Follow
Benjamin Zi Hao Zhao
Title
Cited by
Cited by
Year
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
3012020
Hidden backdoors in human-centric language models
S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
882021
On the (in) feasibility of attribute inference attacks on machine learning models
BZH Zhao, A Agrawal, C Coburn, HJ Asghar, R Bhaskar, MA Kaafar, ...
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 232-251, 2021
352021
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
322019
Deep learning backdoors
S Li, S Ma, M Xue, BZH Zhao
Security and Artificial Intelligence: A Crossdisciplinary Approach, 313-334, 2022
302022
The audio auditor: user-level membership inference in internet of things voice services
Y Miao, M Xue, C Chen, L Pan, J Zhang, BZH Zhao, D Kaafar, Y Xiang
arXiv preprint arXiv:1905.07082, 2019
302019
Touch and you’re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings on Privacy Enhancing Technologies, 2018
222018
With great dispersion comes greater resilience: Efficient poisoning attacks and defenses for linear regression models
J Wen, BZH Zhao, M Xue, A Oprea, H Qian
IEEE Transactions on Information Forensics and Security 16, 3709-3723, 2021
212021
On the Resilience of Biometric Authentication Systems against Random Inputs
BZH Zhao, HJ Asghar, MA Kaafar
Network and Distributed System Security Symposium 2020, 2020
212020
Not one but many tradeoffs: Privacy vs. utility in differentially private machine learning
BZH Zhao, MA Kaafar, N Kourtellis
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security …, 2020
202020
Backdoors against natural language processing: A review
S Li, T Dong, BZH Zhao, M Xue, S Du, H Zhu
IEEE Security & Privacy 20 (5), 50-59, 2022
152022
On inferring training data attributes in machine learning models
BZH Zhao, HJ Asghar, R Bhaskar, MA Kaafar
arXiv preprint arXiv:1908.10558, 2019
132019
The audio auditor: Participant-level membership inference in voice-based iot
Y Miao, BZH Zhao, M Xue, C Chen, L Pan, J Zhang, D Kaafar, Y Xiang
arXiv preprint arXiv:1905.07082, 2019
112019
BehavioCog: An observation resistant authentication scheme
J Chauhan, BZH Zhao, HJ Asghar, J Chan, MA Kaafar
Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
72017
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models
L Chen, H Wang, BZH Zhao, M Xue, H Qian
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
62021
PALOR: Poisoning attacks against logistic regression
J Wen, BZH Zhao, M Xue, H Qian
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
52020
A longitudinal study of the top 1% toxic Twitter profiles
H Qayyum, B Zi Hao Zhao, I Wood, M Ikram, N Kourtellis, M Ali Kaafar
Proceedings of the 15th ACM Web Science Conference 2023, 292-303, 2023
42023
DDoD: Dual Denial of Decision Attacks on Human-AI Teams
B Tag, N Van Berkel, S Verma, BZH Zhao, S Berkovsky, D Kaafar, ...
IEEE Pervasive Computing 22 (1), 77-84, 2023
32023
POSTER: TouchTrack: How Unique are your Touch Gestures?
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
32017
Use of cryptography in malware obfuscation
HJ Asghar, BZH Zhao, M Ikram, G Nguyen, D Kaafar, S Lamont, D Coscia
Journal of Computer Virology and Hacking Techniques 20 (1), 135-152, 2024
22024
The system can't perform the operation now. Try again later.
Articles 1–20