Ben Y. Zhao

Google Scholar
26 publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
Can Virtual Reality Protect Users from Keystroke Inference Attacks?
2023
conf/uss
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models.
2023
conf/uss
Towards a General Video-based Keystroke Inference Attack.
2022
conf/uss
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks.
2022
conf/uss
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks.
2020
conf/uss
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models.
2020
conf/ndss
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors.
2018
conf/uss
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning.
2017
conf/uss
SecurePost: Verified Group-Anonymity on Social Media.
2014
conf/uss
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers.
2013
conf/uss
You Are How You Click: Clickstream Analysis for Sybil Detection.
2013
conf/ndss
Social Turing Tests: Crowdsourcing Sybil Detection.
Filters
Years:  to