Zi Hao Zhao, Benjamin
761  results:
Search for persons X
?
1

A longitudinal study of the top 1% toxic Twitter profiles:

, In: Proceedings of the 15th ACM Web Science Conference 2023,
Qayyum, Hina ; Zi Hao Zhao, Benjamin ; Wood, Ian... - p. 292-303 , 2023
 
?
2

Those Aren't Your Memories, They're Somebody Else's: Seedin..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
3

Use of cryptography in malware obfuscation:

Asghar, Hassan Jameel ; Zhao, Benjamin Zi Hao ; Ikram, Muhammad...
Journal of Computer Virology and Hacking Techniques.  20 (2023)  1 - p. 135-152 , 2023
 
?
4

On mission Twitter Profiles: A Study of Selective Toxic Beh..:

, In: 2023 IEEE International Conference on Big Data (BigData),
Qayyum, Hina ; Ikram, Muhammad ; Zhao, Benjamin Zi Hao... - p. 3634-3643 , 2023
 
?
5

Exploring the Distinctive Tweeting Patterns of Toxic Twitte..:

, In: 2023 IEEE International Conference on Big Data (BigData),
Qayyum, Hina ; Ikram, Muhammad ; Zhao, Benjamin Zi Hao... - p. 3624-3633 , 2023
 
?
 
?
8

Deep Learning Backdoors:

, In: Security and Artificial Intelligence; Lecture Notes in Computer Science,
Li, Shaofeng ; Ma, Shiqing ; Xue, Minhui. - p. 313-334 , 2022
 
?
9

Hidden Backdoors in Human-Centric Language Models:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
Li, Shaofeng ; Liu, Hui ; Dong, Tian... - p. 3123-3140 , 2021
 
?
10

On the (In)Feasibility of Attribute Inference Attacks on Ma..:

, In: 2021 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
11

Oriole: Thwarting Privacy Against Trustworthy Deep Learning..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Chen, Liuqiao ; Wang, Hu ; Zhao, Benjamin Zi Hao.. - p. 550-568 , 2021
 
?
13

The Audio Auditor: User-Level Membership Inference in Inter..:

Miao, Yuantian ; Xue, Minhui ; Chen, Chao...
Proceedings on Privacy Enhancing Technologies.  2021 (2020)  1 - p. 209-228 , 2020
 
?
14

Not one but many Tradeoffs : Privacy Vs. Utility in Diff..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop,
 
?
15

PALOR: Poisoning Attacks Against Logistic Regression:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Wen, Jialin ; Zhao, Benjamin Zi Hao ; Xue, Minhui. - p. 447-460 , 2020
 
1-15