Benjamin Zi Hao Zhao
Orcid: 0000-0002-2774-2675
According to our database1,
Benjamin Zi Hao Zhao
authored at least 39 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Proc. Priv. Enhancing Technol., April, 2023
IEEE Pervasive Comput., 2023
Proceedings of the 15th ACM Web Science Conference 2023, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
2021
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
IEEE Trans. Inf. Forensics Secur., 2021
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes.
ACM Trans. Priv. Secur., 2020
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models.
CoRR, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning.
Proceedings of the CCSW'20, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
CoRR, 2019
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Proc. Priv. Enhancing Technol., 2018
2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017