What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Benjamin Zi Hao Zhao
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sec
Facing the Challenge of Leveraging Untrained Humans in Malware Analysis.
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Muhammad Ikram
Mohamed Ali Kâafar
Sean Lamont
Daniel Coscia
2024
conf/uss
DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts.
Shuo Wang
Hongsheng Hu
Jiamin Chang
Benjamin Zi Hao Zhao
Qi Alfred Chen
Minhui Xue
2024
conf/sp
LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs.
Shuo Wang
Hongsheng Hu
Jiamin Chang
Benjamin Zi Hao Zhao
Minhui Xue
2024
conf/esorics
On the Robustness of Malware Detectors to Adversarial Samples.
Muhammad Salman
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Muhammad Ikram
Sidharth Kaushik
Mohamed Ali Kâafar
2023
journals/popets
Unintended Memorization and Timing Attacks in Named Entity Recognition Models.
Rana Salal Ali
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Tham Nguyen
Ian David Wood
Mohamed Ali Kâafar
2023
conf/acns
Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
Conor Atkins
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Ian D. Wood
Mohamed Ali Kâafar
2021
journals/tifs
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
Jialin Wen
Benjamin Zi Hao Zhao
Minhui Xue
Alina Oprea
Haifeng Qian
2021
journals/popets
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Yuantian Miao
Minhui Xue
Chao Chen
Lei Pan
Jun Zhang
Benjamin Zi Hao Zhao
Dali Kaafar
Yang Xiang
2021
conf/ccs
Hidden Backdoors in Human-Centric Language Models.
Shaofeng Li
Hui Liu
Tian Dong
Benjamin Zi Hao Zhao
Minhui Xue
Haojin Zhu
Jialiang Lu
2021
conf/acisp
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models.
Liuqiao Chen
Hu Wang
Benjamin Zi Hao Zhao
Minhui Xue
Haifeng Qian
2021
conf/eurosp
On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models.
Benjamin Zi Hao Zhao
Aviral Agrawal
Catisha Coburn
Hassan Jameel Asghar
Raghav Bhaskar
Mohamed Ali Kâafar
Darren Webb
Peter Dickinson
2020
conf/acisp
PALOR: Poisoning Attacks Against Logistic Regression.
Jialin Wen
Benjamin Zi Hao Zhao
Minhui Xue
Haifeng Qian
2020
conf/ccsw-ws
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning.
Benjamin Zi Hao Zhao
Mohamed Ali Kâafar
Nicolas Kourtellis
2020
conf/ndss
On the Resilience of Biometric Authentication Systems against Random Inputs.
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Mohamed Ali Kâafar
2019
conf/ccs
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Benjamin Zi Hao Zhao
Muhammad Ikram
Hassan Jameel Asghar
Mohamed Ali Kâafar
Abdelberi Chaabane
Kanchana Thilakarathna
2018
journals/popets
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Rahat Masood
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Mohamed Ali Kâafar
2017
conf/ccs
POSTER: TouchTrack: How Unique are your Touch Gestures?
Rahat Masood
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Mohamed Ali Kâafar
2017
conf/fc
BehavioCog: An Observation Resistant Authentication Scheme.
Jagmohan Chauhan
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Jonathan Chan
Mohamed Ali Kâafar
Coauthors
Abdelberi Chaabane
(1)
Alina Oprea
(1)
Aviral Agrawal
(1)
Benjamin Zi Hao Zhao
(18)
Catisha Coburn
(1)
Chao Chen
(1)
Conor Atkins
(1)
Dali Kaafar
(1)
Daniel Coscia
(1)
Darren Webb
(1)
Haifeng Qian
(3)
Haojin Zhu
(1)
Hassan Jameel Asghar
(10)
Hongsheng Hu
(2)
Hu Wang
(1)
Hui Liu
(1)
Ian D. Wood
(1)
Ian David Wood
(1)
Jagmohan Chauhan
(1)
Jialiang Lu
(1)
Jialin Wen
(2)
Jiamin Chang
(2)
Jonathan Chan
(1)
Jun Zhang
(1)
Kanchana Thilakarathna
(1)
Lei Pan
(1)
Liuqiao Chen
(1)
Minhui Xue
(7)
Mohamed Ali Kâafar
(11)
Muhammad Ikram
(3)
Muhammad Salman
(1)
Nicolas Kourtellis
(1)
Peter Dickinson
(1)
Qi Alfred Chen
(1)
Raghav Bhaskar
(1)
Rahat Masood
(2)
Rana Salal Ali
(1)
Sean Lamont
(1)
Shaofeng Li
(1)
Shuo Wang
(2)
Sidharth Kaushik
(1)
Tham Nguyen
(1)
Tian Dong
(1)
Yang Xiang
(1)
Yuantian Miao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to