Haitao Zheng

Affiliations:
  • University of Chicago, IL, USA
  • University of California, Santa Barbara, Department Computer Science, CA, USA


According to our database1, Haitao Zheng authored at least 164 papers between 2005 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2022, "For contributions to wireless networking and mobile computing".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Disrupting Style Mimicry Attacks on Video Imagery.
CoRR, 2024

Inception Attacks: Immersive Hijacking in Virtual Reality Systems.
CoRR, 2024

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?
CoRR, 2024

Can Virtual Reality Protect Users from Keystroke Inference Attacks?
Proceedings of the 33rd USENIX Security Symposium, 2024

Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Towards Scalable and Robust Model Versioning.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024

2023
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing.
Proc. Priv. Enhancing Technol., July, 2023

Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions.
IEEE Trans. Mob. Comput., 2023

A Response to Glaze Purification via IMPRESS.
CoRR, 2023

Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models.
CoRR, 2023

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker.
CoRR, 2023

Towards a General Video-based Keystroke Inference Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models.
Proceedings of the 32nd USENIX Security Symposium, 2023

SoK: Anti-Facial Recognition Technology.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Natural Backdoor Datasets.
CoRR, 2022

Can Backdoor Attacks Survive Time-Varying Models?
CoRR, 2022

Assessing Privacy Risks from Feature Vector Reconstruction Attacks.
CoRR, 2022

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Finding Naturally Occurring Physical Backdoors in Image Datasets.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Understanding Robust Learning through the Lens of Representation Similarities.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
On Migratory Behavior in Video Consumption.
IEEE Trans. Netw. Serv. Manag., 2021

Traceback of Data Poisoning Attacks in Neural Networks.
CoRR, 2021

A Real-time Defense against Website Fingerprinting Attacks.
CoRR, 2021

Understanding the Effect of Bias in Deep Anomaly Detection.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Towards Performance Clarity of Edge Video Analytics.
Proceedings of the 6th IEEE/ACM Symposium on Edge Computing, 2021

Backdoor Attacks Against Deep Learning Systems in the Physical World.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Artificial Reasoning Toward Goal-Oriented Adaptive Arrays of Sensors.
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021

User Authentication via Electrical Muscle Stimulation.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Demonstrating User Authentication via Electrical Muscle Stimulation.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Patch-based Defenses against Web Fingerprinting Attacks.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
Artificial Noise Hopping: A Practical Secure Transmission Technique With Experimental Analysis for Millimeter Wave Systems.
IEEE Syst. J., 2020

Backdoor Attacks on Facial Recognition in the Physical World.
CoRR, 2020

Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks.
CoRR, 2020

Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models.
CoRR, 2020

Fawkes: Protecting Privacy against Unauthorized Deep Learning Models.
Proceedings of the 29th USENIX Security Symposium, 2020

Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Demonstrating Wearable Microphone Jamming.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Wearable Microphone Jamming.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Persistent and Unforgeable Watermarks for Deep Neural Networks.
CoRR, 2019

Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks.
CoRR, 2019

Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks.
CoRR, 2019

Understanding the Effectiveness of Ultrasonic Microphone Jammer.
CoRR, 2019

Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Safely and automatically updating in-network ACL configurations with intent language.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Scaling Deep Learning Models for Spectrum Anomaly Detection.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

Towards Understanding the Adoption and Social Experience of Digital Wallet Systems.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Latent Backdoor Attacks on Deep Neural Networks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services.
IEEE/ACM Trans. Netw., 2018

Wireless Side-Lobe Eavesdropping Attacks.
CoRR, 2018

Adversarial WiFi Sensing.
CoRR, 2018

Seeding Deep Learning using Wireless Localization.
CoRR, 2018

Adversarial Localization against Wireless Cameras.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning.
Proceedings of the 27th USENIX Security Symposium, 2018

Predictive Analysis in Network Function Virtualization.
Proceedings of the Internet Measurement Conference 2018, 2018

Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash.
Proceedings of the 29th on Hypertext and Social Media, 2018

2017
Clickstream User Behavior Models.
ACM Trans. Web, 2017

Value and Misinformation in Collaborative Investing Platforms.
ACM Trans. Web, 2017

Toward Practical Spectrum Permits.
IEEE Trans. Cogn. Commun. Netw., 2017

Gender Bias in the Job Market: A Longitudinal Analysis.
Proc. ACM Hum. Comput. Interact., 2017

Identifying Value in Crowdsourced Wireless Signal Measurements.
Proceedings of the 26th International Conference on World Wide Web, 2017

Noncoherent mmWave Path Tracking.
Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, 2017

Object Recognition and Navigation using a Single Networking Device.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Complexity vs. performance: empirical analysis of machine learning as a service.
Proceedings of the 2017 Internet Measurement Conference, 2017

Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

A First Look at User Switching Behaviors Over Multiple Video Content Providers.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Echo Chambers in Investment Discussion Boards.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

On Migratory Behavior in Video Consumption.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Automated Crowdturfing Attacks and Defenses in Online Review Systems.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Self-Similarity in Social Network Dynamics.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

Understanding and Predicting Data Hotspots in Cellular Networks.
Mob. Networks Appl., 2016

The power of comments: fostering social interactions in microblog networks.
Frontiers Comput. Sci., 2016

Empirical Validation of Commodity Spectrum Monitoring.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Poster: Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Anatomy of a Personalized Livestreaming System.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Network Growth and Link Prediction Through an Empirical Lens.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Trimming the Smartphone Network Stack.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

Unsupervised Clickstream Clustering for User Behavior Analysis.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Practical Conflict Graphs in the Wild.
IEEE/ACM Trans. Netw., 2015

Graph Watermarks.
CoRR, 2015

Attacks and Defenses in Crowdsourced Mapping Services.
CoRR, 2015

Energy and Performance of Smartphone Radio Bundling in Outdoor Environments.
Proceedings of the 24th International Conference on World Wide Web, 2015

60GHz Mobile Imaging Radar.
Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, 2015

Packet-Level Telemetry in Large Datacenter Networks.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Reusing 60GHz Radios for Mobile Radar Imaging.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Interference Analysis for mm-Wave Picocells.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Towards Graph Watermarks.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

2014
Crowds on Wall Street: Extracting Value from Social Investing Platforms.
CoRR, 2014

Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Understanding data hotspots in cellular networks.
Proceedings of the 10th International Conference on Heterogeneous Networking for Quality, 2014

Cutting the cord: a robust wireless facilities network for data centers.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Demystifying 60GHz outdoor picocells.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Towards commoditized real-time spectrum monitoring.
Proceedings of the 1st ACM workshop on Hot topics in wireless, HotWireless 2014, Maui, 2014

Whispers in the dark: analysis of an anonymous social network.
Proceedings of the 2014 Internet Measurement Conference, 2014

Link and Triadic Closure Delay: Temporal Metrics for Social Network Dynamics.
Proceedings of the Eighth International Conference on Weblogs and Social Media, 2014

2013
Measurement-Based Design of Roadside Content Delivery Systems.
IEEE Trans. Mob. Comput., 2013

On the Embeddability of Random Walk Distances.
Proc. VLDB Endow., 2013

Wisdom in the social crowd: an analysis of quora.
Proceedings of the 22nd International World Wide Web Conference, 2013

You Are How You Click: Clickstream Analysis for Sybil Detection.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Practical conflict graphs for dynamic spectrum distribution.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Characterizing and detecting malicious crowdsourcing.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Social Turing Tests: Crowdsourcing Sybil Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Follow the green: growth and dynamics in twitter follower markets.
Proceedings of the 2013 Internet Measurement Conference, 2013

On the validity of geosocial mobility traces.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

2012
The effectiveness of opportunistic spectrum access: a measurement study.
IEEE/ACM Trans. Netw., 2012

Balancing Reliability and Utilization in Dynamic Spectrum Access.
IEEE/ACM Trans. Netw., 2012

On the Bursty Evolution of Online Social Networks
CoRR, 2012

Serf and turf: crowdturfing for fun and profit.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Mirror mirror on the ceiling: flexible wireless links for data centers.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Enforcing dynamic spectrum access with spectrum permits.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Multi-scale dynamics in a massive online social network.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Measurement-calibrated conflict graphs for dynamic spectrum distribution.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

Enforcing dynamic spectrum access with spectrum permits.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2011
The Impact of Infostation Density on Vehicular Data Dissemination.
Mob. Networks Appl., 2011

Revisiting Degree Distribution Models for Social Graph Analysis
CoRR, 2011

Fast and Scalable Analysis of Massive Social Graphs
CoRR, 2011

Papyrus: a software platform for distributed dynamic spectrum sharing using SDRs.
Comput. Commun. Rev., 2011

AirLab: consistency, fidelity and privacy in wireless measurements.
Comput. Commun. Rev., 2011

Privacy, availability and economics in the Polaris mobile social network.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

I am the antenna: accurate outdoor AP location using smartphones.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

To preempt or not: Tackling bid and time-based cheating in online spectrum auctions.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Sharing graphs using differentially private graph models.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

3D beamforming for wireless data centers.
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011

Efficient shortest paths on massive social graphs.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
Cross-Band Interference Considered Harmful in OFDM Based Distributed Spectrum Sharing
CoRR, 2010

Measurement-calibrated graph models for social network experiments.
Proceedings of the 19th International Conference on World Wide Web, 2010

Orion: Shortest Path Estimation for Large Social Graphs.
Proceedings of the 3rd Workshop on Online Social Networks, 2010

On Infostation Density of Vehicular Networks.
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010

Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Brief announcement: revisiting the power-law degree distribution for social graph analysis.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Supporting Demanding Wireless Applications with Frequency-agile Radios.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Breaking bidder collusion in large-scale spectrum auctions.
Proceedings of the 11th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2010

The spaces between us: setting and maintaining boundaries in wireless spectrum access.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

On the feasibility of effective opportunistic spectrum access.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
Securing Structured Overlays against Identity Attacks.
IEEE Trans. Parallel Distributed Syst., 2009

Editorial.
Phys. Commun., 2009

Preamble design for non-contiguous spectrum usage in cognitive radio networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Understanding cross-band interference in unsynchronized spectrum access.
Proceedings of the 2009 ACM Workshop on Cognitive Radio Networks, CoRoNet 2009, Beijing, 2009

TRUST: A General Framework for Truthful Double Spectrum Auctions.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Proactive channel access in dynamic spectrum networks.
Phys. Commun., 2008

Understanding the Power of Distributed Coordination for Dynamic Spectrum Management.
Mob. Networks Appl., 2008

Distributed Rule-Regulated Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2008

Towards real-time dynamic spectrum auctions.
Comput. Networks, 2008

Traffic-aware dynamic spectrum access.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Malware in IEEE 802.11 Wireless Networks.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

eBay in the Sky: strategy-proof wireless spectrum auctions.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

Stable and Efficient Spectrum Access in Next Generation Dynamic Spectrum Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
QUORUM - Quality of Service in Wireless Mesh Networks.
Mob. Networks Appl., 2007

Globally Decoupled Reputations for Large Distributed Networks.
Adv. Multim., 2007

QUORUM: quality of service routing in wireless mesh networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Multi-channel Jamming Attacks using Cognitive Radios.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Proactive Cannel Access in Dynaic Spectrum Networks.
Proceedings of the 2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007

On the Efficiency and Complexity of Distributed Spectrum Allocation.
Proceedings of the 2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007

2006
Utilization and fairness in spectrum assignment for opportunistic spectrum access.
Mob. Networks Appl., 2006

Location independent compact routing for wireless networks.
Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking, 2006

2005
Distributed spectrum allocation via local bargaining.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005


  Loading...