Ben Y. Zhao

Affiliations:
  • University of Chicago, Chicago, IL, USA
  • University of California, Santa Barbara, USA (former)


According to our database1, Ben Y. Zhao authored at least 217 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Data Isotopes for Data Provenance in DNNs.
Proc. Priv. Enhancing Technol., January, 2024

MYCROFT: Towards Effective and Efficient External Data Augmentation.
CoRR, 2024

Understanding Implosion in Text-to-Image Generative Models.
CoRR, 2024

Disrupting Style Mimicry Attacks on Video Imagery.
CoRR, 2024

Inception Attacks: Immersive Hijacking in Virtual Reality Systems.
CoRR, 2024

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?
CoRR, 2024

Can Virtual Reality Protect Users from Keystroke Inference Attacks?
Proceedings of the 33rd USENIX Security Symposium, 2024

Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Towards Scalable and Robust Model Versioning.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024

2023
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing.
Proc. Priv. Enhancing Technol., July, 2023

Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions.
IEEE Trans. Mob. Comput., 2023

A Response to Glaze Purification via IMPRESS.
CoRR, 2023

Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models.
CoRR, 2023

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker.
CoRR, 2023

Towards a General Video-based Keystroke Inference Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models.
Proceedings of the 32nd USENIX Security Symposium, 2023

SoK: Anti-Facial Recognition Technology.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Natural Backdoor Datasets.
CoRR, 2022

Understanding Robust Learning through the Lens of Representation Similarities.
CoRR, 2022

Can Backdoor Attacks Survive Time-Varying Models?
CoRR, 2022

Assessing Privacy Risks from Feature Vector Reconstruction Attacks.
CoRR, 2022

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Finding Naturally Occurring Physical Backdoors in Image Datasets.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Understanding Robust Learning through the Lens of Representation Similarities.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
On Migratory Behavior in Video Consumption.
IEEE Trans. Netw. Serv. Manag., 2021

Traceback of Data Poisoning Attacks in Neural Networks.
CoRR, 2021

A Real-time Defense against Website Fingerprinting Attacks.
CoRR, 2021

Towards Performance Clarity of Edge Video Analytics.
Proceedings of the 6th IEEE/ACM Symposium on Edge Computing, 2021

Backdoor Attacks Against Deep Learning Systems in the Physical World.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

User Authentication via Electrical Muscle Stimulation.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Demonstrating User Authentication via Electrical Muscle Stimulation.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Patch-based Defenses against Web Fingerprinting Attacks.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
Backdoor Attacks on Facial Recognition in the Physical World.
CoRR, 2020

Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks.
CoRR, 2020

Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models.
CoRR, 2020

Fawkes: Protecting Privacy against Unauthorized Deep Learning Models.
Proceedings of the 29th USENIX Security Symposium, 2020

Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Deep Graph Convolutional Networks for Incident-Driven Traffic Speed Prediction.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Demonstrating Wearable Microphone Jamming.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Wearable Microphone Jamming.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
"How do urban incidents affect traffic speed?" A Deep Graph Convolutional Network for Incident-driven Traffic Speed Prediction.
CoRR, 2019

Persistent and Unforgeable Watermarks for Deep Neural Networks.
CoRR, 2019

Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks.
CoRR, 2019

Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks.
CoRR, 2019

Understanding the Effectiveness of Ultrasonic Microphone Jammer.
CoRR, 2019

Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Safely and automatically updating in-network ACL configurations with intent language.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Scaling Deep Learning Models for Spectrum Anomaly Detection.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

Towards Understanding the Adoption and Social Experience of Digital Wallet Systems.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Latent Backdoor Attacks on Deep Neural Networks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services.
IEEE/ACM Trans. Netw., 2018

Understanding Motivations behind Inaccurate Check-ins.
Proc. ACM Hum. Comput. Interact., 2018

Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites.
J. Comput. Mediat. Commun., 2018

Wireless Side-Lobe Eavesdropping Attacks.
CoRR, 2018

Adversarial WiFi Sensing.
CoRR, 2018

Seeding Deep Learning using Wireless Localization.
CoRR, 2018

Adversarial Localization against Wireless Cameras.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning.
Proceedings of the 27th USENIX Security Symposium, 2018

Predictive Analysis in Network Function Virtualization.
Proceedings of the Internet Measurement Conference 2018, 2018

DeepCredit: Exploiting User Cickstream for Loan Risk Prediction in P2P Lending.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Insecure Machine Learning Systems and Their Impact on the Web.
Proceedings of the 29th on Hypertext and Social Media, 2018

Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash.
Proceedings of the 29th on Hypertext and Social Media, 2018

2017
Clickstream User Behavior Models.
ACM Trans. Web, 2017

Value and Misinformation in Collaborative Investing Platforms.
ACM Trans. Web, 2017

Toward Practical Spectrum Permits.
IEEE Trans. Cogn. Commun. Netw., 2017

Gender Bias in the Job Market: A Longitudinal Analysis.
Proc. ACM Hum. Comput. Interact., 2017

Identifying Value in Crowdsourced Wireless Signal Measurements.
Proceedings of the 26th International Conference on World Wide Web, 2017

SecurePost: Verified Group-Anonymity on Social Media.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

Object Recognition and Navigation using a Single Networking Device.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Complexity vs. performance: empirical analysis of machine learning as a service.
Proceedings of the 2017 Internet Measurement Conference, 2017

Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

A First Look at User Switching Behaviors Over Multiple Video Content Providers.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Echo Chambers in Investment Discussion Boards.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

On Migratory Behavior in Video Consumption.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Automated Crowdturfing Attacks and Defenses in Online Review Systems.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Self-Similarity in Social Network Dynamics.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

Understanding and Predicting Data Hotspots in Cellular Networks.
Mob. Networks Appl., 2016

The power of comments: fostering social interactions in microblog networks.
Frontiers Comput. Sci., 2016

Empirical Validation of Commodity Spectrum Monitoring.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Poster: Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

On the performance of cloud storage applications with global measurement.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Anatomy of a Personalized Livestreaming System.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Network Growth and Link Prediction Through an Empirical Lens.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Trimming the Smartphone Network Stack.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

Unsupervised Clickstream Clustering for User Behavior Analysis.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Practical Conflict Graphs in the Wild.
IEEE/ACM Trans. Netw., 2015

Graph Watermarks.
CoRR, 2015

Attacks and Defenses in Crowdsourced Mapping Services.
CoRR, 2015

Energy and Performance of Smartphone Radio Bundling in Outdoor Environments.
Proceedings of the 24th International Conference on World Wide Web, 2015

60GHz Mobile Imaging Radar.
Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, 2015

Packet-Level Telemetry in Large Datacenter Networks.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Reusing 60GHz Radios for Mobile Radar Imaging.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Uncovering User Interaction Dynamics in Online Social Networks.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Towards Graph Watermarks.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Process-driven Analysis of Dynamics in Online Social Interactions.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

2014
Preserving Location Privacy in Geosocial Applications.
IEEE Trans. Mob. Comput., 2014

Uncovering social network Sybils in the wild.
ACM Trans. Knowl. Discov. Data, 2014

Crowds on Wall Street: Extracting Value from Social Investing Platforms.
CoRR, 2014

Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Understanding data hotspots in cellular networks.
Proceedings of the 10th International Conference on Heterogeneous Networking for Quality, 2014

Cutting the cord: a robust wireless facilities network for data centers.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Demystifying 60GHz outdoor picocells.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Towards commoditized real-time spectrum monitoring.
Proceedings of the 1st ACM workshop on Hot topics in wireless, HotWireless 2014, Maui, 2014

Whispers in the dark: analysis of an anonymous social network.
Proceedings of the 2014 Internet Measurement Conference, 2014

Link and Triadic Closure Delay: Temporal Metrics for Social Network Dynamics.
Proceedings of the Eighth International Conference on Weblogs and Social Media, 2014

2013
Understanding latent interactions in online social networks.
ACM Trans. Web, 2013

Measurement-Based Design of Roadside Content Delivery Systems.
IEEE Trans. Mob. Comput., 2013

On the Embeddability of Random Walk Distances.
Proc. VLDB Endow., 2013

Shortest Paths in Microseconds.
CoRR, 2013

Unfolding dynamics in a social network: co-evolution oflink formation and user interaction.
Proceedings of the 22nd International World Wide Web Conference, 2013

Wisdom in the social crowd: an analysis of quora.
Proceedings of the 22nd International World Wide Web Conference, 2013

You Are How You Click: Clickstream Analysis for Sybil Detection.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Practical conflict graphs for dynamic spectrum distribution.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Characterizing and detecting malicious crowdsourcing.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Social Turing Tests: Crowdsourcing Sybil Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services.
Proceedings of the Middleware 2013, 2013

Follow the green: growth and dynamics in twitter follower markets.
Proceedings of the 2013 Internet Measurement Conference, 2013

On the validity of geosocial mobility traces.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

2012
Beyond Social Graphs: User Interactions in Online Social Networks and their Implications.
ACM Trans. Web, 2012

The effectiveness of opportunistic spectrum access: a measurement study.
IEEE/ACM Trans. Netw., 2012

On the Bursty Evolution of Online Social Networks
CoRR, 2012

Serf and turf: crowdturfing for fun and profit.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Shortest paths in less than a millisecond.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Mirror mirror on the ceiling: flexible wireless links for data centers.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Enforcing dynamic spectrum access with spectrum permits.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Multi-scale dynamics in a massive online social network.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Measurement-calibrated conflict graphs for dynamic spectrum distribution.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

Enforcing dynamic spectrum access with spectrum permits.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2011
Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage.
IEEE Trans. Parallel Distributed Syst., 2011

The Impact of Infostation Density on Vehicular Data Dissemination.
Mob. Networks Appl., 2011

Revisiting Degree Distribution Models for Social Graph Analysis
CoRR, 2011

Fast and Scalable Analysis of Massive Social Graphs
CoRR, 2011

Papyrus: a software platform for distributed dynamic spectrum sharing using SDRs.
Comput. Commun. Rev., 2011

AirLab: consistency, fidelity and privacy in wireless measurements.
Comput. Commun. Rev., 2011

Privacy, availability and economics in the Polaris mobile social network.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

I am the antenna: accurate outdoor AP location using smartphones.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

Scaling Microblogging Services with Divergent Traffic Demands.
Proceedings of the Middleware 2011, 2011

Sharing graphs using differentially private graph models.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

3D beamforming for wireless data centers.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

Efficient shortest paths on massive social graphs.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Silverline: toward data confidentiality in storage-intensive cloud applications.
Proceedings of the ACM Symposium on Cloud Computing in conjunction with SOSP 2011, 2011

2010
The design of a reliable reputation system.
Electron. Commer. Res., 2010

Measurement-calibrated graph models for social network experiments.
Proceedings of the 19th International Conference on World Wide Web, 2010

Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip.
Proceedings of the 3rd Workshop on Online Social Networks, 2010

Preserving privacy in location-based mobile social applications.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

On Infostation Density of Vehicular Networks.
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010

Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Brief announcement: revisiting the power-law degree distribution for social graph analysis.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Supporting Demanding Wireless Applications with Frequency-agile Radios.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

The spaces between us: setting and maintaining boundaries in wireless spectrum access.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

AmazingStore: available, low-cost online storage service using cloudlets.
Proceedings of the 9th international conference on Peer-to-peer systems, 2010

On the feasibility of effective opportunistic spectrum access.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Exploiting locality of interest in online social networks.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Securing Structured Overlays against Identity Attacks.
IEEE Trans. Parallel Distributed Syst., 2009

Peer-exchange schemes to handle mismatch in peer-to-peer systems.
J. Supercomput., 2009

Rome: Performance and Anonymity using Route Meshes.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

User interactions in social networks and their implications.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

StarClique: guaranteeing user privacy in social networks against intersection attacks.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Special Issue: Recent Advances in Peer-to-Peer Systems and Security.
Concurr. Comput. Pract. Exp., 2008

Exploring the feasibility of proactive reputations.
Concurr. Comput. Pract. Exp., 2008

Do social networks improve e-commerce?: a study on social marketplaces.
Proceedings of the first Workshop on Online Social Networks, 2008

Probabilistic Failure Detection for Efficient Distributed Storage Maintenance.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Towards Reliable Reputations for Dynamic Networked Systems.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Searching for Rare Objects Using Index Replication.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Protecting anonymity in dynamic peer-to-peer networks.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

2007
QUORUM - Quality of Service in Wireless Mesh Networks.
Mob. Networks Appl., 2007

Globally Decoupled Reputations for Large Distributed Networks.
Adv. Multim., 2007

Toward the Next-Generation Peer-to-Peer Services.
Adv. Multim., 2007

QUORUM: quality of service routing in wireless mesh networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Fairness Attacks in the Explicit Control Protocol.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

HPTP: Relieving the Tension between ISPs and P2P.
Proceedings of the 6th International workshop on Peer-To-Peer Systems, 2007

Towards Location-aware Topology in both Unstructured and Structured P2P Systems.
Proceedings of the 2007 International Conference on Parallel Processing (ICPP 2007), 2007

An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Deploying Video-on-Demand Services on Cable Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Multi-channel Jamming Attacks using Cognitive Radios.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Integrated Data Location in Multihop Wireless Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
Utilization and fairness in spectrum assignment for opportunistic spectrum access.
Mob. Networks Appl., 2006

Determining model accuracy of network traces.
J. Comput. Syst. Sci., 2006

Energy consumption and conservation in mobile peer-to-peer systems.
Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, 2006

Location independent compact routing for wireless networks.
Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, 2006

Understanding user behavior in large-scale video-on-demand systems.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006

Parallelizing Skyline Queries for Scalable Distribution.
Proceedings of the Advances in Database Technology, 2006

2005
Cashmere: Resilient Anonymous Routing.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Hybrid Overlay Structure Based on Random Walks.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

Choosing an Accurate Network Model using Domain Analysis.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
Distributed Object Location in a Dynamic Network.
Theory Comput. Syst., 2004

Tapestry: a resilient global-scale overlay for service deployment.
IEEE J. Sel. Areas Commun., 2004

Deployment of a Large-scale Peer-to-Peer Social Network.
Proceedings of the First USENIX Workshop on Real, Large Distributed Systems, 2004

Rapid Mobility via Type Indirection.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
A Markov-Based Channel Model Algorithm for Wireless Networks.
Wirel. Networks, 2003

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems.
Proceedings of the Middleware 2003, 2003

Towards a Common API for Structured Peer-to-Peer Overlays.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

Pond: The OceanStore Prototype.
Proceedings of the FAST '03 Conference on File and Storage Technologies, March 31, 2003

2002
An Architecture for Secure Wide-Area Service Discovery.
Wirel. Networks, 2002

Tapestry: a fault-tolerant wide-area application infrastructure.
Comput. Commun. Rev., 2002

Brocade: Landmark Routing on Overlay Networks.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

2001
Maintenance-Free Global Data Storage.
IEEE Internet Comput., 2001

The Ninja architecture for robust Internet-scale systems and services.
Comput. Networks, 2001

Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001

2000
ICEBERG: an Internet core network architecture for integrated communications.
IEEE Wirel. Commun., 2000

OceanStore: An Architecture for Global-Scale Persistent Storage.
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000

1999
An Architecture for a Secure Service Discovery Service.
Proceedings of the MOBICOM '99, 1999


  Loading...