Bin B. Zhu

Orcid: 0000-0002-3571-7808

Affiliations:
  • Microsoft Research Asia, Beijing, China
  • Cognicity, Inc., Edina, MN, USA (1997 - 2001)
  • University of Minnesota, Minneapolis, MN, USA (PhD 1998)


According to our database1, Bin B. Zhu authored at least 66 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AMPO: Automatic Multi-Branched Prompt Optimization.
CoRR, 2024

StraGo: Harnessing Strategic Guidance for Prompt Optimization.
CoRR, 2024

DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Backdoor Attacks on Bimodal Salient Object Detection with RGB-Thermal Data.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Towards Stricter Black-box Integrity Verification of Deep Neural Network Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Visually Analysing the Fairness of Clustered Federated Learning with Non-IID Data.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
Privacy-preserving Motion Detection for HEVC-compressed Surveillance Video.
ACM Trans. Multim. Comput. Commun. Appl., 2022

ChartStamp: Robust Chart Embedding for Real-World Applications.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

2021
Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2018
A Heuristic Framework to Detect Concurrency Vulnerabilities.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2014
Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems.
IEEE Trans. Inf. Forensics Secur., 2014

Security Analyses of Click-based Graphical Passwords via Image Point Memorability.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Security implications of password discretization for click-based graphical passwords.
Proceedings of the 22nd International World Wide Web Conference, 2013

Towards New Security Primitives Based on Hard AI Problems.
Proceedings of the Security Protocols XXI, 2013

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013

2011
Detecting Malicious Web Links and Identifying Their Attack Types.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

2010
Smart caching for web browsers.
Proceedings of the 19th International Conference on World Wide Web, 2010

Attacks and design of image recognition CAPTCHAs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
WPBench: a benchmark for evaluating the client-side performance of web 2.0 applications.
Proceedings of the 18th International Conference on World Wide Web, 2009

2008
Compoweb: a component-oriented web architecture.
Proceedings of the 17th International Conference on World Wide Web, 2008

A comprehensive human computation framework: with application to image labeling.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

A DRM System Protecting Consumer Privacy.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Deniable Internet Key-Exchange.
IACR Cryptol. ePrint Arch., 2007

Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability.
EURASIP J. Inf. Secur., 2007

An Efficient Certified Email Protocol.
Proceedings of the Information Security, 10th International Conference, 2007

When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication.
Proceedings of the Information Security Practice and Experience, 2006

An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Scalable protection for MPEG-4 fine granularity scalability.
IEEE Trans. Multim., 2005

Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis.
IACR Cryptol. ePrint Arch., 2005

A Note on the Cramer-Damgård Identification Scheme.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Secure Key Management for Flexible Digital Rights Management of Scalable Codestreams.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

JPEG 2000 encryption enabling fine granularity scalability without decryption.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

A framework of scalable layered access control for multimedia.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

JPEG 2000 syntax-compliant encryption preserving full scalability.
Proceedings of the 2005 International Conference on Image Processing, 2005

Optimal packetization of fine granularity scalability codestreams for error-prone channels.
Proceedings of the 2005 International Conference on Image Processing, 2005

ThresPassport - A Distributed Single Sign-On Service.
Proceedings of the Advances in Intelligent Computing, 2005

A DRM System Supporting What You See Is What You Pay.
Proceedings of the Digital Rights Management: Technologies, 2005

A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network.
Proceedings of the Digital Rights Management: Technologies, 2005

2004
When seeing isn't believing [multimedia authentication technologies].
IEEE Signal Process. Mag., 2004

New attacks on SARI image authentication system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

An efficient key scheme for layered access control of MPEG-4 FGS video.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

A secure image authentication algorithm with pixel-level tamper localization.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Efficient and fully scalable encryption for MPEG-4 FGS.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Layered access control for MPEG-4 FGS video.
Proceedings of the 2003 International Conference on Image Processing, 2003

PLI: A New Framework to Protect Digital Content for P2P Networks.
Proceedings of the Applied Cryptography and Network Security, 2003

1999
Arithmetic coding with dual symbol sets and its performance analysis.
IEEE Trans. Image Process., 1999

Current State of the Art - Challenges and Future Directions for Audio Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Data embedding in audio: where do we stand.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
Robust audio watermarking using perceptual masking.
Signal Process., 1998

Multiresolution scene-based video watermarking using perceptual models.
IEEE J. Sel. Areas Commun., 1998

1997
Object-based transparent video watermarking.
Proceedings of the First IEEE Workshop on Multimedia Signal Processing, 1997

Image Coding by Folding.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Data Hiding for Video-in-Video.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Multiresolution Video Watermarking Using Perceptual Models and Scene Segmentation.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
Transparent robust image watermarking.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Dual set arithmetic coding and its applications to image coding.
Proceedings of the 8th European Signal Processing Conference, 1996

1995
Image coding with wavelet representations, edge information and visual masking.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

Image coding with mixed representations and visual masking.
Proceedings of the 1995 International Conference on Acoustics, 1995


  Loading...