default search action
Haitao Zheng 0001
Person information
- unicode name: 郑海涛
- affiliation: University of Chicago, IL, USA
- affiliation: University of California, Santa Barbara, Department Computer Science, CA, USA
Other persons with the same name
- Haitao Zheng (aka: Hai-Tao Zheng) — disambiguation page
- Hai-Tao Zheng 0002 (aka: Haitao Zheng 0002) — Tsinghua University, Graduate School at Shenzhen, Shenzhen, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c107]Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng:
Towards Scalable and Robust Model Versioning. SaTML 2024: 592-611 - [c106]Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao:
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. SP 2024: 807-825 - [c105]Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng:
Can Virtual Reality Protect Users from Keystroke Inference Attacks? USENIX Security Symposium 2024 - [i41]Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng:
Towards Scalable and Robust Model Versioning. CoRR abs/2401.09574 (2024) - [i40]Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao:
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? CoRR abs/2402.03214 (2024) - [i39]Zhuolin Yang, Cathy Yuanchen Li, Arman Bhalla, Ben Y. Zhao, Haitao Zheng:
Inception Attacks: Immersive Hijacking in Virtual Reality Systems. CoRR abs/2403.05721 (2024) - [i38]Josephine Passananti, Stanley Wu, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
Disrupting Style Mimicry Attacks on Video Imagery. CoRR abs/2405.06865 (2024) - 2023
- [j29]Zhujun Xiao, Jenna Cryan, Yuanshun Yao, Yi Hong Gordon Cheo, Yuanchao Shu, Stefan Saroiu, Ben Y. Zhao, Haitao Zheng:
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing. Proc. Priv. Enhancing Technol. 2023(3): 252-267 (2023) - [j28]Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao:
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions. IEEE Trans. Mob. Comput. 22(1): 556-573 (2023) - [c104]Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Heather Zheng, Ben Zhao, Prateek Mittal:
Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker. NeurIPS 2023 - [c103]Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. SP 2023: 864-881 - [c102]Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng:
Towards a General Video-based Keystroke Inference Attack. USENIX Security Symposium 2023: 141-158 - [c101]Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao:
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. USENIX Security Symposium 2023: 2187-2204 - [i37]Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao:
GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models. CoRR abs/2302.04222 (2023) - [i36]Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Ben Y. Zhao, Haitao Zheng, Prateek Mittal:
Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker. CoRR abs/2302.10722 (2023) - [i35]Shawn Shan, Wenxin Ding, Josephine Passananti, Haitao Zheng, Ben Y. Zhao:
Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. CoRR abs/2310.13828 (2023) - [i34]Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng:
Can Virtual Reality Protect Users from Keystroke Inference Attacks? CoRR abs/2310.16191 (2023) - [i33]Shawn Shan, Stanley Wu, Haitao Zheng, Ben Y. Zhao:
A Response to Glaze Purification via IMPRESS. CoRR abs/2312.07731 (2023) - 2022
- [c100]Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. CCS 2022: 2611-2625 - [c99]Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Heather Zheng, Prateek Mittal:
Understanding Robust Learning through the Lens of Representation Similarities. NeurIPS 2022 - [c98]Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Heather Zheng, Ben Y. Zhao:
Finding Naturally Occurring Physical Backdoors in Image Datasets. NeurIPS 2022 - [c97]Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao:
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. USENIX Security Symposium 2022: 2117-2134 - [c96]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. USENIX Security Symposium 2022: 3575-3592 - [i32]Emily Wenger, Francesca Falzon, Josephine Passananti, Haitao Zheng, Ben Y. Zhao:
Assessing Privacy Risks from Feature Vector Reconstruction Attacks. CoRR abs/2202.05760 (2022) - [i31]Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. CoRR abs/2205.10686 (2022) - [i30]Huiying Li, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng:
Can Backdoor Attacks Survive Time-Varying Models? CoRR abs/2206.04677 (2022) - [i29]Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao:
Natural Backdoor Datasets. CoRR abs/2206.10673 (2022) - 2021
- [j27]Huan Yan, Haohao Fu, Yong Li, Tzu-Heng Lin, Gang Wang, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
On Migratory Behavior in Video Consumption. IEEE Trans. Netw. Serv. Manag. 18(2): 1775-1788 (2021) - [c95]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Patch-based Defenses against Web Fingerprinting Attacks. AISec@CCS 2021: 97-109 - [c94]Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao:
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. CCS 2021: 235-251 - [c93]Yuxin Chen, Zhuolin Yang, Ruben Abbou, Pedro Lopes, Ben Y. Zhao, Haitao Zheng:
User Authentication via Electrical Muscle Stimulation. CHI 2021: 6:1-6:15 - [c92]Yuxin Chen, Zhuolin Yang, Ruben Abbou, Pedro Lopes, Ben Y. Zhao, Haitao Zheng:
Demonstrating User Authentication via Electrical Muscle Stimulation. CHI Extended Abstracts 2021: 191:1-191:5 - [c91]Adrienne Raglin, Henry Hoffman, Mark R. Mittrick, Heather Zheng, Justine Caylor:
Artificial Reasoning Toward Goal-Oriented Adaptive Arrays of Sensors. CogMI 2021: 197-203 - [c90]Emily Wenger, Josephine Passananti, Arjun Nitin Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao:
Backdoor Attacks Against Deep Learning Systems in the Physical World. CVPR 2021: 6206-6215 - [c89]Zhujun Xiao, Zhengxu Xia, Haitao Zheng, Ben Y. Zhao, Junchen Jiang:
Towards Performance Clarity of Edge Video Analytics. SEC 2021: 148-164 - [c88]Ziyu Ye, Yuxin Chen, Haitao Zheng:
Understanding the Effect of Bias in Deep Anomaly Detection. IJCAI 2021: 3314-3320 - [i28]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
A Real-time Defense against Website Fingerprinting Attacks. CoRR abs/2102.04291 (2021) - [i27]Ziyu Ye, Yuxin Chen, Haitao Zheng:
Understanding the Effect of Bias in Deep Anomaly Detection. CoRR abs/2105.07346 (2021) - [i26]Zhujun Xiao, Zhengxu Xia, Haitao Zheng, Ben Y. Zhao, Junchen Jiang:
Towards Performance Clarity of Edge Video Analytics. CoRR abs/2105.08694 (2021) - [i25]Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, Ben Y. Zhao:
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World. CoRR abs/2109.09598 (2021) - [i24]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Traceback of Data Poisoning Attacks in Neural Networks. CoRR abs/2110.06904 (2021) - [i23]Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. CoRR abs/2112.04558 (2021) - 2020
- [j26]Ying Ju, Yanzi Zhu, Hui-Ming Wang, Qingqi Pei, Haitao Zheng:
Artificial Noise Hopping: A Practical Secure Transmission Technique With Experimental Analysis for Millimeter Wave Systems. IEEE Syst. J. 14(4): 5121-5132 (2020) - [c87]Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao:
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks. CCS 2020: 67-83 - [c86]Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, Haitao Zheng:
Wearable Microphone Jamming. CHI 2020: 1-12 - [c85]Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Haitao Zheng, Ben Y. Zhao:
Demonstrating Wearable Microphone Jamming. CHI Extended Abstracts 2020: 1-4 - [c84]Jenna Cryan, Shiliang Tang, Xinyi Zhang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods. CHI 2020: 1-11 - [c83]Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Heather Zheng:
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors. NDSS 2020 - [c82]Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. USENIX Security Symposium 2020: 1589-1604 - [e2]Ben Y. Zhao, Heather Zheng, Harsha V. Madhyastha, Venkat N. Padmanabhan:
HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4-6, 2020. ACM 2020, ISBN 978-1-4503-8145-1 [contents] - [i22]Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models. CoRR abs/2002.08327 (2020) - [i21]Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao:
Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks. CoRR abs/2006.14042 (2020) - [i20]Emily Wenger, Josephine Passananti, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao:
Backdoor Attacks on Facial Recognition in the Physical World. CoRR abs/2006.14580 (2020)
2010 – 2019
- 2019
- [c81]Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Latent Backdoor Attacks on Deep Neural Networks. CCS 2019: 2041-2055 - [c80]Shiliang Tang, Ziming Wu, Xinyi Zhang, Gang Wang, Xiaojuan Ma, Haitao Zheng, Ben Y. Zhao:
Towards Understanding the Adoption and Social Experience of Digital Wallet Systems. HICSS 2019: 1-10 - [c79]Zhijing Li, Zhujun Xiao, Bolun Wang, Ben Y. Zhao, Haitao Zheng:
Scaling Deep Learning Models for Spectrum Anomaly Detection. MobiHoc 2019: 291-300 - [c78]Bingchuan Tian, Xinyi Zhang, Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang, Da Yu, Chen Tian, Haitao Zheng, Ben Y. Zhao:
Safely and automatically updating in-network ACL configurations with intent language. SIGCOMM 2019: 214-226 - [c77]Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. IEEE Symposium on Security and Privacy 2019: 707-723 - [i19]Yuxin Chen, Huiying Li, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, Haitao Zheng:
Understanding the Effectiveness of Ultrasonic Microphone Jammer. CoRR abs/1904.08490 (2019) - [i18]Shawn Shan, Emily Willson, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao:
Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks. CoRR abs/1904.08554 (2019) - [i17]Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks. CoRR abs/1905.10447 (2019) - [i16]Huiying Li, Emily Willson, Haitao Zheng, Ben Y. Zhao:
Persistent and Unforgeable Watermarks for Deep Neural Networks. CoRR abs/1910.01226 (2019) - [i15]Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao:
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions. CoRR abs/1912.01328 (2019) - 2018
- [j25]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services. IEEE/ACM Trans. Netw. 26(3): 1123-1136 (2018) - [c76]Xinyi Zhang, Shawn Shan, Shiliang Tang, Haitao Zheng, Ben Y. Zhao:
Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash. HT 2018: 123-127 - [c75]Zhijing Li, Zihui Ge, Ajay Mahimkar, Jia Wang, Ben Y. Zhao, Haitao Zheng, Joanne Emmons, Laura Ogden:
Predictive Analysis in Network Function Virtualization. Internet Measurement Conference 2018: 161-167 - [c74]Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. USENIX Security Symposium 2018: 1281-1297 - [c73]Zhijing Li, Zhujun Xiao, Yanzi Zhu, Irene Pattarachanyakul, Ben Y. Zhao, Haitao Zheng:
Adversarial Localization against Wireless Cameras. HotMobile 2018: 87-92 - [i14]Zhujun Xiao, Yanzi Zhu, Yuxin Chen, Ben Y. Zhao, Junchen Jiang, Haitao Zheng:
Seeding Deep Learning using Wireless Localization. CoRR abs/1809.10242 (2018) - [i13]Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Haitao Zheng:
Adversarial WiFi Sensing. CoRR abs/1810.10109 (2018) - [i12]Yanzi Zhu, Ying Ju, Bolun Wang, Jenna Cryan, Ben Y. Zhao, Haitao Zheng:
Wireless Side-Lobe Eavesdropping Attacks. CoRR abs/1810.10157 (2018) - 2017
- [j24]Shiliang Tang, Xinyi Zhang, Jenna Cryan, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Gender Bias in the Job Market: A Longitudinal Analysis. Proc. ACM Hum. Comput. Interact. 1(CSCW): 99:1-99:19 (2017) - [j23]Ana Nika, Zengbin Zhang, Ben Y. Zhao, Haitao Zheng:
Toward Practical Spectrum Permits. IEEE Trans. Cogn. Commun. Netw. 3(1): 112-122 (2017) - [j22]Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao:
Value and Misinformation in Collaborative Investing Platforms. ACM Trans. Web 11(2): 8:1-8:32 (2017) - [j21]Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, Ben Y. Zhao:
Clickstream User Behavior Models. ACM Trans. Web 11(4): 21:1-21:37 (2017) - [c72]Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao:
Automated Crowdturfing Attacks and Defenses in Online Review Systems. CCS 2017: 1143-1158 - [c71]Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
On Migratory Behavior in Video Consumption. CIKM 2017: 1109-1118 - [c70]Shiliang Tang, Qingyun Liu, Megan McQueen, Scott Counts, Apurv Jain, Haitao Zheng, Ben Y. Zhao:
Echo Chambers in Investment Discussion Boards. ICWSM 2017: 240-249 - [c69]Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao:
Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System. ICWSM 2017: 387-396 - [c68]Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
A First Look at User Switching Behaviors Over Multiple Video Content Providers. ICWSM 2017: 700-703 - [c67]Yuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Complexity vs. performance: empirical analysis of machine learning as a service. Internet Measurement Conference 2017: 384-397 - [c66]Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao, Haitao Zheng:
Object Recognition and Navigation using a Single Networking Device. MobiSys 2017: 265-277 - [c65]Maryam Eslami Rasekh, Zhinus Marzi, Yanzi Zhu, Upamanyu Madhow, Haitao Zheng:
Noncoherent mmWave Path Tracking. HotMobile 2017: 13-18 - [c64]Zhijing Li, Ana Nika, Xinyi Zhang, Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao, Haitao Zheng:
Identifying Value in Crowdsourced Wireless Signal Measurements. WWW 2017: 607-616 - [i11]Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao:
Automated Crowdturfing Attacks and Defenses in Online Review Systems. CoRR abs/1708.08151 (2017) - 2016
- [j20]Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao:
The power of comments: fostering social interactions in microblog networks. Frontiers Comput. Sci. 10(5): 889-907 (2016) - [j19]Ana Nika, Asad Ismail, Ben Y. Zhao, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng:
Understanding and Predicting Data Hotspots in Cellular Networks. Mob. Networks Appl. 21(3): 402-413 (2016) - [j18]Qingyun Liu, Xiaohan Zhao, Walter Willinger, Xiao Wang, Ben Y. Zhao, Haitao Zheng:
Self-Similarity in Social Network Dynamics. ACM Trans. Model. Perform. Evaluation Comput. Syst. 2(1): 5:1-5:26 (2016) - [c63]Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao:
Unsupervised Clickstream Clustering for User Behavior Analysis. CHI 2016: 225-236 - [c62]Yanzi Zhu, Yibo Zhu, Ana Nika, Ben Y. Zhao, Haitao Zheng:
Trimming the Smartphone Network Stack. HotNets 2016: 176-182 - [c61]Gang Wang, Sarita Yardi Schoenebeck, Haitao Zheng, Ben Y. Zhao:
"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks. ICWSM 2016: 417-426 - [c60]Qingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao, Haitao Zheng:
Network Growth and Link Prediction Through an Empirical Lens. Internet Measurement Conference 2016: 1-15 - [c59]Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao:
Anatomy of a Personalized Livestreaming System. Internet Measurement Conference 2016: 485-498 - [c58]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Poster: Defending against Sybil Devices in Crowdsourced Mapping Services. MobiSys (Companion Volume) 2016: 146 - [c57]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Defending against Sybil Devices in Crowdsourced Mapping Services. MobiSys 2016: 179-191 - [c56]Ana Nika, Zhijing Li, Yanzi Zhu, Yibo Zhu, Ben Y. Zhao, Xia Zhou, Haitao Zheng:
Empirical Validation of Commodity Spectrum Monitoring. SenSys 2016: 96-108 - 2015
- [j17]Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:
Practical Conflict Graphs in the Wild. IEEE/ACM Trans. Netw. 23(3): 824-835 (2015) - [c55]Xiaohan Zhao, Qingyun Liu, Haitao Zheng, Ben Y. Zhao:
Towards Graph Watermarks. COSN 2015: 101-112 - [c54]Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao:
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms. CSCW 2015: 17-30 - [c53]Zhinus Marzi, Upamanyu Madhow, Haitao Zheng:
Interference Analysis for mm-Wave Picocells. GLOBECOM 2015: 1-6 - [c52]Yanzi Zhu, Yibo Zhu, Ben Y. Zhao, Haitao Zheng:
Reusing 60GHz Radios for Mobile Radar Imaging. MobiCom 2015: 103-116 - [c51]Yibo Zhu, Nanxi Kang, Jiaxin Cao, Albert G. Greenberg, Guohan Lu, Ratul Mahajan, David A. Maltz, Lihua Yuan, Ming Zhang, Ben Y. Zhao, Haitao Zheng:
Packet-Level Telemetry in Large Datacenter Networks. SIGCOMM 2015: 479-491 - [c50]Yibo Zhu, Yanzi Zhu, Zengbin Zhang, Ben Y. Zhao, Haitao Zheng:
60GHz Mobile Imaging Radar. HotMobile 2015: 75-80 - [c49]Ana Nika, Yibo Zhu, Ning Ding, Abhilash Jindal, Y. Charlie Hu, Xia Zhou, Ben Y. Zhao, Haitao Zheng:
Energy and Performance of Smartphone Radio Bundling in Outdoor Environments. WWW 2015: 809-819 - [e1]Serge Fdida, Giovanni Pau, Sneha Kumar Kasera, Heather Zheng:
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom 2015, Paris, France, September 7-11, 2015. ACM 2015, ISBN 978-1-4503-3619-2 [contents] - [i10]Xiaohan Zhao, Qingyun Liu, Lin Zhou, Haitao Zheng, Ben Y. Zhao:
Graph Watermarks. CoRR abs/1506.00022 (2015) - [i9]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Bingzhe Liu, Haitao Zheng, Ben Y. Zhao:
Attacks and Defenses in Crowdsourced Mapping Services. CoRR abs/1508.00837 (2015) - 2014
- [c48]Matteo Zignani, Sabrina Gaito, Gian Paolo Rossi, Xiaohan Zhao, Haitao Zheng, Ben Y. Zhao:
Link and Triadic Closure Delay: Temporal Metrics for Social Network Dynamics. ICWSM 2014 - [c47]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Whispers in the dark: analysis of an anonymous social network. Internet Measurement Conference 2014: 137-150 - [c46]Yibo Zhu, Zengbin Zhang, Zhinus Marzi, Chris Nelson, Upamanyu Madhow, Ben Y. Zhao, Haitao Zheng:
Demystifying 60GHz outdoor picocells. MobiCom 2014: 5-16 - [c45]Ana Nika, Zengbin Zhang, Xia Zhou, Ben Y. Zhao, Haitao Zheng:
Towards commoditized real-time spectrum monitoring. HotWireless@MobiCom 2014: 25-30 - [c44]Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao, Haitao Zheng:
Cutting the cord: a robust wireless facilities network for data centers. MobiCom 2014: 581-592 - [c43]Ana Nika, Asad Ismail, Ben Y. Zhao, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng:
Understanding data hotspots in cellular networks. QSHINE 2014: 70-76 - [c42]Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao:
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. USENIX Security Symposium 2014: 239-254 - [i8]Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao:
Crowds on Wall Street: Extracting Value from Social Investing Platforms. CoRR abs/1406.1137 (2014) - 2013
- [j16]Xiaohan Zhao, Adelbert Chang, Atish Das Sarma, Haitao Zheng, Ben Y. Zhao:
On the Embeddability of Random Walk Distances. Proc. VLDB Endow. 6(14): 1690-1701 (2013) - [j15]Vinod Kone, Haitao Zheng, Antony I. T. Rowstron, Greg O'Shea, Ben Y. Zhao:
Measurement-Based Design of Roadside Content Delivery Systems. IEEE Trans. Mob. Comput. 12(6): 1160-1173 (2013) - [c41]Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
On the validity of geosocial mobility traces. HotNets 2013: 11:1-11:7 - [c40]Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao:
Follow the green: growth and dynamics in twitter follower markets. Internet Measurement Conference 2013: 163-176 - [c39]Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Social Turing Tests: Crowdsourcing Sybil Detection. NDSS 2013 - [c38]Tianyi Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao:
Characterizing and detecting malicious crowdsourcing. SIGCOMM 2013: 537-538 - [c37]Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:
Practical conflict graphs for dynamic spectrum distribution. SIGMETRICS 2013: 5-16 - [c36]Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao:
You Are How You Click: Clickstream Analysis for Sybil Detection. USENIX Security Symposium 2013: 241-256 - [c35]Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao:
Wisdom in the social crowd: an analysis of quora. WWW 2013: 1341-1352 - 2012
- [j14]Lili Cao, Haitao Zheng:
Balancing Reliability and Utilization in Dynamic Spectrum Access. IEEE/ACM Trans. Netw. 20(3): 651-661 (2012) - [j13]Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haitao Zheng:
The effectiveness of opportunistic spectrum access: a measurement study. IEEE/ACM Trans. Netw. 20(6): 2005-2016 (2012) - [c34]Zengbin Zhang, Lei Yang, Yibo Zhu, Ben Y. Zhao, Haitao Zheng:
Enforcing dynamic spectrum access with spectrum permits. DySPAN 2012: 278-279 - [c33]Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:
Measurement-calibrated conflict graphs for dynamic spectrum distribution. DySPAN 2012: 287 - [c32]Xiaohan Zhao, Alessandra Sala, Christo Wilson, Xiao Wang, Sabrina Gaito, Haitao Zheng, Ben Y. Zhao:
Multi-scale dynamics in a massive online social network. Internet Measurement Conference 2012: 171-184 - [c31]Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher Kruegel, Haitao Zheng:
Enforcing dynamic spectrum access with spectrum permits. MobiHoc 2012: 195-204 - [c30]Xia Zhou, Zengbin Zhang, Yibo Zhu, Yubo Li, Saipriya Kumar, Amin Vahdat, Ben Y. Zhao, Haitao Zheng:
Mirror mirror on the ceiling: flexible wireless links for data centers. SIGCOMM 2012: 443-454 - [c29]Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao:
Serf and turf: crowdturfing for fun and profit. WWW 2012: 679-688 - [i7]Sabrina Gaito, Matteo Zignani, Gian Paolo Rossi, Alessandra Sala, Xiao Wang, Haitao Zheng, Ben Y. Zhao:
On the Bursty Evolution of Online Social Networks. CoRR abs/1203.6744 (2012) - [i6]Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Social Turing Tests: Crowdsourcing Sybil Detection. CoRR abs/1205.3856 (2012) - [i5]Xiaohan Zhao, Alessandra Sala, Christo Wilson, Xiao Wang, Sabrina Gaito, Haitao Zheng, Ben Y. Zhao:
Multi-scale Dynamics in a Massive Online Social Network. CoRR abs/1205.4013 (2012) - 2011
- [j12]Lei Yang, Zengbin Zhang, Wei Hou, Ben Y. Zhao, Haitao Zheng:
Papyrus: a software platform for distributed dynamic spectrum sharing using SDRs. Comput. Commun. Rev. 41(1): 31-37 (2011) - [j11]Vinod Kone, Mariya Zheleva, Mike P. Wittie, Ben Y. Zhao, Elizabeth M. Belding, Haitao Zheng, Kevin C. Almeroth:
AirLab: consistency, fidelity and privacy in wireless measurements. Comput. Commun. Rev. 41(1): 60-65 (2011) - [j10]Vinod Kone, Haitao Zheng, Antony I. T. Rowstron, Ben Y. Zhao:
The Impact of Infostation Density on Vehicular Data Dissemination. Mob. Networks Appl. 16(6): 807-819 (2011) - [c28]Xiaohan Zhao, Alessandra Sala, Haitao Zheng, Ben Y. Zhao:
Efficient shortest paths on massive social graphs. CollaborateCom 2011: 77-86 - [c27]Weile Zhang, Xia Zhou, Lei Yang, Zengbin Zhang, Ben Y. Zhao, Haitao Zheng:
3D beamforming for wireless data centers. HotNets 2011: 4 - [c26]Alessandra Sala, Xiaohan Zhao, Christo Wilson, Haitao Zheng, Ben Y. Zhao:
Sharing graphs using differentially private graph models. Internet Measurement Conference 2011: 81-98 - [c25]Lara B. Deek, Xia Zhou, Kevin C. Almeroth, Haitao Zheng:
To preempt or not: Tackling bid and time-based cheating in online spectrum auctions. INFOCOM 2011: 2219-2227 - [c24]Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng:
I am the antenna: accurate outdoor AP location using smartphones. MobiCom 2011: 109-120 - [c23]Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng, Ben Y. Zhao:
Privacy, availability and economics in the Polaris mobile social network. HotMobile 2011: 42-47 - [i4]Xiaohan Zhao, Alessandra Sala, Haitao Zheng, Ben Y. Zhao:
Fast and Scalable Analysis of Massive Social Graphs. CoRR abs/1107.5114 (2011) - [i3]Alessandra Sala, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng, Ben Y. Zhao:
Revisiting Degree Distribution Models for Social Graph Analysis. CoRR abs/1108.0027 (2011) - [i2]Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao:
Serf and Turf: Crowdturfing for Fun and Profit. CoRR abs/1111.5654 (2011) - 2010
- [c22]Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haitao Zheng:
On the feasibility of effective opportunistic spectrum access. Internet Measurement Conference 2010: 151-164 - [c21]Lei Yang, Ben Y. Zhao, Haitao Zheng:
The spaces between us: setting and maintaining boundaries in wireless spectrum access. MobiCom 2010: 37-48 - [c20]Xia Zhou, Haitao Zheng:
Breaking bidder collusion in large-scale spectrum auctions. MobiHoc 2010: 121-130 - [c19]Lei Yang, Wei Hou, Lili Cao, Ben Y. Zhao, Haitao Zheng:
Supporting Demanding Wireless Applications with Frequency-agile Radios. NSDI 2010: 65-80 - [c18]Alessandra Sala, Haitao Zheng, Ben Y. Zhao, Sabrina Gaito, Gian Paolo Rossi:
Brief announcement: revisiting the power-law degree distribution for social graph analysis. PODC 2010: 400-401 - [c17]Lei Yang, Vinod Kone, Xue Yang, York Liu, Ben Y. Zhao, Haitao Zheng:
Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices. SECON 2010: 288-296 - [c16]Vinod Kone, Haitao Zheng, Antony I. T. Rowstron, Ben Y. Zhao:
On Infostation Density of Vehicular Networks. WICON 2010: 1-9 - [c15]Xiaohan Zhao, Haitao Zheng:
Orion: Shortest Path Estimation for Large Social Graphs. WOSN 2010 - [c14]Alessandra Sala, Lili Cao, Christo Wilson, Robert Zablit, Haitao Zheng, Ben Y. Zhao:
Measurement-calibrated graph models for social network experiments. WWW 2010: 861-870 - [i1]Wei Hou, Lin Zhang, Lei Yang, Heather Zheng, Xiuming Shan:
Cross-Band Interference Considered Harmful in OFDM Based Distributed Spectrum Sharing. CoRR abs/1005.2731 (2010)
2000 – 2009
- 2009
- [j9]Aawatif Hayar, Dana Porrat, Heather Zheng, Honggang Zhang, Sai Shankar Nandagopalan:
Editorial. Phys. Commun. 2(1-2): 1-2 (2009) - [j8]Krishna P. N. Puttaswamy, Heather Zheng, Ben Y. Zhao:
Securing Structured Overlays against Identity Attacks. IEEE Trans. Parallel Distributed Syst. 20(10): 1487-1498 (2009) - [c13]Xia Zhou, Haitao Zheng:
TRUST: A General Framework for Truthful Double Spectrum Auctions. INFOCOM 2009: 999-1007 - [c12]Wei Hou, Lei Yang, Lin Zhang, Xiuming Shan, Heather Zheng:
Understanding cross-band interference in unsynchronized spectrum access. CoRoNet@MobiCom 2009: 19-24 - [c11]Shulan Feng, Heather Zheng, Haiguang Wang, Jinnan Liu, Philipp Zhang:
Preamble design for non-contiguous spectrum usage in cognitive radio networks. WCNC 2009: 705-710 - 2008
- [j7]Sorabh Gandhi, Chiranjeeb Buragohain, Lili Cao, Haitao Zheng, Subhash Suri:
Towards real-time dynamic spectrum auctions. Comput. Networks 52(4): 879-897 (2008) - [j6]Lili Cao, Haitao Zheng:
Distributed Rule-Regulated Spectrum Sharing. IEEE J. Sel. Areas Commun. 26(1): 130-145 (2008) - [j5]Lili Cao, Haitao Zheng:
Understanding the Power of Distributed Coordination for Dynamic Spectrum Management. Mob. Networks Appl. 13(5): 477-497 (2008) - [j4]Lei Yang, Lili Cao, Haitao Zheng:
Proactive channel access in dynamic spectrum networks. Phys. Commun. 1(2): 103-111 (2008) - [c10]Lili Cao, Haitao Zheng:
Stable and Efficient Spectrum Access in Next Generation Dynamic Spectrum Networks. INFOCOM 2008: 870-878 - [c9]Xia Zhou, Sorabh Gandhi, Subhash Suri, Haitao Zheng:
eBay in the Sky: strategy-proof wireless spectrum auctions. MobiCom 2008: 2-13 - [c8]Brett Stone-Gross, Christo Wilson, Kevin C. Almeroth, Elizabeth M. Belding, Heather Zheng, Konstantina Papagiannaki:
Malware in IEEE 802.11 Wireless Networks. PAM 2008: 222-231 - [c7]Lei Yang, Lili Cao, Heather Zheng, Elizabeth M. Belding:
Traffic-aware dynamic spectrum access. WICON 2008: 10 - 2007
- [j3]Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth, Haitao Zheng:
Globally Decoupled Reputations for Large Distributed Networks. Adv. Multim. 2007: 92485:1-92485:14 (2007) - [j2]Vinod Kone, Sudipto Das, Ben Y. Zhao, Haitao Zheng:
QUORUM - Quality of Service in Wireless Mesh Networks. Mob. Networks Appl. 12(5-6): 358-369 (2007) - [c6]Lili Cao, Haitao Zheng:
On the Efficiency and Complexity of Distributed Spectrum Allocation. CrownCom 2007: 357-366 - [c5]Lei Yang, Lili Cao, Haitao Zheng:
Proactive Cannel Access in Dynaic Spectrum Networks. CrownCom 2007: 487-491 - [c4]Ashwin Sampath, Hui Dai, Haitao Zheng, Ben Y. Zhao:
Multi-channel Jamming Attacks using Cognitive Radios. ICCCN 2007: 352-357 - [c3]Vinod Kone, Sudipto Das, Ben Y. Zhao, Haitao Zheng:
QUORUM: quality of service routing in wireless mesh networks. QSHINE 2007: 18 - 2006
- [j1]Chunyi Peng, Haitao Zheng, Ben Y. Zhao:
Utilization and fairness in spectrum assignment for opportunistic spectrum access. Mob. Networks Appl. 11(4): 555-576 (2006) - [c2]Robert Gilbert, Kerby Johnson, Shaomei Wu, Ben Y. Zhao, Haitao Zheng:
Location independent compact routing for wireless networks. MobiShare@MobiCom 2006: 57-59 - 2005
- [c1]Lili Cao, Haitao Zheng:
Distributed spectrum allocation via local bargaining. SECON 2005: 475-486
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint