australia - November 1-3, 2010}, pages = {35--47}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1879141.1879147}, doi = {10.1145/1879141.1879147}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/GaoHWLCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/KoneYYZZ10, author = {Vinod Kone and Lei Yang and Xue Yang and Ben Y. Zhao and Haitao Zheng}, editor = {Mark Allman}, title = {On the feasibility of effective opportunistic spectrum access}, booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2010, Melbourne, Australia - November 1-3, 2010}, pages = {151--164}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1879141.1879160}, doi = {10.1145/1879141.1879160}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imc/KoneYYZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/JiangWWHSDZ10, author = {Jing Jiang and Christo Wilson and Xiao Wang and Peng Huang and Wenpeng Sha and Yafei Dai and Ben Y. Zhao}, editor = {Mark Allman}, title = {Understanding latent interactions in online social networks}, booktitle = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference, {IMC} 2010, Melbourne, Australia - November 1-3, 2010}, pages = {369--382}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1879141.1879190}, doi = {10.1145/1879141.1879190}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imc/JiangWWHSDZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/YangZXDXD10, author = {Zhi Yang and Ben Y. Zhao and Yuanjian Xing and Song Ding and Feng Xiao and Yafei Dai}, editor = {Michael J. Freedman and Arvind Krishnamurthy}, title = {AmazingStore: available, low-cost online storage service using cloudlets}, booktitle = {Proceedings of the 9th international conference on Peer-to-peer systems, IPTPS'10, San Jose, CA, USA, April 27, 2010}, pages = {2}, publisher = {{USENIX}}, year = {2010}, url = {http://www.iptps.org/papers-2010/Yang.pdf}, timestamp = {Thu, 14 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iptps/YangZXDXD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/YangZZ10, author = {Lei Yang and Ben Y. Zhao and Haitao Zheng}, editor = {Nitin H. Vaidya and Suman Banerjee and Dina Katabi}, title = {The spaces between us: setting and maintaining boundaries in wireless spectrum access}, booktitle = {Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, {MOBICOM} 2010, Chicago, Illinois, USA, September 20-24, 2010}, pages = {37--48}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1859995.1860001}, doi = {10.1145/1859995.1860001}, timestamp = {Thu, 27 Apr 2023 08:33:19 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/YangZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/YangHCZZ10, author = {Lei Yang and Wei Hou and Lili Cao and Ben Y. Zhao and Haitao Zheng}, title = {Supporting Demanding Wireless Applications with Frequency-agile Radios}, booktitle = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA, {USA}}, pages = {65--80}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/nsdi10/tech/full\_papers/yang.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/YangHCZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/SalaZZGR10, author = {Alessandra Sala and Haitao Zheng and Ben Y. Zhao and Sabrina Gaito and Gian Paolo Rossi}, editor = {Andr{\'{e}}a W. Richa and Rachid Guerraoui}, title = {Brief announcement: revisiting the power-law degree distribution for social graph analysis}, booktitle = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010}, pages = {400--401}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835698.1835791}, doi = {10.1145/1835698.1835791}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/SalaZZGR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/YangKYLZZ10, author = {Lei Yang and Vinod Kone and Xue Yang and York Liu and Ben Y. Zhao and Haitao Zheng}, title = {Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices}, booktitle = {Proceedings of the Seventh Annual {IEEE} Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2010, June 21-25, 2010, Boston, Massachusetts, {USA}}, pages = {288--296}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/SECON.2010.5508245}, doi = {10.1109/SECON.2010.5508245}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secon/YangKYLZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wicon/KoneZRZ10, author = {Vinod Kone and Haitao Zheng and Antony I. T. Rowstron and Ben Y. Zhao}, editor = {Hsiao{-}Hwa Chen and Mahmoud Daneshmand and Stanley Liu}, title = {On Infostation Density of Vehicular Networks}, booktitle = {Proceedings of the 5th Annual International Conference on Wireless Internet, {WICON} 2010, Singapore, March 1-3, 2010}, pages = {1--9}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://doi.org/10.4108/ICST.WICON2010.8533}, doi = {10.4108/ICST.WICON2010.8533}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wicon/KoneZRZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/PuttaswamyZ10, author = {Krishna P. N. Puttaswamy and Ben Y. Zhao}, editor = {Angela Dalton and Roy Want}, title = {Preserving privacy in location-based mobile social applications}, booktitle = {Eleventh Workshop on Mobile Computing Systems and Applications, HotMobile '10, Annapolis, Maryland, USA, February 22-23, 2010}, pages = {1--6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1734583.1734585}, doi = {10.1145/1734583.1734585}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/PuttaswamyZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosn/WilsonSBZZ10, author = {Christo Wilson and Alessandra Sala and Joseph Bonneau and Robert Zablit and Ben Y. Zhao}, editor = {Bruce M. Maggs and Andrew Tomkins}, title = {Don't Tread on Me: Moderating Access to {OSN} Data with SpikeStrip}, booktitle = {3rd Workshop on Online Social Networks, {WOSN} 2010, Boston, MA, USA, June 22, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/wosn-2010/dont-tread-me-moderating-access-osn-data-spikestrip}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/wosn/WilsonSBZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SalaCWZZZ10, author = {Alessandra Sala and Lili Cao and Christo Wilson and Robert Zablit and Haitao Zheng and Ben Y. Zhao}, editor = {Michael Rappa and Paul Jones and Juliana Freire and Soumen Chakrabarti}, title = {Measurement-calibrated graph models for social network experiments}, booktitle = {Proceedings of the 19th International Conference on World Wide Web, {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010}, pages = {861--870}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1772690.1772778}, doi = {10.1145/1772690.1772778}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/SalaCWZZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/QiuCYCZ09, author = {Tongqing Qiu and Edward Chan and Mao Ye and Guihai Chen and Ben Y. Zhao}, title = {Peer-exchange schemes to handle mismatch in peer-to-peer systems}, journal = {J. Supercomput.}, volume = {48}, number = {1}, pages = {15--42}, year = {2009}, url = {https://doi.org/10.1007/s11227-008-0203-3}, doi = {10.1007/S11227-008-0203-3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/QiuCYCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/PuttaswamyZZ09, author = {Krishna P. N. Puttaswamy and Heather Zheng and Ben Y. Zhao}, title = {Securing Structured Overlays against Identity Attacks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {20}, number = {10}, pages = {1487--1498}, year = {2009}, url = {https://doi.org/10.1109/TPDS.2008.241}, doi = {10.1109/TPDS.2008.241}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/PuttaswamyZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/PuttaswamySZ09, author = {Krishna P. N. Puttaswamy and Alessandra Sala and Ben Y. Zhao}, editor = {J{\"{o}}rg Liebeherr and Giorgio Ventre and Ernst W. Biersack and Srinivasan Keshav}, title = {StarClique: guaranteeing user privacy in social networks against intersection attacks}, booktitle = {Proceedings of the 2009 {ACM} Conference on Emerging Networking Experiments and Technology, CoNEXT 2009, Rome, Italy, December 1-4, 2009}, pages = {157--168}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1658939.1658958}, doi = {10.1145/1658939.1658958}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/PuttaswamySZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/WilsonBSPZ09, author = {Christo Wilson and Bryce Boe and Alessandra Sala and Krishna P. N. Puttaswamy and Ben Y. Zhao}, editor = {Wolfgang Schr{\"{o}}der{-}Preikschat and John Wilkes and Rebecca Isaacs}, title = {User interactions in social networks and their implications}, booktitle = {Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009}, pages = {205--218}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1519065.1519089}, doi = {10.1145/1519065.1519089}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/WilsonBSPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PuttaswamySEZ09, author = {Krishna P. N. Puttaswamy and Alessandra Sala and {\"{O}}mer Egecioglu and Ben Y. Zhao}, title = {Rome: Performance and Anonymity using Route Meshes}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {2861--2865}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062247}, doi = {10.1109/INFCOM.2009.5062247}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PuttaswamySEZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/Zhao08, author = {Ben Y. Zhao}, title = {Special Issue: Recent Advances in Peer-to-Peer Systems and Security}, journal = {Concurr. Comput. Pract. Exp.}, volume = {20}, number = {2}, pages = {125--126}, year = {2008}, url = {https://doi.org/10.1002/cpe.1239}, doi = {10.1002/CPE.1239}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/Zhao08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SwamynathanZA08, author = {Gayatri Swamynathan and Ben Y. Zhao and Kevin C. Almeroth}, title = {Exploring the feasibility of proactive reputations}, journal = {Concurr. Comput. Pract. Exp.}, volume = {20}, number = {2}, pages = {155--166}, year = {2008}, url = {https://doi.org/10.1002/cpe.1186}, doi = {10.1002/CPE.1186}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/SwamynathanZA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/PuttaswamySWZ08, author = {Krishna P. N. Puttaswamy and Alessandra Sala and Christo Wilson and Ben Y. Zhao}, title = {Protecting anonymity in dynamic peer-to-peer networks}, booktitle = {Proceedings of the 16th annual {IEEE} International Conference on Network Protocols, 2008. {ICNP} 2008, Orlando, Florida, USA, 19-22 October 2008}, pages = {104--113}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICNP.2008.4697029}, doi = {10.1109/ICNP.2008.4697029}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/PuttaswamySWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PuttaswamySZ08, author = {Krishna P. N. Puttaswamy and Alessandra Sala and Ben Y. Zhao}, title = {Searching for Rare Objects Using Index Replication}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {1723--1731}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.234}, doi = {10.1109/INFOCOM.2008.234}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PuttaswamySZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/TianYCZD08, author = {Jing Tian and Zhi Yang and Wei Chen and Ben Y. Zhao and Yafei Dai}, title = {Probabilistic Failure Detection for Efficient Distributed Storage Maintenance}, booktitle = {27th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2008), Napoli, Italy, October 6-8, 2008}, pages = {147--156}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SRDS.2008.28}, doi = {10.1109/SRDS.2008.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/TianYCZD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/SwamynathanZAJ08, author = {Gayatri Swamynathan and Ben Y. Zhao and Kevin C. Almeroth and S. Rao Jammalamadaka}, title = {Towards Reliable Reputations for Dynamic Networked Systems}, booktitle = {27th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2008), Napoli, Italy, October 6-8, 2008}, pages = {195--204}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SRDS.2008.31}, doi = {10.1109/SRDS.2008.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/SwamynathanZAJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosn/SwamynathanWBAZ08, author = {Gayatri Swamynathan and Christo Wilson and Bryce Boe and Kevin C. Almeroth and Ben Y. Zhao}, editor = {Christos Faloutsos and Thomas Karagiannis and Pablo Rodriguez}, title = {Do social networks improve e-commerce?: a study on social marketplaces}, booktitle = {Proceedings of the first Workshop on Online Social Networks, {WOSN} 2008, Seattle, WA, USA, August 17-22, 2008}, pages = {1--6}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1397735.1397737}, doi = {10.1145/1397735.1397737}, timestamp = {Wed, 12 Jan 2022 13:48:25 +0100}, biburl = {https://dblp.org/rec/conf/wosn/SwamynathanWBAZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amm/CuiZC07, author = {Yi Cui and Ben Y. Zhao and Shigang Chen}, title = {Toward the Next-Generation Peer-to-Peer Services}, journal = {Adv. Multim.}, volume = {2007}, pages = {52679:1}, year = {2007}, url = {https://doi.org/10.1155/2007/52679}, doi = {10.1155/2007/52679}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amm/CuiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amm/SwamynathanZAZ07, author = {Gayatri Swamynathan and Ben Y. Zhao and Kevin C. Almeroth and Haitao Zheng}, title = {Globally Decoupled Reputations for Large Distributed Networks}, journal = {Adv. Multim.}, volume = {2007}, pages = {92485:1--92485:14}, year = {2007}, url = {https://doi.org/10.1155/2007/92485}, doi = {10.1155/2007/92485}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amm/SwamynathanZAZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/KoneDZZ07, author = {Vinod Kone and Sudipto Das and Ben Y. Zhao and Haitao Zheng}, title = {{QUORUM} - Quality of Service in Wireless Mesh Networks}, journal = {Mob. Networks Appl.}, volume = {12}, number = {5-6}, pages = {358--369}, year = {2007}, url = {https://doi.org/10.1007/s11036-008-0050-8}, doi = {10.1007/S11036-008-0050-8}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/KoneDZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsware/SheriffASZB07, author = {Irfan Sheriff and Prashanth Aravinda Kumar Acharya and Ashwin Sampath and Ben Y. Zhao and Elizabeth M. Belding}, editor = {Sanjoy Paul and Henning Schulzrinne and G. Venkatesh}, title = {Integrated Data Location in Multihop Wireless Networks}, booktitle = {Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE {(COMSWARE} 2007), January 7-12, 2007, Bangalore, India}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/COMSWA.2007.382588}, doi = {10.1109/COMSWA.2007.382588}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsware/SheriffASZB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/SampathDZZ07, author = {Ashwin Sampath and Hui Dai and Haitao Zheng and Ben Y. Zhao}, title = {Multi-channel Jamming Attacks using Cognitive Radios}, booktitle = {Proceedings of the 16th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007}, pages = {352--357}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICCCN.2007.4317844}, doi = {10.1109/ICCCN.2007.4317844}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/SampathDZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LianZYZDL07, author = {Qiao Lian and Zheng Zhang and Mao Yang and Ben Y. Zhao and Yafei Dai and Xiaoming Li}, title = {An Empirical Study of Collusion Behavior in the Maze {P2P} File-Sharing System}, booktitle = {27th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada}, pages = {56}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDCS.2007.84}, doi = {10.1109/ICDCS.2007.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LianZYZDL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/AllenZW07, author = {Matthew S. Allen and Ben Y. Zhao and Richard Wolski}, title = {Deploying Video-on-Demand Services on Cable Networks}, booktitle = {27th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2007), June 25-29, 2007, Toronto, Ontario, Canada}, pages = {63}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDCS.2007.98}, doi = {10.1109/ICDCS.2007.98}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/AllenZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/QiuCYCZ07, author = {Tongqing Qiu and Guihai Chen and Mao Ye and Edward Chan and Ben Y. Zhao}, title = {Towards Location-aware Topology in both Unstructured and Structured {P2P} Systems}, booktitle = {2007 International Conference on Parallel Processing {(ICPP} 2007), September 10-14, 2007, Xi-An, China}, pages = {30}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICPP.2007.81}, doi = {10.1109/ICPP.2007.81}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpp/QiuCYCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/ShenWXZZ07, author = {Guobin Shen and Ye Wang and Yongqiang Xiong and Ben Y. Zhao and Zhi{-}Li Zhang}, editor = {John R. Douceur and Roger Wattenhofer}, title = {{HPTP:} Relieving the Tension between ISPs and {P2P}}, booktitle = {6th International workshop on Peer-To-Peer Systems, {IPTPS} 2007, Bellevue, WA, USA, February 26-27, 2007}, year = {2007}, url = {http://www.iptps.org/papers-2007/ShenWangXiongZhaoZhang.pdf}, timestamp = {Thu, 14 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iptps/ShenWXZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/WilsonCZ07, author = {Christo Wilson and Chris Coakley and Ben Y. Zhao}, title = {Fairness Attacks in the Explicit Control Protocol}, booktitle = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS 2007, Evanston, Illinois, USA, June 21-22, 2007}, pages = {21--28}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IWQOS.2007.376544}, doi = {10.1109/IWQOS.2007.376544}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/WilsonCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/KoneDZZ07, author = {Vinod Kone and Sudipto Das and Ben Y. Zhao and Haitao Zheng}, editor = {Victor C. M. Leung and Sastri Kota}, title = {{QUORUM:} quality of service routing in wireless mesh networks}, booktitle = {4th International {ICST} Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, {QSHINE} 2007, Vancouver, Canada, August 14-17, 2007}, pages = {18}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1577222.1577248}, doi = {10.1145/1577222.1577248}, timestamp = {Fri, 18 Oct 2019 16:45:58 +0200}, biburl = {https://dblp.org/rec/conf/qshine/KoneDZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/KonradZJ06, author = {Almudena Konrad and Ben Y. Zhao and Anthony D. Joseph}, title = {Determining model accuracy of network traces}, journal = {J. Comput. Syst. Sci.}, volume = {72}, number = {7}, pages = {1156--1171}, year = {2006}, url = {https://doi.org/10.1016/j.jcss.2005.12.009}, doi = {10.1016/J.JCSS.2005.12.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/KonradZJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/PengZZ06, author = {Chunyi Peng and Haitao Zheng and Ben Y. Zhao}, title = {Utilization and fairness in spectrum assignment for opportunistic spectrum access}, journal = {Mob. Networks Appl.}, volume = {11}, number = {4}, pages = {555--576}, year = {2006}, url = {https://doi.org/10.1007/s11036-006-7322-y}, doi = {10.1007/S11036-006-7322-Y}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/PengZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/WuZFZAA06, author = {Ping Wu and Caijie Zhang and Ying Feng and Ben Y. Zhao and Divyakant Agrawal and Amr El Abbadi}, editor = {Yannis E. Ioannidis and Marc H. Scholl and Joachim W. Schmidt and Florian Matthes and Michael Hatzopoulos and Klemens B{\"{o}}hm and Alfons Kemper and Torsten Grust and Christian B{\"{o}}hm}, title = {Parallelizing Skyline Queries for Scalable Distribution}, booktitle = {Advances in Database Technology - {EDBT} 2006, 10th International Conference on Extending Database Technology, Munich, Germany, March 26-31, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3896}, pages = {112--130}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11687238\_10}, doi = {10.1007/11687238\_10}, timestamp = {Tue, 30 Jan 2024 13:00:56 +0100}, biburl = {https://dblp.org/rec/conf/edbt/WuZFZAA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/YuZZZ06, author = {Hongliang Yu and Dongdong Zheng and Ben Y. Zhao and Weimin Zheng}, editor = {Yolande Berbers and Willy Zwaenepoel}, title = {Understanding user behavior in large-scale video-on-demand systems}, booktitle = {Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006}, pages = {333--344}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1217935.1217968}, doi = {10.1145/1217935.1217968}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/YuZZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/SwamynathanZA06, author = {Gayatri Swamynathan and Ben Y. Zhao and Kevin C. Almeroth}, editor = {Emin G{\"{u}}n Sirer and Ben Y. Zhao}, title = {Exploring the Feasibility of Proactive Reputations}, booktitle = {5th International workshop on Peer-To-Peer Systems, {IPTPS} 2006, Santa Barbara, CA, USA, February 27-28, 2006}, year = {2006}, url = {http://www.iptps.org/papers-2006/Swam-Proactive06.pdf}, timestamp = {Thu, 14 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iptps/SwamynathanZA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/GurunNZ06, author = {Selim Gurun and Priya Nagpurkar and Ben Y. Zhao}, editor = {Christoph Lindemann and Antony I. T. Rowstron}, title = {Energy consumption and conservation in mobile peer-to-peer systems}, booktitle = {Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, MobiShare@MobiCom 2006, Los Angeles, California, USA, July 25, 2006}, pages = {18--23}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161252.1161258}, doi = {10.1145/1161252.1161258}, timestamp = {Tue, 06 Nov 2018 16:59:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/GurunNZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/GilbertJWZZ06, author = {Robert Gilbert and Kerby Johnson and Shaomei Wu and Ben Y. Zhao and Haitao Zheng}, editor = {Christoph Lindemann and Antony I. T. Rowstron}, title = {Location independent compact routing for wireless networks}, booktitle = {Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, MobiShare@MobiCom 2006, Los Angeles, California, USA, July 25, 2006}, pages = {57--59}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161252.1161267}, doi = {10.1145/1161252.1161267}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/GilbertJWZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iptps/2006, editor = {Emin G{\"{u}}n Sirer and Ben Y. Zhao}, title = {5th International workshop on Peer-To-Peer Systems, {IPTPS} 2006, Santa Barbara, CA, USA, February 27-28, 2006}, year = {2006}, timestamp = {Fri, 09 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptps/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LianZWZ05, author = {Qiao Lian and Wei Chen and Zheng Zhang and Shaomei Wu and Ben Y. Zhao}, title = {Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol}, booktitle = {13th {IEEE} International Conference on Network Protocols {(ICNP} 2005), 6-9 November 2005, Boston, MA, {USA}}, pages = {132--146}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICNP.2005.45}, doi = {10.1109/ICNP.2005.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LianZWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/KonradZJ05, author = {Almudena Konrad and Ben Y. Zhao and Anthony D. Joseph}, title = {Choosing an Accurate Network Model using Domain Analysis}, booktitle = {11th International Conference on Parallel and Distributed Systems, {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005}, pages = {100--104}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPADS.2005.301}, doi = {10.1109/ICPADS.2005.301}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/KonradZJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/TianXZLZL05, author = {Ruixiong Tian and Yongqiang Xiong and Qian Zhang and Bo Li and Ben Y. Zhao and Xing Li}, editor = {Miguel Castro and Robbert van Renesse}, title = {Hybrid Overlay Structure Based on Random Walks}, booktitle = {Peer-to-Peer Systems IV, 4th International Workshop, {IPTPS} 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3640}, pages = {152--162}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558989\_14}, doi = {10.1007/11558989\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iptps/TianXZLZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/ChunZK05, author = {Byung{-}Gon Chun and Ben Y. Zhao and John Kubiatowicz}, editor = {Miguel Castro and Robbert van Renesse}, title = {Impact of Neighbor Selection on Performance and Resilience of Structured {P2P} Networks}, booktitle = {Peer-to-Peer Systems IV, 4th International Workshop, {IPTPS} 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3640}, pages = {264--274}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11558989\_24}, doi = {10.1007/11558989\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iptps/ChunZK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/SwamynathanZA05, author = {Gayatri Swamynathan and Ben Y. Zhao and Kevin C. Almeroth}, editor = {Guihai Chen and Yi Pan and Minyi Guo and Jian Lu}, title = {Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System}, booktitle = {Parallel and Distributed Processing and Applications - {ISPA} 2005 Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3759}, pages = {82--90}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576259\_10}, doi = {10.1007/11576259\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispa/SwamynathanZA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/ZhuangZZR05, author = {Li Zhuang and Feng Zhou and Ben Y. Zhao and Antony I. T. Rowstron}, editor = {Amin Vahdat and David Wetherall}, title = {Cashmere: Resilient Anonymous Routing}, booktitle = {2nd Symposium on Networked Systems Design and Implementation {(NSDI} 2005), May 2-4, 2005, Boston, Massachusetts, USA, Proceedings}, publisher = {{USENIX}}, year = {2005}, url = {http://www.usenix.org/events/nsdi05/tech/zhuang.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/ZhuangZZR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ZhaoHSRJK04, author = {Ben Y. Zhao and Ling Huang and Jeremy Stribling and Sean C. Rhea and Anthony D. Joseph and John Kubiatowicz}, title = {Tapestry: a resilient global-scale overlay for service deployment}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {22}, number = {1}, pages = {41--53}, year = {2004}, url = {https://doi.org/10.1109/JSAC.2003.818784}, doi = {10.1109/JSAC.2003.818784}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ZhaoHSRJK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/HildrumKRZ04, author = {Kirsten Hildrum and John D. Kubiatowicz and Satish Rao and Ben Y. Zhao}, title = {Distributed Object Location in a Dynamic Network}, journal = {Theory Comput. Syst.}, volume = {37}, number = {3}, pages = {405--440}, year = {2004}, url = {https://doi.org/10.1007/s00224-004-1146-6}, doi = {10.1007/S00224-004-1146-6}, timestamp = {Tue, 12 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mst/HildrumKRZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/ZhaoHJK04, author = {Ben Y. Zhao and Ling Huang and Anthony D. Joseph and John Kubiatowicz}, editor = {Geoffrey M. Voelker and Scott Shenker}, title = {Rapid Mobility via Type Indirection}, booktitle = {Peer-to-Peer Systems III, Third International Workshop, {IPTPS} 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3279}, pages = {64--74}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30183-7\_7}, doi = {10.1007/978-3-540-30183-7\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iptps/ZhaoHJK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/YangCZDZ04, author = {Mao Yang and Hua Chen and Ben Y. Zhao and Yafei Dai and Zheng Zhang}, editor = {David E. Culler and Timothy Roscoe}, title = {Deployment of a Large-scale Peer-to-Peer Social Network}, booktitle = {First {USENIX} Workshop on Real, Large Distributed Systems, WORLDS'04, San Francisco, CA, USA, December 5, 2004}, publisher = {{USENIX} Association}, year = {2004}, url = {https://www.usenix.org/conference/worlds-04/deployment-large-scale-peer-peer-social-network}, timestamp = {Tue, 02 Feb 2021 08:06:00 +0100}, biburl = {https://dblp.org/rec/conf/osdi/YangCZDZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/KonradZJL03, author = {Almudena Konrad and Ben Y. Zhao and Anthony D. Joseph and Reiner Ludwig}, title = {A Markov-Based Channel Model Algorithm for Wireless Networks}, journal = {Wirel. Networks}, volume = {9}, number = {3}, pages = {189--199}, year = {2003}, url = {https://doi.org/10.1023/A:1022869025953}, doi = {10.1023/A:1022869025953}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/KonradZJL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/RheaEGWZK03, author = {Sean C. Rhea and Patrick R. Eaton and Dennis Geels and Hakim Weatherspoon and Ben Y. Zhao and John Kubiatowicz}, editor = {Jeff Chase}, title = {Pond: The OceanStore Prototype}, booktitle = {Proceedings of the {FAST} '03 Conference on File and Storage Technologies, March 31 - April 2, 2003, Cathedral Hill Hotel, San Francisco, California, {USA}}, publisher = {{USENIX}}, year = {2003}, url = {http://www.usenix.org/events/fast03/tech/rhea.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/RheaEGWZK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/ZhaoHSJK03, author = {Ben Y. Zhao and Ling Huang and Jeremy Stribling and Anthony D. Joseph and John Kubiatowicz}, title = {Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays}, booktitle = {11th {IEEE} International Conference on Network Protocols {(ICNP} 2003), 4-7 November 2003, Atlanta, GA, {USA}}, pages = {246--257}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICNP.2003.1249775}, doi = {10.1109/ICNP.2003.1249775}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/ZhaoHSJK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/DabekZDKS03, author = {Frank Dabek and Ben Y. Zhao and Peter Druschel and John Kubiatowicz and Ion Stoica}, editor = {M. Frans Kaashoek and Ion Stoica}, title = {Towards a Common {API} for Structured Peer-to-Peer Overlays}, booktitle = {Peer-to-Peer Systems II, Second International Workshop, {IPTPS} 2003, Berkeley, CA, USA, February 21-22,2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2735}, pages = {33--44}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45172-3\_3}, doi = {10.1007/978-3-540-45172-3\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iptps/DabekZDKS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/ZhouZZHJK03, author = {Feng Zhou and Li Zhuang and Ben Y. Zhao and Ling Huang and Anthony D. Joseph and John Kubiatowicz}, editor = {Markus Endler and Douglas C. Schmidt}, title = {Approximate Object Location and Spam Filtering on Peer-to-Peer Systems}, booktitle = {Middleware 2003, {ACM/IFIP/USENIX} International Middleware Conference, Rio de Janeiro, Brazil, June 16-20, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2672}, pages = {1--20}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44892-6\_1}, doi = {10.1007/3-540-44892-6\_1}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/middleware/ZhouZZHJK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ac/2003dc, editor = {Andr{\'{e}} Schiper and Alexander A. Shvartsman and Hakim Weatherspoon and Ben Y. Zhao}, title = {Future Directions in Distributed Computing, Research and Position Papers}, series = {Lecture Notes in Computer Science}, volume = {2584}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-37795-6}, doi = {10.1007/3-540-37795-6}, isbn = {3-540-00912-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/2003dc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/ZhaoKJ02, author = {Ben Y. Zhao and John Kubiatowicz and Anthony D. Joseph}, title = {Tapestry: a fault-tolerant wide-area application infrastructure}, journal = {Comput. Commun. Rev.}, volume = {32}, number = {1}, pages = {81}, year = {2002}, url = {https://doi.org/10.1145/510726.510755}, doi = {10.1145/510726.510755}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/ZhaoKJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/HodesCZJK02, author = {Todd D. Hodes and Steven E. Czerwinski and Ben Y. Zhao and Anthony D. Joseph and Randy H. Katz}, title = {An Architecture for Secure Wide-Area Service Discovery}, journal = {Wirel. Networks}, volume = {8}, number = {2-3}, pages = {213--230}, year = {2002}, url = {https://doi.org/10.1023/A:1013772027164}, doi = {10.1023/A:1013772027164}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/HodesCZJK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/ZhaoDHJK02, author = {Ben Y. Zhao and Yitao Duan and Ling Huang and Anthony D. Joseph and John Kubiatowicz}, editor = {Peter Druschel and M. Frans Kaashoek and Antony I. T. Rowstron}, title = {Brocade: Landmark Routing on Overlay Networks}, booktitle = {Peer-to-Peer Systems, First International Workshop, {IPTPS} 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2429}, pages = {34--44}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45748-8\_3}, doi = {10.1007/3-540-45748-8\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iptps/ZhaoDHJK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/HildrumKRZ02, author = {Kirsten Hildrum and John Kubiatowicz and Satish Rao and Ben Y. Zhao}, editor = {Arnold L. Rosenberg and Bruce M. Maggs}, title = {Distributed object location in a dynamic network}, booktitle = {Proceedings of the Fourteenth Annual {ACM} Symposium on Parallel Algorithms and Architectures, {SPAA} 2002, Winnipeg, Manitoba, Canada, August 11-13, 2002}, pages = {41--52}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/564870.564877}, doi = {10.1145/564870.564877}, timestamp = {Wed, 21 Nov 2018 12:27:44 +0100}, biburl = {https://dblp.org/rec/conf/spaa/HildrumKRZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GribbleWBBCBCGHJKMRZ01, author = {Steven D. Gribble and Matt Welsh and J. Robert von Behren and Eric A. Brewer and David E. Culler and Nikita Borisov and Steven E. Czerwinski and Ramakrishna Gummadi and Jon R. Hill and Anthony D. Joseph and Randy H. Katz and Zhuoqing Morley Mao and Steven J. Ross and Ben Y. Zhao}, title = {The Ninja architecture for robust Internet-scale systems and services}, journal = {Comput. Networks}, volume = {35}, number = {4}, pages = {473--497}, year = {2001}, url = {https://doi.org/10.1016/S1389-1286(00)00179-1}, doi = {10.1016/S1389-1286(00)00179-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/GribbleWBBCBCGHJKMRZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/RheaWEGZWK01, author = {Sean C. Rhea and Chris Wells and Patrick R. Eaton and Dennis Geels and Ben Y. Zhao and Hakim Weatherspoon and John Kubiatowicz}, title = {Maintenance-Free Global Data Storage}, journal = {{IEEE} Internet Comput.}, volume = {5}, number = {5}, pages = {40--49}, year = {2001}, url = {https://doi.org/10.1109/4236.957894}, doi = {10.1109/4236.957894}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/RheaWEGZWK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/KonradZJL01, author = {Almudena Konrad and Ben Y. Zhao and Anthony D. Joseph and Reiner Ludwig}, editor = {Michela Meo and Teresa A. Dahlberg and Lorenzo Donatiello}, title = {A Markov-based channel model algorithm for wireless networks}, booktitle = {Proceedings of the 4th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2001, Rome, Italy, 2001}, pages = {28--36}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/381591.381602}, doi = {10.1145/381591.381602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mswim/KonradZJL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nossdav/ZhuangZJKK01, author = {Shelley Zhuang and Ben Y. Zhao and Anthony D. Joseph and Randy H. Katz and John Kubiatowicz}, title = {Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination}, booktitle = {Network and Operating System Support for Digital Audio and Video, 11th International Workshop, {NOSSDAV} 2001, Port Jefferson, NY, USA, June 25-26, 2001, Proceedings}, pages = {11--20}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/378344.378347}, doi = {10.1145/378344.378347}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nossdav/ZhuangZJKK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/WangRCBGHHKMSSZJK00, author = {Helen J. Wang and Bhaskaran Raman and Chen{-}Nee Chuah and Rahul Biswas and Ramakrishna Gummadi and Barbara Hohlt and Xia Hong and Emre Kiciman and Zhuoqing Morley Mao and Jimmy S. Shih and Lakshminarayanan Subramanian and Ben Y. Zhao and Anthony D. Joseph and Randy H. Katz}, title = {{ICEBERG:} an Internet core network architecture for integrated communications}, journal = {{IEEE} Wirel. Commun.}, volume = {7}, number = {4}, pages = {10--19}, year = {2000}, url = {https://doi.org/10.1109/98.863991}, doi = {10.1109/98.863991}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/WangRCBGHHKMSSZJK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/KubiatowiczBCCEGGRWWWZ00, author = {John Kubiatowicz and David Bindel and Yan Chen and Steven E. Czerwinski and Patrick R. Eaton and Dennis Geels and Ramakrishna Gummadi and Sean C. Rhea and Hakim Weatherspoon and Westley Weimer and Chris Wells and Ben Y. Zhao}, editor = {Larry Rudolph and Anoop Gupta}, title = {OceanStore: An Architecture for Global-Scale Persistent Storage}, booktitle = {{ASPLOS-IX} Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, 2000}, pages = {190--201}, publisher = {{ACM} Press}, year = {2000}, url = {https://doi.org/10.1145/378993.379239}, doi = {10.1145/378993.379239}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asplos/KubiatowiczBCCEGGRWWWZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/CzerwinskiZHJK99, author = {Steven E. Czerwinski and Ben Y. Zhao and Todd D. Hodes and Anthony D. Joseph and Randy H. Katz}, editor = {Harel Kodesh and Victor Bahl and Tomasz Imielinski and Martha Steenstrup}, title = {An Architecture for a Secure Service Discovery Service}, booktitle = {{MOBICOM} '99, The Fifth Annual {ACM/IEEE} International Conference on Mobile Computing and Networking, Seattle, Washington, USA, August 15-19, 1999}, pages = {24--35}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/313451.313462}, doi = {10.1145/313451.313462}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/CzerwinskiZHJK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.