关注
Benjamin Zi Hao Zhao
Benjamin Zi Hao Zhao
在 mq.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
3332020
Hidden backdoors in human-centric language models
S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
1092021
On the (in) feasibility of attribute inference attacks on machine learning models
BZH Zhao, A Agrawal, C Coburn, HJ Asghar, R Bhaskar, MA Kaafar, ...
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 232-251, 2021
422021
Deep learning backdoors
S Li, S Ma, M Xue, BZH Zhao
Security and Artificial Intelligence: A Crossdisciplinary Approach, 313-334, 2022
342022
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
342019
The audio auditor: user-level membership inference in internet of things voice services
Y Miao, M Xue, C Chen, L Pan, J Zhang, BZH Zhao, D Kaafar, Y Xiang
arXiv preprint arXiv:1905.07082, 2019
312019
On the Resilience of Biometric Authentication Systems against Random Inputs
BZH Zhao, HJ Asghar, MA Kaafar
Network and Distributed System Security Symposium 2020, 2020
222020
Touch and you’re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings on Privacy Enhancing Technologies, 2018
222018
With great dispersion comes greater resilience: Efficient poisoning attacks and defenses for linear regression models
J Wen, BZH Zhao, M Xue, A Oprea, H Qian
IEEE Transactions on Information Forensics and Security 16, 3709-3723, 2021
212021
Backdoors against natural language processing: A review
S Li, T Dong, BZH Zhao, M Xue, S Du, H Zhu
IEEE Security & Privacy 20 (5), 50-59, 2022
202022
Not one but many tradeoffs: Privacy vs. utility in differentially private machine learning
BZH Zhao, MA Kaafar, N Kourtellis
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security …, 2020
202020
On inferring training data attributes in machine learning models
BZH Zhao, HJ Asghar, R Bhaskar, MA Kaafar
arXiv preprint arXiv:1908.10558, 2019
132019
The audio auditor: Participant-level membership inference in voice-based iot
Y Miao, BZH Zhao, M Xue, C Chen, L Pan, J Zhang, D Kaafar, Y Xiang
arXiv preprint arXiv:1905.07082, 2019
112019
BehavioCog: An observation resistant authentication scheme
J Chauhan, BZH Zhao, HJ Asghar, J Chan, MA Kaafar
Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
72017
Use of cryptography in malware obfuscation
HJ Asghar, BZH Zhao, M Ikram, G Nguyen, D Kaafar, S Lamont, D Coscia
Journal of Computer Virology and Hacking Techniques 20 (1), 135-152, 2024
62024
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models
L Chen, H Wang, BZH Zhao, M Xue, H Qian
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
62021
A longitudinal study of the top 1% toxic Twitter profiles
H Qayyum, B Zi Hao Zhao, I Wood, M Ikram, N Kourtellis, M Ali Kaafar
Proceedings of the 15th ACM Web Science Conference 2023, 292-303, 2023
52023
PALOR: Poisoning attacks against logistic regression
J Wen, BZH Zhao, M Xue, H Qian
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
52020
DDoD: Dual Denial of Decision Attacks on Human-AI Teams
B Tag, N Van Berkel, S Verma, BZH Zhao, S Berkovsky, D Kaafar, ...
IEEE Pervasive Computing 22 (1), 77-84, 2023
32023
POSTER: TouchTrack: How Unique are your Touch Gestures?
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
32017
系统目前无法执行此操作,请稍后再试。
文章 1–20