Benjamin Zi Hao Zhao

Orcid: 0000-0002-2774-2675

According to our database1, Benjamin Zi Hao Zhao authored at least 39 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Use of cryptography in malware obfuscation.
J. Comput. Virol. Hacking Tech., 2024

On the Robustness of Malware Detectors to Adversarial Samples.
CoRR, 2024

SenTopX: Benchmark for User Sentiment on Various Topics.
CoRR, 2024

GPTs Window Shopping: An analysis of the Landscape of Custom ChatGPT Models.
CoRR, 2024

Privacy-Preserving, Dropout-Resilient Aggregation in Decentralized Learning.
CoRR, 2024

Privacy-Preserving Aggregation for Decentralized Learning with Byzantine-Robustness.
CoRR, 2024

On Adversarial Training with Incorrect Labels.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts.
Proceedings of the 33rd USENIX Security Symposium, 2024

LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Unintended Memorization and Timing Attacks in Named Entity Recognition Models.
Proc. Priv. Enhancing Technol., April, 2023

DDoD: Dual Denial of Decision Attacks on Human-AI Teams.
IEEE Pervasive Comput., 2023

A longitudinal study of the top 1% toxic Twitter profiles.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

On mission Twitter Profiles: A Study of Selective Toxic Behavior.
Proceedings of the IEEE International Conference on Big Data, 2023

Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users.
Proceedings of the IEEE International Conference on Big Data, 2023

Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Deep Learning Backdoors.
Security and Artificial Intelligence, 2022

Backdoors Against Natural Language Processing: A Review.
IEEE Secur. Priv., 2022

SoK: Use of Cryptography in Malware Obfuscation.
IACR Cryptol. ePrint Arch., 2022

A deep dive into the consistently toxic 1% of Twitter.
CoRR, 2022

2021
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
IEEE Trans. Inf. Forensics Secur., 2021

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021

The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021

MANDERA: Malicious Node Detection in Federated Learning via Ranking.
CoRR, 2021

On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Hidden Backdoors in Human-Centric Language Models.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes.
ACM Trans. Priv. Secur., 2020

Deep Learning Backdoors.
CoRR, 2020

With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models.
CoRR, 2020

On the Resilience of Biometric Authentication Systems against Random Inputs.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning.
Proceedings of the CCSW'20, 2020

PALOR: Poisoning Attacks Against Logistic Regression.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Invisible Backdoor Attacks Against Deep Neural Networks.
CoRR, 2019

On Inferring Training Data Attributes in Machine Learning Models.
CoRR, 2019

The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT.
CoRR, 2019

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Proc. Priv. Enhancing Technol., 2018

2017
BehavioCog: An Observation Resistant Authentication Scheme.
Proceedings of the Financial Cryptography and Data Security, 2017

POSTER: TouchTrack: How Unique are your Touch Gestures?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...