default search action
Ben Y. Zhao
Person information
- affiliation: University of Chicago, Chicago, IL, USA
- affiliation (former): University of California, Santa Barbara, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j44]Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. Proc. Priv. Enhancing Technol. 2024(1): 413-429 (2024) - [c147]Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng:
Towards Scalable and Robust Model Versioning. SaTML 2024: 592-611 - [c146]Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao:
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. SP 2024: 807-825 - [c145]Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng:
Can Virtual Reality Protect Users from Keystroke Inference Attacks? USENIX Security Symposium 2024 - [i45]Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng:
Towards Scalable and Robust Model Versioning. CoRR abs/2401.09574 (2024) - [i44]Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao:
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? CoRR abs/2402.03214 (2024) - [i43]Zhuolin Yang, Cathy Yuanchen Li, Arman Bhalla, Ben Y. Zhao, Haitao Zheng:
Inception Attacks: Immersive Hijacking in Virtual Reality Systems. CoRR abs/2403.05721 (2024) - [i42]Josephine Passananti, Stanley Wu, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
Disrupting Style Mimicry Attacks on Video Imagery. CoRR abs/2405.06865 (2024) - 2023
- [j43]Zhujun Xiao, Jenna Cryan, Yuanshun Yao, Yi Hong Gordon Cheo, Yuanchao Shu, Stefan Saroiu, Ben Y. Zhao, Haitao Zheng:
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing. Proc. Priv. Enhancing Technol. 2023(3): 252-267 (2023) - [j42]Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao:
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions. IEEE Trans. Mob. Comput. 22(1): 556-573 (2023) - [c144]Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. SP 2023: 864-881 - [c143]Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng:
Towards a General Video-based Keystroke Inference Attack. USENIX Security Symposium 2023: 141-158 - [c142]Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao:
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. USENIX Security Symposium 2023: 2187-2204 - [i41]Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao:
GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models. CoRR abs/2302.04222 (2023) - [i40]Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Ben Y. Zhao, Haitao Zheng, Prateek Mittal:
Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker. CoRR abs/2302.10722 (2023) - [i39]Shawn Shan, Wenxin Ding, Josephine Passananti, Haitao Zheng, Ben Y. Zhao:
Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. CoRR abs/2310.13828 (2023) - [i38]Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng:
Can Virtual Reality Protect Users from Keystroke Inference Attacks? CoRR abs/2310.16191 (2023) - [i37]Shawn Shan, Stanley Wu, Haitao Zheng, Ben Y. Zhao:
A Response to Glaze Purification via IMPRESS. CoRR abs/2312.07731 (2023) - 2022
- [c141]Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. CCS 2022: 2611-2625 - [c140]Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Heather Zheng, Prateek Mittal:
Understanding Robust Learning through the Lens of Representation Similarities. NeurIPS 2022 - [c139]Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Heather Zheng, Ben Y. Zhao:
Finding Naturally Occurring Physical Backdoors in Image Datasets. NeurIPS 2022 - [c138]Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao:
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. USENIX Security Symposium 2022: 2117-2134 - [c137]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. USENIX Security Symposium 2022: 3575-3592 - [i36]Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao:
Assessing Privacy Risks from Feature Vector Reconstruction Attacks. CoRR abs/2202.05760 (2022) - [i35]Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. CoRR abs/2205.10686 (2022) - [i34]Huiying Li, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng:
Can Backdoor Attacks Survive Time-Varying Models? CoRR abs/2206.04677 (2022) - [i33]Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Prateek Mittal:
Understanding Robust Learning through the Lens of Representation Similarities. CoRR abs/2206.09868 (2022) - [i32]Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao:
Natural Backdoor Datasets. CoRR abs/2206.10673 (2022) - [i31]Emily Wenger, Xiuyu Li, Ben Y. Zhao, Vitaly Shmatikov:
Data Isotopes for Data Provenance in DNNs. CoRR abs/2208.13893 (2022) - 2021
- [j41]Huan Yan, Haohao Fu, Yong Li, Tzu-Heng Lin, Gang Wang, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
On Migratory Behavior in Video Consumption. IEEE Trans. Netw. Serv. Manag. 18(2): 1775-1788 (2021) - [c136]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Patch-based Defenses against Web Fingerprinting Attacks. AISec@CCS 2021: 97-109 - [c135]Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao:
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. CCS 2021: 235-251 - [c134]Yuxin Chen, Zhuolin Yang, Ruben Abbou, Pedro Lopes, Ben Y. Zhao, Haitao Zheng:
User Authentication via Electrical Muscle Stimulation. CHI 2021: 6:1-6:15 - [c133]Yuxin Chen, Zhuolin Yang, Ruben Abbou, Pedro Lopes, Ben Y. Zhao, Haitao Zheng:
Demonstrating User Authentication via Electrical Muscle Stimulation. CHI Extended Abstracts 2021: 191:1-191:5 - [c132]Emily Wenger, Josephine Passananti, Arjun Nitin Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao:
Backdoor Attacks Against Deep Learning Systems in the Physical World. CVPR 2021: 6206-6215 - [c131]Zhujun Xiao, Zhengxu Xia, Haitao Zheng, Ben Y. Zhao, Junchen Jiang:
Towards Performance Clarity of Edge Video Analytics. SEC 2021: 148-164 - [i30]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
A Real-time Defense against Website Fingerprinting Attacks. CoRR abs/2102.04291 (2021) - [i29]Zhujun Xiao, Zhengxu Xia, Haitao Zheng, Ben Y. Zhao, Junchen Jiang:
Towards Performance Clarity of Edge Video Analytics. CoRR abs/2105.08694 (2021) - [i28]Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao:
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. CoRR abs/2109.09598 (2021) - [i27]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Traceback of Data Poisoning Attacks in Neural Networks. CoRR abs/2110.06904 (2021) - [i26]Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. CoRR abs/2112.04558 (2021) - 2020
- [c130]Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao:
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks. CCS 2020: 67-83 - [c129]Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, Haitao Zheng:
Wearable Microphone Jamming. CHI 2020: 1-12 - [c128]Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Haitao Zheng, Ben Y. Zhao:
Demonstrating Wearable Microphone Jamming. CHI Extended Abstracts 2020: 1-4 - [c127]Jenna Cryan, Shiliang Tang, Xinyi Zhang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods. CHI 2020: 1-11 - [c126]Qinge Xie, Tiancheng Guo, Yang Chen, Yu Xiao, Xin Wang, Ben Y. Zhao:
Deep Graph Convolutional Networks for Incident-Driven Traffic Speed Prediction. CIKM 2020: 1665-1674 - [c125]Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Heather Zheng:
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors. NDSS 2020 - [c124]Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. USENIX Security Symposium 2020: 1589-1604 - [e6]Ben Y. Zhao, Heather Zheng, Harsha V. Madhyastha, Venkat N. Padmanabhan:
HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4-6, 2020. ACM 2020, ISBN 978-1-4503-8145-1 [contents] - [i25]Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models. CoRR abs/2002.08327 (2020) - [i24]Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao:
Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks. CoRR abs/2006.14042 (2020) - [i23]Emily Wenger, Josephine Passananti, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao:
Backdoor Attacks on Facial Recognition in the Physical World. CoRR abs/2006.14580 (2020)
2010 – 2019
- 2019
- [c123]Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Latent Backdoor Attacks on Deep Neural Networks. CCS 2019: 2041-2055 - [c122]Shiliang Tang, Ziming Wu, Xinyi Zhang, Gang Wang, Xiaojuan Ma, Haitao Zheng, Ben Y. Zhao:
Towards Understanding the Adoption and Social Experience of Digital Wallet Systems. HICSS 2019: 1-10 - [c121]Zhijing Li, Zhujun Xiao, Bolun Wang, Ben Y. Zhao, Haitao Zheng:
Scaling Deep Learning Models for Spectrum Anomaly Detection. MobiHoc 2019: 291-300 - [c120]Bingchuan Tian, Xinyi Zhang, Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang, Da Yu, Chen Tian, Haitao Zheng, Ben Y. Zhao:
Safely and automatically updating in-network ACL configurations with intent language. SIGCOMM 2019: 214-226 - [c119]Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. IEEE Symposium on Security and Privacy 2019: 707-723 - [i22]Yuxin Chen, Huiying Li, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, Haitao Zheng:
Understanding the Effectiveness of Ultrasonic Microphone Jammer. CoRR abs/1904.08490 (2019) - [i21]Shawn Shan, Emily Willson, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao:
Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks. CoRR abs/1904.08554 (2019) - [i20]Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks. CoRR abs/1905.10447 (2019) - [i19]Huiying Li, Emily Willson, Haitao Zheng, Ben Y. Zhao:
Persistent and Unforgeable Watermarks for Deep Neural Networks. CoRR abs/1910.01226 (2019) - [i18]Qinge Xie, Tiancheng Guo, Yang Chen, Yu Xiao, Xin Wang, Ben Y. Zhao:
"How do urban incidents affect traffic speed?" A Deep Graph Convolutional Network for Incident-driven Traffic Speed Prediction. CoRR abs/1912.01242 (2019) - [i17]Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao:
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions. CoRR abs/1912.01328 (2019) - 2018
- [j40]Miriam J. Metzger, Christo Wilson, Ben Y. Zhao:
Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites. J. Comput. Mediat. Commun. 23(2): 72-89 (2018) - [j39]Fengli Xu, Guozhen Zhang, Zhilong Chen, Jiaxin Huang, Yong Li, Diyi Yang, Ben Y. Zhao, Fanchao Meng:
Understanding Motivations behind Inaccurate Check-ins. Proc. ACM Hum. Comput. Interact. 2(CSCW): 188:1-188:22 (2018) - [j38]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services. IEEE/ACM Trans. Netw. 26(3): 1123-1136 (2018) - [c118]Ben Y. Zhao:
Insecure Machine Learning Systems and Their Impact on the Web. HT 2018: 63 - [c117]Xinyi Zhang, Shawn Shan, Shiliang Tang, Haitao Zheng, Ben Y. Zhao:
Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash. HT 2018: 123-127 - [c116]Zhi Yang, Yusi Zhang, Binghui Guo, Ben Y. Zhao, Yafei Dai:
DeepCredit: Exploiting User Cickstream for Loan Risk Prediction in P2P Lending. ICWSM 2018: 444-453 - [c115]Zhijing Li, Zihui Ge, Ajay Mahimkar, Jia Wang, Ben Y. Zhao, Haitao Zheng, Joanne Emmons, Laura Ogden:
Predictive Analysis in Network Function Virtualization. Internet Measurement Conference 2018: 161-167 - [c114]Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. USENIX Security Symposium 2018: 1281-1297 - [c113]Zhijing Li, Zhujun Xiao, Yanzi Zhu, Irene Pattarachanyakul, Ben Y. Zhao, Haitao Zheng:
Adversarial Localization against Wireless Cameras. HotMobile 2018: 87-92 - [i16]Zhujun Xiao, Yanzi Zhu, Yuxin Chen, Ben Y. Zhao, Junchen Jiang, Haitao Zheng:
Seeding Deep Learning using Wireless Localization. CoRR abs/1809.10242 (2018) - [i15]Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Haitao Zheng:
Adversarial WiFi Sensing. CoRR abs/1810.10109 (2018) - [i14]Yanzi Zhu, Ying Ju, Bolun Wang, Jenna Cryan, Ben Y. Zhao, Haitao Zheng:
Wireless Side-Lobe Eavesdropping Attacks. CoRR abs/1810.10157 (2018) - 2017
- [j37]Shiliang Tang, Xinyi Zhang, Jenna Cryan, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Gender Bias in the Job Market: A Longitudinal Analysis. Proc. ACM Hum. Comput. Interact. 1(CSCW): 99:1-99:19 (2017) - [j36]Ana Nika, Zengbin Zhang, Ben Y. Zhao, Haitao Zheng:
Toward Practical Spectrum Permits. IEEE Trans. Cogn. Commun. Netw. 3(1): 112-122 (2017) - [j35]Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao:
Value and Misinformation in Collaborative Investing Platforms. ACM Trans. Web 11(2): 8:1-8:32 (2017) - [j34]Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, Ben Y. Zhao:
Clickstream User Behavior Models. ACM Trans. Web 11(4): 21:1-21:37 (2017) - [c112]Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao:
Automated Crowdturfing Attacks and Defenses in Online Review Systems. CCS 2017: 1143-1158 - [c111]Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
On Migratory Behavior in Video Consumption. CIKM 2017: 1109-1118 - [c110]Shiliang Tang, Qingyun Liu, Megan McQueen, Scott Counts, Apurv Jain, Haitao Zheng, Ben Y. Zhao:
Echo Chambers in Investment Discussion Boards. ICWSM 2017: 240-249 - [c109]Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao:
Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System. ICWSM 2017: 387-396 - [c108]Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
A First Look at User Switching Behaviors Over Multiple Video Content Providers. ICWSM 2017: 700-703 - [c107]Yuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Complexity vs. performance: empirical analysis of machine learning as a service. Internet Measurement Conference 2017: 384-397 - [c106]Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao, Haitao Zheng:
Object Recognition and Navigation using a Single Networking Device. MobiSys 2017: 265-277 - [c105]Michael Nekrasov, Daniel Iland, Miriam J. Metzger, Ben Y. Zhao, Elizabeth M. Belding:
SecurePost: Verified Group-Anonymity on Social Media. FOCI @ USENIX Security Symposium 2017 - [c104]Zhijing Li, Ana Nika, Xinyi Zhang, Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao, Haitao Zheng:
Identifying Value in Crowdsourced Wireless Signal Measurements. WWW 2017: 607-616 - [i13]Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao:
Automated Crowdturfing Attacks and Defenses in Online Review Systems. CoRR abs/1708.08151 (2017) - 2016
- [j33]Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao:
The power of comments: fostering social interactions in microblog networks. Frontiers Comput. Sci. 10(5): 889-907 (2016) - [j32]Ana Nika, Asad Ismail, Ben Y. Zhao, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng:
Understanding and Predicting Data Hotspots in Cellular Networks. Mob. Networks Appl. 21(3): 402-413 (2016) - [j31]Qingyun Liu, Xiaohan Zhao, Walter Willinger, Xiao Wang, Ben Y. Zhao, Haitao Zheng:
Self-Similarity in Social Network Dynamics. ACM Trans. Model. Perform. Evaluation Comput. Syst. 2(1): 5:1-5:26 (2016) - [c103]Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao:
Unsupervised Clickstream Clustering for User Behavior Analysis. CHI 2016: 225-236 - [c102]Yanzi Zhu, Yibo Zhu, Ana Nika, Ben Y. Zhao, Haitao Zheng:
Trimming the Smartphone Network Stack. HotNets 2016: 176-182 - [c101]Gang Wang, Sarita Yardi Schoenebeck, Haitao Zheng, Ben Y. Zhao:
"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks. ICWSM 2016: 417-426 - [c100]Qingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao, Haitao Zheng:
Network Growth and Link Prediction Through an Empirical Lens. Internet Measurement Conference 2016: 1-15 - [c99]Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao:
Anatomy of a Personalized Livestreaming System. Internet Measurement Conference 2016: 485-498 - [c98]Guangyuan Wu, Fangming Liu, Haowen Tang, Keke Huang, Qixia Zhang, Zhenhua Li, Ben Y. Zhao, Hai Jin:
On the performance of cloud storage applications with global measurement. IWQoS 2016: 1-10 - [c97]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Poster: Defending against Sybil Devices in Crowdsourced Mapping Services. MobiSys (Companion Volume) 2016: 146 - [c96]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Defending against Sybil Devices in Crowdsourced Mapping Services. MobiSys 2016: 179-191 - [c95]Zhenhua Li, Weiwei Wang, Tianyin Xu, Xin Zhong, Xiang-Yang Li, Yunhao Liu, Christo Wilson, Ben Y. Zhao:
Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard. NSDI 2016: 61-76 - [c94]Ana Nika, Zhijing Li, Yanzi Zhu, Yibo Zhu, Ben Y. Zhao, Xia Zhou, Haitao Zheng:
Empirical Validation of Commodity Spectrum Monitoring. SenSys 2016: 96-108 - [e5]Jacqueline Bourdeau, Jim Hendler, Roger Nkambou, Ian Horrocks, Ben Y. Zhao:
Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, April 11 - 15, 2016. ACM 2016, ISBN 978-1-4503-4143-1 [contents] - [e4]Jacqueline Bourdeau, Jim Hendler, Roger Nkambou, Ian Horrocks, Ben Y. Zhao:
Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, April 11-15, 2016, Companion Volume. ACM 2016, ISBN 978-1-4503-4144-8 [contents] - 2015
- [j30]Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:
Practical Conflict Graphs in the Wild. IEEE/ACM Trans. Netw. 23(3): 824-835 (2015) - [c93]Xiaohan Zhao, Qingyun Liu, Haitao Zheng, Ben Y. Zhao:
Towards Graph Watermarks. COSN 2015: 101-112 - [c92]Zhi Yang, Jilong Xue, Christo Wilson, Ben Y. Zhao, Yafei Dai:
Process-driven Analysis of Dynamics in Online Social Interactions. COSN 2015: 139-149 - [c91]Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao:
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms. CSCW 2015: 17-30 - [c90]Zhi Yang, Jilong Xue, Christo Wilson, Ben Y. Zhao, Yafei Dai:
Uncovering User Interaction Dynamics in Online Social Networks. ICWSM 2015: 698-701 - [c89]Yanzi Zhu, Yibo Zhu, Ben Y. Zhao, Haitao Zheng:
Reusing 60GHz Radios for Mobile Radar Imaging. MobiCom 2015: 103-116 - [c88]Yibo Zhu, Nanxi Kang, Jiaxin Cao, Albert G. Greenberg, Guohan Lu, Ratul Mahajan, David A. Maltz, Lihua Yuan, Ming Zhang, Ben Y. Zhao, Haitao Zheng:
Packet-Level Telemetry in Large Datacenter Networks. SIGCOMM 2015: 479-491 - [c87]Yibo Zhu, Yanzi Zhu, Zengbin Zhang, Ben Y. Zhao, Haitao Zheng:
60GHz Mobile Imaging Radar. HotMobile 2015: 75-80 - [c86]Ana Nika, Yibo Zhu, Ning Ding, Abhilash Jindal, Y. Charlie Hu, Xia Zhou, Ben Y. Zhao, Haitao Zheng:
Energy and Performance of Smartphone Radio Bundling in Outdoor Environments. WWW 2015: 809-819 - [i12]Xiaohan Zhao